0s autopkgtest [00:25:06]: starting date and time: 2025-03-16 00:25:06+0000 0s autopkgtest [00:25:06]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [00:25:06]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.k98a_rmm/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:glibc --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=glibc/2.41-1ubuntu2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@lcy02-5.secgroup --name adt-plucky-amd64-sssd-20250315-231905-juju-7f2275-prod-proposed-migration-environment-2-e64cd8d8-a50d-4522-b89f-1d4135e93e22 --image adt/ubuntu-plucky-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 52s autopkgtest [00:25:58]: testbed dpkg architecture: amd64 52s autopkgtest [00:25:58]: testbed apt version: 2.9.31ubuntu1 52s autopkgtest [00:25:58]: @@@@@@@@@@@@@@@@@@@@ test bed setup 52s autopkgtest [00:25:58]: testbed release detected to be: None 52s autopkgtest [00:25:58]: updating testbed package index (apt update) 52s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [126 kB] 52s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 52s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 52s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 52s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [41.4 kB] 52s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [365 kB] 52s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [17.7 kB] 52s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 Packages [84.0 kB] 52s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main i386 Packages [66.6 kB] 52s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 c-n-f Metadata [1844 B] 52s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/restricted amd64 c-n-f Metadata [116 B] 52s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/universe i386 Packages [168 kB] 52s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 Packages [338 kB] 52s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 c-n-f Metadata [14.9 kB] 52s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse amd64 Packages [18.0 kB] 52s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse i386 Packages [9324 B] 52s Get:17 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse amd64 c-n-f Metadata [628 B] 53s Fetched 1252 kB in 0s (6007 kB/s) 54s Reading package lists... 54s Reading package lists... 54s Building dependency tree... 54s Reading state information... 55s Calculating upgrade... 55s Calculating upgrade... 55s The following package was automatically installed and is no longer required: 55s libnl-genl-3-200 55s Use 'sudo apt autoremove' to remove it. 55s The following NEW packages will be installed: 55s bpftool libdebuginfod-common libdebuginfod1t64 linux-headers-6.14.0-10 55s linux-headers-6.14.0-10-generic linux-image-6.14.0-10-generic 55s linux-modules-6.14.0-10-generic linux-modules-extra-6.14.0-10-generic 55s linux-perf linux-tools-6.14.0-10 linux-tools-6.14.0-10-generic pnp.ids 55s The following packages will be upgraded: 55s apparmor apt apt-utils binutils binutils-common binutils-x86-64-linux-gnu 55s cloud-init cloud-init-base curl dosfstools fwupd gir1.2-girepository-2.0 55s gir1.2-glib-2.0 htop hwdata libapparmor1 libapt-pkg7.0 libaudit-common 55s libaudit1 libbinutils libbrotli1 libcap-ng0 libctf-nobfd0 libctf0 55s libcurl3t64-gnutls libcurl4t64 libestr0 libfwupd3 libgirepository-1.0-1 55s libglib2.0-0t64 libglib2.0-data libgprofng0 libjemalloc2 liblz4-1 liblzma5 55s libmm-glib0 libncurses6 libncursesw6 libnl-3-200 libnl-genl-3-200 55s libnl-route-3-200 libpci3 libpython3-stdlib libpython3.13 55s libpython3.13-minimal libpython3.13-stdlib libselinux1 libsframe1 55s libsqlite3-0 libtinfo6 libxml2 linux-firmware linux-generic 55s linux-headers-generic linux-headers-virtual linux-image-generic 55s linux-image-virtual linux-libc-dev linux-tools-common linux-virtual 55s media-types ncurses-base ncurses-bin ncurses-term pci.ids pciutils 55s pinentry-curses python-apt-common python3 python3-apt python3-cffi-backend 55s python3-dbus python3-gi python3-jinja2 python3-lazr.uri python3-markupsafe 55s python3-minimal python3-systemd python3-yaml python3.13 python3.13-gdbm 55s python3.13-minimal rsync rsyslog strace xz-utils 55s 86 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. 55s Need to get 807 MB of archives. 55s After this operation, 326 MB of additional disk space will be used. 55s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 ncurses-bin amd64 6.5+20250216-2 [194 kB] 55s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 ncurses-base all 6.5+20250216-2 [25.9 kB] 55s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 ncurses-term all 6.5+20250216-2 [276 kB] 55s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 liblz4-1 amd64 1.10.0-4 [66.4 kB] 55s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 liblzma5 amd64 5.6.4-1 [157 kB] 55s Get:6 http://ftpmaster.internal/ubuntu plucky/main amd64 libapt-pkg7.0 amd64 2.9.33 [1138 kB] 55s Get:7 http://ftpmaster.internal/ubuntu plucky/main amd64 apt amd64 2.9.33 [1439 kB] 55s Get:8 http://ftpmaster.internal/ubuntu plucky/main amd64 apt-utils amd64 2.9.33 [222 kB] 55s Get:9 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-minimal amd64 3.13.2-2 [27.7 kB] 55s Get:10 http://ftpmaster.internal/ubuntu plucky/main amd64 python3 amd64 3.13.2-2 [24.0 kB] 55s Get:11 http://ftpmaster.internal/ubuntu plucky/main amd64 libpython3.13 amd64 3.13.2-2 [2341 kB] 55s Get:12 http://ftpmaster.internal/ubuntu plucky/main amd64 media-types all 13.0.0 [29.9 kB] 55s Get:13 http://ftpmaster.internal/ubuntu plucky/main amd64 libncurses6 amd64 6.5+20250216-2 [126 kB] 55s Get:14 http://ftpmaster.internal/ubuntu plucky/main amd64 libncursesw6 amd64 6.5+20250216-2 [165 kB] 55s Get:15 http://ftpmaster.internal/ubuntu plucky/main amd64 libtinfo6 amd64 6.5+20250216-2 [119 kB] 55s Get:16 http://ftpmaster.internal/ubuntu plucky/main amd64 libsqlite3-0 amd64 3.46.1-2 [715 kB] 55s Get:17 http://ftpmaster.internal/ubuntu plucky/main amd64 python3.13 amd64 3.13.2-2 [735 kB] 55s Get:18 http://ftpmaster.internal/ubuntu plucky/main amd64 python3.13-minimal amd64 3.13.2-2 [2365 kB] 55s Get:19 http://ftpmaster.internal/ubuntu plucky/main amd64 libpython3.13-minimal amd64 3.13.2-2 [883 kB] 55s Get:20 http://ftpmaster.internal/ubuntu plucky/main amd64 libpython3.13-stdlib amd64 3.13.2-2 [2066 kB] 55s Get:21 http://ftpmaster.internal/ubuntu plucky/main amd64 libpython3-stdlib amd64 3.13.2-2 [10.4 kB] 55s Get:22 http://ftpmaster.internal/ubuntu plucky/main amd64 rsync amd64 3.4.1+ds1-3 [482 kB] 55s Get:23 http://ftpmaster.internal/ubuntu plucky/main amd64 libdebuginfod-common all 0.192-4 [15.4 kB] 55s Get:24 http://ftpmaster.internal/ubuntu plucky/main amd64 libaudit-common all 1:4.0.2-2ubuntu2 [6628 B] 55s Get:25 http://ftpmaster.internal/ubuntu plucky/main amd64 libcap-ng0 amd64 0.8.5-4build1 [15.6 kB] 55s Get:26 http://ftpmaster.internal/ubuntu plucky/main amd64 libaudit1 amd64 1:4.0.2-2ubuntu2 [54.0 kB] 55s Get:27 http://ftpmaster.internal/ubuntu plucky/main amd64 libselinux1 amd64 3.7-3ubuntu3 [87.3 kB] 55s Get:28 http://ftpmaster.internal/ubuntu plucky/main amd64 gir1.2-girepository-2.0 amd64 1.83.4-1 [25.3 kB] 55s Get:29 http://ftpmaster.internal/ubuntu plucky/main amd64 gir1.2-glib-2.0 amd64 2.84.0-1 [184 kB] 55s Get:30 http://ftpmaster.internal/ubuntu plucky/main amd64 libglib2.0-0t64 amd64 2.84.0-1 [1669 kB] 55s Get:31 http://ftpmaster.internal/ubuntu plucky/main amd64 libgirepository-1.0-1 amd64 1.83.4-1 [89.5 kB] 55s Get:32 http://ftpmaster.internal/ubuntu plucky/main amd64 libapparmor1 amd64 4.1.0~beta5-0ubuntu8 [55.0 kB] 55s Get:33 http://ftpmaster.internal/ubuntu plucky/main amd64 libestr0 amd64 0.1.11-2 [8340 B] 55s Get:34 http://ftpmaster.internal/ubuntu plucky/main amd64 libglib2.0-data all 2.84.0-1 [53.0 kB] 55s Get:35 http://ftpmaster.internal/ubuntu plucky/main amd64 libxml2 amd64 2.12.7+dfsg+really2.9.14-0.2ubuntu5 [772 kB] 55s Get:36 http://ftpmaster.internal/ubuntu plucky/main amd64 python-apt-common all 2.9.9build1 [21.3 kB] 55s Get:37 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-apt amd64 2.9.9build1 [172 kB] 55s Get:38 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-cffi-backend amd64 1.17.1-2build2 [96.6 kB] 55s Get:39 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-dbus amd64 1.3.2-5build5 [102 kB] 55s Get:40 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-gi amd64 3.50.0-4build1 [252 kB] 55s Get:41 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-yaml amd64 6.0.2-1build2 [144 kB] 55s Get:42 http://ftpmaster.internal/ubuntu plucky/main amd64 rsyslog amd64 8.2412.0-2ubuntu2 [555 kB] 55s Get:43 http://ftpmaster.internal/ubuntu plucky/main amd64 apparmor amd64 4.1.0~beta5-0ubuntu8 [701 kB] 55s Get:44 http://ftpmaster.internal/ubuntu plucky/main amd64 dosfstools amd64 4.2-1.2 [95.0 kB] 55s Get:45 http://ftpmaster.internal/ubuntu plucky/main amd64 libnl-genl-3-200 amd64 3.7.0-1 [12.2 kB] 55s Get:46 http://ftpmaster.internal/ubuntu plucky/main amd64 libnl-route-3-200 amd64 3.7.0-1 [191 kB] 55s Get:47 http://ftpmaster.internal/ubuntu plucky/main amd64 libnl-3-200 amd64 3.7.0-1 [64.9 kB] 55s Get:48 http://ftpmaster.internal/ubuntu plucky/main amd64 pci.ids all 0.0~2025.03.09-1 [285 kB] 55s Get:49 http://ftpmaster.internal/ubuntu plucky/main amd64 pciutils amd64 1:3.13.0-2 [110 kB] 55s Get:50 http://ftpmaster.internal/ubuntu plucky/main amd64 libpci3 amd64 1:3.13.0-2 [39.8 kB] 55s Get:51 http://ftpmaster.internal/ubuntu plucky/main amd64 strace amd64 6.13+ds-1ubuntu1 [622 kB] 55s Get:52 http://ftpmaster.internal/ubuntu plucky/main amd64 xz-utils amd64 5.6.4-1 [278 kB] 55s Get:53 http://ftpmaster.internal/ubuntu plucky/main amd64 libgprofng0 amd64 2.44-3ubuntu1 [886 kB] 55s Get:54 http://ftpmaster.internal/ubuntu plucky/main amd64 libctf0 amd64 2.44-3ubuntu1 [96.5 kB] 55s Get:55 http://ftpmaster.internal/ubuntu plucky/main amd64 libctf-nobfd0 amd64 2.44-3ubuntu1 [98.9 kB] 55s Get:56 http://ftpmaster.internal/ubuntu plucky/main amd64 binutils-x86-64-linux-gnu amd64 2.44-3ubuntu1 [1108 kB] 55s Get:57 http://ftpmaster.internal/ubuntu plucky/main amd64 libbinutils amd64 2.44-3ubuntu1 [585 kB] 55s Get:58 http://ftpmaster.internal/ubuntu plucky/main amd64 binutils amd64 2.44-3ubuntu1 [208 kB] 55s Get:59 http://ftpmaster.internal/ubuntu plucky/main amd64 binutils-common amd64 2.44-3ubuntu1 [215 kB] 55s Get:60 http://ftpmaster.internal/ubuntu plucky/main amd64 libsframe1 amd64 2.44-3ubuntu1 [14.8 kB] 55s Get:61 http://ftpmaster.internal/ubuntu plucky/main amd64 hwdata all 0.393-3 [1562 B] 55s Get:62 http://ftpmaster.internal/ubuntu plucky/main amd64 pnp.ids all 0.393-3 [29.5 kB] 55s Get:63 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-tools-common all 6.14.0-10.10 [295 kB] 55s Get:64 http://ftpmaster.internal/ubuntu plucky/main amd64 bpftool amd64 7.6.0+6.14.0-10.10 [1147 kB] 55s Get:65 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-markupsafe amd64 2.1.5-1build4 [13.4 kB] 55s Get:66 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-jinja2 all 3.1.5-2ubuntu1 [109 kB] 55s Get:67 http://ftpmaster.internal/ubuntu plucky/main amd64 cloud-init-base all 25.1-0ubuntu3 [616 kB] 55s Get:68 http://ftpmaster.internal/ubuntu plucky/main amd64 libbrotli1 amd64 1.1.0-2build4 [365 kB] 55s Get:69 http://ftpmaster.internal/ubuntu plucky/main amd64 curl amd64 8.12.1-3ubuntu1 [258 kB] 55s Get:70 http://ftpmaster.internal/ubuntu plucky/main amd64 libcurl4t64 amd64 8.12.1-3ubuntu1 [437 kB] 55s Get:71 http://ftpmaster.internal/ubuntu plucky/main amd64 libcurl3t64-gnutls amd64 8.12.1-3ubuntu1 [432 kB] 55s Get:72 http://ftpmaster.internal/ubuntu plucky/main amd64 fwupd amd64 2.0.6-4 [5408 kB] 55s Get:73 http://ftpmaster.internal/ubuntu plucky/main amd64 libfwupd3 amd64 2.0.6-4 [136 kB] 55s Get:74 http://ftpmaster.internal/ubuntu plucky/main amd64 libmm-glib0 amd64 1.23.4-0ubuntu3 [251 kB] 55s Get:75 http://ftpmaster.internal/ubuntu plucky/main amd64 htop amd64 3.4.0-2 [195 kB] 55s Get:76 http://ftpmaster.internal/ubuntu plucky/main amd64 libdebuginfod1t64 amd64 0.192-4 [21.0 kB] 55s Get:77 http://ftpmaster.internal/ubuntu plucky/main amd64 libjemalloc2 amd64 5.3.0-3 [277 kB] 55s Get:78 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-firmware amd64 20250310.git9e1370d3-0ubuntu1 [571 MB] 59s Get:79 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-modules-6.14.0-10-generic amd64 6.14.0-10.10 [41.2 MB] 59s Get:80 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-image-6.14.0-10-generic amd64 6.14.0-10.10 [15.3 MB] 59s Get:81 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-modules-extra-6.14.0-10-generic amd64 6.14.0-10.10 [120 MB] 60s Get:82 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-generic amd64 6.14.0-10.10 [1730 B] 60s Get:83 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-image-generic amd64 6.14.0-10.10 [11.1 kB] 60s Get:84 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-virtual amd64 6.14.0-10.10 [1722 B] 60s Get:85 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-image-virtual amd64 6.14.0-10.10 [11.1 kB] 60s Get:86 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-headers-virtual amd64 6.14.0-10.10 [1642 B] 60s Get:87 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-headers-6.14.0-10 all 6.14.0-10.10 [14.2 MB] 60s Get:88 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-headers-6.14.0-10-generic amd64 6.14.0-10.10 [3915 kB] 60s Get:89 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-headers-generic amd64 6.14.0-10.10 [11.0 kB] 60s Get:90 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-libc-dev amd64 6.14.0-10.10 [1723 kB] 60s Get:91 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-perf amd64 6.14.0-10.10 [4122 kB] 60s Get:92 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-tools-6.14.0-10 amd64 6.14.0-10.10 [1394 kB] 60s Get:93 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-tools-6.14.0-10-generic amd64 6.14.0-10.10 [830 B] 60s Get:94 http://ftpmaster.internal/ubuntu plucky/main amd64 pinentry-curses amd64 1.3.1-2ubuntu3 [42.3 kB] 60s Get:95 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-lazr.uri all 1.0.6-6 [13.7 kB] 60s Get:96 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-systemd amd64 235-1build6 [43.9 kB] 60s Get:97 http://ftpmaster.internal/ubuntu plucky/main amd64 python3.13-gdbm amd64 3.13.2-2 [31.9 kB] 60s Get:98 http://ftpmaster.internal/ubuntu plucky/main amd64 cloud-init all 25.1-0ubuntu3 [2100 B] 61s Preconfiguring packages ... 61s Fetched 807 MB in 5s (152 MB/s) 61s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 61s Preparing to unpack .../ncurses-bin_6.5+20250216-2_amd64.deb ... 61s Unpacking ncurses-bin (6.5+20250216-2) over (6.5+20250216-1) ... 61s Setting up ncurses-bin (6.5+20250216-2) ... 61s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 61s Preparing to unpack .../ncurses-base_6.5+20250216-2_all.deb ... 61s Unpacking ncurses-base (6.5+20250216-2) over (6.5+20250216-1) ... 61s Setting up ncurses-base (6.5+20250216-2) ... 61s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 61s Preparing to unpack .../ncurses-term_6.5+20250216-2_all.deb ... 61s Unpacking ncurses-term (6.5+20250216-2) over (6.5+20250216-1) ... 62s Preparing to unpack .../liblz4-1_1.10.0-4_amd64.deb ... 62s Unpacking liblz4-1:amd64 (1.10.0-4) over (1.10.0-3) ... 62s Setting up liblz4-1:amd64 (1.10.0-4) ... 62s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 62s Preparing to unpack .../liblzma5_5.6.4-1_amd64.deb ... 62s Unpacking liblzma5:amd64 (5.6.4-1) over (5.6.3-1) ... 62s Setting up liblzma5:amd64 (5.6.4-1) ... 62s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 62s Preparing to unpack .../libapt-pkg7.0_2.9.33_amd64.deb ... 62s Unpacking libapt-pkg7.0:amd64 (2.9.33) over (2.9.31ubuntu1) ... 62s Setting up libapt-pkg7.0:amd64 (2.9.33) ... 62s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 62s Preparing to unpack .../archives/apt_2.9.33_amd64.deb ... 62s Unpacking apt (2.9.33) over (2.9.31ubuntu1) ... 62s Setting up apt (2.9.33) ... 63s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 63s Preparing to unpack .../apt-utils_2.9.33_amd64.deb ... 63s Unpacking apt-utils (2.9.33) over (2.9.31ubuntu1) ... 63s Preparing to unpack .../python3-minimal_3.13.2-2_amd64.deb ... 63s Unpacking python3-minimal (3.13.2-2) over (3.13.2-1) ... 63s Setting up python3-minimal (3.13.2-2) ... 63s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 63s Preparing to unpack .../0-python3_3.13.2-2_amd64.deb ... 63s Unpacking python3 (3.13.2-2) over (3.13.2-1) ... 63s Preparing to unpack .../1-libpython3.13_3.13.2-2_amd64.deb ... 63s Unpacking libpython3.13:amd64 (3.13.2-2) over (3.13.2-1) ... 63s Preparing to unpack .../2-media-types_13.0.0_all.deb ... 63s Unpacking media-types (13.0.0) over (12.0.0) ... 64s Preparing to unpack .../3-libncurses6_6.5+20250216-2_amd64.deb ... 64s Unpacking libncurses6:amd64 (6.5+20250216-2) over (6.5+20250216-1) ... 64s Preparing to unpack .../4-libncursesw6_6.5+20250216-2_amd64.deb ... 64s Unpacking libncursesw6:amd64 (6.5+20250216-2) over (6.5+20250216-1) ... 64s Preparing to unpack .../5-libtinfo6_6.5+20250216-2_amd64.deb ... 64s Unpacking libtinfo6:amd64 (6.5+20250216-2) over (6.5+20250216-1) ... 64s Setting up libtinfo6:amd64 (6.5+20250216-2) ... 64s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 64s Preparing to unpack .../0-libsqlite3-0_3.46.1-2_amd64.deb ... 64s Unpacking libsqlite3-0:amd64 (3.46.1-2) over (3.46.1-1) ... 64s Preparing to unpack .../1-python3.13_3.13.2-2_amd64.deb ... 64s Unpacking python3.13 (3.13.2-2) over (3.13.2-1) ... 64s Preparing to unpack .../2-python3.13-minimal_3.13.2-2_amd64.deb ... 64s Unpacking python3.13-minimal (3.13.2-2) over (3.13.2-1) ... 64s Preparing to unpack .../3-libpython3.13-minimal_3.13.2-2_amd64.deb ... 64s Unpacking libpython3.13-minimal:amd64 (3.13.2-2) over (3.13.2-1) ... 64s Preparing to unpack .../4-libpython3.13-stdlib_3.13.2-2_amd64.deb ... 64s Unpacking libpython3.13-stdlib:amd64 (3.13.2-2) over (3.13.2-1) ... 64s Preparing to unpack .../5-libpython3-stdlib_3.13.2-2_amd64.deb ... 64s Unpacking libpython3-stdlib:amd64 (3.13.2-2) over (3.13.2-1) ... 64s Preparing to unpack .../6-rsync_3.4.1+ds1-3_amd64.deb ... 64s Unpacking rsync (3.4.1+ds1-3) over (3.4.1-0syncable1) ... 64s Selecting previously unselected package libdebuginfod-common. 64s Preparing to unpack .../7-libdebuginfod-common_0.192-4_all.deb ... 64s Unpacking libdebuginfod-common (0.192-4) ... 64s Preparing to unpack .../8-libaudit-common_1%3a4.0.2-2ubuntu2_all.deb ... 64s Unpacking libaudit-common (1:4.0.2-2ubuntu2) over (1:4.0.2-2ubuntu1) ... 64s Setting up libaudit-common (1:4.0.2-2ubuntu2) ... 65s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109147 files and directories currently installed.) 65s Preparing to unpack .../libcap-ng0_0.8.5-4build1_amd64.deb ... 65s Unpacking libcap-ng0:amd64 (0.8.5-4build1) over (0.8.5-4) ... 65s Setting up libcap-ng0:amd64 (0.8.5-4build1) ... 65s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109147 files and directories currently installed.) 65s Preparing to unpack .../libaudit1_1%3a4.0.2-2ubuntu2_amd64.deb ... 65s Unpacking libaudit1:amd64 (1:4.0.2-2ubuntu2) over (1:4.0.2-2ubuntu1) ... 65s Setting up libaudit1:amd64 (1:4.0.2-2ubuntu2) ... 65s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109147 files and directories currently installed.) 65s Preparing to unpack .../libselinux1_3.7-3ubuntu3_amd64.deb ... 65s Unpacking libselinux1:amd64 (3.7-3ubuntu3) over (3.7-3ubuntu2) ... 65s Setting up libselinux1:amd64 (3.7-3ubuntu3) ... 65s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109147 files and directories currently installed.) 65s Preparing to unpack .../00-gir1.2-girepository-2.0_1.83.4-1_amd64.deb ... 65s Unpacking gir1.2-girepository-2.0:amd64 (1.83.4-1) over (1.82.0-4) ... 65s Preparing to unpack .../01-gir1.2-glib-2.0_2.84.0-1_amd64.deb ... 65s Unpacking gir1.2-glib-2.0:amd64 (2.84.0-1) over (2.83.5-1) ... 65s Preparing to unpack .../02-libglib2.0-0t64_2.84.0-1_amd64.deb ... 65s Unpacking libglib2.0-0t64:amd64 (2.84.0-1) over (2.83.5-1) ... 65s Preparing to unpack .../03-libgirepository-1.0-1_1.83.4-1_amd64.deb ... 65s Unpacking libgirepository-1.0-1:amd64 (1.83.4-1) over (1.82.0-4) ... 65s Preparing to unpack .../04-libapparmor1_4.1.0~beta5-0ubuntu8_amd64.deb ... 65s Unpacking libapparmor1:amd64 (4.1.0~beta5-0ubuntu8) over (4.1.0~beta5-0ubuntu6) ... 65s Preparing to unpack .../05-libestr0_0.1.11-2_amd64.deb ... 65s Unpacking libestr0:amd64 (0.1.11-2) over (0.1.11-1build1) ... 65s Preparing to unpack .../06-libglib2.0-data_2.84.0-1_all.deb ... 65s Unpacking libglib2.0-data (2.84.0-1) over (2.83.5-1) ... 65s Preparing to unpack .../07-libxml2_2.12.7+dfsg+really2.9.14-0.2ubuntu5_amd64.deb ... 65s Unpacking libxml2:amd64 (2.12.7+dfsg+really2.9.14-0.2ubuntu5) over (2.12.7+dfsg+really2.9.14-0.2ubuntu4) ... 65s Preparing to unpack .../08-python-apt-common_2.9.9build1_all.deb ... 65s Unpacking python-apt-common (2.9.9build1) over (2.9.9) ... 65s Preparing to unpack .../09-python3-apt_2.9.9build1_amd64.deb ... 65s Unpacking python3-apt (2.9.9build1) over (2.9.9) ... 65s Preparing to unpack .../10-python3-cffi-backend_1.17.1-2build2_amd64.deb ... 65s Unpacking python3-cffi-backend:amd64 (1.17.1-2build2) over (1.17.1-2build1) ... 65s Preparing to unpack .../11-python3-dbus_1.3.2-5build5_amd64.deb ... 66s Unpacking python3-dbus (1.3.2-5build5) over (1.3.2-5build4) ... 66s Preparing to unpack .../12-python3-gi_3.50.0-4build1_amd64.deb ... 66s Unpacking python3-gi (3.50.0-4build1) over (3.50.0-4) ... 66s Preparing to unpack .../13-python3-yaml_6.0.2-1build2_amd64.deb ... 66s Unpacking python3-yaml (6.0.2-1build2) over (6.0.2-1build1) ... 66s Preparing to unpack .../14-rsyslog_8.2412.0-2ubuntu2_amd64.deb ... 66s Unpacking rsyslog (8.2412.0-2ubuntu2) over (8.2412.0-2ubuntu1) ... 66s Preparing to unpack .../15-apparmor_4.1.0~beta5-0ubuntu8_amd64.deb ... 67s Unpacking apparmor (4.1.0~beta5-0ubuntu8) over (4.1.0~beta5-0ubuntu6) ... 67s Preparing to unpack .../16-dosfstools_4.2-1.2_amd64.deb ... 67s Unpacking dosfstools (4.2-1.2) over (4.2-1.1build1) ... 67s Preparing to unpack .../17-libnl-genl-3-200_3.7.0-1_amd64.deb ... 67s Unpacking libnl-genl-3-200:amd64 (3.7.0-1) over (3.7.0-0.3build2) ... 67s Preparing to unpack .../18-libnl-route-3-200_3.7.0-1_amd64.deb ... 67s Unpacking libnl-route-3-200:amd64 (3.7.0-1) over (3.7.0-0.3build2) ... 67s Preparing to unpack .../19-libnl-3-200_3.7.0-1_amd64.deb ... 67s Unpacking libnl-3-200:amd64 (3.7.0-1) over (3.7.0-0.3build2) ... 67s Preparing to unpack .../20-pci.ids_0.0~2025.03.09-1_all.deb ... 67s Unpacking pci.ids (0.0~2025.03.09-1) over (0.0~2025.02.12-1) ... 67s Preparing to unpack .../21-pciutils_1%3a3.13.0-2_amd64.deb ... 67s Unpacking pciutils (1:3.13.0-2) over (1:3.13.0-1) ... 67s Preparing to unpack .../22-libpci3_1%3a3.13.0-2_amd64.deb ... 67s Unpacking libpci3:amd64 (1:3.13.0-2) over (1:3.13.0-1) ... 67s Preparing to unpack .../23-strace_6.13+ds-1ubuntu1_amd64.deb ... 67s Unpacking strace (6.13+ds-1ubuntu1) over (6.11-0ubuntu1) ... 67s Preparing to unpack .../24-xz-utils_5.6.4-1_amd64.deb ... 67s Unpacking xz-utils (5.6.4-1) over (5.6.3-1) ... 67s Preparing to unpack .../25-libgprofng0_2.44-3ubuntu1_amd64.deb ... 67s Unpacking libgprofng0:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 67s Preparing to unpack .../26-libctf0_2.44-3ubuntu1_amd64.deb ... 67s Unpacking libctf0:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 67s Preparing to unpack .../27-libctf-nobfd0_2.44-3ubuntu1_amd64.deb ... 67s Unpacking libctf-nobfd0:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 67s Preparing to unpack .../28-binutils-x86-64-linux-gnu_2.44-3ubuntu1_amd64.deb ... 67s Unpacking binutils-x86-64-linux-gnu (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 68s Preparing to unpack .../29-libbinutils_2.44-3ubuntu1_amd64.deb ... 68s Unpacking libbinutils:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 68s Preparing to unpack .../30-binutils_2.44-3ubuntu1_amd64.deb ... 68s Unpacking binutils (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 68s Preparing to unpack .../31-binutils-common_2.44-3ubuntu1_amd64.deb ... 68s Unpacking binutils-common:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 68s Preparing to unpack .../32-libsframe1_2.44-3ubuntu1_amd64.deb ... 68s Unpacking libsframe1:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 68s Preparing to unpack .../33-hwdata_0.393-3_all.deb ... 68s Unpacking hwdata (0.393-3) over (0.393-1) ... 68s Selecting previously unselected package pnp.ids. 68s Preparing to unpack .../34-pnp.ids_0.393-3_all.deb ... 68s Unpacking pnp.ids (0.393-3) ... 68s Preparing to unpack .../35-linux-tools-common_6.14.0-10.10_all.deb ... 68s Unpacking linux-tools-common (6.14.0-10.10) over (6.12.0-16.16) ... 68s Selecting previously unselected package bpftool. 68s Preparing to unpack .../36-bpftool_7.6.0+6.14.0-10.10_amd64.deb ... 68s Unpacking bpftool (7.6.0+6.14.0-10.10) ... 68s Preparing to unpack .../37-python3-markupsafe_2.1.5-1build4_amd64.deb ... 68s Unpacking python3-markupsafe (2.1.5-1build4) over (2.1.5-1build3) ... 68s Preparing to unpack .../38-python3-jinja2_3.1.5-2ubuntu1_all.deb ... 68s Unpacking python3-jinja2 (3.1.5-2ubuntu1) over (3.1.5-2) ... 68s Preparing to unpack .../39-cloud-init-base_25.1-0ubuntu3_all.deb ... 68s Unpacking cloud-init-base (25.1-0ubuntu3) over (25.1-0ubuntu2) ... 68s Preparing to unpack .../40-libbrotli1_1.1.0-2build4_amd64.deb ... 68s Unpacking libbrotli1:amd64 (1.1.0-2build4) over (1.1.0-2build3) ... 69s Preparing to unpack .../41-curl_8.12.1-3ubuntu1_amd64.deb ... 69s Unpacking curl (8.12.1-3ubuntu1) over (8.12.1-2ubuntu1) ... 69s Preparing to unpack .../42-libcurl4t64_8.12.1-3ubuntu1_amd64.deb ... 69s Unpacking libcurl4t64:amd64 (8.12.1-3ubuntu1) over (8.12.1-2ubuntu1) ... 69s Preparing to unpack .../43-libcurl3t64-gnutls_8.12.1-3ubuntu1_amd64.deb ... 69s Unpacking libcurl3t64-gnutls:amd64 (8.12.1-3ubuntu1) over (8.12.1-2ubuntu1) ... 69s Preparing to unpack .../44-fwupd_2.0.6-4_amd64.deb ... 69s Unpacking fwupd (2.0.6-4) over (2.0.6-3) ... 69s Preparing to unpack .../45-libfwupd3_2.0.6-4_amd64.deb ... 69s Unpacking libfwupd3:amd64 (2.0.6-4) over (2.0.6-3) ... 69s Preparing to unpack .../46-libmm-glib0_1.23.4-0ubuntu3_amd64.deb ... 69s Unpacking libmm-glib0:amd64 (1.23.4-0ubuntu3) over (1.23.4-0ubuntu2) ... 69s Preparing to unpack .../47-htop_3.4.0-2_amd64.deb ... 69s Unpacking htop (3.4.0-2) over (3.3.0-5) ... 69s Selecting previously unselected package libdebuginfod1t64:amd64. 69s Preparing to unpack .../48-libdebuginfod1t64_0.192-4_amd64.deb ... 69s Unpacking libdebuginfod1t64:amd64 (0.192-4) ... 69s Preparing to unpack .../49-libjemalloc2_5.3.0-3_amd64.deb ... 69s Unpacking libjemalloc2:amd64 (5.3.0-3) over (5.3.0-2build1) ... 69s Preparing to unpack .../50-linux-firmware_20250310.git9e1370d3-0ubuntu1_amd64.deb ... 69s Unpacking linux-firmware (20250310.git9e1370d3-0ubuntu1) over (20250204.git0fd450ee-0ubuntu1) ... 72s Selecting previously unselected package linux-modules-6.14.0-10-generic. 72s Preparing to unpack .../51-linux-modules-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 72s Unpacking linux-modules-6.14.0-10-generic (6.14.0-10.10) ... 73s Selecting previously unselected package linux-image-6.14.0-10-generic. 73s Preparing to unpack .../52-linux-image-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 73s Unpacking linux-image-6.14.0-10-generic (6.14.0-10.10) ... 73s Selecting previously unselected package linux-modules-extra-6.14.0-10-generic. 73s Preparing to unpack .../53-linux-modules-extra-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 73s Unpacking linux-modules-extra-6.14.0-10-generic (6.14.0-10.10) ... 74s Preparing to unpack .../54-linux-generic_6.14.0-10.10_amd64.deb ... 74s Unpacking linux-generic (6.14.0-10.10) over (6.12.0-16.16+2) ... 74s Preparing to unpack .../55-linux-image-generic_6.14.0-10.10_amd64.deb ... 74s Unpacking linux-image-generic (6.14.0-10.10) over (6.12.0-16.16+2) ... 74s Preparing to unpack .../56-linux-virtual_6.14.0-10.10_amd64.deb ... 74s Unpacking linux-virtual (6.14.0-10.10) over (6.12.0-16.16+2) ... 74s Preparing to unpack .../57-linux-image-virtual_6.14.0-10.10_amd64.deb ... 74s Unpacking linux-image-virtual (6.14.0-10.10) over (6.12.0-16.16+2) ... 74s Preparing to unpack .../58-linux-headers-virtual_6.14.0-10.10_amd64.deb ... 74s Unpacking linux-headers-virtual (6.14.0-10.10) over (6.12.0-16.16+2) ... 74s Selecting previously unselected package linux-headers-6.14.0-10. 74s Preparing to unpack .../59-linux-headers-6.14.0-10_6.14.0-10.10_all.deb ... 74s Unpacking linux-headers-6.14.0-10 (6.14.0-10.10) ... 76s Selecting previously unselected package linux-headers-6.14.0-10-generic. 76s Preparing to unpack .../60-linux-headers-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 76s Unpacking linux-headers-6.14.0-10-generic (6.14.0-10.10) ... 78s Preparing to unpack .../61-linux-headers-generic_6.14.0-10.10_amd64.deb ... 78s Unpacking linux-headers-generic (6.14.0-10.10) over (6.12.0-16.16+2) ... 78s Preparing to unpack .../62-linux-libc-dev_6.14.0-10.10_amd64.deb ... 78s Unpacking linux-libc-dev:amd64 (6.14.0-10.10) over (6.12.0-16.16) ... 78s Selecting previously unselected package linux-perf. 78s Preparing to unpack .../63-linux-perf_6.14.0-10.10_amd64.deb ... 78s Unpacking linux-perf (6.14.0-10.10) ... 78s Selecting previously unselected package linux-tools-6.14.0-10. 78s Preparing to unpack .../64-linux-tools-6.14.0-10_6.14.0-10.10_amd64.deb ... 78s Unpacking linux-tools-6.14.0-10 (6.14.0-10.10) ... 78s Selecting previously unselected package linux-tools-6.14.0-10-generic. 78s Preparing to unpack .../65-linux-tools-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 78s Unpacking linux-tools-6.14.0-10-generic (6.14.0-10.10) ... 78s Preparing to unpack .../66-pinentry-curses_1.3.1-2ubuntu3_amd64.deb ... 78s Unpacking pinentry-curses (1.3.1-2ubuntu3) over (1.3.1-2ubuntu2) ... 79s Preparing to unpack .../67-python3-lazr.uri_1.0.6-6_all.deb ... 79s Unpacking python3-lazr.uri (1.0.6-6) over (1.0.6-5) ... 79s Preparing to unpack .../68-python3-systemd_235-1build6_amd64.deb ... 79s Unpacking python3-systemd (235-1build6) over (235-1build5) ... 79s Preparing to unpack .../69-python3.13-gdbm_3.13.2-2_amd64.deb ... 79s Unpacking python3.13-gdbm (3.13.2-2) over (3.13.2-1) ... 79s Preparing to unpack .../70-cloud-init_25.1-0ubuntu3_all.deb ... 79s Unpacking cloud-init (25.1-0ubuntu3) over (25.1-0ubuntu2) ... 79s Setting up linux-headers-6.14.0-10 (6.14.0-10.10) ... 79s Setting up media-types (13.0.0) ... 79s Installing new version of config file /etc/mime.types ... 79s Setting up linux-headers-6.14.0-10-generic (6.14.0-10.10) ... 79s Setting up libapparmor1:amd64 (4.1.0~beta5-0ubuntu8) ... 79s Setting up pci.ids (0.0~2025.03.09-1) ... 79s Setting up apt-utils (2.9.33) ... 79s Setting up libdebuginfod-common (0.192-4) ... 79s Setting up linux-firmware (20250310.git9e1370d3-0ubuntu1) ... 79s Setting up bpftool (7.6.0+6.14.0-10.10) ... 79s Setting up libestr0:amd64 (0.1.11-2) ... 79s Setting up libbrotli1:amd64 (1.1.0-2build4) ... 79s Setting up libsqlite3-0:amd64 (3.46.1-2) ... 79s Setting up dosfstools (4.2-1.2) ... 79s Setting up rsyslog (8.2412.0-2ubuntu2) ... 79s info: The user `syslog' is already a member of `adm'. 80s Setting up binutils-common:amd64 (2.44-3ubuntu1) ... 80s Setting up libcurl3t64-gnutls:amd64 (8.12.1-3ubuntu1) ... 80s Setting up linux-libc-dev:amd64 (6.14.0-10.10) ... 80s Setting up libctf-nobfd0:amd64 (2.44-3ubuntu1) ... 80s Setting up linux-headers-generic (6.14.0-10.10) ... 80s Setting up libjemalloc2:amd64 (5.3.0-3) ... 80s Setting up libsframe1:amd64 (2.44-3ubuntu1) ... 80s Setting up libpython3.13-minimal:amd64 (3.13.2-2) ... 80s Setting up apparmor (4.1.0~beta5-0ubuntu8) ... 80s Installing new version of config file /etc/apparmor.d/openvpn ... 81s Reloading AppArmor profiles 83s Setting up libglib2.0-0t64:amd64 (2.84.0-1) ... 83s No schema files found: doing nothing. 83s Setting up libglib2.0-data (2.84.0-1) ... 83s Setting up libncurses6:amd64 (6.5+20250216-2) ... 83s Setting up strace (6.13+ds-1ubuntu1) ... 83s Setting up xz-utils (5.6.4-1) ... 83s Setting up gir1.2-glib-2.0:amd64 (2.84.0-1) ... 83s Setting up linux-modules-6.14.0-10-generic (6.14.0-10.10) ... 85s Setting up libncursesw6:amd64 (6.5+20250216-2) ... 85s Setting up libpci3:amd64 (1:3.13.0-2) ... 85s Setting up python-apt-common (2.9.9build1) ... 85s Setting up libmm-glib0:amd64 (1.23.4-0ubuntu3) ... 85s Setting up pnp.ids (0.393-3) ... 85s Setting up libnl-3-200:amd64 (3.7.0-1) ... 85s Setting up python3.13-minimal (3.13.2-2) ... 85s Setting up libgirepository-1.0-1:amd64 (1.83.4-1) ... 85s Setting up libbinutils:amd64 (2.44-3ubuntu1) ... 85s Setting up libpython3.13-stdlib:amd64 (3.13.2-2) ... 85s Setting up libxml2:amd64 (2.12.7+dfsg+really2.9.14-0.2ubuntu5) ... 85s Setting up rsync (3.4.1+ds1-3) ... 86s rsync.service is a disabled or a static unit not running, not starting it. 86s Setting up python3.13-gdbm (3.13.2-2) ... 86s Setting up libpython3-stdlib:amd64 (3.13.2-2) ... 86s Setting up ncurses-term (6.5+20250216-2) ... 86s Setting up libctf0:amd64 (2.44-3ubuntu1) ... 86s Setting up libpython3.13:amd64 (3.13.2-2) ... 86s Setting up pinentry-curses (1.3.1-2ubuntu3) ... 86s Setting up libdebuginfod1t64:amd64 (0.192-4) ... 86s Setting up linux-headers-virtual (6.14.0-10.10) ... 86s Setting up libcurl4t64:amd64 (8.12.1-3ubuntu1) ... 86s Setting up python3.13 (3.13.2-2) ... 87s Setting up htop (3.4.0-2) ... 87s Setting up linux-image-6.14.0-10-generic (6.14.0-10.10) ... 89s I: /boot/vmlinuz.old is now a symlink to vmlinuz-6.12.0-16-generic 89s I: /boot/initrd.img.old is now a symlink to initrd.img-6.12.0-16-generic 89s I: /boot/vmlinuz is now a symlink to vmlinuz-6.14.0-10-generic 89s I: /boot/initrd.img is now a symlink to initrd.img-6.14.0-10-generic 89s Setting up libfwupd3:amd64 (2.0.6-4) ... 89s Setting up python3 (3.13.2-2) ... 89s Setting up python3-markupsafe (2.1.5-1build4) ... 89s Setting up linux-modules-extra-6.14.0-10-generic (6.14.0-10.10) ... 92s Setting up libnl-route-3-200:amd64 (3.7.0-1) ... 92s Setting up hwdata (0.393-3) ... 92s Setting up python3-jinja2 (3.1.5-2ubuntu1) ... 92s Setting up libgprofng0:amd64 (2.44-3ubuntu1) ... 92s Setting up linux-perf (6.14.0-10.10) ... 92s Setting up gir1.2-girepository-2.0:amd64 (1.83.4-1) ... 92s Setting up python3-gi (3.50.0-4build1) ... 92s Setting up pciutils (1:3.13.0-2) ... 92s Setting up libnl-genl-3-200:amd64 (3.7.0-1) ... 92s Setting up curl (8.12.1-3ubuntu1) ... 92s Setting up linux-image-virtual (6.14.0-10.10) ... 92s Setting up linux-tools-common (6.14.0-10.10) ... 92s Setting up fwupd (2.0.6-4) ... 92s fwupd-refresh.service is a disabled or a static unit not running, not starting it. 92s fwupd.service is a disabled or a static unit not running, not starting it. 93s Setting up python3-systemd (235-1build6) ... 93s Setting up python3-cffi-backend:amd64 (1.17.1-2build2) ... 93s Setting up binutils-x86-64-linux-gnu (2.44-3ubuntu1) ... 93s Setting up linux-image-generic (6.14.0-10.10) ... 93s Setting up python3-dbus (1.3.2-5build5) ... 93s Setting up linux-tools-6.14.0-10 (6.14.0-10.10) ... 93s Setting up linux-generic (6.14.0-10.10) ... 93s Setting up python3-apt (2.9.9build1) ... 93s Setting up python3-yaml (6.0.2-1build2) ... 93s Setting up python3-lazr.uri (1.0.6-6) ... 93s Setting up binutils (2.44-3ubuntu1) ... 93s Setting up cloud-init-base (25.1-0ubuntu3) ... 95s Setting up linux-virtual (6.14.0-10.10) ... 95s Setting up linux-tools-6.14.0-10-generic (6.14.0-10.10) ... 95s Setting up cloud-init (25.1-0ubuntu3) ... 95s Processing triggers for systemd (257.3-1ubuntu3) ... 95s Processing triggers for man-db (2.13.0-1) ... 96s Processing triggers for dbus (1.16.2-1ubuntu1) ... 96s Processing triggers for libc-bin (2.41-1ubuntu1) ... 96s Processing triggers for initramfs-tools (0.146ubuntu1) ... 96s update-initramfs: Generating /boot/initrd.img-6.12.0-16-generic 96s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 107s Processing triggers for linux-image-6.14.0-10-generic (6.14.0-10.10) ... 107s /etc/kernel/postinst.d/initramfs-tools: 107s update-initramfs: Generating /boot/initrd.img-6.14.0-10-generic 107s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 117s /etc/kernel/postinst.d/zz-update-grub: 117s Sourcing file `/etc/default/grub' 117s Sourcing file `/etc/default/grub.d/50-cloudimg-settings.cfg' 117s Sourcing file `/etc/default/grub.d/90-autopkgtest.cfg' 117s Generating grub configuration file ... 117s Found linux image: /boot/vmlinuz-6.14.0-10-generic 117s Found initrd image: /boot/initrd.img-6.14.0-10-generic 117s Found linux image: /boot/vmlinuz-6.12.0-16-generic 117s Found initrd image: /boot/initrd.img-6.12.0-16-generic 117s Found linux image: /boot/vmlinuz-6.11.0-8-generic 117s Found initrd image: /boot/initrd.img-6.11.0-8-generic 118s Warning: os-prober will not be executed to detect other bootable partitions. 118s Systems on them will not be added to the GRUB boot configuration. 118s Check GRUB_DISABLE_OS_PROBER documentation entry. 118s Adding boot menu entry for UEFI Firmware Settings ... 118s done 119s Reading package lists... 119s Building dependency tree... 119s Reading state information... 119s Solving dependencies... 120s The following packages will be REMOVED: 120s libnl-genl-3-200* libnsl2* libpython3.12-minimal* libpython3.12-stdlib* 120s libpython3.12t64* linux-headers-6.11.0-8* linux-headers-6.11.0-8-generic* 120s linux-headers-6.12.0-16* linux-headers-6.12.0-16-generic* 120s linux-image-6.11.0-8-generic* linux-image-6.12.0-16-generic* 120s linux-modules-6.11.0-8-generic* linux-modules-6.12.0-16-generic* 120s linux-modules-extra-6.12.0-16-generic* linux-tools-6.11.0-8* 120s linux-tools-6.11.0-8-generic* linux-tools-6.12.0-16* 120s linux-tools-6.12.0-16-generic* 120s 0 upgraded, 0 newly installed, 18 to remove and 5 not upgraded. 120s After this operation, 545 MB disk space will be freed. 120s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 148643 files and directories currently installed.) 120s Removing libnl-genl-3-200:amd64 (3.7.0-1) ... 120s Removing linux-tools-6.11.0-8-generic (6.11.0-8.8) ... 120s Removing linux-tools-6.11.0-8 (6.11.0-8.8) ... 120s Removing libpython3.12t64:amd64 (3.12.9-1) ... 120s Removing libpython3.12-stdlib:amd64 (3.12.9-1) ... 120s Removing libnsl2:amd64 (1.3.0-3build3) ... 120s Removing libpython3.12-minimal:amd64 (3.12.9-1) ... 120s Removing linux-headers-6.11.0-8-generic (6.11.0-8.8) ... 121s Removing linux-headers-6.11.0-8 (6.11.0-8.8) ... 123s Removing linux-headers-6.12.0-16-generic (6.12.0-16.16) ... 123s Removing linux-headers-6.12.0-16 (6.12.0-16.16) ... 125s Removing linux-image-6.11.0-8-generic (6.11.0-8.8) ... 125s /etc/kernel/postrm.d/initramfs-tools: 125s update-initramfs: Deleting /boot/initrd.img-6.11.0-8-generic 125s /etc/kernel/postrm.d/zz-update-grub: 125s Sourcing file `/etc/default/grub' 125s Sourcing file `/etc/default/grub.d/50-cloudimg-settings.cfg' 125s Sourcing file `/etc/default/grub.d/90-autopkgtest.cfg' 125s Generating grub configuration file ... 126s Found linux image: /boot/vmlinuz-6.14.0-10-generic 126s Found initrd image: /boot/initrd.img-6.14.0-10-generic 126s Found linux image: /boot/vmlinuz-6.12.0-16-generic 126s Found initrd image: /boot/initrd.img-6.12.0-16-generic 126s Warning: os-prober will not be executed to detect other bootable partitions. 126s Systems on them will not be added to the GRUB boot configuration. 126s Check GRUB_DISABLE_OS_PROBER documentation entry. 126s Adding boot menu entry for UEFI Firmware Settings ... 126s done 126s Removing linux-image-6.12.0-16-generic (6.12.0-16.16) ... 126s W: Removing the running kernel 126s I: /boot/vmlinuz.old is now a symlink to vmlinuz-6.14.0-10-generic 126s I: /boot/initrd.img.old is now a symlink to initrd.img-6.14.0-10-generic 126s /etc/kernel/postrm.d/initramfs-tools: 126s update-initramfs: Deleting /boot/initrd.img-6.12.0-16-generic 126s /etc/kernel/postrm.d/zz-update-grub: 126s Sourcing file `/etc/default/grub' 126s Sourcing file `/etc/default/grub.d/50-cloudimg-settings.cfg' 126s Sourcing file `/etc/default/grub.d/90-autopkgtest.cfg' 126s Generating grub configuration file ... 126s Found linux image: /boot/vmlinuz-6.14.0-10-generic 126s Found initrd image: /boot/initrd.img-6.14.0-10-generic 127s Warning: os-prober will not be executed to detect other bootable partitions. 127s Systems on them will not be added to the GRUB boot configuration. 127s Check GRUB_DISABLE_OS_PROBER documentation entry. 127s Adding boot menu entry for UEFI Firmware Settings ... 127s done 127s Removing linux-modules-6.11.0-8-generic (6.11.0-8.8) ... 127s Removing linux-modules-extra-6.12.0-16-generic (6.12.0-16.16) ... 128s Removing linux-modules-6.12.0-16-generic (6.12.0-16.16) ... 128s Removing linux-tools-6.12.0-16-generic (6.12.0-16.16) ... 128s Removing linux-tools-6.12.0-16 (6.12.0-16.16) ... 128s Processing triggers for libc-bin (2.41-1ubuntu1) ... 129s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76972 files and directories currently installed.) 129s Purging configuration files for linux-image-6.11.0-8-generic (6.11.0-8.8) ... 129s Purging configuration files for libpython3.12-minimal:amd64 (3.12.9-1) ... 129s Purging configuration files for linux-modules-extra-6.12.0-16-generic (6.12.0-16.16) ... 129s Purging configuration files for linux-modules-6.12.0-16-generic (6.12.0-16.16) ... 129s dpkg: warning: while removing linux-modules-6.12.0-16-generic, directory '/lib/modules/6.12.0-16-generic' not empty so not removed 129s Purging configuration files for linux-modules-6.11.0-8-generic (6.11.0-8.8) ... 129s Purging configuration files for linux-image-6.12.0-16-generic (6.12.0-16.16) ... 129s rmdir: failed to remove '/lib/modules/6.12.0-16-generic': Directory not empty 129s autopkgtest [00:27:15]: upgrading testbed (apt dist-upgrade and autopurge) 129s Reading package lists... 129s Building dependency tree... 129s Reading state information... 130s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 130s Starting 2 pkgProblemResolver with broken count: 0 130s Done 130s Entering ResolveByKeep 130s 130s Calculating upgrade... 131s The following packages will be upgraded: 131s libc-bin libc-dev-bin libc6 libc6-dev locales 131s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 131s Need to get 10.5 MB of archives. 131s After this operation, 1024 B of additional disk space will be used. 131s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libc6-dev amd64 2.41-1ubuntu2 [2183 kB] 131s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libc-dev-bin amd64 2.41-1ubuntu2 [24.7 kB] 131s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libc6 amd64 2.41-1ubuntu2 [3327 kB] 131s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libc-bin amd64 2.41-1ubuntu2 [700 kB] 131s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 locales all 2.41-1ubuntu2 [4246 kB] 131s Preconfiguring packages ... 131s Fetched 10.5 MB in 0s (56.8 MB/s) 131s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76968 files and directories currently installed.) 131s Preparing to unpack .../libc6-dev_2.41-1ubuntu2_amd64.deb ... 131s Unpacking libc6-dev:amd64 (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 131s Preparing to unpack .../libc-dev-bin_2.41-1ubuntu2_amd64.deb ... 131s Unpacking libc-dev-bin (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 131s Preparing to unpack .../libc6_2.41-1ubuntu2_amd64.deb ... 131s Unpacking libc6:amd64 (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 132s Setting up libc6:amd64 (2.41-1ubuntu2) ... 132s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76968 files and directories currently installed.) 132s Preparing to unpack .../libc-bin_2.41-1ubuntu2_amd64.deb ... 132s Unpacking libc-bin (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 132s Setting up libc-bin (2.41-1ubuntu2) ... 132s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76968 files and directories currently installed.) 132s Preparing to unpack .../locales_2.41-1ubuntu2_all.deb ... 132s Unpacking locales (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 132s Setting up locales (2.41-1ubuntu2) ... 133s Generating locales (this might take a while)... 134s en_US.UTF-8... done 134s Generation complete. 134s Setting up libc-dev-bin (2.41-1ubuntu2) ... 134s Setting up libc6-dev:amd64 (2.41-1ubuntu2) ... 134s Processing triggers for man-db (2.13.0-1) ... 135s Processing triggers for systemd (257.3-1ubuntu3) ... 136s Reading package lists... 136s Building dependency tree... 136s Reading state information... 136s Starting pkgProblemResolver with broken count: 0 136s Starting 2 pkgProblemResolver with broken count: 0 136s Done 136s Solving dependencies... 137s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 137s autopkgtest [00:27:23]: rebooting testbed after setup commands that affected boot 140s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 152s autopkgtest [00:27:38]: testbed running kernel: Linux 6.14.0-10-generic #10-Ubuntu SMP PREEMPT_DYNAMIC Wed Mar 12 16:07:00 UTC 2025 153s autopkgtest [00:27:39]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 161s Get:1 http://ftpmaster.internal/ubuntu plucky/main sssd 2.10.1-2ubuntu3 (dsc) [5083 B] 161s Get:2 http://ftpmaster.internal/ubuntu plucky/main sssd 2.10.1-2ubuntu3 (tar) [9197 kB] 161s Get:3 http://ftpmaster.internal/ubuntu plucky/main sssd 2.10.1-2ubuntu3 (diff) [50.0 kB] 161s gpgv: Signature made Thu Feb 20 17:50:10 2025 UTC 161s gpgv: using RSA key 8AFD08D3D1B817B2DF8982F501AC4B4083590A98 161s gpgv: Can't check signature: No public key 161s dpkg-source: warning: cannot verify inline signature for ./sssd_2.10.1-2ubuntu3.dsc: no acceptable signature found 161s autopkgtest [00:27:47]: testing package sssd version 2.10.1-2ubuntu3 168s autopkgtest [00:27:54]: build not needed 175s autopkgtest [00:28:01]: test ldap-user-group-ldap-auth: preparing testbed 175s Reading package lists... 176s Building dependency tree... 176s Reading state information... 176s Starting pkgProblemResolver with broken count: 0 176s Starting 2 pkgProblemResolver with broken count: 0 176s Done 176s The following NEW packages will be installed: 176s expect ldap-utils libargon2-1 libavahi-client3 libavahi-common-data 176s libavahi-common3 libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 176s libdhash1t64 libevent-2.1-7t64 libini-config5t64 libipa-hbac-dev 176s libipa-hbac0t64 libjose0 libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss 176s libnss-sudo libodbc2 libpam-pwquality libpam-sss libpath-utils1t64 176s libpwquality-common libpwquality1 libref-array1t64 libsmbclient0 176s libsss-certmap-dev libsss-certmap0 libsss-idmap-dev libsss-idmap0 176s libsss-nss-idmap-dev libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 176s libtdb1 libtevent0t64 libverto-libevent1t64 libverto1t64 libwbclient0 176s python3-libipa-hbac python3-libsss-nss-idmap python3-sss samba-libs slapd 176s sssd sssd-ad sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm 176s sssd-krb5 sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools 176s tcl-expect tcl8.6 176s 0 upgraded, 65 newly installed, 0 to remove and 0 not upgraded. 176s Need to get 13.6 MB of archives. 176s After this operation, 52.0 MB of additional disk space will be used. 176s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 libargon2-1 amd64 0~20190702+dfsg-4build1 [20.8 kB] 176s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 libltdl7 amd64 2.5.4-4 [46.5 kB] 176s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 libodbc2 amd64 2.3.12-2ubuntu1 [186 kB] 176s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 slapd amd64 2.6.9+dfsg-1~exp2ubuntu1 [1648 kB] 176s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 libtcl8.6 amd64 8.6.16+dfsg-1 [1086 kB] 176s Get:6 http://ftpmaster.internal/ubuntu plucky/main amd64 tcl8.6 amd64 8.6.16+dfsg-1 [14.9 kB] 176s Get:7 http://ftpmaster.internal/ubuntu plucky/universe amd64 tcl-expect amd64 5.45.4-4 [110 kB] 176s Get:8 http://ftpmaster.internal/ubuntu plucky/universe amd64 expect amd64 5.45.4-4 [136 kB] 176s Get:9 http://ftpmaster.internal/ubuntu plucky/main amd64 ldap-utils amd64 2.6.9+dfsg-1~exp2ubuntu1 [154 kB] 176s Get:10 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-common-data amd64 0.8-16ubuntu1 [30.9 kB] 176s Get:11 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-common3 amd64 0.8-16ubuntu1 [23.6 kB] 176s Get:12 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-client3 amd64 0.8-16ubuntu1 [27.5 kB] 176s Get:13 http://ftpmaster.internal/ubuntu plucky/main amd64 libbasicobjects0t64 amd64 0.6.2-3 [5878 B] 176s Get:14 http://ftpmaster.internal/ubuntu plucky/main amd64 libcares2 amd64 1.34.4-2.1 [109 kB] 176s Get:15 http://ftpmaster.internal/ubuntu plucky/main amd64 libcollection4t64 amd64 0.6.2-3 [31.1 kB] 176s Get:16 http://ftpmaster.internal/ubuntu plucky/main amd64 libcrack2 amd64 2.9.6-5.2build1 [29.4 kB] 176s Get:17 http://ftpmaster.internal/ubuntu plucky/main amd64 libdhash1t64 amd64 0.6.2-3 [8792 B] 176s Get:18 http://ftpmaster.internal/ubuntu plucky/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10 [144 kB] 176s Get:19 http://ftpmaster.internal/ubuntu plucky/main amd64 libpath-utils1t64 amd64 0.6.2-3 [8810 B] 176s Get:20 http://ftpmaster.internal/ubuntu plucky/main amd64 libref-array1t64 amd64 0.6.2-3 [7396 B] 177s Get:21 http://ftpmaster.internal/ubuntu plucky/main amd64 libini-config5t64 amd64 0.6.2-3 [43.9 kB] 177s Get:22 http://ftpmaster.internal/ubuntu plucky/main amd64 libipa-hbac0t64 amd64 2.10.1-2ubuntu3 [18.8 kB] 177s Get:23 http://ftpmaster.internal/ubuntu plucky/universe amd64 libjose0 amd64 14-1 [45.2 kB] 177s Get:24 http://ftpmaster.internal/ubuntu plucky/main amd64 libverto-libevent1t64 amd64 0.3.1-1.2ubuntu3 [6424 B] 177s Get:25 http://ftpmaster.internal/ubuntu plucky/main amd64 libverto1t64 amd64 0.3.1-1.2ubuntu3 [10.5 kB] 177s Get:26 http://ftpmaster.internal/ubuntu plucky/main amd64 libkrad0 amd64 1.21.3-4ubuntu2 [23.7 kB] 177s Get:27 http://ftpmaster.internal/ubuntu plucky/main amd64 libtalloc2 amd64 2:2.4.2+samba4.21.4+dfsg-1ubuntu3 [79.8 kB] 177s Get:28 http://ftpmaster.internal/ubuntu plucky/main amd64 libtdb1 amd64 2:1.4.12+samba4.21.4+dfsg-1ubuntu3 [99.2 kB] 177s Get:29 http://ftpmaster.internal/ubuntu plucky/main amd64 libtevent0t64 amd64 2:0.16.1+samba4.21.4+dfsg-1ubuntu3 [43.6 kB] 177s Get:30 http://ftpmaster.internal/ubuntu plucky/main amd64 libldb2 amd64 2:2.10.0+samba4.21.4+dfsg-1ubuntu3 [155 kB] 177s Get:31 http://ftpmaster.internal/ubuntu plucky/main amd64 libnfsidmap1 amd64 1:2.8.2-2ubuntu1 [52.5 kB] 177s Get:32 http://ftpmaster.internal/ubuntu plucky/universe amd64 libnss-sudo all 1.9.16p2-1ubuntu1 [16.7 kB] 177s Get:33 http://ftpmaster.internal/ubuntu plucky/main amd64 libpwquality-common all 1.4.5-4 [7714 B] 177s Get:34 http://ftpmaster.internal/ubuntu plucky/main amd64 libpwquality1 amd64 1.4.5-4 [14.2 kB] 177s Get:35 http://ftpmaster.internal/ubuntu plucky/main amd64 libpam-pwquality amd64 1.4.5-4 [12.0 kB] 177s Get:36 http://ftpmaster.internal/ubuntu plucky/main amd64 libwbclient0 amd64 2:4.21.4+dfsg-1ubuntu3 [80.5 kB] 177s Get:37 http://ftpmaster.internal/ubuntu plucky/main amd64 samba-libs amd64 2:4.21.4+dfsg-1ubuntu3 [6502 kB] 177s Get:38 http://ftpmaster.internal/ubuntu plucky/main amd64 libsmbclient0 amd64 2:4.21.4+dfsg-1ubuntu3 [63.8 kB] 177s Get:39 http://ftpmaster.internal/ubuntu plucky/main amd64 libnss-sss amd64 2.10.1-2ubuntu3 [33.4 kB] 177s Get:40 http://ftpmaster.internal/ubuntu plucky/main amd64 libpam-sss amd64 2.10.1-2ubuntu3 [53.4 kB] 177s Get:41 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-sss amd64 2.10.1-2ubuntu3 [46.9 kB] 177s Get:42 http://ftpmaster.internal/ubuntu plucky/main amd64 libsss-certmap0 amd64 2.10.1-2ubuntu3 [49.6 kB] 177s Get:43 http://ftpmaster.internal/ubuntu plucky/main amd64 libsss-idmap0 amd64 2.10.1-2ubuntu3 [23.6 kB] 177s Get:44 http://ftpmaster.internal/ubuntu plucky/main amd64 libsss-nss-idmap0 amd64 2.10.1-2ubuntu3 [34.2 kB] 177s Get:45 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-common amd64 2.10.1-2ubuntu3 [1163 kB] 177s Get:46 http://ftpmaster.internal/ubuntu plucky/universe amd64 sssd-idp amd64 2.10.1-2ubuntu3 [28.7 kB] 177s Get:47 http://ftpmaster.internal/ubuntu plucky/universe amd64 sssd-passkey amd64 2.10.1-2ubuntu3 [32.7 kB] 177s Get:48 http://ftpmaster.internal/ubuntu plucky/main amd64 libipa-hbac-dev amd64 2.10.1-2ubuntu3 [6672 B] 177s Get:49 http://ftpmaster.internal/ubuntu plucky/main amd64 libsss-certmap-dev amd64 2.10.1-2ubuntu3 [5728 B] 177s Get:50 http://ftpmaster.internal/ubuntu plucky/main amd64 libsss-idmap-dev amd64 2.10.1-2ubuntu3 [8378 B] 177s Get:51 http://ftpmaster.internal/ubuntu plucky/main amd64 libsss-nss-idmap-dev amd64 2.10.1-2ubuntu3 [6712 B] 177s Get:52 http://ftpmaster.internal/ubuntu plucky/universe amd64 libsss-sudo amd64 2.10.1-2ubuntu3 [22.3 kB] 177s Get:53 http://ftpmaster.internal/ubuntu plucky/universe amd64 python3-libipa-hbac amd64 2.10.1-2ubuntu3 [18.0 kB] 177s Get:54 http://ftpmaster.internal/ubuntu plucky/universe amd64 python3-libsss-nss-idmap amd64 2.10.1-2ubuntu3 [9298 B] 177s Get:55 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-ad-common amd64 2.10.1-2ubuntu3 [78.7 kB] 177s Get:56 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-krb5-common amd64 2.10.1-2ubuntu3 [94.6 kB] 177s Get:57 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-ad amd64 2.10.1-2ubuntu3 [141 kB] 177s Get:58 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-ipa amd64 2.10.1-2ubuntu3 [226 kB] 177s Get:59 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-krb5 amd64 2.10.1-2ubuntu3 [14.6 kB] 177s Get:60 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-ldap amd64 2.10.1-2ubuntu3 [31.7 kB] 177s Get:61 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-proxy amd64 2.10.1-2ubuntu3 [44.8 kB] 177s Get:62 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd amd64 2.10.1-2ubuntu3 [4122 B] 177s Get:63 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-dbus amd64 2.10.1-2ubuntu3 [110 kB] 177s Get:64 http://ftpmaster.internal/ubuntu plucky/universe amd64 sssd-kcm amd64 2.10.1-2ubuntu3 [144 kB] 177s Get:65 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-tools amd64 2.10.1-2ubuntu3 [100 kB] 177s Preconfiguring packages ... 177s Fetched 13.6 MB in 1s (24.5 MB/s) 177s Selecting previously unselected package libargon2-1:amd64. 178s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76968 files and directories currently installed.) 178s Preparing to unpack .../00-libargon2-1_0~20190702+dfsg-4build1_amd64.deb ... 178s Unpacking libargon2-1:amd64 (0~20190702+dfsg-4build1) ... 178s Selecting previously unselected package libltdl7:amd64. 178s Preparing to unpack .../01-libltdl7_2.5.4-4_amd64.deb ... 178s Unpacking libltdl7:amd64 (2.5.4-4) ... 178s Selecting previously unselected package libodbc2:amd64. 178s Preparing to unpack .../02-libodbc2_2.3.12-2ubuntu1_amd64.deb ... 178s Unpacking libodbc2:amd64 (2.3.12-2ubuntu1) ... 178s Selecting previously unselected package slapd. 178s Preparing to unpack .../03-slapd_2.6.9+dfsg-1~exp2ubuntu1_amd64.deb ... 178s Unpacking slapd (2.6.9+dfsg-1~exp2ubuntu1) ... 178s Selecting previously unselected package libtcl8.6:amd64. 178s Preparing to unpack .../04-libtcl8.6_8.6.16+dfsg-1_amd64.deb ... 178s Unpacking libtcl8.6:amd64 (8.6.16+dfsg-1) ... 178s Selecting previously unselected package tcl8.6. 178s Preparing to unpack .../05-tcl8.6_8.6.16+dfsg-1_amd64.deb ... 178s Unpacking tcl8.6 (8.6.16+dfsg-1) ... 178s Selecting previously unselected package tcl-expect:amd64. 178s Preparing to unpack .../06-tcl-expect_5.45.4-4_amd64.deb ... 178s Unpacking tcl-expect:amd64 (5.45.4-4) ... 178s Selecting previously unselected package expect. 178s Preparing to unpack .../07-expect_5.45.4-4_amd64.deb ... 178s Unpacking expect (5.45.4-4) ... 178s Selecting previously unselected package ldap-utils. 178s Preparing to unpack .../08-ldap-utils_2.6.9+dfsg-1~exp2ubuntu1_amd64.deb ... 178s Unpacking ldap-utils (2.6.9+dfsg-1~exp2ubuntu1) ... 178s Selecting previously unselected package libavahi-common-data:amd64. 178s Preparing to unpack .../09-libavahi-common-data_0.8-16ubuntu1_amd64.deb ... 178s Unpacking libavahi-common-data:amd64 (0.8-16ubuntu1) ... 178s Selecting previously unselected package libavahi-common3:amd64. 178s Preparing to unpack .../10-libavahi-common3_0.8-16ubuntu1_amd64.deb ... 178s Unpacking libavahi-common3:amd64 (0.8-16ubuntu1) ... 178s Selecting previously unselected package libavahi-client3:amd64. 178s Preparing to unpack .../11-libavahi-client3_0.8-16ubuntu1_amd64.deb ... 178s Unpacking libavahi-client3:amd64 (0.8-16ubuntu1) ... 178s Selecting previously unselected package libbasicobjects0t64:amd64. 178s Preparing to unpack .../12-libbasicobjects0t64_0.6.2-3_amd64.deb ... 178s Unpacking libbasicobjects0t64:amd64 (0.6.2-3) ... 178s Selecting previously unselected package libcares2:amd64. 178s Preparing to unpack .../13-libcares2_1.34.4-2.1_amd64.deb ... 178s Unpacking libcares2:amd64 (1.34.4-2.1) ... 178s Selecting previously unselected package libcollection4t64:amd64. 178s Preparing to unpack .../14-libcollection4t64_0.6.2-3_amd64.deb ... 178s Unpacking libcollection4t64:amd64 (0.6.2-3) ... 178s Selecting previously unselected package libcrack2:amd64. 178s Preparing to unpack .../15-libcrack2_2.9.6-5.2build1_amd64.deb ... 178s Unpacking libcrack2:amd64 (2.9.6-5.2build1) ... 178s Selecting previously unselected package libdhash1t64:amd64. 178s Preparing to unpack .../16-libdhash1t64_0.6.2-3_amd64.deb ... 178s Unpacking libdhash1t64:amd64 (0.6.2-3) ... 178s Selecting previously unselected package libevent-2.1-7t64:amd64. 178s Preparing to unpack .../17-libevent-2.1-7t64_2.1.12-stable-10_amd64.deb ... 178s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 178s Selecting previously unselected package libpath-utils1t64:amd64. 178s Preparing to unpack .../18-libpath-utils1t64_0.6.2-3_amd64.deb ... 178s Unpacking libpath-utils1t64:amd64 (0.6.2-3) ... 178s Selecting previously unselected package libref-array1t64:amd64. 178s Preparing to unpack .../19-libref-array1t64_0.6.2-3_amd64.deb ... 178s Unpacking libref-array1t64:amd64 (0.6.2-3) ... 178s Selecting previously unselected package libini-config5t64:amd64. 178s Preparing to unpack .../20-libini-config5t64_0.6.2-3_amd64.deb ... 178s Unpacking libini-config5t64:amd64 (0.6.2-3) ... 178s Selecting previously unselected package libipa-hbac0t64. 178s Preparing to unpack .../21-libipa-hbac0t64_2.10.1-2ubuntu3_amd64.deb ... 178s Unpacking libipa-hbac0t64 (2.10.1-2ubuntu3) ... 178s Selecting previously unselected package libjose0:amd64. 178s Preparing to unpack .../22-libjose0_14-1_amd64.deb ... 178s Unpacking libjose0:amd64 (14-1) ... 178s Selecting previously unselected package libverto-libevent1t64:amd64. 178s Preparing to unpack .../23-libverto-libevent1t64_0.3.1-1.2ubuntu3_amd64.deb ... 178s Unpacking libverto-libevent1t64:amd64 (0.3.1-1.2ubuntu3) ... 178s Selecting previously unselected package libverto1t64:amd64. 178s Preparing to unpack .../24-libverto1t64_0.3.1-1.2ubuntu3_amd64.deb ... 178s Unpacking libverto1t64:amd64 (0.3.1-1.2ubuntu3) ... 178s Selecting previously unselected package libkrad0:amd64. 178s Preparing to unpack .../25-libkrad0_1.21.3-4ubuntu2_amd64.deb ... 178s Unpacking libkrad0:amd64 (1.21.3-4ubuntu2) ... 179s Selecting previously unselected package libtalloc2:amd64. 179s Preparing to unpack .../26-libtalloc2_2%3a2.4.2+samba4.21.4+dfsg-1ubuntu3_amd64.deb ... 179s Unpacking libtalloc2:amd64 (2:2.4.2+samba4.21.4+dfsg-1ubuntu3) ... 179s Selecting previously unselected package libtdb1:amd64. 179s Preparing to unpack .../27-libtdb1_2%3a1.4.12+samba4.21.4+dfsg-1ubuntu3_amd64.deb ... 179s Unpacking libtdb1:amd64 (2:1.4.12+samba4.21.4+dfsg-1ubuntu3) ... 179s Selecting previously unselected package libtevent0t64:amd64. 179s Preparing to unpack .../28-libtevent0t64_2%3a0.16.1+samba4.21.4+dfsg-1ubuntu3_amd64.deb ... 179s Unpacking libtevent0t64:amd64 (2:0.16.1+samba4.21.4+dfsg-1ubuntu3) ... 179s Selecting previously unselected package libldb2:amd64. 179s Preparing to unpack .../29-libldb2_2%3a2.10.0+samba4.21.4+dfsg-1ubuntu3_amd64.deb ... 179s Unpacking libldb2:amd64 (2:2.10.0+samba4.21.4+dfsg-1ubuntu3) ... 179s Selecting previously unselected package libnfsidmap1:amd64. 179s Preparing to unpack .../30-libnfsidmap1_1%3a2.8.2-2ubuntu1_amd64.deb ... 179s Unpacking libnfsidmap1:amd64 (1:2.8.2-2ubuntu1) ... 179s Selecting previously unselected package libnss-sudo. 179s Preparing to unpack .../31-libnss-sudo_1.9.16p2-1ubuntu1_all.deb ... 179s Unpacking libnss-sudo (1.9.16p2-1ubuntu1) ... 179s Selecting previously unselected package libpwquality-common. 179s Preparing to unpack .../32-libpwquality-common_1.4.5-4_all.deb ... 179s Unpacking libpwquality-common (1.4.5-4) ... 179s Selecting previously unselected package libpwquality1:amd64. 179s Preparing to unpack .../33-libpwquality1_1.4.5-4_amd64.deb ... 179s Unpacking libpwquality1:amd64 (1.4.5-4) ... 179s Selecting previously unselected package libpam-pwquality:amd64. 179s Preparing to unpack .../34-libpam-pwquality_1.4.5-4_amd64.deb ... 179s Unpacking libpam-pwquality:amd64 (1.4.5-4) ... 179s Selecting previously unselected package libwbclient0:amd64. 179s Preparing to unpack .../35-libwbclient0_2%3a4.21.4+dfsg-1ubuntu3_amd64.deb ... 179s Unpacking libwbclient0:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 179s Selecting previously unselected package samba-libs:amd64. 179s Preparing to unpack .../36-samba-libs_2%3a4.21.4+dfsg-1ubuntu3_amd64.deb ... 179s Unpacking samba-libs:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 179s Selecting previously unselected package libsmbclient0:amd64. 179s Preparing to unpack .../37-libsmbclient0_2%3a4.21.4+dfsg-1ubuntu3_amd64.deb ... 179s Unpacking libsmbclient0:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 179s Selecting previously unselected package libnss-sss:amd64. 179s Preparing to unpack .../38-libnss-sss_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libnss-sss:amd64 (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package libpam-sss:amd64. 179s Preparing to unpack .../39-libpam-sss_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libpam-sss:amd64 (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package python3-sss. 179s Preparing to unpack .../40-python3-sss_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking python3-sss (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package libsss-certmap0. 179s Preparing to unpack .../41-libsss-certmap0_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libsss-certmap0 (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package libsss-idmap0. 179s Preparing to unpack .../42-libsss-idmap0_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libsss-idmap0 (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package libsss-nss-idmap0. 179s Preparing to unpack .../43-libsss-nss-idmap0_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libsss-nss-idmap0 (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package sssd-common. 179s Preparing to unpack .../44-sssd-common_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking sssd-common (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package sssd-idp. 179s Preparing to unpack .../45-sssd-idp_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking sssd-idp (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package sssd-passkey. 179s Preparing to unpack .../46-sssd-passkey_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking sssd-passkey (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package libipa-hbac-dev. 179s Preparing to unpack .../47-libipa-hbac-dev_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libipa-hbac-dev (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package libsss-certmap-dev. 179s Preparing to unpack .../48-libsss-certmap-dev_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libsss-certmap-dev (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package libsss-idmap-dev. 179s Preparing to unpack .../49-libsss-idmap-dev_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libsss-idmap-dev (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package libsss-nss-idmap-dev. 179s Preparing to unpack .../50-libsss-nss-idmap-dev_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libsss-nss-idmap-dev (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package libsss-sudo. 179s Preparing to unpack .../51-libsss-sudo_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking libsss-sudo (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package python3-libipa-hbac. 179s Preparing to unpack .../52-python3-libipa-hbac_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking python3-libipa-hbac (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package python3-libsss-nss-idmap. 179s Preparing to unpack .../53-python3-libsss-nss-idmap_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking python3-libsss-nss-idmap (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package sssd-ad-common. 179s Preparing to unpack .../54-sssd-ad-common_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking sssd-ad-common (2.10.1-2ubuntu3) ... 179s Selecting previously unselected package sssd-krb5-common. 179s Preparing to unpack .../55-sssd-krb5-common_2.10.1-2ubuntu3_amd64.deb ... 179s Unpacking sssd-krb5-common (2.10.1-2ubuntu3) ... 180s Selecting previously unselected package sssd-ad. 180s Preparing to unpack .../56-sssd-ad_2.10.1-2ubuntu3_amd64.deb ... 180s Unpacking sssd-ad (2.10.1-2ubuntu3) ... 180s Selecting previously unselected package sssd-ipa. 180s Preparing to unpack .../57-sssd-ipa_2.10.1-2ubuntu3_amd64.deb ... 180s Unpacking sssd-ipa (2.10.1-2ubuntu3) ... 180s Selecting previously unselected package sssd-krb5. 180s Preparing to unpack .../58-sssd-krb5_2.10.1-2ubuntu3_amd64.deb ... 180s Unpacking sssd-krb5 (2.10.1-2ubuntu3) ... 180s Selecting previously unselected package sssd-ldap. 180s Preparing to unpack .../59-sssd-ldap_2.10.1-2ubuntu3_amd64.deb ... 180s Unpacking sssd-ldap (2.10.1-2ubuntu3) ... 180s Selecting previously unselected package sssd-proxy. 180s Preparing to unpack .../60-sssd-proxy_2.10.1-2ubuntu3_amd64.deb ... 180s Unpacking sssd-proxy (2.10.1-2ubuntu3) ... 180s Selecting previously unselected package sssd. 180s Preparing to unpack .../61-sssd_2.10.1-2ubuntu3_amd64.deb ... 180s Unpacking sssd (2.10.1-2ubuntu3) ... 180s Selecting previously unselected package sssd-dbus. 180s Preparing to unpack .../62-sssd-dbus_2.10.1-2ubuntu3_amd64.deb ... 180s Unpacking sssd-dbus (2.10.1-2ubuntu3) ... 180s Selecting previously unselected package sssd-kcm. 180s Preparing to unpack .../63-sssd-kcm_2.10.1-2ubuntu3_amd64.deb ... 180s Unpacking sssd-kcm (2.10.1-2ubuntu3) ... 180s Selecting previously unselected package sssd-tools. 180s Preparing to unpack .../64-sssd-tools_2.10.1-2ubuntu3_amd64.deb ... 180s Unpacking sssd-tools (2.10.1-2ubuntu3) ... 180s Setting up libpwquality-common (1.4.5-4) ... 180s Setting up libnfsidmap1:amd64 (1:2.8.2-2ubuntu1) ... 180s Setting up libsss-idmap0 (2.10.1-2ubuntu3) ... 180s Setting up libbasicobjects0t64:amd64 (0.6.2-3) ... 180s Setting up libipa-hbac0t64 (2.10.1-2ubuntu3) ... 180s Setting up libsss-idmap-dev (2.10.1-2ubuntu3) ... 180s Setting up libref-array1t64:amd64 (0.6.2-3) ... 180s Setting up libipa-hbac-dev (2.10.1-2ubuntu3) ... 180s Setting up libtdb1:amd64 (2:1.4.12+samba4.21.4+dfsg-1ubuntu3) ... 180s Setting up libargon2-1:amd64 (0~20190702+dfsg-4build1) ... 180s Setting up libcollection4t64:amd64 (0.6.2-3) ... 180s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 180s Setting up ldap-utils (2.6.9+dfsg-1~exp2ubuntu1) ... 180s Setting up libjose0:amd64 (14-1) ... 180s Setting up libwbclient0:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 180s Setting up libtalloc2:amd64 (2:2.4.2+samba4.21.4+dfsg-1ubuntu3) ... 180s Setting up libpath-utils1t64:amd64 (0.6.2-3) ... 180s Setting up libavahi-common-data:amd64 (0.8-16ubuntu1) ... 180s Setting up libcares2:amd64 (1.34.4-2.1) ... 180s Setting up libdhash1t64:amd64 (0.6.2-3) ... 180s Setting up libtcl8.6:amd64 (8.6.16+dfsg-1) ... 180s Setting up libltdl7:amd64 (2.5.4-4) ... 180s Setting up libcrack2:amd64 (2.9.6-5.2build1) ... 180s Setting up libodbc2:amd64 (2.3.12-2ubuntu1) ... 180s Setting up python3-libipa-hbac (2.10.1-2ubuntu3) ... 180s Setting up libnss-sudo (1.9.16p2-1ubuntu1) ... 180s Setting up libsss-nss-idmap0 (2.10.1-2ubuntu3) ... 180s Setting up libini-config5t64:amd64 (0.6.2-3) ... 180s Setting up libtevent0t64:amd64 (2:0.16.1+samba4.21.4+dfsg-1ubuntu3) ... 180s Setting up libnss-sss:amd64 (2.10.1-2ubuntu3) ... 180s Setting up slapd (2.6.9+dfsg-1~exp2ubuntu1) ... 180s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 180s Can't find configuration db, was SSSD configured and run? 180s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 180s Can't find configuration db, was SSSD configured and run? 180s Creating new user openldap... [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 180s Can't find configuration db, was SSSD configured and run? 180s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 180s Can't find configuration db, was SSSD configured and run? 180s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 180s Can't find configuration db, was SSSD configured and run? 180s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 180s Can't find configuration db, was SSSD configured and run? 180s done. 180s Creating initial configuration... done. 180s Creating LDAP directory... done. 181s Created symlink '/etc/systemd/system/multi-user.target.wants/slapd.service' → '/usr/lib/systemd/system/slapd.service'. 181s Setting up tcl8.6 (8.6.16+dfsg-1) ... 181s Setting up libsss-sudo (2.10.1-2ubuntu3) ... 181s Setting up libsss-nss-idmap-dev (2.10.1-2ubuntu3) ... 181s Setting up libavahi-common3:amd64 (0.8-16ubuntu1) ... 181s Setting up tcl-expect:amd64 (5.45.4-4) ... 181s Setting up libsss-certmap0 (2.10.1-2ubuntu3) ... 181s Setting up libpwquality1:amd64 (1.4.5-4) ... 181s Setting up python3-libsss-nss-idmap (2.10.1-2ubuntu3) ... 181s Setting up libldb2:amd64 (2:2.10.0+samba4.21.4+dfsg-1ubuntu3) ... 181s Setting up libavahi-client3:amd64 (0.8-16ubuntu1) ... 181s Setting up expect (5.45.4-4) ... 181s Setting up libpam-pwquality:amd64 (1.4.5-4) ... 181s Setting up samba-libs:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 181s Setting up libsss-certmap-dev (2.10.1-2ubuntu3) ... 181s Setting up python3-sss (2.10.1-2ubuntu3) ... 181s Setting up libsmbclient0:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 181s Setting up libpam-sss:amd64 (2.10.1-2ubuntu3) ... 181s Setting up sssd-common (2.10.1-2ubuntu3) ... 181s Creating SSSD system user & group... 181s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 181s Can't find configuration db, was SSSD configured and run? 181s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 181s Can't find configuration db, was SSSD configured and run? 181s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 181s Can't find configuration db, was SSSD configured and run? 181s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 181s Can't find configuration db, was SSSD configured and run? 181s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 181s Can't find configuration db, was SSSD configured and run? 181s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 181s Can't find configuration db, was SSSD configured and run? 181s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 181s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 182s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 182s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 182s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-autofs.socket' → '/usr/lib/systemd/system/sssd-autofs.socket'. 182s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-nss.socket' → '/usr/lib/systemd/system/sssd-nss.socket'. 182s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pam.socket' → '/usr/lib/systemd/system/sssd-pam.socket'. 183s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-ssh.socket' → '/usr/lib/systemd/system/sssd-ssh.socket'. 183s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-sudo.socket' → '/usr/lib/systemd/system/sssd-sudo.socket'. 183s Created symlink '/etc/systemd/system/multi-user.target.wants/sssd.service' → '/usr/lib/systemd/system/sssd.service'. 183s sssd-autofs.service is a disabled or a static unit, not starting it. 183s sssd-nss.service is a disabled or a static unit, not starting it. 184s sssd-pam.service is a disabled or a static unit, not starting it. 184s sssd-ssh.service is a disabled or a static unit, not starting it. 184s sssd-sudo.service is a disabled or a static unit, not starting it. 184s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 184s Setting up sssd-proxy (2.10.1-2ubuntu3) ... 184s Setting up sssd-kcm (2.10.1-2ubuntu3) ... 184s Created symlink '/etc/systemd/system/sockets.target.wants/sssd-kcm.socket' → '/usr/lib/systemd/system/sssd-kcm.socket'. 184s sssd-kcm.service is a disabled or a static unit, not starting it. 184s Setting up sssd-dbus (2.10.1-2ubuntu3) ... 184s sssd-ifp.service is a disabled or a static unit, not starting it. 184s Setting up sssd-ad-common (2.10.1-2ubuntu3) ... 185s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pac.socket' → '/usr/lib/systemd/system/sssd-pac.socket'. 185s sssd-pac.service is a disabled or a static unit, not starting it. 185s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 185s Setting up sssd-krb5-common (2.10.1-2ubuntu3) ... 185s Setting up sssd-krb5 (2.10.1-2ubuntu3) ... 185s Setting up sssd-ldap (2.10.1-2ubuntu3) ... 185s Setting up sssd-ad (2.10.1-2ubuntu3) ... 185s Setting up sssd-tools (2.10.1-2ubuntu3) ... 185s Setting up sssd-ipa (2.10.1-2ubuntu3) ... 185s Setting up sssd (2.10.1-2ubuntu3) ... 185s Setting up libverto1t64:amd64 (0.3.1-1.2ubuntu3) ... 185s Setting up libkrad0:amd64 (1.21.3-4ubuntu2) ... 185s Setting up libverto-libevent1t64:amd64 (0.3.1-1.2ubuntu3) ... 185s Setting up sssd-passkey (2.10.1-2ubuntu3) ... 185s Setting up sssd-idp (2.10.1-2ubuntu3) ... 185s Processing triggers for libc-bin (2.41-1ubuntu2) ... 185s Processing triggers for ufw (0.36.2-9) ... 185s Processing triggers for man-db (2.13.0-1) ... 186s Processing triggers for dbus (1.16.2-1ubuntu1) ... 189s autopkgtest [00:28:15]: test ldap-user-group-ldap-auth: [----------------------- 189s + . debian/tests/util 189s + . debian/tests/common-tests 189s + trap cleanup EXIT 189s + mydomain=example.com 189s + myhostname=ldap.example.com 189s + mysuffix=dc=example,dc=com 189s + admin_dn=cn=admin,dc=example,dc=com 189s + admin_pw=secret 189s + ldap_user=testuser1 189s + ldap_user_pw=testuser1secret 189s + ldap_group=ldapusers 189s + adjust_hostname ldap.example.com 189s + local myhostname=ldap.example.com 189s + echo ldap.example.com 189s + hostname ldap.example.com 189s + grep -qE ldap.example.com /etc/hosts 189s + echo 127.0.1.10 ldap.example.com 189s + reconfigure_slapd 189s + debconf-set-selections 189s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 189s + dpkg-reconfigure -fnoninteractive -pcritical slapd 190s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.9+dfsg-1~exp2ubuntu1... done. 190s Moving old database directory to /var/backups: 190s - directory unknown... done. 190s Creating initial configuration... done. 190s Creating LDAP directory... done. 190s + generate_certs ldap.example.com 190s + local cn=ldap.example.com 190s + local cert=/etc/ldap/server.pem 190s + local key=/etc/ldap/server.key 190s + local cnf=/etc/ldap/openssl.cnf 190s + cat 190s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 190s ...+...................+.....+++++++++++++++++++++++++++++++++++++++*........+.........+...+..+...+...+......+...+................+......+.....+.+.........+++++++++++++++++++++++++++++++++++++++*..+..............+....+......+...........+.+..+.+..............+...+.............+.....+.+....................+.++++++ 190s ............+..........+..+...+++++++++++++++++++++++++++++++++++++++*..........+.+......+++++++++++++++++++++++++++++++++++++++*.+..............+...+....+.........+..+...+....+........+....+...+..+...+......+......+.............+........+..................+......+.+..............+...+.+.....+.........+.+.....+.+...+............+.....+..........+.....++++++ 191s ----- 191s + chmod 0640 /etc/ldap/server.key 191s + chgrp openldap /etc/ldap/server.key 191s + [ ! -f /etc/ldap/server.pem ] 191s + [ ! -f /etc/ldap/server.key ] 191s + enable_ldap_ssl 191s + cat 191s + cat 191s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 191s modifying entry "cn=config" 191s 191s + populate_ldap_rfc2307 191s + cat 191s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 191s adding new entry "ou=People,dc=example,dc=com" 191s 191s adding new entry "ou=Group,dc=example,dc=com" 191s 191s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 191s 191s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 191s 191s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 191s 191s + configure_sssd_ldap_rfc2307 191s + cat 191s + chmod 0600 /etc/sssd/sssd.conf 191s + systemctl restart sssd 191s + enable_pam_mkhomedir 191s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 191s Assert local user databases do not have our LDAP test data 191s + echo session optional pam_mkhomedir.so 191s + run_common_tests 191s + echo Assert local user databases do not have our LDAP test data 191s + check_local_user testuser1 191s + local local_user=testuser1 191s + grep -q ^testuser1 /etc/passwd 191s + check_local_group testuser1 191s + local local_group=testuser1 191s + grep -q ^testuser1 /etc/group 191s The LDAP user is known to the system via getent 191s + check_local_group ldapusers 191s + local local_group=ldapusers 191s + grep -q ^ldapusers /etc/group 191s + echo The LDAP user is known to the system via getent 191s + check_getent_user testuser1 191s + local getent_user=testuser1 191s + local output 191s + getent passwd testuser1 191s The LDAP user's private group is known to the system via getent 191s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 191s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 191s + echo The LDAP user's private group is known to the system via getent 191s + check_getent_group testuser1 191s + local getent_group=testuser1 191s + local output 191s + getent group testuser1 191s The LDAP group ldapusers is known to the system via getent 191s + output=testuser1:*:10001:testuser1 191s + [ -z testuser1:*:10001:testuser1 ] 191s + echo The LDAP group ldapusers is known to the system via getent 191s + check_getent_group ldapusers 191s + local getent_group=ldapusers 191s + local output 191s + getent group ldapusers 191s + output=ldapusers:*:10100:testuser1 191s + [ -z ldapusers:*:10100:testuser1 ] 191s + echo The id(1) command can resolve the group membership of the LDAP user 191s The id(1) command can resolve the group membership of the LDAP user 191s + id -Gn testuser1 191s + output=testuser1 ldapusers 191s + [ testuser1 ldapusers != testuser1 ldapusers ] 191s The LDAP user can login via ssh 191s + echo The LDAP user can login via ssh 191s + setup_sshd_password_auth 191s + cat 191s + systemctl restart ssh 191s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 191s spawn ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no testuser1@localhost 191s Warning: Permanently added 'localhost' (ED25519) to the list of known hosts. 191s testuser1@localhost's password: 191s Creating directory '/home/testuser1'. 191s Welcome to Ubuntu Plucky Puffin (development branch) (GNU/Linux 6.14.0-10-generic x86_64) 191s 191s * Documentation: https://help.ubuntu.com 191s * Management: https://landscape.canonical.com 191s * Support: https://ubuntu.com/pro 191s 191s 191s The programs included with the Ubuntu system are free software; 191s the exact distribution terms for each program are described in the 191s individual files in /usr/share/doc/*/copyright. 191s 191s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 191s applicable law. 191s 191s [?2004htestuser1@ldap:~$ id -un 191s [?2004l testuser1 191s [?2004htestuser1@ldap:~$ ## All tests passed, phew 191s + cleanup 191s + result=0 191s + set +e 191s + [ 0 -ne 0 ] 191s + echo ## All tests passed, phew 191s + cleanup_sshd_config 191s + rm -f /etc/ssh/sshd_config.d/00-dep8.conf 191s + systemctl restart ssh 192s autopkgtest [00:28:18]: test ldap-user-group-ldap-auth: -----------------------] 192s autopkgtest [00:28:18]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 192s ldap-user-group-ldap-auth PASS 192s autopkgtest [00:28:18]: test ldap-user-group-krb5-auth: preparing testbed 192s Reading package lists... 193s Building dependency tree... 193s Reading state information... 193s Starting pkgProblemResolver with broken count: 0 193s Starting 2 pkgProblemResolver with broken count: 0 193s Done 194s The following NEW packages will be installed: 194s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4t64 194s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 194s 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. 194s Need to get 628 kB of archives. 194s After this operation, 2205 kB of additional disk space will be used. 194s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 krb5-config all 2.7 [22.0 kB] 194s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 libgssrpc4t64 amd64 1.21.3-4ubuntu2 [58.1 kB] 194s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 libkadm5clnt-mit12 amd64 1.21.3-4ubuntu2 [41.3 kB] 194s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 libkdb5-10t64 amd64 1.21.3-4ubuntu2 [42.0 kB] 194s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 libkadm5srv-mit12 amd64 1.21.3-4ubuntu2 [55.5 kB] 194s Get:6 http://ftpmaster.internal/ubuntu plucky/universe amd64 krb5-user amd64 1.21.3-4ubuntu2 [111 kB] 194s Get:7 http://ftpmaster.internal/ubuntu plucky/universe amd64 krb5-kdc amd64 1.21.3-4ubuntu2 [197 kB] 194s Get:8 http://ftpmaster.internal/ubuntu plucky/universe amd64 krb5-admin-server amd64 1.21.3-4ubuntu2 [100 kB] 194s Preconfiguring packages ... 195s Fetched 628 kB in 0s (10.2 MB/s) 195s Selecting previously unselected package krb5-config. 195s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78256 files and directories currently installed.) 195s Preparing to unpack .../0-krb5-config_2.7_all.deb ... 195s Unpacking krb5-config (2.7) ... 195s Selecting previously unselected package libgssrpc4t64:amd64. 195s Preparing to unpack .../1-libgssrpc4t64_1.21.3-4ubuntu2_amd64.deb ... 195s Unpacking libgssrpc4t64:amd64 (1.21.3-4ubuntu2) ... 195s Selecting previously unselected package libkadm5clnt-mit12:amd64. 195s Preparing to unpack .../2-libkadm5clnt-mit12_1.21.3-4ubuntu2_amd64.deb ... 195s Unpacking libkadm5clnt-mit12:amd64 (1.21.3-4ubuntu2) ... 195s Selecting previously unselected package libkdb5-10t64:amd64. 195s Preparing to unpack .../3-libkdb5-10t64_1.21.3-4ubuntu2_amd64.deb ... 195s Unpacking libkdb5-10t64:amd64 (1.21.3-4ubuntu2) ... 195s Selecting previously unselected package libkadm5srv-mit12:amd64. 195s Preparing to unpack .../4-libkadm5srv-mit12_1.21.3-4ubuntu2_amd64.deb ... 195s Unpacking libkadm5srv-mit12:amd64 (1.21.3-4ubuntu2) ... 195s Selecting previously unselected package krb5-user. 195s Preparing to unpack .../5-krb5-user_1.21.3-4ubuntu2_amd64.deb ... 195s Unpacking krb5-user (1.21.3-4ubuntu2) ... 195s Selecting previously unselected package krb5-kdc. 195s Preparing to unpack .../6-krb5-kdc_1.21.3-4ubuntu2_amd64.deb ... 195s Unpacking krb5-kdc (1.21.3-4ubuntu2) ... 195s Selecting previously unselected package krb5-admin-server. 195s Preparing to unpack .../7-krb5-admin-server_1.21.3-4ubuntu2_amd64.deb ... 195s Unpacking krb5-admin-server (1.21.3-4ubuntu2) ... 195s Setting up libgssrpc4t64:amd64 (1.21.3-4ubuntu2) ... 195s Setting up krb5-config (2.7) ... 195s Setting up libkadm5clnt-mit12:amd64 (1.21.3-4ubuntu2) ... 195s Setting up libkdb5-10t64:amd64 (1.21.3-4ubuntu2) ... 195s Setting up libkadm5srv-mit12:amd64 (1.21.3-4ubuntu2) ... 195s Setting up krb5-user (1.21.3-4ubuntu2) ... 195s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 195s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 195s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 195s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 195s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 195s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 195s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 195s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 195s Setting up krb5-kdc (1.21.3-4ubuntu2) ... 196s Created symlink '/etc/systemd/system/multi-user.target.wants/krb5-kdc.service' → '/usr/lib/systemd/system/krb5-kdc.service'. 196s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 196s Setting up krb5-admin-server (1.21.3-4ubuntu2) ... 197s Created symlink '/etc/systemd/system/multi-user.target.wants/krb5-admin-server.service' → '/usr/lib/systemd/system/krb5-admin-server.service'. 197s Processing triggers for man-db (2.13.0-1) ... 198s Processing triggers for libc-bin (2.41-1ubuntu2) ... 200s autopkgtest [00:28:26]: test ldap-user-group-krb5-auth: [----------------------- 200s + . debian/tests/util 200s + . debian/tests/common-tests 200s + trap cleanup EXIT 200s + mydomain=example.com 200s + myhostname=ldap.example.com 200s + mysuffix=dc=example,dc=com 200s + myrealm=EXAMPLE.COM 200s + admin_dn=cn=admin,dc=example,dc=com 200s + admin_pw=secret 200s + ldap_user=testuser1 200s + ldap_user_pw=testuser1secret 200s + kerberos_principal_pw=testuser1kerberos 200s + ldap_group=ldapusers 200s + adjust_hostname ldap.example.com 200s + local myhostname=ldap.example.com 200s + echo ldap.example.com 200s + hostname ldap.example.com 200s + grep -qE ldap.example.com /etc/hosts 200s + reconfigure_slapd 200s + debconf-set-selections 201s + rm -rf /var/backups/slapd-2.6.9+dfsg-1~exp2ubuntu1 /var/backups/unknown-2.6.9+dfsg-1~exp2ubuntu1-20250316-002816.ldapdb 201s + dpkg-reconfigure -fnoninteractive -pcritical slapd 201s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.9+dfsg-1~exp2ubuntu1... done. 201s Moving old database directory to /var/backups: 201s - directory unknown... done. 201s Creating initial configuration... done. 201s Creating LDAP directory... done. 202s + generate_certs ldap.example.com 202s + local cn=ldap.example.com 202s + local cert=/etc/ldap/server.pem 202s + local key=/etc/ldap/server.key 202s + local cnf=/etc/ldap/openssl.cnf 202s + cat 202s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 202s .+......+.......+..+...+...+++++++++++++++++++++++++++++++++++++++*.+++++++++++++++++++++++++++++++++++++++*.................++++++ 202s ........+...+..+....+...+..+.+.....+.............+...........+.+...+...........+++++++++++++++++++++++++++++++++++++++*.......+..+...+............+...+.........+......+.......+..+......+....+..+.+.........+......+...+.........+..+......+...................+...+...+..+...+.........+.+..+.......+........+.+...........+.............+..+.+...............+.....+....+........+.+++++++++++++++++++++++++++++++++++++++*.....+.+..+.......+.....+..................+............+.....................+.........+......+....+..+....+...........++++++ 202s ----- 202s + chmod 0640 /etc/ldap/server.key 202s + chgrp openldap /etc/ldap/server.key 202s + [ ! -f /etc/ldap/server.pem ] 202s + [ ! -f /etc/ldap/server.key ] 202s + enable_ldap_ssl 202s + cat 202s + cat 202s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 202s + populate_ldap_rfc2307 202s modifying entry "cn=config" 202s 202s + cat 202s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 202s adding new entry "ou=People,dc=example,dc=com" 202s 202s adding new entry "ou=Group,dc=example,dc=com" 202s 202s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 202s 202s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 202s 202s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 202s 202s + create_realm EXAMPLE.COM ldap.example.com 202s + local realm_name=EXAMPLE.COM 202s + local kerberos_server=ldap.example.com 202s + rm -rf /var/lib/krb5kdc/* 202s + rm -rf /etc/krb5kdc/kdc.conf 202s + rm -f /etc/krb5.keytab 202s + cat 202s + cat 202s + echo # */admin * 202s + kdb5_util create -s -P secretpassword 202s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 202s master key name 'K/M@EXAMPLE.COM' 202s + systemctl restart krb5-kdc.service krb5-admin-server.service 202s + create_krb_principal testuser1 testuser1kerberos 202s + local principal=testuser1 202s + local password=testuser1kerberos 202s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 202s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 202s Authenticating as principal root/admin@EXAMPLE.COM with password. 202s Principal "testuser1@EXAMPLE.COM" created. 202s + configure_sssd_ldap_rfc2307_krb5_auth 202s + cat 202s + chmod 0600 /etc/sssd/sssd.conf 202s + systemctl restart sssd 202s + enable_pam_mkhomedir 202s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 202s Assert local user databases do not have our LDAP test data 202s + run_common_tests 202s + echo Assert local user databases do not have our LDAP test data 202s + check_local_user testuser1 202s + local local_user=testuser1 202s + grep -q ^testuser1 /etc/passwd 202s + check_local_group testuser1 202s + local local_group=testuser1 202s + grep -q ^testuser1 /etc/group 202s + check_local_group ldapusers 202s + local local_group=ldapusers 202s + grep -q ^ldapusers /etc/group 202s The LDAP user is known to the system via getent 202s + echo The LDAP user is known to the system via getent 202s + check_getent_user testuser1 202s + local getent_user=testuser1 202s + local output 202s + getent passwd testuser1 202s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 202s + The LDAP user's private group is known to the system via getent 202s [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 202s + echo The LDAP user's private group is known to the system via getent 202s + check_getent_group testuser1 202s + local getent_group=testuser1 202s + local output 202s + getent group testuser1 202s The LDAP group ldapusers is known to the system via getent 202s + output=testuser1:*:10001:testuser1 202s + [ -z testuser1:*:10001:testuser1 ] 202s + echo The LDAP group ldapusers is known to the system via getent 202s + check_getent_group ldapusers 202s + local getent_group=ldapusers 202s + local output 202s + getent group ldapusers 202s + output=ldapusers:*:10100:testuser1 202s + [ -z ldapusers:*:10100:testuser1 ] 202s + echo The id(1) command can resolve the group membership of the LDAP user 202s The id(1) command can resolve the group membership of the LDAP user 202s + id -Gn testuser1 202s The Kerberos principal can login via ssh 202s + output=testuser1 ldapusers 202s + [ testuser1 ldapusers != testuser1 ldapusers ] 202s + echo The Kerberos principal can login via ssh 202s + setup_sshd_password_auth 202s + cat 202s + systemctl restart ssh 202s + kdestroy 202s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 202s spawn ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no testuser1@localhost 202s Warning: Permanently added 'localhost' (ED25519) to the list of known hosts. 202s testuser1@localhost's password: 203s Welcome to Ubuntu Plucky Puffin (development branch) (GNU/Linux 6.14.0-10-generic x86_64) 203s 203s * Documentation: https://help.ubuntu.com 203s * Management: https://landscape.canonical.com 203s * Support: https://ubuntu.com/pro 203s 203s Last login: Sun Mar 16 00:28:17 2025 from ::1 203s [?2004htestuser1@ldap:~$ id -un 203s [?2004l testuser1 203s [?2004htestuser1@ldap:~$ + cleanup 203s + result=0 203s + set +e 203s + [ 0 -ne 0 ] 203s + echo ## All tests passed, phew 203s + cleanup_sshd_config 203s + rm -f /etc/ssh/sshd_config.d/00-dep8.conf 203s + systemctl restart ssh 203s klist 203s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_Jf7juo 203s Default principal: testuser1@EXAMPLE.COM 203s 203s Valid starting Expires Service principal 203s 03/16/25 00:28:28 03/16/25 10:28:28 krbtgt/EXAMPLE.COM@EXAMPLE.COM## All tests passed, phew 203s autopkgtest [00:28:29]: test ldap-user-group-krb5-auth: -----------------------] 203s autopkgtest [00:28:29]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 203s ldap-user-group-krb5-auth PASS 203s autopkgtest [00:28:29]: test sssd-softhism2-certificates-tests.sh: preparing testbed 268s autopkgtest [00:29:34]: testbed dpkg architecture: amd64 268s autopkgtest [00:29:34]: testbed apt version: 2.9.31ubuntu1 268s autopkgtest [00:29:34]: @@@@@@@@@@@@@@@@@@@@ test bed setup 268s autopkgtest [00:29:34]: testbed release detected to be: plucky 269s autopkgtest [00:29:35]: updating testbed package index (apt update) 269s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [126 kB] 269s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 269s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 269s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 269s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [17.7 kB] 269s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [41.4 kB] 269s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [365 kB] 269s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main i386 Packages [66.6 kB] 269s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 Packages [84.0 kB] 269s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 c-n-f Metadata [1844 B] 269s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/restricted amd64 c-n-f Metadata [116 B] 269s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/universe i386 Packages [168 kB] 269s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 Packages [338 kB] 269s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 c-n-f Metadata [14.9 kB] 269s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse amd64 Packages [18.0 kB] 269s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse i386 Packages [9324 B] 269s Get:17 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse amd64 c-n-f Metadata [628 B] 269s Fetched 1252 kB in 0s (6403 kB/s) 270s Reading package lists... 270s Reading package lists... 271s Building dependency tree... 271s Reading state information... 271s Calculating upgrade... 271s Calculating upgrade... 272s The following package was automatically installed and is no longer required: 272s libnl-genl-3-200 272s Use 'sudo apt autoremove' to remove it. 272s The following NEW packages will be installed: 272s bpftool libdebuginfod-common libdebuginfod1t64 linux-headers-6.14.0-10 272s linux-headers-6.14.0-10-generic linux-image-6.14.0-10-generic 272s linux-modules-6.14.0-10-generic linux-modules-extra-6.14.0-10-generic 272s linux-perf linux-tools-6.14.0-10 linux-tools-6.14.0-10-generic pnp.ids 272s The following packages will be upgraded: 272s apparmor apt apt-utils binutils binutils-common binutils-x86-64-linux-gnu 272s cloud-init cloud-init-base curl dosfstools fwupd gir1.2-girepository-2.0 272s gir1.2-glib-2.0 htop hwdata libapparmor1 libapt-pkg7.0 libaudit-common 272s libaudit1 libbinutils libbrotli1 libcap-ng0 libctf-nobfd0 libctf0 272s libcurl3t64-gnutls libcurl4t64 libestr0 libfwupd3 libgirepository-1.0-1 272s libglib2.0-0t64 libglib2.0-data libgprofng0 libjemalloc2 liblz4-1 liblzma5 272s libmm-glib0 libncurses6 libncursesw6 libnl-3-200 libnl-genl-3-200 272s libnl-route-3-200 libpci3 libpython3-stdlib libpython3.13 272s libpython3.13-minimal libpython3.13-stdlib libselinux1 libsframe1 272s libsqlite3-0 libtinfo6 libxml2 linux-firmware linux-generic 272s linux-headers-generic linux-headers-virtual linux-image-generic 272s linux-image-virtual linux-libc-dev linux-tools-common linux-virtual 272s media-types ncurses-base ncurses-bin ncurses-term pci.ids pciutils 272s pinentry-curses python-apt-common python3 python3-apt python3-cffi-backend 272s python3-dbus python3-gi python3-jinja2 python3-lazr.uri python3-markupsafe 272s python3-minimal python3-systemd python3-yaml python3.13 python3.13-gdbm 272s python3.13-minimal rsync rsyslog strace xz-utils 272s 86 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. 272s Need to get 807 MB of archives. 272s After this operation, 326 MB of additional disk space will be used. 272s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 ncurses-bin amd64 6.5+20250216-2 [194 kB] 272s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 ncurses-base all 6.5+20250216-2 [25.9 kB] 272s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 ncurses-term all 6.5+20250216-2 [276 kB] 272s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 liblz4-1 amd64 1.10.0-4 [66.4 kB] 272s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 liblzma5 amd64 5.6.4-1 [157 kB] 272s Get:6 http://ftpmaster.internal/ubuntu plucky/main amd64 libapt-pkg7.0 amd64 2.9.33 [1138 kB] 272s Get:7 http://ftpmaster.internal/ubuntu plucky/main amd64 apt amd64 2.9.33 [1439 kB] 272s Get:8 http://ftpmaster.internal/ubuntu plucky/main amd64 apt-utils amd64 2.9.33 [222 kB] 272s Get:9 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-minimal amd64 3.13.2-2 [27.7 kB] 272s Get:10 http://ftpmaster.internal/ubuntu plucky/main amd64 python3 amd64 3.13.2-2 [24.0 kB] 272s Get:11 http://ftpmaster.internal/ubuntu plucky/main amd64 libpython3.13 amd64 3.13.2-2 [2341 kB] 272s Get:12 http://ftpmaster.internal/ubuntu plucky/main amd64 media-types all 13.0.0 [29.9 kB] 272s Get:13 http://ftpmaster.internal/ubuntu plucky/main amd64 libncurses6 amd64 6.5+20250216-2 [126 kB] 272s Get:14 http://ftpmaster.internal/ubuntu plucky/main amd64 libncursesw6 amd64 6.5+20250216-2 [165 kB] 272s Get:15 http://ftpmaster.internal/ubuntu plucky/main amd64 libtinfo6 amd64 6.5+20250216-2 [119 kB] 272s Get:16 http://ftpmaster.internal/ubuntu plucky/main amd64 libsqlite3-0 amd64 3.46.1-2 [715 kB] 272s Get:17 http://ftpmaster.internal/ubuntu plucky/main amd64 python3.13 amd64 3.13.2-2 [735 kB] 272s Get:18 http://ftpmaster.internal/ubuntu plucky/main amd64 python3.13-minimal amd64 3.13.2-2 [2365 kB] 272s Get:19 http://ftpmaster.internal/ubuntu plucky/main amd64 libpython3.13-minimal amd64 3.13.2-2 [883 kB] 272s Get:20 http://ftpmaster.internal/ubuntu plucky/main amd64 libpython3.13-stdlib amd64 3.13.2-2 [2066 kB] 272s Get:21 http://ftpmaster.internal/ubuntu plucky/main amd64 libpython3-stdlib amd64 3.13.2-2 [10.4 kB] 272s Get:22 http://ftpmaster.internal/ubuntu plucky/main amd64 rsync amd64 3.4.1+ds1-3 [482 kB] 272s Get:23 http://ftpmaster.internal/ubuntu plucky/main amd64 libdebuginfod-common all 0.192-4 [15.4 kB] 272s Get:24 http://ftpmaster.internal/ubuntu plucky/main amd64 libaudit-common all 1:4.0.2-2ubuntu2 [6628 B] 272s Get:25 http://ftpmaster.internal/ubuntu plucky/main amd64 libcap-ng0 amd64 0.8.5-4build1 [15.6 kB] 272s Get:26 http://ftpmaster.internal/ubuntu plucky/main amd64 libaudit1 amd64 1:4.0.2-2ubuntu2 [54.0 kB] 272s Get:27 http://ftpmaster.internal/ubuntu plucky/main amd64 libselinux1 amd64 3.7-3ubuntu3 [87.3 kB] 272s Get:28 http://ftpmaster.internal/ubuntu plucky/main amd64 gir1.2-girepository-2.0 amd64 1.83.4-1 [25.3 kB] 272s Get:29 http://ftpmaster.internal/ubuntu plucky/main amd64 gir1.2-glib-2.0 amd64 2.84.0-1 [184 kB] 272s Get:30 http://ftpmaster.internal/ubuntu plucky/main amd64 libglib2.0-0t64 amd64 2.84.0-1 [1669 kB] 272s Get:31 http://ftpmaster.internal/ubuntu plucky/main amd64 libgirepository-1.0-1 amd64 1.83.4-1 [89.5 kB] 272s Get:32 http://ftpmaster.internal/ubuntu plucky/main amd64 libapparmor1 amd64 4.1.0~beta5-0ubuntu8 [55.0 kB] 272s Get:33 http://ftpmaster.internal/ubuntu plucky/main amd64 libestr0 amd64 0.1.11-2 [8340 B] 272s Get:34 http://ftpmaster.internal/ubuntu plucky/main amd64 libglib2.0-data all 2.84.0-1 [53.0 kB] 272s Get:35 http://ftpmaster.internal/ubuntu plucky/main amd64 libxml2 amd64 2.12.7+dfsg+really2.9.14-0.2ubuntu5 [772 kB] 272s Get:36 http://ftpmaster.internal/ubuntu plucky/main amd64 python-apt-common all 2.9.9build1 [21.3 kB] 272s Get:37 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-apt amd64 2.9.9build1 [172 kB] 272s Get:38 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-cffi-backend amd64 1.17.1-2build2 [96.6 kB] 272s Get:39 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-dbus amd64 1.3.2-5build5 [102 kB] 272s Get:40 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-gi amd64 3.50.0-4build1 [252 kB] 272s Get:41 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-yaml amd64 6.0.2-1build2 [144 kB] 272s Get:42 http://ftpmaster.internal/ubuntu plucky/main amd64 rsyslog amd64 8.2412.0-2ubuntu2 [555 kB] 272s Get:43 http://ftpmaster.internal/ubuntu plucky/main amd64 apparmor amd64 4.1.0~beta5-0ubuntu8 [701 kB] 272s Get:44 http://ftpmaster.internal/ubuntu plucky/main amd64 dosfstools amd64 4.2-1.2 [95.0 kB] 272s Get:45 http://ftpmaster.internal/ubuntu plucky/main amd64 libnl-genl-3-200 amd64 3.7.0-1 [12.2 kB] 272s Get:46 http://ftpmaster.internal/ubuntu plucky/main amd64 libnl-route-3-200 amd64 3.7.0-1 [191 kB] 272s Get:47 http://ftpmaster.internal/ubuntu plucky/main amd64 libnl-3-200 amd64 3.7.0-1 [64.9 kB] 272s Get:48 http://ftpmaster.internal/ubuntu plucky/main amd64 pci.ids all 0.0~2025.03.09-1 [285 kB] 272s Get:49 http://ftpmaster.internal/ubuntu plucky/main amd64 pciutils amd64 1:3.13.0-2 [110 kB] 272s Get:50 http://ftpmaster.internal/ubuntu plucky/main amd64 libpci3 amd64 1:3.13.0-2 [39.8 kB] 272s Get:51 http://ftpmaster.internal/ubuntu plucky/main amd64 strace amd64 6.13+ds-1ubuntu1 [622 kB] 272s Get:52 http://ftpmaster.internal/ubuntu plucky/main amd64 xz-utils amd64 5.6.4-1 [278 kB] 272s Get:53 http://ftpmaster.internal/ubuntu plucky/main amd64 libgprofng0 amd64 2.44-3ubuntu1 [886 kB] 272s Get:54 http://ftpmaster.internal/ubuntu plucky/main amd64 libctf0 amd64 2.44-3ubuntu1 [96.5 kB] 272s Get:55 http://ftpmaster.internal/ubuntu plucky/main amd64 libctf-nobfd0 amd64 2.44-3ubuntu1 [98.9 kB] 272s Get:56 http://ftpmaster.internal/ubuntu plucky/main amd64 binutils-x86-64-linux-gnu amd64 2.44-3ubuntu1 [1108 kB] 272s Get:57 http://ftpmaster.internal/ubuntu plucky/main amd64 libbinutils amd64 2.44-3ubuntu1 [585 kB] 272s Get:58 http://ftpmaster.internal/ubuntu plucky/main amd64 binutils amd64 2.44-3ubuntu1 [208 kB] 272s Get:59 http://ftpmaster.internal/ubuntu plucky/main amd64 binutils-common amd64 2.44-3ubuntu1 [215 kB] 272s Get:60 http://ftpmaster.internal/ubuntu plucky/main amd64 libsframe1 amd64 2.44-3ubuntu1 [14.8 kB] 272s Get:61 http://ftpmaster.internal/ubuntu plucky/main amd64 hwdata all 0.393-3 [1562 B] 272s Get:62 http://ftpmaster.internal/ubuntu plucky/main amd64 pnp.ids all 0.393-3 [29.5 kB] 272s Get:63 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-tools-common all 6.14.0-10.10 [295 kB] 272s Get:64 http://ftpmaster.internal/ubuntu plucky/main amd64 bpftool amd64 7.6.0+6.14.0-10.10 [1147 kB] 272s Get:65 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-markupsafe amd64 2.1.5-1build4 [13.4 kB] 272s Get:66 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-jinja2 all 3.1.5-2ubuntu1 [109 kB] 272s Get:67 http://ftpmaster.internal/ubuntu plucky/main amd64 cloud-init-base all 25.1-0ubuntu3 [616 kB] 272s Get:68 http://ftpmaster.internal/ubuntu plucky/main amd64 libbrotli1 amd64 1.1.0-2build4 [365 kB] 272s Get:69 http://ftpmaster.internal/ubuntu plucky/main amd64 curl amd64 8.12.1-3ubuntu1 [258 kB] 272s Get:70 http://ftpmaster.internal/ubuntu plucky/main amd64 libcurl4t64 amd64 8.12.1-3ubuntu1 [437 kB] 272s Get:71 http://ftpmaster.internal/ubuntu plucky/main amd64 libcurl3t64-gnutls amd64 8.12.1-3ubuntu1 [432 kB] 272s Get:72 http://ftpmaster.internal/ubuntu plucky/main amd64 fwupd amd64 2.0.6-4 [5408 kB] 272s Get:73 http://ftpmaster.internal/ubuntu plucky/main amd64 libfwupd3 amd64 2.0.6-4 [136 kB] 272s Get:74 http://ftpmaster.internal/ubuntu plucky/main amd64 libmm-glib0 amd64 1.23.4-0ubuntu3 [251 kB] 272s Get:75 http://ftpmaster.internal/ubuntu plucky/main amd64 htop amd64 3.4.0-2 [195 kB] 272s Get:76 http://ftpmaster.internal/ubuntu plucky/main amd64 libdebuginfod1t64 amd64 0.192-4 [21.0 kB] 272s Get:77 http://ftpmaster.internal/ubuntu plucky/main amd64 libjemalloc2 amd64 5.3.0-3 [277 kB] 272s Get:78 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-firmware amd64 20250310.git9e1370d3-0ubuntu1 [571 MB] 276s Get:79 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-modules-6.14.0-10-generic amd64 6.14.0-10.10 [41.2 MB] 276s Get:80 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-image-6.14.0-10-generic amd64 6.14.0-10.10 [15.3 MB] 276s Get:81 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-modules-extra-6.14.0-10-generic amd64 6.14.0-10.10 [120 MB] 277s Get:82 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-generic amd64 6.14.0-10.10 [1730 B] 277s Get:83 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-image-generic amd64 6.14.0-10.10 [11.1 kB] 277s Get:84 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-virtual amd64 6.14.0-10.10 [1722 B] 277s Get:85 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-image-virtual amd64 6.14.0-10.10 [11.1 kB] 277s Get:86 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-headers-virtual amd64 6.14.0-10.10 [1642 B] 277s Get:87 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-headers-6.14.0-10 all 6.14.0-10.10 [14.2 MB] 277s Get:88 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-headers-6.14.0-10-generic amd64 6.14.0-10.10 [3915 kB] 277s Get:89 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-headers-generic amd64 6.14.0-10.10 [11.0 kB] 277s Get:90 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-libc-dev amd64 6.14.0-10.10 [1723 kB] 277s Get:91 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-perf amd64 6.14.0-10.10 [4122 kB] 277s Get:92 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-tools-6.14.0-10 amd64 6.14.0-10.10 [1394 kB] 277s Get:93 http://ftpmaster.internal/ubuntu plucky/main amd64 linux-tools-6.14.0-10-generic amd64 6.14.0-10.10 [830 B] 277s Get:94 http://ftpmaster.internal/ubuntu plucky/main amd64 pinentry-curses amd64 1.3.1-2ubuntu3 [42.3 kB] 277s Get:95 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-lazr.uri all 1.0.6-6 [13.7 kB] 277s Get:96 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-systemd amd64 235-1build6 [43.9 kB] 277s Get:97 http://ftpmaster.internal/ubuntu plucky/main amd64 python3.13-gdbm amd64 3.13.2-2 [31.9 kB] 277s Get:98 http://ftpmaster.internal/ubuntu plucky/main amd64 cloud-init all 25.1-0ubuntu3 [2100 B] 278s Preconfiguring packages ... 278s Fetched 807 MB in 6s (146 MB/s) 278s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 278s Preparing to unpack .../ncurses-bin_6.5+20250216-2_amd64.deb ... 278s Unpacking ncurses-bin (6.5+20250216-2) over (6.5+20250216-1) ... 278s Setting up ncurses-bin (6.5+20250216-2) ... 278s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 278s Preparing to unpack .../ncurses-base_6.5+20250216-2_all.deb ... 278s Unpacking ncurses-base (6.5+20250216-2) over (6.5+20250216-1) ... 278s Setting up ncurses-base (6.5+20250216-2) ... 278s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 278s Preparing to unpack .../ncurses-term_6.5+20250216-2_all.deb ... 278s Unpacking ncurses-term (6.5+20250216-2) over (6.5+20250216-1) ... 279s Preparing to unpack .../liblz4-1_1.10.0-4_amd64.deb ... 279s Unpacking liblz4-1:amd64 (1.10.0-4) over (1.10.0-3) ... 279s Setting up liblz4-1:amd64 (1.10.0-4) ... 279s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 279s Preparing to unpack .../liblzma5_5.6.4-1_amd64.deb ... 279s Unpacking liblzma5:amd64 (5.6.4-1) over (5.6.3-1) ... 279s Setting up liblzma5:amd64 (5.6.4-1) ... 279s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 279s Preparing to unpack .../libapt-pkg7.0_2.9.33_amd64.deb ... 279s Unpacking libapt-pkg7.0:amd64 (2.9.33) over (2.9.31ubuntu1) ... 279s Setting up libapt-pkg7.0:amd64 (2.9.33) ... 279s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 279s Preparing to unpack .../archives/apt_2.9.33_amd64.deb ... 279s Unpacking apt (2.9.33) over (2.9.31ubuntu1) ... 279s Setting up apt (2.9.33) ... 280s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 280s Preparing to unpack .../apt-utils_2.9.33_amd64.deb ... 280s Unpacking apt-utils (2.9.33) over (2.9.31ubuntu1) ... 280s Preparing to unpack .../python3-minimal_3.13.2-2_amd64.deb ... 280s Unpacking python3-minimal (3.13.2-2) over (3.13.2-1) ... 280s Setting up python3-minimal (3.13.2-2) ... 280s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 280s Preparing to unpack .../0-python3_3.13.2-2_amd64.deb ... 280s Unpacking python3 (3.13.2-2) over (3.13.2-1) ... 280s Preparing to unpack .../1-libpython3.13_3.13.2-2_amd64.deb ... 280s Unpacking libpython3.13:amd64 (3.13.2-2) over (3.13.2-1) ... 280s Preparing to unpack .../2-media-types_13.0.0_all.deb ... 280s Unpacking media-types (13.0.0) over (12.0.0) ... 281s Preparing to unpack .../3-libncurses6_6.5+20250216-2_amd64.deb ... 281s Unpacking libncurses6:amd64 (6.5+20250216-2) over (6.5+20250216-1) ... 281s Preparing to unpack .../4-libncursesw6_6.5+20250216-2_amd64.deb ... 281s Unpacking libncursesw6:amd64 (6.5+20250216-2) over (6.5+20250216-1) ... 281s Preparing to unpack .../5-libtinfo6_6.5+20250216-2_amd64.deb ... 281s Unpacking libtinfo6:amd64 (6.5+20250216-2) over (6.5+20250216-1) ... 281s Setting up libtinfo6:amd64 (6.5+20250216-2) ... 281s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109138 files and directories currently installed.) 281s Preparing to unpack .../0-libsqlite3-0_3.46.1-2_amd64.deb ... 281s Unpacking libsqlite3-0:amd64 (3.46.1-2) over (3.46.1-1) ... 281s Preparing to unpack .../1-python3.13_3.13.2-2_amd64.deb ... 281s Unpacking python3.13 (3.13.2-2) over (3.13.2-1) ... 281s Preparing to unpack .../2-python3.13-minimal_3.13.2-2_amd64.deb ... 281s Unpacking python3.13-minimal (3.13.2-2) over (3.13.2-1) ... 281s Preparing to unpack .../3-libpython3.13-minimal_3.13.2-2_amd64.deb ... 281s Unpacking libpython3.13-minimal:amd64 (3.13.2-2) over (3.13.2-1) ... 281s Preparing to unpack .../4-libpython3.13-stdlib_3.13.2-2_amd64.deb ... 281s Unpacking libpython3.13-stdlib:amd64 (3.13.2-2) over (3.13.2-1) ... 281s Preparing to unpack .../5-libpython3-stdlib_3.13.2-2_amd64.deb ... 281s Unpacking libpython3-stdlib:amd64 (3.13.2-2) over (3.13.2-1) ... 281s Preparing to unpack .../6-rsync_3.4.1+ds1-3_amd64.deb ... 281s Unpacking rsync (3.4.1+ds1-3) over (3.4.1-0syncable1) ... 281s Selecting previously unselected package libdebuginfod-common. 281s Preparing to unpack .../7-libdebuginfod-common_0.192-4_all.deb ... 281s Unpacking libdebuginfod-common (0.192-4) ... 281s Preparing to unpack .../8-libaudit-common_1%3a4.0.2-2ubuntu2_all.deb ... 281s Unpacking libaudit-common (1:4.0.2-2ubuntu2) over (1:4.0.2-2ubuntu1) ... 281s Setting up libaudit-common (1:4.0.2-2ubuntu2) ... 281s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109147 files and directories currently installed.) 282s Preparing to unpack .../libcap-ng0_0.8.5-4build1_amd64.deb ... 282s Unpacking libcap-ng0:amd64 (0.8.5-4build1) over (0.8.5-4) ... 282s Setting up libcap-ng0:amd64 (0.8.5-4build1) ... 282s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109147 files and directories currently installed.) 282s Preparing to unpack .../libaudit1_1%3a4.0.2-2ubuntu2_amd64.deb ... 282s Unpacking libaudit1:amd64 (1:4.0.2-2ubuntu2) over (1:4.0.2-2ubuntu1) ... 282s Setting up libaudit1:amd64 (1:4.0.2-2ubuntu2) ... 282s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109147 files and directories currently installed.) 282s Preparing to unpack .../libselinux1_3.7-3ubuntu3_amd64.deb ... 282s Unpacking libselinux1:amd64 (3.7-3ubuntu3) over (3.7-3ubuntu2) ... 282s Setting up libselinux1:amd64 (3.7-3ubuntu3) ... 282s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 109147 files and directories currently installed.) 282s Preparing to unpack .../00-gir1.2-girepository-2.0_1.83.4-1_amd64.deb ... 282s Unpacking gir1.2-girepository-2.0:amd64 (1.83.4-1) over (1.82.0-4) ... 282s Preparing to unpack .../01-gir1.2-glib-2.0_2.84.0-1_amd64.deb ... 282s Unpacking gir1.2-glib-2.0:amd64 (2.84.0-1) over (2.83.5-1) ... 282s Preparing to unpack .../02-libglib2.0-0t64_2.84.0-1_amd64.deb ... 282s Unpacking libglib2.0-0t64:amd64 (2.84.0-1) over (2.83.5-1) ... 282s Preparing to unpack .../03-libgirepository-1.0-1_1.83.4-1_amd64.deb ... 282s Unpacking libgirepository-1.0-1:amd64 (1.83.4-1) over (1.82.0-4) ... 282s Preparing to unpack .../04-libapparmor1_4.1.0~beta5-0ubuntu8_amd64.deb ... 282s Unpacking libapparmor1:amd64 (4.1.0~beta5-0ubuntu8) over (4.1.0~beta5-0ubuntu6) ... 282s Preparing to unpack .../05-libestr0_0.1.11-2_amd64.deb ... 282s Unpacking libestr0:amd64 (0.1.11-2) over (0.1.11-1build1) ... 282s Preparing to unpack .../06-libglib2.0-data_2.84.0-1_all.deb ... 282s Unpacking libglib2.0-data (2.84.0-1) over (2.83.5-1) ... 282s Preparing to unpack .../07-libxml2_2.12.7+dfsg+really2.9.14-0.2ubuntu5_amd64.deb ... 282s Unpacking libxml2:amd64 (2.12.7+dfsg+really2.9.14-0.2ubuntu5) over (2.12.7+dfsg+really2.9.14-0.2ubuntu4) ... 282s Preparing to unpack .../08-python-apt-common_2.9.9build1_all.deb ... 282s Unpacking python-apt-common (2.9.9build1) over (2.9.9) ... 282s Preparing to unpack .../09-python3-apt_2.9.9build1_amd64.deb ... 282s Unpacking python3-apt (2.9.9build1) over (2.9.9) ... 282s Preparing to unpack .../10-python3-cffi-backend_1.17.1-2build2_amd64.deb ... 282s Unpacking python3-cffi-backend:amd64 (1.17.1-2build2) over (1.17.1-2build1) ... 282s Preparing to unpack .../11-python3-dbus_1.3.2-5build5_amd64.deb ... 283s Unpacking python3-dbus (1.3.2-5build5) over (1.3.2-5build4) ... 283s Preparing to unpack .../12-python3-gi_3.50.0-4build1_amd64.deb ... 283s Unpacking python3-gi (3.50.0-4build1) over (3.50.0-4) ... 283s Preparing to unpack .../13-python3-yaml_6.0.2-1build2_amd64.deb ... 283s Unpacking python3-yaml (6.0.2-1build2) over (6.0.2-1build1) ... 283s Preparing to unpack .../14-rsyslog_8.2412.0-2ubuntu2_amd64.deb ... 283s Unpacking rsyslog (8.2412.0-2ubuntu2) over (8.2412.0-2ubuntu1) ... 283s Preparing to unpack .../15-apparmor_4.1.0~beta5-0ubuntu8_amd64.deb ... 284s Unpacking apparmor (4.1.0~beta5-0ubuntu8) over (4.1.0~beta5-0ubuntu6) ... 284s Preparing to unpack .../16-dosfstools_4.2-1.2_amd64.deb ... 284s Unpacking dosfstools (4.2-1.2) over (4.2-1.1build1) ... 284s Preparing to unpack .../17-libnl-genl-3-200_3.7.0-1_amd64.deb ... 284s Unpacking libnl-genl-3-200:amd64 (3.7.0-1) over (3.7.0-0.3build2) ... 284s Preparing to unpack .../18-libnl-route-3-200_3.7.0-1_amd64.deb ... 284s Unpacking libnl-route-3-200:amd64 (3.7.0-1) over (3.7.0-0.3build2) ... 284s Preparing to unpack .../19-libnl-3-200_3.7.0-1_amd64.deb ... 284s Unpacking libnl-3-200:amd64 (3.7.0-1) over (3.7.0-0.3build2) ... 284s Preparing to unpack .../20-pci.ids_0.0~2025.03.09-1_all.deb ... 284s Unpacking pci.ids (0.0~2025.03.09-1) over (0.0~2025.02.12-1) ... 284s Preparing to unpack .../21-pciutils_1%3a3.13.0-2_amd64.deb ... 284s Unpacking pciutils (1:3.13.0-2) over (1:3.13.0-1) ... 284s Preparing to unpack .../22-libpci3_1%3a3.13.0-2_amd64.deb ... 284s Unpacking libpci3:amd64 (1:3.13.0-2) over (1:3.13.0-1) ... 284s Preparing to unpack .../23-strace_6.13+ds-1ubuntu1_amd64.deb ... 284s Unpacking strace (6.13+ds-1ubuntu1) over (6.11-0ubuntu1) ... 284s Preparing to unpack .../24-xz-utils_5.6.4-1_amd64.deb ... 284s Unpacking xz-utils (5.6.4-1) over (5.6.3-1) ... 284s Preparing to unpack .../25-libgprofng0_2.44-3ubuntu1_amd64.deb ... 284s Unpacking libgprofng0:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 284s Preparing to unpack .../26-libctf0_2.44-3ubuntu1_amd64.deb ... 284s Unpacking libctf0:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 284s Preparing to unpack .../27-libctf-nobfd0_2.44-3ubuntu1_amd64.deb ... 284s Unpacking libctf-nobfd0:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 284s Preparing to unpack .../28-binutils-x86-64-linux-gnu_2.44-3ubuntu1_amd64.deb ... 284s Unpacking binutils-x86-64-linux-gnu (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 285s Preparing to unpack .../29-libbinutils_2.44-3ubuntu1_amd64.deb ... 285s Unpacking libbinutils:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 285s Preparing to unpack .../30-binutils_2.44-3ubuntu1_amd64.deb ... 285s Unpacking binutils (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 285s Preparing to unpack .../31-binutils-common_2.44-3ubuntu1_amd64.deb ... 285s Unpacking binutils-common:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 285s Preparing to unpack .../32-libsframe1_2.44-3ubuntu1_amd64.deb ... 285s Unpacking libsframe1:amd64 (2.44-3ubuntu1) over (2.44-2ubuntu1) ... 285s Preparing to unpack .../33-hwdata_0.393-3_all.deb ... 285s Unpacking hwdata (0.393-3) over (0.393-1) ... 285s Selecting previously unselected package pnp.ids. 285s Preparing to unpack .../34-pnp.ids_0.393-3_all.deb ... 285s Unpacking pnp.ids (0.393-3) ... 285s Preparing to unpack .../35-linux-tools-common_6.14.0-10.10_all.deb ... 285s Unpacking linux-tools-common (6.14.0-10.10) over (6.12.0-16.16) ... 285s Selecting previously unselected package bpftool. 285s Preparing to unpack .../36-bpftool_7.6.0+6.14.0-10.10_amd64.deb ... 285s Unpacking bpftool (7.6.0+6.14.0-10.10) ... 285s Preparing to unpack .../37-python3-markupsafe_2.1.5-1build4_amd64.deb ... 285s Unpacking python3-markupsafe (2.1.5-1build4) over (2.1.5-1build3) ... 285s Preparing to unpack .../38-python3-jinja2_3.1.5-2ubuntu1_all.deb ... 285s Unpacking python3-jinja2 (3.1.5-2ubuntu1) over (3.1.5-2) ... 285s Preparing to unpack .../39-cloud-init-base_25.1-0ubuntu3_all.deb ... 285s Unpacking cloud-init-base (25.1-0ubuntu3) over (25.1-0ubuntu2) ... 286s Preparing to unpack .../40-libbrotli1_1.1.0-2build4_amd64.deb ... 286s Unpacking libbrotli1:amd64 (1.1.0-2build4) over (1.1.0-2build3) ... 286s Preparing to unpack .../41-curl_8.12.1-3ubuntu1_amd64.deb ... 286s Unpacking curl (8.12.1-3ubuntu1) over (8.12.1-2ubuntu1) ... 286s Preparing to unpack .../42-libcurl4t64_8.12.1-3ubuntu1_amd64.deb ... 286s Unpacking libcurl4t64:amd64 (8.12.1-3ubuntu1) over (8.12.1-2ubuntu1) ... 286s Preparing to unpack .../43-libcurl3t64-gnutls_8.12.1-3ubuntu1_amd64.deb ... 286s Unpacking libcurl3t64-gnutls:amd64 (8.12.1-3ubuntu1) over (8.12.1-2ubuntu1) ... 286s Preparing to unpack .../44-fwupd_2.0.6-4_amd64.deb ... 286s Unpacking fwupd (2.0.6-4) over (2.0.6-3) ... 286s Preparing to unpack .../45-libfwupd3_2.0.6-4_amd64.deb ... 286s Unpacking libfwupd3:amd64 (2.0.6-4) over (2.0.6-3) ... 286s Preparing to unpack .../46-libmm-glib0_1.23.4-0ubuntu3_amd64.deb ... 286s Unpacking libmm-glib0:amd64 (1.23.4-0ubuntu3) over (1.23.4-0ubuntu2) ... 286s Preparing to unpack .../47-htop_3.4.0-2_amd64.deb ... 286s Unpacking htop (3.4.0-2) over (3.3.0-5) ... 286s Selecting previously unselected package libdebuginfod1t64:amd64. 286s Preparing to unpack .../48-libdebuginfod1t64_0.192-4_amd64.deb ... 286s Unpacking libdebuginfod1t64:amd64 (0.192-4) ... 286s Preparing to unpack .../49-libjemalloc2_5.3.0-3_amd64.deb ... 286s Unpacking libjemalloc2:amd64 (5.3.0-3) over (5.3.0-2build1) ... 286s Preparing to unpack .../50-linux-firmware_20250310.git9e1370d3-0ubuntu1_amd64.deb ... 286s Unpacking linux-firmware (20250310.git9e1370d3-0ubuntu1) over (20250204.git0fd450ee-0ubuntu1) ... 290s Selecting previously unselected package linux-modules-6.14.0-10-generic. 290s Preparing to unpack .../51-linux-modules-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 290s Unpacking linux-modules-6.14.0-10-generic (6.14.0-10.10) ... 290s Selecting previously unselected package linux-image-6.14.0-10-generic. 290s Preparing to unpack .../52-linux-image-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 290s Unpacking linux-image-6.14.0-10-generic (6.14.0-10.10) ... 290s Selecting previously unselected package linux-modules-extra-6.14.0-10-generic. 290s Preparing to unpack .../53-linux-modules-extra-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 290s Unpacking linux-modules-extra-6.14.0-10-generic (6.14.0-10.10) ... 292s Preparing to unpack .../54-linux-generic_6.14.0-10.10_amd64.deb ... 292s Unpacking linux-generic (6.14.0-10.10) over (6.12.0-16.16+2) ... 292s Preparing to unpack .../55-linux-image-generic_6.14.0-10.10_amd64.deb ... 292s Unpacking linux-image-generic (6.14.0-10.10) over (6.12.0-16.16+2) ... 292s Preparing to unpack .../56-linux-virtual_6.14.0-10.10_amd64.deb ... 292s Unpacking linux-virtual (6.14.0-10.10) over (6.12.0-16.16+2) ... 292s Preparing to unpack .../57-linux-image-virtual_6.14.0-10.10_amd64.deb ... 292s Unpacking linux-image-virtual (6.14.0-10.10) over (6.12.0-16.16+2) ... 292s Preparing to unpack .../58-linux-headers-virtual_6.14.0-10.10_amd64.deb ... 292s Unpacking linux-headers-virtual (6.14.0-10.10) over (6.12.0-16.16+2) ... 292s Selecting previously unselected package linux-headers-6.14.0-10. 292s Preparing to unpack .../59-linux-headers-6.14.0-10_6.14.0-10.10_all.deb ... 292s Unpacking linux-headers-6.14.0-10 (6.14.0-10.10) ... 294s Selecting previously unselected package linux-headers-6.14.0-10-generic. 294s Preparing to unpack .../60-linux-headers-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 294s Unpacking linux-headers-6.14.0-10-generic (6.14.0-10.10) ... 296s Preparing to unpack .../61-linux-headers-generic_6.14.0-10.10_amd64.deb ... 296s Unpacking linux-headers-generic (6.14.0-10.10) over (6.12.0-16.16+2) ... 296s Preparing to unpack .../62-linux-libc-dev_6.14.0-10.10_amd64.deb ... 296s Unpacking linux-libc-dev:amd64 (6.14.0-10.10) over (6.12.0-16.16) ... 296s Selecting previously unselected package linux-perf. 296s Preparing to unpack .../63-linux-perf_6.14.0-10.10_amd64.deb ... 296s Unpacking linux-perf (6.14.0-10.10) ... 296s Selecting previously unselected package linux-tools-6.14.0-10. 296s Preparing to unpack .../64-linux-tools-6.14.0-10_6.14.0-10.10_amd64.deb ... 296s Unpacking linux-tools-6.14.0-10 (6.14.0-10.10) ... 296s Selecting previously unselected package linux-tools-6.14.0-10-generic. 296s Preparing to unpack .../65-linux-tools-6.14.0-10-generic_6.14.0-10.10_amd64.deb ... 296s Unpacking linux-tools-6.14.0-10-generic (6.14.0-10.10) ... 297s Preparing to unpack .../66-pinentry-curses_1.3.1-2ubuntu3_amd64.deb ... 297s Unpacking pinentry-curses (1.3.1-2ubuntu3) over (1.3.1-2ubuntu2) ... 297s Preparing to unpack .../67-python3-lazr.uri_1.0.6-6_all.deb ... 297s Unpacking python3-lazr.uri (1.0.6-6) over (1.0.6-5) ... 297s Preparing to unpack .../68-python3-systemd_235-1build6_amd64.deb ... 297s Unpacking python3-systemd (235-1build6) over (235-1build5) ... 297s Preparing to unpack .../69-python3.13-gdbm_3.13.2-2_amd64.deb ... 297s Unpacking python3.13-gdbm (3.13.2-2) over (3.13.2-1) ... 297s Preparing to unpack .../70-cloud-init_25.1-0ubuntu3_all.deb ... 297s Unpacking cloud-init (25.1-0ubuntu3) over (25.1-0ubuntu2) ... 297s Setting up linux-headers-6.14.0-10 (6.14.0-10.10) ... 297s Setting up media-types (13.0.0) ... 297s Installing new version of config file /etc/mime.types ... 297s Setting up linux-headers-6.14.0-10-generic (6.14.0-10.10) ... 297s Setting up libapparmor1:amd64 (4.1.0~beta5-0ubuntu8) ... 297s Setting up pci.ids (0.0~2025.03.09-1) ... 297s Setting up apt-utils (2.9.33) ... 297s Setting up libdebuginfod-common (0.192-4) ... 297s Setting up linux-firmware (20250310.git9e1370d3-0ubuntu1) ... 297s Setting up bpftool (7.6.0+6.14.0-10.10) ... 297s Setting up libestr0:amd64 (0.1.11-2) ... 297s Setting up libbrotli1:amd64 (1.1.0-2build4) ... 297s Setting up libsqlite3-0:amd64 (3.46.1-2) ... 297s Setting up dosfstools (4.2-1.2) ... 297s Setting up rsyslog (8.2412.0-2ubuntu2) ... 297s info: The user `syslog' is already a member of `adm'. 298s Setting up binutils-common:amd64 (2.44-3ubuntu1) ... 298s Setting up libcurl3t64-gnutls:amd64 (8.12.1-3ubuntu1) ... 298s Setting up linux-libc-dev:amd64 (6.14.0-10.10) ... 298s Setting up libctf-nobfd0:amd64 (2.44-3ubuntu1) ... 298s Setting up linux-headers-generic (6.14.0-10.10) ... 298s Setting up libjemalloc2:amd64 (5.3.0-3) ... 298s Setting up libsframe1:amd64 (2.44-3ubuntu1) ... 298s Setting up libpython3.13-minimal:amd64 (3.13.2-2) ... 298s Setting up apparmor (4.1.0~beta5-0ubuntu8) ... 298s Installing new version of config file /etc/apparmor.d/openvpn ... 299s Reloading AppArmor profiles 301s Setting up libglib2.0-0t64:amd64 (2.84.0-1) ... 301s No schema files found: doing nothing. 301s Setting up libglib2.0-data (2.84.0-1) ... 301s Setting up libncurses6:amd64 (6.5+20250216-2) ... 301s Setting up strace (6.13+ds-1ubuntu1) ... 301s Setting up xz-utils (5.6.4-1) ... 301s Setting up gir1.2-glib-2.0:amd64 (2.84.0-1) ... 301s Setting up linux-modules-6.14.0-10-generic (6.14.0-10.10) ... 303s Setting up libncursesw6:amd64 (6.5+20250216-2) ... 303s Setting up libpci3:amd64 (1:3.13.0-2) ... 303s Setting up python-apt-common (2.9.9build1) ... 303s Setting up libmm-glib0:amd64 (1.23.4-0ubuntu3) ... 303s Setting up pnp.ids (0.393-3) ... 303s Setting up libnl-3-200:amd64 (3.7.0-1) ... 303s Setting up python3.13-minimal (3.13.2-2) ... 304s Setting up libgirepository-1.0-1:amd64 (1.83.4-1) ... 304s Setting up libbinutils:amd64 (2.44-3ubuntu1) ... 304s Setting up libpython3.13-stdlib:amd64 (3.13.2-2) ... 304s Setting up libxml2:amd64 (2.12.7+dfsg+really2.9.14-0.2ubuntu5) ... 304s Setting up rsync (3.4.1+ds1-3) ... 304s rsync.service is a disabled or a static unit not running, not starting it. 304s Setting up python3.13-gdbm (3.13.2-2) ... 304s Setting up libpython3-stdlib:amd64 (3.13.2-2) ... 304s Setting up ncurses-term (6.5+20250216-2) ... 304s Setting up libctf0:amd64 (2.44-3ubuntu1) ... 304s Setting up libpython3.13:amd64 (3.13.2-2) ... 304s Setting up pinentry-curses (1.3.1-2ubuntu3) ... 304s Setting up libdebuginfod1t64:amd64 (0.192-4) ... 304s Setting up linux-headers-virtual (6.14.0-10.10) ... 304s Setting up libcurl4t64:amd64 (8.12.1-3ubuntu1) ... 304s Setting up python3.13 (3.13.2-2) ... 305s Setting up htop (3.4.0-2) ... 305s Setting up linux-image-6.14.0-10-generic (6.14.0-10.10) ... 307s I: /boot/vmlinuz.old is now a symlink to vmlinuz-6.12.0-16-generic 307s I: /boot/initrd.img.old is now a symlink to initrd.img-6.12.0-16-generic 307s I: /boot/vmlinuz is now a symlink to vmlinuz-6.14.0-10-generic 307s I: /boot/initrd.img is now a symlink to initrd.img-6.14.0-10-generic 307s Setting up libfwupd3:amd64 (2.0.6-4) ... 307s Setting up python3 (3.13.2-2) ... 308s Setting up python3-markupsafe (2.1.5-1build4) ... 308s Setting up linux-modules-extra-6.14.0-10-generic (6.14.0-10.10) ... 310s Setting up libnl-route-3-200:amd64 (3.7.0-1) ... 310s Setting up hwdata (0.393-3) ... 310s Setting up python3-jinja2 (3.1.5-2ubuntu1) ... 310s Setting up libgprofng0:amd64 (2.44-3ubuntu1) ... 310s Setting up linux-perf (6.14.0-10.10) ... 310s Setting up gir1.2-girepository-2.0:amd64 (1.83.4-1) ... 310s Setting up python3-gi (3.50.0-4build1) ... 310s Setting up pciutils (1:3.13.0-2) ... 310s Setting up libnl-genl-3-200:amd64 (3.7.0-1) ... 310s Setting up curl (8.12.1-3ubuntu1) ... 310s Setting up linux-image-virtual (6.14.0-10.10) ... 310s Setting up linux-tools-common (6.14.0-10.10) ... 310s Setting up fwupd (2.0.6-4) ... 311s fwupd-refresh.service is a disabled or a static unit not running, not starting it. 311s fwupd.service is a disabled or a static unit not running, not starting it. 311s Setting up python3-systemd (235-1build6) ... 311s Setting up python3-cffi-backend:amd64 (1.17.1-2build2) ... 311s Setting up binutils-x86-64-linux-gnu (2.44-3ubuntu1) ... 311s Setting up linux-image-generic (6.14.0-10.10) ... 311s Setting up python3-dbus (1.3.2-5build5) ... 311s Setting up linux-tools-6.14.0-10 (6.14.0-10.10) ... 311s Setting up linux-generic (6.14.0-10.10) ... 311s Setting up python3-apt (2.9.9build1) ... 312s Setting up python3-yaml (6.0.2-1build2) ... 312s Setting up python3-lazr.uri (1.0.6-6) ... 312s Setting up binutils (2.44-3ubuntu1) ... 312s Setting up cloud-init-base (25.1-0ubuntu3) ... 313s Setting up linux-virtual (6.14.0-10.10) ... 313s Setting up linux-tools-6.14.0-10-generic (6.14.0-10.10) ... 313s Setting up cloud-init (25.1-0ubuntu3) ... 313s Processing triggers for systemd (257.3-1ubuntu3) ... 313s Processing triggers for man-db (2.13.0-1) ... 315s Processing triggers for dbus (1.16.2-1ubuntu1) ... 315s Processing triggers for libc-bin (2.41-1ubuntu1) ... 315s Processing triggers for initramfs-tools (0.146ubuntu1) ... 315s update-initramfs: Generating /boot/initrd.img-6.12.0-16-generic 315s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 327s Processing triggers for linux-image-6.14.0-10-generic (6.14.0-10.10) ... 327s /etc/kernel/postinst.d/initramfs-tools: 327s update-initramfs: Generating /boot/initrd.img-6.14.0-10-generic 327s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 338s /etc/kernel/postinst.d/zz-update-grub: 338s Sourcing file `/etc/default/grub' 338s Sourcing file `/etc/default/grub.d/50-cloudimg-settings.cfg' 338s Sourcing file `/etc/default/grub.d/90-autopkgtest.cfg' 338s Generating grub configuration file ... 338s Found linux image: /boot/vmlinuz-6.14.0-10-generic 338s Found initrd image: /boot/initrd.img-6.14.0-10-generic 338s Found linux image: /boot/vmlinuz-6.12.0-16-generic 338s Found initrd image: /boot/initrd.img-6.12.0-16-generic 339s Found linux image: /boot/vmlinuz-6.11.0-8-generic 339s Found initrd image: /boot/initrd.img-6.11.0-8-generic 339s Warning: os-prober will not be executed to detect other bootable partitions. 339s Systems on them will not be added to the GRUB boot configuration. 339s Check GRUB_DISABLE_OS_PROBER documentation entry. 339s Adding boot menu entry for UEFI Firmware Settings ... 339s done 340s Reading package lists... 340s Building dependency tree... 340s Reading state information... 341s Solving dependencies... 341s The following packages will be REMOVED: 341s libnl-genl-3-200* libnsl2* libpython3.12-minimal* libpython3.12-stdlib* 341s libpython3.12t64* linux-headers-6.11.0-8* linux-headers-6.11.0-8-generic* 341s linux-headers-6.12.0-16* linux-headers-6.12.0-16-generic* 341s linux-image-6.11.0-8-generic* linux-image-6.12.0-16-generic* 341s linux-modules-6.11.0-8-generic* linux-modules-6.12.0-16-generic* 341s linux-modules-extra-6.12.0-16-generic* linux-tools-6.11.0-8* 341s linux-tools-6.11.0-8-generic* linux-tools-6.12.0-16* 341s linux-tools-6.12.0-16-generic* 341s 0 upgraded, 0 newly installed, 18 to remove and 5 not upgraded. 341s After this operation, 545 MB disk space will be freed. 341s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 148643 files and directories currently installed.) 341s Removing libnl-genl-3-200:amd64 (3.7.0-1) ... 341s Removing linux-tools-6.11.0-8-generic (6.11.0-8.8) ... 341s Removing linux-tools-6.11.0-8 (6.11.0-8.8) ... 341s Removing libpython3.12t64:amd64 (3.12.9-1) ... 341s Removing libpython3.12-stdlib:amd64 (3.12.9-1) ... 341s Removing libnsl2:amd64 (1.3.0-3build3) ... 341s Removing libpython3.12-minimal:amd64 (3.12.9-1) ... 341s Removing linux-headers-6.11.0-8-generic (6.11.0-8.8) ... 342s Removing linux-headers-6.11.0-8 (6.11.0-8.8) ... 344s Removing linux-headers-6.12.0-16-generic (6.12.0-16.16) ... 345s Removing linux-headers-6.12.0-16 (6.12.0-16.16) ... 346s Removing linux-image-6.11.0-8-generic (6.11.0-8.8) ... 347s /etc/kernel/postrm.d/initramfs-tools: 347s update-initramfs: Deleting /boot/initrd.img-6.11.0-8-generic 347s /etc/kernel/postrm.d/zz-update-grub: 347s Sourcing file `/etc/default/grub' 347s Sourcing file `/etc/default/grub.d/50-cloudimg-settings.cfg' 347s Sourcing file `/etc/default/grub.d/90-autopkgtest.cfg' 347s Generating grub configuration file ... 347s Found linux image: /boot/vmlinuz-6.14.0-10-generic 347s Found initrd image: /boot/initrd.img-6.14.0-10-generic 347s Found linux image: /boot/vmlinuz-6.12.0-16-generic 347s Found initrd image: /boot/initrd.img-6.12.0-16-generic 348s Warning: os-prober will not be executed to detect other bootable partitions. 348s Systems on them will not be added to the GRUB boot configuration. 348s Check GRUB_DISABLE_OS_PROBER documentation entry. 348s Adding boot menu entry for UEFI Firmware Settings ... 348s done 348s Removing linux-image-6.12.0-16-generic (6.12.0-16.16) ... 348s W: Removing the running kernel 348s I: /boot/vmlinuz.old is now a symlink to vmlinuz-6.14.0-10-generic 348s I: /boot/initrd.img.old is now a symlink to initrd.img-6.14.0-10-generic 348s /etc/kernel/postrm.d/initramfs-tools: 348s update-initramfs: Deleting /boot/initrd.img-6.12.0-16-generic 348s /etc/kernel/postrm.d/zz-update-grub: 348s Sourcing file `/etc/default/grub' 348s Sourcing file `/etc/default/grub.d/50-cloudimg-settings.cfg' 348s Sourcing file `/etc/default/grub.d/90-autopkgtest.cfg' 348s Generating grub configuration file ... 348s Found linux image: /boot/vmlinuz-6.14.0-10-generic 348s Found initrd image: /boot/initrd.img-6.14.0-10-generic 348s Warning: os-prober will not be executed to detect other bootable partitions. 348s Systems on them will not be added to the GRUB boot configuration. 348s Check GRUB_DISABLE_OS_PROBER documentation entry. 348s Adding boot menu entry for UEFI Firmware Settings ... 348s done 348s Removing linux-modules-6.11.0-8-generic (6.11.0-8.8) ... 349s Removing linux-modules-extra-6.12.0-16-generic (6.12.0-16.16) ... 350s Removing linux-modules-6.12.0-16-generic (6.12.0-16.16) ... 350s Removing linux-tools-6.12.0-16-generic (6.12.0-16.16) ... 350s Removing linux-tools-6.12.0-16 (6.12.0-16.16) ... 350s Processing triggers for libc-bin (2.41-1ubuntu1) ... 350s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76972 files and directories currently installed.) 350s Purging configuration files for linux-image-6.11.0-8-generic (6.11.0-8.8) ... 350s Purging configuration files for libpython3.12-minimal:amd64 (3.12.9-1) ... 350s Purging configuration files for linux-modules-extra-6.12.0-16-generic (6.12.0-16.16) ... 350s Purging configuration files for linux-modules-6.12.0-16-generic (6.12.0-16.16) ... 350s dpkg: warning: while removing linux-modules-6.12.0-16-generic, directory '/lib/modules/6.12.0-16-generic' not empty so not removed 350s Purging configuration files for linux-modules-6.11.0-8-generic (6.11.0-8.8) ... 350s Purging configuration files for linux-image-6.12.0-16-generic (6.12.0-16.16) ... 350s rmdir: failed to remove '/lib/modules/6.12.0-16-generic': Directory not empty 351s autopkgtest [00:30:57]: upgrading testbed (apt dist-upgrade and autopurge) 351s Reading package lists... 351s Building dependency tree... 351s Reading state information... 351s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 351s Starting 2 pkgProblemResolver with broken count: 0 351s Done 352s Entering ResolveByKeep 352s 352s Calculating upgrade... 352s The following packages will be upgraded: 352s libc-bin libc-dev-bin libc6 libc6-dev locales 353s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 353s Need to get 10.5 MB of archives. 353s After this operation, 1024 B of additional disk space will be used. 353s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libc6-dev amd64 2.41-1ubuntu2 [2183 kB] 353s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libc-dev-bin amd64 2.41-1ubuntu2 [24.7 kB] 353s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libc6 amd64 2.41-1ubuntu2 [3327 kB] 353s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 libc-bin amd64 2.41-1ubuntu2 [700 kB] 353s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 locales all 2.41-1ubuntu2 [4246 kB] 353s Preconfiguring packages ... 353s Fetched 10.5 MB in 0s (45.1 MB/s) 353s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76968 files and directories currently installed.) 353s Preparing to unpack .../libc6-dev_2.41-1ubuntu2_amd64.deb ... 353s Unpacking libc6-dev:amd64 (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 353s Preparing to unpack .../libc-dev-bin_2.41-1ubuntu2_amd64.deb ... 353s Unpacking libc-dev-bin (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 353s Preparing to unpack .../libc6_2.41-1ubuntu2_amd64.deb ... 354s Unpacking libc6:amd64 (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 354s Setting up libc6:amd64 (2.41-1ubuntu2) ... 354s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76968 files and directories currently installed.) 354s Preparing to unpack .../libc-bin_2.41-1ubuntu2_amd64.deb ... 354s Unpacking libc-bin (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 354s Setting up libc-bin (2.41-1ubuntu2) ... 354s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76968 files and directories currently installed.) 354s Preparing to unpack .../locales_2.41-1ubuntu2_all.deb ... 354s Unpacking locales (2.41-1ubuntu2) over (2.41-1ubuntu1) ... 354s Setting up locales (2.41-1ubuntu2) ... 355s Generating locales (this might take a while)... 356s en_US.UTF-8... done 356s Generation complete. 356s Setting up libc-dev-bin (2.41-1ubuntu2) ... 356s Setting up libc6-dev:amd64 (2.41-1ubuntu2) ... 356s Processing triggers for man-db (2.13.0-1) ... 357s Processing triggers for systemd (257.3-1ubuntu3) ... 358s Reading package lists... 358s Building dependency tree... 358s Reading state information... 358s Starting pkgProblemResolver with broken count: 0 358s Starting 2 pkgProblemResolver with broken count: 0 358s Done 359s Solving dependencies... 359s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 359s autopkgtest [00:31:05]: rebooting testbed after setup commands that affected boot 363s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 376s Reading package lists... 376s Building dependency tree... 376s Reading state information... 376s Starting pkgProblemResolver with broken count: 0 376s Starting 2 pkgProblemResolver with broken count: 0 376s Done 377s The following NEW packages will be installed: 377s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 377s libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 libdhash1t64 377s libevent-2.1-7t64 libgnutls-dane0t64 libini-config5t64 libipa-hbac0t64 377s libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 377s libpath-utils1t64 libpwquality-common libpwquality1 libref-array1t64 377s libsmbclient0 libsofthsm2 libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 377s libtalloc2 libtdb1 libtevent0t64 libunbound8 libwbclient0 python3-sss 377s samba-libs softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common sssd-common 377s sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 377s 0 upgraded, 45 newly installed, 0 to remove and 0 not upgraded. 377s Need to get 10.9 MB of archives. 377s After this operation, 41.9 MB of additional disk space will be used. 377s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10 [144 kB] 377s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 libunbound8 amd64 1.22.0-1ubuntu1 [519 kB] 377s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 libgnutls-dane0t64 amd64 3.8.9-2ubuntu2 [24.4 kB] 377s Get:4 http://ftpmaster.internal/ubuntu plucky/universe amd64 gnutls-bin amd64 3.8.9-2ubuntu2 [283 kB] 377s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-common-data amd64 0.8-16ubuntu1 [30.9 kB] 377s Get:6 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-common3 amd64 0.8-16ubuntu1 [23.6 kB] 377s Get:7 http://ftpmaster.internal/ubuntu plucky/main amd64 libavahi-client3 amd64 0.8-16ubuntu1 [27.5 kB] 377s Get:8 http://ftpmaster.internal/ubuntu plucky/main amd64 libbasicobjects0t64 amd64 0.6.2-3 [5878 B] 377s Get:9 http://ftpmaster.internal/ubuntu plucky/main amd64 libcares2 amd64 1.34.4-2.1 [109 kB] 377s Get:10 http://ftpmaster.internal/ubuntu plucky/main amd64 libcollection4t64 amd64 0.6.2-3 [31.1 kB] 377s Get:11 http://ftpmaster.internal/ubuntu plucky/main amd64 libcrack2 amd64 2.9.6-5.2build1 [29.4 kB] 377s Get:12 http://ftpmaster.internal/ubuntu plucky/main amd64 libdhash1t64 amd64 0.6.2-3 [8792 B] 377s Get:13 http://ftpmaster.internal/ubuntu plucky/main amd64 libpath-utils1t64 amd64 0.6.2-3 [8810 B] 377s Get:14 http://ftpmaster.internal/ubuntu plucky/main amd64 libref-array1t64 amd64 0.6.2-3 [7396 B] 377s Get:15 http://ftpmaster.internal/ubuntu plucky/main amd64 libini-config5t64 amd64 0.6.2-3 [43.9 kB] 377s Get:16 http://ftpmaster.internal/ubuntu plucky/main amd64 libipa-hbac0t64 amd64 2.10.1-2ubuntu3 [18.8 kB] 377s Get:17 http://ftpmaster.internal/ubuntu plucky/main amd64 libtalloc2 amd64 2:2.4.2+samba4.21.4+dfsg-1ubuntu3 [79.8 kB] 377s Get:18 http://ftpmaster.internal/ubuntu plucky/main amd64 libtdb1 amd64 2:1.4.12+samba4.21.4+dfsg-1ubuntu3 [99.2 kB] 377s Get:19 http://ftpmaster.internal/ubuntu plucky/main amd64 libtevent0t64 amd64 2:0.16.1+samba4.21.4+dfsg-1ubuntu3 [43.6 kB] 377s Get:20 http://ftpmaster.internal/ubuntu plucky/main amd64 libldb2 amd64 2:2.10.0+samba4.21.4+dfsg-1ubuntu3 [155 kB] 377s Get:21 http://ftpmaster.internal/ubuntu plucky/main amd64 libnfsidmap1 amd64 1:2.8.2-2ubuntu1 [52.5 kB] 377s Get:22 http://ftpmaster.internal/ubuntu plucky/main amd64 libpwquality-common all 1.4.5-4 [7714 B] 377s Get:23 http://ftpmaster.internal/ubuntu plucky/main amd64 libpwquality1 amd64 1.4.5-4 [14.2 kB] 377s Get:24 http://ftpmaster.internal/ubuntu plucky/main amd64 libpam-pwquality amd64 1.4.5-4 [12.0 kB] 377s Get:25 http://ftpmaster.internal/ubuntu plucky/main amd64 libwbclient0 amd64 2:4.21.4+dfsg-1ubuntu3 [80.5 kB] 377s Get:26 http://ftpmaster.internal/ubuntu plucky/main amd64 samba-libs amd64 2:4.21.4+dfsg-1ubuntu3 [6502 kB] 377s Get:27 http://ftpmaster.internal/ubuntu plucky/main amd64 libsmbclient0 amd64 2:4.21.4+dfsg-1ubuntu3 [63.8 kB] 377s Get:28 http://ftpmaster.internal/ubuntu plucky/main amd64 libnss-sss amd64 2.10.1-2ubuntu3 [33.4 kB] 377s Get:29 http://ftpmaster.internal/ubuntu plucky/main amd64 libpam-sss amd64 2.10.1-2ubuntu3 [53.4 kB] 377s Get:30 http://ftpmaster.internal/ubuntu plucky/universe amd64 softhsm2-common amd64 2.6.1-2.2ubuntu3 [6198 B] 377s Get:31 http://ftpmaster.internal/ubuntu plucky/universe amd64 libsofthsm2 amd64 2.6.1-2.2ubuntu3 [266 kB] 377s Get:32 http://ftpmaster.internal/ubuntu plucky/main amd64 libsss-certmap0 amd64 2.10.1-2ubuntu3 [49.6 kB] 377s Get:33 http://ftpmaster.internal/ubuntu plucky/main amd64 libsss-idmap0 amd64 2.10.1-2ubuntu3 [23.6 kB] 377s Get:34 http://ftpmaster.internal/ubuntu plucky/main amd64 libsss-nss-idmap0 amd64 2.10.1-2ubuntu3 [34.2 kB] 377s Get:35 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-sss amd64 2.10.1-2ubuntu3 [46.9 kB] 377s Get:36 http://ftpmaster.internal/ubuntu plucky/universe amd64 softhsm2 amd64 2.6.1-2.2ubuntu3 [175 kB] 377s Get:37 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-common amd64 2.10.1-2ubuntu3 [1163 kB] 377s Get:38 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-ad-common amd64 2.10.1-2ubuntu3 [78.7 kB] 377s Get:39 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-krb5-common amd64 2.10.1-2ubuntu3 [94.6 kB] 377s Get:40 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-ad amd64 2.10.1-2ubuntu3 [141 kB] 377s Get:41 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-ipa amd64 2.10.1-2ubuntu3 [226 kB] 377s Get:42 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-krb5 amd64 2.10.1-2ubuntu3 [14.6 kB] 377s Get:43 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-ldap amd64 2.10.1-2ubuntu3 [31.7 kB] 377s Get:44 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd-proxy amd64 2.10.1-2ubuntu3 [44.8 kB] 377s Get:45 http://ftpmaster.internal/ubuntu plucky/main amd64 sssd amd64 2.10.1-2ubuntu3 [4122 B] 377s Fetched 10.9 MB in 0s (34.0 MB/s) 377s Selecting previously unselected package libevent-2.1-7t64:amd64. 378s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 76968 files and directories currently installed.) 378s Preparing to unpack .../00-libevent-2.1-7t64_2.1.12-stable-10_amd64.deb ... 378s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 378s Selecting previously unselected package libunbound8:amd64. 378s Preparing to unpack .../01-libunbound8_1.22.0-1ubuntu1_amd64.deb ... 378s Unpacking libunbound8:amd64 (1.22.0-1ubuntu1) ... 378s Selecting previously unselected package libgnutls-dane0t64:amd64. 378s Preparing to unpack .../02-libgnutls-dane0t64_3.8.9-2ubuntu2_amd64.deb ... 378s Unpacking libgnutls-dane0t64:amd64 (3.8.9-2ubuntu2) ... 378s Selecting previously unselected package gnutls-bin. 378s Preparing to unpack .../03-gnutls-bin_3.8.9-2ubuntu2_amd64.deb ... 378s Unpacking gnutls-bin (3.8.9-2ubuntu2) ... 378s Selecting previously unselected package libavahi-common-data:amd64. 378s Preparing to unpack .../04-libavahi-common-data_0.8-16ubuntu1_amd64.deb ... 378s Unpacking libavahi-common-data:amd64 (0.8-16ubuntu1) ... 378s Selecting previously unselected package libavahi-common3:amd64. 378s Preparing to unpack .../05-libavahi-common3_0.8-16ubuntu1_amd64.deb ... 378s Unpacking libavahi-common3:amd64 (0.8-16ubuntu1) ... 378s Selecting previously unselected package libavahi-client3:amd64. 378s Preparing to unpack .../06-libavahi-client3_0.8-16ubuntu1_amd64.deb ... 378s Unpacking libavahi-client3:amd64 (0.8-16ubuntu1) ... 378s Selecting previously unselected package libbasicobjects0t64:amd64. 378s Preparing to unpack .../07-libbasicobjects0t64_0.6.2-3_amd64.deb ... 378s Unpacking libbasicobjects0t64:amd64 (0.6.2-3) ... 378s Selecting previously unselected package libcares2:amd64. 378s Preparing to unpack .../08-libcares2_1.34.4-2.1_amd64.deb ... 378s Unpacking libcares2:amd64 (1.34.4-2.1) ... 378s Selecting previously unselected package libcollection4t64:amd64. 378s Preparing to unpack .../09-libcollection4t64_0.6.2-3_amd64.deb ... 378s Unpacking libcollection4t64:amd64 (0.6.2-3) ... 378s Selecting previously unselected package libcrack2:amd64. 378s Preparing to unpack .../10-libcrack2_2.9.6-5.2build1_amd64.deb ... 378s Unpacking libcrack2:amd64 (2.9.6-5.2build1) ... 378s Selecting previously unselected package libdhash1t64:amd64. 378s Preparing to unpack .../11-libdhash1t64_0.6.2-3_amd64.deb ... 378s Unpacking libdhash1t64:amd64 (0.6.2-3) ... 378s Selecting previously unselected package libpath-utils1t64:amd64. 378s Preparing to unpack .../12-libpath-utils1t64_0.6.2-3_amd64.deb ... 378s Unpacking libpath-utils1t64:amd64 (0.6.2-3) ... 378s Selecting previously unselected package libref-array1t64:amd64. 378s Preparing to unpack .../13-libref-array1t64_0.6.2-3_amd64.deb ... 378s Unpacking libref-array1t64:amd64 (0.6.2-3) ... 378s Selecting previously unselected package libini-config5t64:amd64. 378s Preparing to unpack .../14-libini-config5t64_0.6.2-3_amd64.deb ... 378s Unpacking libini-config5t64:amd64 (0.6.2-3) ... 378s Selecting previously unselected package libipa-hbac0t64. 378s Preparing to unpack .../15-libipa-hbac0t64_2.10.1-2ubuntu3_amd64.deb ... 378s Unpacking libipa-hbac0t64 (2.10.1-2ubuntu3) ... 378s Selecting previously unselected package libtalloc2:amd64. 378s Preparing to unpack .../16-libtalloc2_2%3a2.4.2+samba4.21.4+dfsg-1ubuntu3_amd64.deb ... 378s Unpacking libtalloc2:amd64 (2:2.4.2+samba4.21.4+dfsg-1ubuntu3) ... 378s Selecting previously unselected package libtdb1:amd64. 378s Preparing to unpack .../17-libtdb1_2%3a1.4.12+samba4.21.4+dfsg-1ubuntu3_amd64.deb ... 378s Unpacking libtdb1:amd64 (2:1.4.12+samba4.21.4+dfsg-1ubuntu3) ... 378s Selecting previously unselected package libtevent0t64:amd64. 378s Preparing to unpack .../18-libtevent0t64_2%3a0.16.1+samba4.21.4+dfsg-1ubuntu3_amd64.deb ... 378s Unpacking libtevent0t64:amd64 (2:0.16.1+samba4.21.4+dfsg-1ubuntu3) ... 378s Selecting previously unselected package libldb2:amd64. 378s Preparing to unpack .../19-libldb2_2%3a2.10.0+samba4.21.4+dfsg-1ubuntu3_amd64.deb ... 378s Unpacking libldb2:amd64 (2:2.10.0+samba4.21.4+dfsg-1ubuntu3) ... 378s Selecting previously unselected package libnfsidmap1:amd64. 378s Preparing to unpack .../20-libnfsidmap1_1%3a2.8.2-2ubuntu1_amd64.deb ... 378s Unpacking libnfsidmap1:amd64 (1:2.8.2-2ubuntu1) ... 378s Selecting previously unselected package libpwquality-common. 378s Preparing to unpack .../21-libpwquality-common_1.4.5-4_all.deb ... 378s Unpacking libpwquality-common (1.4.5-4) ... 378s Selecting previously unselected package libpwquality1:amd64. 378s Preparing to unpack .../22-libpwquality1_1.4.5-4_amd64.deb ... 378s Unpacking libpwquality1:amd64 (1.4.5-4) ... 378s Selecting previously unselected package libpam-pwquality:amd64. 378s Preparing to unpack .../23-libpam-pwquality_1.4.5-4_amd64.deb ... 378s Unpacking libpam-pwquality:amd64 (1.4.5-4) ... 378s Selecting previously unselected package libwbclient0:amd64. 378s Preparing to unpack .../24-libwbclient0_2%3a4.21.4+dfsg-1ubuntu3_amd64.deb ... 378s Unpacking libwbclient0:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 378s Selecting previously unselected package samba-libs:amd64. 378s Preparing to unpack .../25-samba-libs_2%3a4.21.4+dfsg-1ubuntu3_amd64.deb ... 378s Unpacking samba-libs:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 379s Selecting previously unselected package libsmbclient0:amd64. 379s Preparing to unpack .../26-libsmbclient0_2%3a4.21.4+dfsg-1ubuntu3_amd64.deb ... 379s Unpacking libsmbclient0:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 379s Selecting previously unselected package libnss-sss:amd64. 379s Preparing to unpack .../27-libnss-sss_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking libnss-sss:amd64 (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package libpam-sss:amd64. 379s Preparing to unpack .../28-libpam-sss_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking libpam-sss:amd64 (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package softhsm2-common. 379s Preparing to unpack .../29-softhsm2-common_2.6.1-2.2ubuntu3_amd64.deb ... 379s Unpacking softhsm2-common (2.6.1-2.2ubuntu3) ... 379s Selecting previously unselected package libsofthsm2. 379s Preparing to unpack .../30-libsofthsm2_2.6.1-2.2ubuntu3_amd64.deb ... 379s Unpacking libsofthsm2 (2.6.1-2.2ubuntu3) ... 379s Selecting previously unselected package libsss-certmap0. 379s Preparing to unpack .../31-libsss-certmap0_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking libsss-certmap0 (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package libsss-idmap0. 379s Preparing to unpack .../32-libsss-idmap0_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking libsss-idmap0 (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package libsss-nss-idmap0. 379s Preparing to unpack .../33-libsss-nss-idmap0_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking libsss-nss-idmap0 (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package python3-sss. 379s Preparing to unpack .../34-python3-sss_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking python3-sss (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package softhsm2. 379s Preparing to unpack .../35-softhsm2_2.6.1-2.2ubuntu3_amd64.deb ... 379s Unpacking softhsm2 (2.6.1-2.2ubuntu3) ... 379s Selecting previously unselected package sssd-common. 379s Preparing to unpack .../36-sssd-common_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking sssd-common (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package sssd-ad-common. 379s Preparing to unpack .../37-sssd-ad-common_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking sssd-ad-common (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package sssd-krb5-common. 379s Preparing to unpack .../38-sssd-krb5-common_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking sssd-krb5-common (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package sssd-ad. 379s Preparing to unpack .../39-sssd-ad_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking sssd-ad (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package sssd-ipa. 379s Preparing to unpack .../40-sssd-ipa_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking sssd-ipa (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package sssd-krb5. 379s Preparing to unpack .../41-sssd-krb5_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking sssd-krb5 (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package sssd-ldap. 379s Preparing to unpack .../42-sssd-ldap_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking sssd-ldap (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package sssd-proxy. 379s Preparing to unpack .../43-sssd-proxy_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking sssd-proxy (2.10.1-2ubuntu3) ... 379s Selecting previously unselected package sssd. 379s Preparing to unpack .../44-sssd_2.10.1-2ubuntu3_amd64.deb ... 379s Unpacking sssd (2.10.1-2ubuntu3) ... 379s Setting up libpwquality-common (1.4.5-4) ... 379s Setting up softhsm2-common (2.6.1-2.2ubuntu3) ... 379s Creating config file /etc/softhsm/softhsm2.conf with new version 380s Setting up libnfsidmap1:amd64 (1:2.8.2-2ubuntu1) ... 380s Setting up libsss-idmap0 (2.10.1-2ubuntu3) ... 380s Setting up libbasicobjects0t64:amd64 (0.6.2-3) ... 380s Setting up libipa-hbac0t64 (2.10.1-2ubuntu3) ... 380s Setting up libref-array1t64:amd64 (0.6.2-3) ... 380s Setting up libtdb1:amd64 (2:1.4.12+samba4.21.4+dfsg-1ubuntu3) ... 380s Setting up libcollection4t64:amd64 (0.6.2-3) ... 380s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10) ... 380s Setting up libwbclient0:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 380s Setting up libtalloc2:amd64 (2:2.4.2+samba4.21.4+dfsg-1ubuntu3) ... 380s Setting up libpath-utils1t64:amd64 (0.6.2-3) ... 380s Setting up libunbound8:amd64 (1.22.0-1ubuntu1) ... 380s Setting up libgnutls-dane0t64:amd64 (3.8.9-2ubuntu2) ... 380s Setting up libavahi-common-data:amd64 (0.8-16ubuntu1) ... 380s Setting up libcares2:amd64 (1.34.4-2.1) ... 380s Setting up libdhash1t64:amd64 (0.6.2-3) ... 380s Setting up libcrack2:amd64 (2.9.6-5.2build1) ... 380s Setting up libsss-nss-idmap0 (2.10.1-2ubuntu3) ... 380s Setting up libini-config5t64:amd64 (0.6.2-3) ... 380s Setting up libtevent0t64:amd64 (2:0.16.1+samba4.21.4+dfsg-1ubuntu3) ... 380s Setting up libnss-sss:amd64 (2.10.1-2ubuntu3) ... 380s Setting up gnutls-bin (3.8.9-2ubuntu2) ... 380s Setting up libsofthsm2 (2.6.1-2.2ubuntu3) ... 380s Setting up softhsm2 (2.6.1-2.2ubuntu3) ... 380s Setting up libavahi-common3:amd64 (0.8-16ubuntu1) ... 380s Setting up libsss-certmap0 (2.10.1-2ubuntu3) ... 380s Setting up libpwquality1:amd64 (1.4.5-4) ... 380s Setting up libldb2:amd64 (2:2.10.0+samba4.21.4+dfsg-1ubuntu3) ... 380s Setting up libavahi-client3:amd64 (0.8-16ubuntu1) ... 380s Setting up libpam-pwquality:amd64 (1.4.5-4) ... 380s Setting up samba-libs:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 380s Setting up python3-sss (2.10.1-2ubuntu3) ... 380s Setting up libsmbclient0:amd64 (2:4.21.4+dfsg-1ubuntu3) ... 380s Setting up libpam-sss:amd64 (2.10.1-2ubuntu3) ... 380s Setting up sssd-common (2.10.1-2ubuntu3) ... 380s Creating SSSD system user & group... 380s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 380s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 380s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 380s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 381s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-autofs.socket' → '/usr/lib/systemd/system/sssd-autofs.socket'. 381s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-nss.socket' → '/usr/lib/systemd/system/sssd-nss.socket'. 381s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pam.socket' → '/usr/lib/systemd/system/sssd-pam.socket'. 381s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-ssh.socket' → '/usr/lib/systemd/system/sssd-ssh.socket'. 382s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-sudo.socket' → '/usr/lib/systemd/system/sssd-sudo.socket'. 382s Created symlink '/etc/systemd/system/multi-user.target.wants/sssd.service' → '/usr/lib/systemd/system/sssd.service'. 382s sssd-autofs.service is a disabled or a static unit, not starting it. 382s sssd-nss.service is a disabled or a static unit, not starting it. 382s sssd-pam.service is a disabled or a static unit, not starting it. 382s sssd-ssh.service is a disabled or a static unit, not starting it. 382s sssd-sudo.service is a disabled or a static unit, not starting it. 382s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 382s Setting up sssd-proxy (2.10.1-2ubuntu3) ... 382s Setting up sssd-ad-common (2.10.1-2ubuntu3) ... 383s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pac.socket' → '/usr/lib/systemd/system/sssd-pac.socket'. 383s sssd-pac.service is a disabled or a static unit, not starting it. 383s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 383s Setting up sssd-krb5-common (2.10.1-2ubuntu3) ... 383s Setting up sssd-krb5 (2.10.1-2ubuntu3) ... 383s Setting up sssd-ldap (2.10.1-2ubuntu3) ... 383s Setting up sssd-ad (2.10.1-2ubuntu3) ... 383s Setting up sssd-ipa (2.10.1-2ubuntu3) ... 383s Setting up sssd (2.10.1-2ubuntu3) ... 383s Processing triggers for man-db (2.13.0-1) ... 384s Processing triggers for libc-bin (2.41-1ubuntu2) ... 393s autopkgtest [00:31:39]: test sssd-softhism2-certificates-tests.sh: [----------------------- 393s + '[' -z ubuntu ']' 393s + required_tools=(p11tool openssl softhsm2-util) 393s + for cmd in "${required_tools[@]}" 393s + command -v p11tool 393s + for cmd in "${required_tools[@]}" 393s + command -v openssl 393s + for cmd in "${required_tools[@]}" 393s + command -v softhsm2-util 393s + PIN=053350 393s +++ find /usr/lib/softhsm/libsofthsm2.so 393s +++ head -n 1 393s ++ realpath /usr/lib/softhsm/libsofthsm2.so 393s + SOFTHSM2_MODULE=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 393s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 393s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 393s + '[' '!' -v NO_SSSD_TESTS ']' 393s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 393s + ca_db_arg=ca_db 393s ++ /usr/libexec/sssd/p11_child --help 393s + p11_child_help='Usage: p11_child [OPTION...] 393s -d, --debug-level=INT Debug level 393s --debug-timestamps=INT Add debug timestamps 393s --debug-microseconds=INT Show timestamps with microseconds 393s --dumpable=INT Allow core dumps 393s --backtrace=INT Enable debug backtrace 393s --debug-fd=INT An open file descriptor for the debug 393s logs 393s --logger=stderr|files|journald Set logger 393s --auth Run in auth mode 393s --pre Run in pre-auth mode 393s --wait_for_card Wait until card is available 393s --verification Run in verification mode 393s --pin Expect PIN on stdin 393s --keypad Expect PIN on keypad 393s --verify=STRING Tune validation 393s --ca_db=STRING CA DB to use 393s --module_name=STRING Module name for authentication 393s --token_name=STRING Token name for authentication 393s --key_id=STRING Key ID for authentication 393s --label=STRING Label for authentication 393s --certificate=STRING certificate to verify, base64 encoded 393s --uri=STRING PKCS#11 URI to restrict selection 393s --chain-id=LONG Tevent chain ID used for logging 393s purposes 393s 393s Help options: 393s -?, --help Show this help message 393s --usage Display brief usage message' 393s + echo 'Usage: p11_child [OPTION...] 393s -d, --debug-level=INT Debug level 393s --debug-timestamps=INT Add debug timestamps 393s --debug-microseconds=INT Show timestamps with microseconds 393s --dumpable=INT Allow core dumps 393s --backtrace=INT Enable debug backtrace 393s --debug-fd=INT An open file descriptor for the debug 393s logs 393s --logger=stderr|files|journald Set logger 393s --auth Run in auth mode 393s --pre Run in pre-auth mode 393s --wait_for_card Wait until card is available 393s --verification Run in verification mode 393s --pin Expect PIN on stdin 393s --keypad Expect PIN on keypad 393s --verify=STRING Tune validation 393s --ca_db=STRING CA DB to use 393s --module_name=STRING Module name for authentication 393s --token_name=STRING Token name for authentication 393s --key_id=STRING Key ID for authentication 393s --label=STRING Label for authentication 393s --certificate=STRING certificate to verify, base64 encoded 393s --uri=STRING PKCS#11 URI to restrict selection 393s --chain-id=LONG Tevent chain ID used for logging 393s purposes 393s 393s Help options: 393s -?, --help Show this help message 393s --usage Display brief usage message' 393s + grep nssdb -qs 393s + echo 'Usage: p11_child [OPTION...] 393s -d, --debug-level=INT Debug level 393s --debug-timestamps=INT Add debug timestamps 393s --debug-microseconds=INT Show timestamps with microseconds 393s --dumpable=INT Allow core dumps 393s --backtrace=INT Enable debug backtrace 393s --debug-fd=INT An open file descriptor for the debug 393s logs 393s --logger=stderr|files|journald Set logger 393s --auth Run in auth mode 393s --pre Run in pre-auth mode 393s --wait_for_card Wait until card is available 393s --verification Run in verification mode 393s --pin Expect PIN on stdin 393s --keypad Expect PIN on keypad 393s --verify=STRING Tune validation 393s --ca_db=STRING CA DB to use 393s --module_name=STRING Module name for authentication 393s --token_name=STRING Token name for authentication 393s --key_id=STRING Key ID for authentication 393s --label=STRING Label for authentication 393s --certificate=STRING certificate to verify, base64 encoded 393s --uri=STRING PKCS#11 URI to restrict selection 393s --chain-id=LONG Tevent chain ID used for logging 393s purposes 393s 393s Help options: 393s -?, --help Show this help message 393s --usage Display brief usage message' 393s + grep -qs -- --ca_db 393s + '[' '!' -e /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ']' 393s ++ mktemp -d -t sssd-softhsm2-XXXXXX 393s + tmpdir=/tmp/sssd-softhsm2-MkMiAn 393s + keys_size=1024 393s + [[ ! -v KEEP_TEMPORARY_FILES ]] 393s + trap 'rm -rf "$tmpdir"' EXIT 393s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 393s + echo -n 01 393s + touch /tmp/sssd-softhsm2-MkMiAn/index.txt 393s + mkdir -p /tmp/sssd-softhsm2-MkMiAn/new_certs 393s + cat 393s + root_ca_key_pass=pass:random-root-CA-password-29367 393s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-MkMiAn/test-root-CA-key.pem -passout pass:random-root-CA-password-29367 1024 393s + openssl req -passin pass:random-root-CA-password-29367 -batch -config /tmp/sssd-softhsm2-MkMiAn/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-MkMiAn/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 393s + openssl x509 -noout -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 393s + cat 393s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-12003 393s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-12003 1024 393s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-12003 -config /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.config -key /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-29367 -sha256 -out /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-certificate-request.pem 393s + openssl req -text -noout -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-certificate-request.pem 393s Certificate Request: 393s Data: 393s Version: 1 (0x0) 393s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 393s Subject Public Key Info: 393s Public Key Algorithm: rsaEncryption 393s Public-Key: (1024 bit) 393s Modulus: 393s 00:c6:ac:78:6d:d3:3e:ef:3f:01:08:7b:89:c0:9c: 393s be:c6:d7:e6:a5:03:25:3e:cd:2e:bc:99:37:31:44: 393s 8d:e5:97:5b:78:1d:07:a7:6e:ff:2b:1a:fc:3c:24: 393s 7c:a5:f5:6a:bd:7f:a3:c1:40:70:74:12:cd:2c:a1: 393s 12:22:bb:f2:8f:fe:a8:59:3a:50:29:8b:0d:38:73: 393s 11:ae:64:36:dc:cf:d0:4a:48:a3:e4:46:62:f3:cd: 393s 48:eb:e8:99:a9:3b:1e:0c:4b:e5:d9:9c:c8:ae:5a: 393s 6a:2b:f1:76:67:89:dd:48:bb:6f:fe:d2:35:c7:82: 393s ae:ea:58:d4:0f:51:50:cc:83 393s Exponent: 65537 (0x10001) 393s Attributes: 393s (none) 393s Requested Extensions: 393s Signature Algorithm: sha256WithRSAEncryption 393s Signature Value: 393s 13:d0:d7:1d:53:5b:0b:9d:0d:29:1a:34:c6:97:48:ed:ad:18: 393s fc:79:ac:ea:a2:5c:ed:90:ce:5b:99:16:fc:dc:91:45:71:58: 393s 5a:e8:2e:b7:c6:d9:93:9b:c0:2b:fe:98:7f:bd:8d:45:a6:b0: 393s 0a:6e:74:65:bc:e5:9c:0b:3d:73:ce:a6:d3:b2:cc:4f:1f:83: 393s d4:12:25:96:3e:a0:72:56:33:a6:80:f9:54:dd:93:ff:2a:4c: 393s 70:3f:25:f6:5b:14:cc:42:8a:4b:db:22:07:16:f0:58:b2:87: 393s 2a:bf:c6:df:8f:31:e6:49:ad:e8:08:f5:5d:a0:dd:55:ab:ea: 393s 19:47 393s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-MkMiAn/test-root-CA.config -passin pass:random-root-CA-password-29367 -keyfile /tmp/sssd-softhsm2-MkMiAn/test-root-CA-key.pem -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 393s Using configuration from /tmp/sssd-softhsm2-MkMiAn/test-root-CA.config 393s Check that the request matches the signature 393s Signature ok 393s Certificate Details: 393s Serial Number: 1 (0x1) 393s Validity 393s Not Before: Mar 16 00:31:38 2025 GMT 393s Not After : Mar 16 00:31:38 2026 GMT 393s Subject: 393s organizationName = Test Organization 393s organizationalUnitName = Test Organization Unit 393s commonName = Test Organization Intermediate CA 393s X509v3 extensions: 393s X509v3 Subject Key Identifier: 393s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 393s X509v3 Authority Key Identifier: 393s keyid:F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 393s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 393s serial:00 393s X509v3 Basic Constraints: 393s CA:TRUE 393s X509v3 Key Usage: critical 393s Digital Signature, Certificate Sign, CRL Sign 393s Certificate is to be certified until Mar 16 00:31:38 2026 GMT (365 days) 393s 393s Write out database with 1 new entries 393s Database updated 393s + openssl x509 -noout -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 393s /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem: OK 393s + cat 393s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-18853 393s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-18853 1024 393s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-18853 -config /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-12003 -sha256 -out /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-certificate-request.pem 393s + openssl req -text -noout -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-certificate-request.pem 393s Certificate Request: 393s Data: 393s Version: 1 (0x0) 393s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 393s Subject Public Key Info: 393s Public Key Algorithm: rsaEncryption 393s Public-Key: (1024 bit) 393s Modulus: 393s 00:e1:db:0d:f2:10:db:e8:52:02:50:26:f2:7b:da: 393s 60:0c:63:5f:19:1e:46:eb:78:58:7b:a0:4f:25:a9: 393s cd:1d:13:0a:14:2e:3b:fb:57:d8:a9:4d:36:3e:c5: 393s 79:ea:55:c3:69:9c:73:3e:da:0a:69:29:27:45:84: 393s 9c:bc:22:ba:94:09:fc:a5:2e:ae:df:1c:fd:dc:5c: 393s 88:88:ce:a6:8f:47:ec:fc:fe:b3:39:23:c3:c9:f0: 393s aa:d4:81:40:a1:1b:75:94:33:c3:93:63:91:d8:76: 393s 93:cc:8d:67:1a:9a:5e:81:a2:e0:0f:ad:26:91:cc: 393s e2:85:22:23:0d:b5:03:f2:47 393s Exponent: 65537 (0x10001) 393s Attributes: 393s (none) 393s Requested Extensions: 393s Signature Algorithm: sha256WithRSAEncryption 393s Signature Value: 393s 77:c0:2a:44:47:19:cc:2d:bc:f0:d7:cc:ac:d1:b6:33:1b:f8: 393s c2:1f:01:54:f1:e7:e9:07:08:e3:42:7b:97:ae:d9:eb:be:fc: 393s bd:8d:4f:2c:bd:d4:f4:91:a6:39:ad:81:b1:a1:f2:fe:69:dd: 393s 51:5c:a5:3e:0c:27:18:9f:4e:85:f2:0a:eb:ac:a8:9d:10:bd: 393s 3e:db:2e:ad:8b:f1:2e:91:f6:88:6d:78:66:23:ae:3b:fe:f9: 393s e8:f1:48:d1:a2:21:38:a6:68:a6:01:89:27:7a:2c:ca:c9:19: 393s ff:fc:d9:90:7c:07:b5:e0:60:63:2a:d0:52:ea:a3:6f:b4:0d: 393s b9:4d 393s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-12003 -keyfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 393s Using configuration from /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.config 393s Check that the request matches the signature 393s Signature ok 393s Certificate Details: 393s Serial Number: 2 (0x2) 393s Validity 393s Not Before: Mar 16 00:31:38 2025 GMT 393s Not After : Mar 16 00:31:38 2026 GMT 393s Subject: 393s organizationName = Test Organization 393s organizationalUnitName = Test Organization Unit 393s commonName = Test Organization Sub Intermediate CA 393s X509v3 extensions: 393s X509v3 Subject Key Identifier: 393s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 393s X509v3 Authority Key Identifier: 393s keyid:9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 393s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 393s serial:01 393s X509v3 Basic Constraints: 393s CA:TRUE 393s X509v3 Key Usage: critical 393s Digital Signature, Certificate Sign, CRL Sign 393s Certificate is to be certified until Mar 16 00:31:38 2026 GMT (365 days) 393s 393s Write out database with 1 new entries 393s Database updated 393s + openssl x509 -noout -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 393s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 393s /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem: OK 393s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 393s + local cmd=openssl 393s + shift 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 393s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 393s error 20 at 0 depth lookup: unable to get local issuer certificate 393s error /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem: verification failed 393s + cat 393s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-15181 393s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-15181 1024 393s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-15181 -key /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-request.pem 393s + openssl req -text -noout -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-request.pem 393s Certificate Request: 393s Data: 393s Version: 1 (0x0) 393s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 393s Subject Public Key Info: 393s Public Key Algorithm: rsaEncryption 393s Public-Key: (1024 bit) 393s Modulus: 393s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 393s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 393s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 393s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 393s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 393s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 393s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 393s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 393s 8a:db:a6:b0:fc:42:f3:7a:53 393s Exponent: 65537 (0x10001) 393s Attributes: 393s Requested Extensions: 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Root CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Signature Algorithm: sha256WithRSAEncryption 393s Signature Value: 393s 0b:45:e0:9a:52:97:1a:07:16:be:2b:2b:dd:fe:f4:4f:10:10: 393s d1:d9:ba:19:fd:12:29:d5:ff:4a:3d:b5:14:b8:02:fb:2b:32: 393s eb:d1:6c:c1:7a:0c:6e:d9:72:36:92:25:19:92:25:fb:b8:30: 393s 5f:5a:78:18:1e:9d:2c:3f:29:8e:eb:77:23:47:43:65:2a:50: 393s ec:97:c4:30:10:68:33:19:18:0e:5f:b5:64:eb:e1:89:a4:05: 393s 29:ec:73:b7:b8:c8:c4:e0:6d:cd:7f:a4:d6:04:42:3f:83:81: 393s 13:66:54:23:fc:e5:bc:0b:dd:20:90:82:58:5b:df:74:eb:92: 393s 72:99 393s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-MkMiAn/test-root-CA.config -passin pass:random-root-CA-password-29367 -keyfile /tmp/sssd-softhsm2-MkMiAn/test-root-CA-key.pem -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 393s Using configuration from /tmp/sssd-softhsm2-MkMiAn/test-root-CA.config 393s Check that the request matches the signature 393s Signature ok 393s Certificate Details: 393s Serial Number: 3 (0x3) 393s Validity 393s Not Before: Mar 16 00:31:39 2025 GMT 393s Not After : Mar 16 00:31:39 2026 GMT 393s Subject: 393s organizationName = Test Organization 393s organizationalUnitName = Test Organization Unit 393s commonName = Test Organization Root Trusted Certificate 0001 393s X509v3 extensions: 393s X509v3 Authority Key Identifier: 393s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Root CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Certificate is to be certified until Mar 16 00:31:39 2026 GMT (365 days) 393s 393s Write out database with 1 new entries 393s Database updated 393s + openssl x509 -noout -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 393s /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem: OK 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 393s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 393s + local cmd=openssl 393s + shift 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 393s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 393s error 20 at 0 depth lookup: unable to get local issuer certificate 393s error /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem: verification failed 393s + cat 393s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 393s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-7411 1024 393s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-7411 -key /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-request.pem 393s Certificate Request: 393s Data: 393s Version: 1 (0x0) 393s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 393s Subject Public Key Info: 393s Public Key Algorithm: rsaEncryption 393s Public-Key: (1024 bit) 393s Modulus: 393s 00:c9:c7:8d:9f:20:cb:d7:3f:ad:d2:12:72:4a:54: 393s 6d:60:f9:56:c2:e2:b8:81:0e:ac:3f:e8:29:c9:eb: 393s 83:a1:85:41:21:6d:f8:b4:e1:f3:87:a2:92:e5:4a: 393s b6:28:61:ed:8e:e5:e0:79:2d:aa:4f:a4:69:fe:f1: 393s 86:34:e9:5e:fb:67:d0:db:9b:ad:25:19:c3:6b:38: 393s d8:9d:33:eb:0f:2a:4e:9b:de:56:4d:ef:d2:da:2c: 393s 22:b4:67:b8:e6:37:fd:8a:9e:ee:f4:fd:8f:1f:0b: 393s a8:fc:40:e0:db:ed:f1:b8:7c:ee:e2:b1:74:21:d3: 393s 9e:5c:d6:1d:95:bd:20:05:d3 393s Exponent: 65537 (0x10001) 393s Attributes: 393s Requested Extensions: 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Intermediate CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Signature Algorithm: sha256WithRSAEncryption 393s Signature Value: 393s 2b:fe:8e:cb:a4:bb:a3:f1:d9:65:68:10:54:82:16:e6:8a:1d: 393s e2:d4:1a:d8:88:7e:1a:49:b9:80:f3:8b:d2:cc:b2:d8:35:73: 393s 22:18:f6:d9:f9:b5:dc:34:65:37:54:79:ee:3d:d3:2f:d6:f8: 393s 9a:3b:61:62:a7:32:0c:5d:67:11:c0:8e:d9:7f:75:65:a0:71: 393s a2:99:64:83:a5:3b:ba:96:86:df:ee:ba:7a:3c:e7:6a:5b:bb: 393s 63:1b:55:09:7d:e7:3a:a0:a7:5e:94:a5:66:0e:d1:84:d6:27: 393s b0:49:43:35:06:bd:a4:19:97:37:c1:28:ec:30:5a:62:a0:88: 393s 37:61 393s + openssl req -text -noout -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-request.pem 393s + openssl ca -passin pass:random-intermediate-CA-password-12003 -config /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 393s Using configuration from /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.config 393s Check that the request matches the signature 393s Signature ok 393s Certificate Details: 393s Serial Number: 4 (0x4) 393s Validity 393s Not Before: Mar 16 00:31:39 2025 GMT 393s Not After : Mar 16 00:31:39 2026 GMT 393s Subject: 393s organizationName = Test Organization 393s organizationalUnitName = Test Organization Unit 393s commonName = Test Organization Intermediate Trusted Certificate 0001 393s X509v3 extensions: 393s X509v3 Authority Key Identifier: 393s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Intermediate CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Certificate is to be certified until Mar 16 00:31:39 2026 GMT (365 days) 393s 393s Write out database with 1 new entries 393s Database updated 393s + openssl x509 -noout -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 393s This certificate should not be trusted fully 393s + echo 'This certificate should not be trusted fully' 393s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 393s + local cmd=openssl 393s + shift 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 393s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 393s error 2 at 1 depth lookup: unable to get issuer certificate 393s error /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 393s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 393s /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem: OK 393s + cat 393s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 393s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-10927 1024 393s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-10927 -key /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 393s + openssl req -text -noout -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 393s Certificate Request: 393s Data: 393s Version: 1 (0x0) 393s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 393s Subject Public Key Info: 393s Public Key Algorithm: rsaEncryption 393s Public-Key: (1024 bit) 393s Modulus: 393s 00:c8:ca:c2:55:47:db:43:9e:a2:08:d0:62:17:69: 393s 82:c3:8c:47:6f:f6:30:e8:99:2a:0d:41:ea:e7:7d: 393s 3d:1b:08:87:ab:1e:4e:13:7d:71:e2:a0:b2:71:82: 393s ee:d0:27:3c:42:f7:31:05:b0:eb:e6:66:5e:88:37: 393s 03:27:45:8a:f0:f3:1c:c1:26:35:83:91:7f:df:2e: 393s 3d:98:67:da:47:6c:a0:35:c2:4b:e1:8d:8f:11:cf: 393s f3:d9:8c:34:49:4a:16:f3:ba:9d:8f:05:cf:3e:51: 393s 54:86:ca:d3:51:0d:12:e9:3b:ca:7d:df:0f:1e:4b: 393s 11:ca:3c:0b:f2:b4:91:72:3f 393s Exponent: 65537 (0x10001) 393s Attributes: 393s Requested Extensions: 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Sub Intermediate CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Signature Algorithm: sha256WithRSAEncryption 393s Signature Value: 393s be:a6:ac:47:88:c8:c4:b7:d7:45:2d:df:19:48:e1:a8:b5:d6: 393s de:f2:51:6d:5f:72:68:95:0a:ee:a2:91:de:30:39:b1:44:34: 393s 1c:30:36:e5:5f:1b:b7:c2:8b:2f:04:3d:64:fb:b3:f0:bd:42: 393s cc:55:1d:ce:ed:97:10:63:62:3b:a9:6a:3e:94:7f:15:86:04: 393s e8:14:24:cf:d3:a3:f1:51:e2:60:e5:a7:d6:21:99:dc:96:70: 393s 7c:a1:68:ff:a5:98:f3:00:9a:49:eb:b2:44:91:b9:9b:b8:19: 393s 10:ec:68:1b:47:ce:51:eb:0a:71:75:3a:07:d4:0b:4e:7f:5f: 393s 61:3b 393s + openssl ca -passin pass:random-sub-intermediate-CA-password-18853 -config /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s Using configuration from /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.config 393s Check that the request matches the signature 393s Signature ok 393s Certificate Details: 393s Serial Number: 5 (0x5) 393s Validity 393s Not Before: Mar 16 00:31:39 2025 GMT 393s Not After : Mar 16 00:31:39 2026 GMT 393s Subject: 393s organizationName = Test Organization 393s organizationalUnitName = Test Organization Unit 393s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 393s X509v3 extensions: 393s X509v3 Authority Key Identifier: 393s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 393s X509v3 Basic Constraints: 393s CA:FALSE 393s Netscape Cert Type: 393s SSL Client, S/MIME 393s Netscape Comment: 393s Test Organization Sub Intermediate CA trusted Certificate 393s X509v3 Subject Key Identifier: 393s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 393s X509v3 Key Usage: critical 393s Digital Signature, Non Repudiation, Key Encipherment 393s X509v3 Extended Key Usage: 393s TLS Web Client Authentication, E-mail Protection 393s X509v3 Subject Alternative Name: 393s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 393s Certificate is to be certified until Mar 16 00:31:39 2026 GMT (365 days) 393s 393s Write out database with 1 new entries 393s Database updated 393s + openssl x509 -noout -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s This certificate should not be trusted fully 393s + echo 'This certificate should not be trusted fully' 393s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s + local cmd=openssl 393s + shift 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 393s error 2 at 1 depth lookup: unable to get issuer certificate 393s error /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 393s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s + local cmd=openssl 393s + shift 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 393s error 20 at 0 depth lookup: unable to get local issuer certificate 393s error /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 393s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 393s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s + local cmd=openssl 393s + shift 393s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 393s error 20 at 0 depth lookup: unable to get local issuer certificate 393s error /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 393s Building a the full-chain CA file... 393s + echo 'Building a the full-chain CA file...' 393s + cat /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 393s + cat /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 393s + cat /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 393s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 393s + openssl pkcs7 -print_certs -noout 393s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 393s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 393s 393s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 393s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 393s 393s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 393s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 393s 393s /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem: OK 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 393s /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem: OK 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 393s /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem: OK 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-root-intermediate-chain-CA.pem 393s /tmp/sssd-softhsm2-MkMiAn/test-root-intermediate-chain-CA.pem: OK 393s + openssl verify -CAfile /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 393s /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 393s Certificates generation completed! 393s + echo 'Certificates generation completed!' 393s + [[ -v NO_SSSD_TESTS ]] 393s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /dev/null 393s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /dev/null 393s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 393s + local key_ring=/dev/null 393s + local verify_option= 393s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 393s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 393s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 393s + local key_cn 393s + local key_name 393s + local tokens_dir 393s + local output_cert_file 393s + token_name= 393s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem .pem 393s + key_name=test-root-CA-trusted-certificate-0001 393s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 393s ++ sed -n 's/ *commonName *= //p' 393s + key_cn='Test Organization Root Trusted Certificate 0001' 393s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 393s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 393s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 393s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 393s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 393s + token_name='Test Organization Root Tr Token' 393s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 393s + local key_file 393s + local decrypted_key 393s + mkdir -p /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 393s + key_file=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-key.pem 393s + decrypted_key=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-key-decrypted.pem 393s + cat 393s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 393s Slot 0 has a free/uninitialized token. 393s The token has been initialized and is reassigned to slot 1952680937 393s + softhsm2-util --show-slots 393s Available slots: 393s Slot 1952680937 393s Slot info: 393s Description: SoftHSM slot ID 0x74638be9 393s Manufacturer ID: SoftHSM project 393s Hardware version: 2.6 393s Firmware version: 2.6 393s Token present: yes 393s Token info: 393s Manufacturer ID: SoftHSM project 393s Model: SoftHSM v2 393s Hardware version: 2.6 393s Firmware version: 2.6 393s Serial number: 7fb5272b74638be9 393s Initialized: yes 393s User PIN init.: yes 393s Label: Test Organization Root Tr Token 393s Slot 1 393s Slot info: 393s Description: SoftHSM slot ID 0x1 393s Manufacturer ID: SoftHSM project 393s Hardware version: 2.6 393s Firmware version: 2.6 393s Token present: yes 393s Token info: 393s Manufacturer ID: SoftHSM project 393s Model: SoftHSM v2 393s Hardware version: 2.6 393s Firmware version: 2.6 393s Serial number: 393s Initialized: no 393s User PIN init.: no 393s Label: 393s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 393s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-15181 -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-key-decrypted.pem 393s writing RSA key 393s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 393s + rm /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001-key-decrypted.pem 393s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 394s Object 0: 394s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 394s Type: X.509 Certificate (RSA-1024) 394s Expires: Mon Mar 16 00:31:39 2026 394s Label: Test Organization Root Trusted Certificate 0001 394s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 394s 394s Test Organization Root Tr Token 394s + echo 'Test Organization Root Tr Token' 394s + '[' -n '' ']' 394s + local output_base_name=SSSD-child-21523 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-21523.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-21523.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 394s [p11_child[2160]] [main] (0x0400): p11_child started. 394s [p11_child[2160]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2160]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2160]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2160]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 394s [p11_child[2160]] [do_work] (0x0040): init_verification failed. 394s [p11_child[2160]] [main] (0x0020): p11_child failed (5) 394s + return 2 394s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /dev/null no_verification 394s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /dev/null no_verification 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_ring=/dev/null 394s + local verify_option=no_verification 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-root-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Root Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 394s Test Organization Root Tr Token 394s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 394s + token_name='Test Organization Root Tr Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Root Tr Token' 394s + '[' -n no_verification ']' 394s + local verify_arg=--verify=no_verification 394s + local output_base_name=SSSD-child-21786 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 394s [p11_child[2166]] [main] (0x0400): p11_child started. 394s [p11_child[2166]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2166]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2166]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2166]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 394s [p11_child[2166]] [do_card] (0x4000): Module List: 394s [p11_child[2166]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2166]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2166]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2166]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2166]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2166]] [do_card] (0x4000): Login NOT required. 394s [p11_child[2166]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2166]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2166]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2166]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s + local found_md5 expected_md5 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + expected_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786-auth.output 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786-auth.output .output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786-auth.pem 394s + echo -n 053350 394s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 394s [p11_child[2174]] [main] (0x0400): p11_child started. 394s [p11_child[2174]] [main] (0x2000): Running in [auth] mode. 394s [p11_child[2174]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2174]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2174]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 394s [p11_child[2174]] [do_card] (0x4000): Module List: 394s [p11_child[2174]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2174]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2174]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2174]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2174]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2174]] [do_card] (0x4000): Login required. 394s [p11_child[2174]] [do_card] (0x4000): Token flags [1069]. 394s [p11_child[2174]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2174]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2174]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 394s [p11_child[2174]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 394s [p11_child[2174]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 394s [p11_child[2174]] [do_card] (0x4000): Certificate verified and validated. 394s [p11_child[2174]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786-auth.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786-auth.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786-auth.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-21786-auth.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 394s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 394s + local verify_option= 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-root-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s Test Organization Root Tr Token 394s + key_cn='Test Organization Root Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 394s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 394s + token_name='Test Organization Root Tr Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Root Tr Token' 394s + '[' -n '' ']' 394s + local output_base_name=SSSD-child-18296 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 394s [p11_child[2184]] [main] (0x0400): p11_child started. 394s [p11_child[2184]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2184]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2184]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2184]] [do_card] (0x4000): Module List: 394s [p11_child[2184]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2184]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2184]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2184]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2184]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2184]] [do_card] (0x4000): Login NOT required. 394s [p11_child[2184]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2184]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[2184]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2184]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2184]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s + local found_md5 expected_md5 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + expected_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296-auth.output 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296-auth.output .output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296-auth.pem 394s + echo -n 053350 394s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 394s [p11_child[2192]] [main] (0x0400): p11_child started. 394s [p11_child[2192]] [main] (0x2000): Running in [auth] mode. 394s [p11_child[2192]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2192]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2192]] [do_card] (0x4000): Module List: 394s [p11_child[2192]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2192]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2192]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2192]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2192]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2192]] [do_card] (0x4000): Login required. 394s [p11_child[2192]] [do_card] (0x4000): Token flags [1069]. 394s [p11_child[2192]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2192]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[2192]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2192]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 394s [p11_child[2192]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 394s [p11_child[2192]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 394s [p11_child[2192]] [do_card] (0x4000): Certificate verified and validated. 394s [p11_child[2192]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296-auth.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296-auth.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296-auth.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-18296-auth.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem partial_chain 394s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem partial_chain 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 394s + local verify_option=partial_chain 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-root-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Root Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 394s Test Organization Root Tr Token 394s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 394s + token_name='Test Organization Root Tr Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Root Tr Token' 394s + '[' -n partial_chain ']' 394s + local verify_arg=--verify=partial_chain 394s + local output_base_name=SSSD-child-3940 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 394s [p11_child[2202]] [main] (0x0400): p11_child started. 394s [p11_child[2202]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2202]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2202]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2202]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 394s [p11_child[2202]] [do_card] (0x4000): Module List: 394s [p11_child[2202]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2202]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2202]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2202]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2202]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2202]] [do_card] (0x4000): Login NOT required. 394s [p11_child[2202]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2202]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[2202]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2202]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2202]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s + local found_md5 expected_md5 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + expected_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940-auth.output 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940-auth.output .output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940-auth.pem 394s + echo -n 053350 394s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 394s [p11_child[2210]] [main] (0x0400): p11_child started. 394s [p11_child[2210]] [main] (0x2000): Running in [auth] mode. 394s [p11_child[2210]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2210]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2210]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 394s [p11_child[2210]] [do_card] (0x4000): Module List: 394s [p11_child[2210]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2210]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2210]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2210]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2210]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2210]] [do_card] (0x4000): Login required. 394s [p11_child[2210]] [do_card] (0x4000): Token flags [1069]. 394s [p11_child[2210]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2210]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[2210]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2210]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 394s [p11_child[2210]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 394s [p11_child[2210]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 394s [p11_child[2210]] [do_card] (0x4000): Certificate verified and validated. 394s [p11_child[2210]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940-auth.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940-auth.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940-auth.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3940-auth.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 394s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 394s + local verify_option= 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-root-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Root Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 394s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 394s + token_name='Test Organization Root Tr Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Root Tr Token' 394s Test Organization Root Tr Token 394s + '[' -n '' ']' 394s + local output_base_name=SSSD-child-29255 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 394s [p11_child[2220]] [main] (0x0400): p11_child started. 394s [p11_child[2220]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2220]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2220]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2220]] [do_card] (0x4000): Module List: 394s [p11_child[2220]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2220]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2220]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2220]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2220]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2220]] [do_card] (0x4000): Login NOT required. 394s [p11_child[2220]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2220]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[2220]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2220]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2220]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255.pem 394s + local found_md5 expected_md5 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + expected_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255-auth.output 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255-auth.output .output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255-auth.pem 394s + echo -n 053350 394s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 394s [p11_child[2228]] [main] (0x0400): p11_child started. 394s [p11_child[2228]] [main] (0x2000): Running in [auth] mode. 394s [p11_child[2228]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2228]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2228]] [do_card] (0x4000): Module List: 394s [p11_child[2228]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2228]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2228]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2228]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2228]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2228]] [do_card] (0x4000): Login required. 394s [p11_child[2228]] [do_card] (0x4000): Token flags [1069]. 394s [p11_child[2228]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2228]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[2228]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2228]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 394s [p11_child[2228]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 394s [p11_child[2228]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 394s [p11_child[2228]] [do_card] (0x4000): Certificate verified and validated. 394s [p11_child[2228]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255-auth.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255-auth.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255-auth.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s Test Organization Root Tr Token 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29255-auth.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem partial_chain 394s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem partial_chain 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 394s + local verify_option=partial_chain 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-root-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Root Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 394s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 394s + token_name='Test Organization Root Tr Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Root Tr Token' 394s + '[' -n partial_chain ']' 394s + local verify_arg=--verify=partial_chain 394s + local output_base_name=SSSD-child-7690 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 394s [p11_child[2238]] [main] (0x0400): p11_child started. 394s [p11_child[2238]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2238]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2238]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2238]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 394s [p11_child[2238]] [do_card] (0x4000): Module List: 394s [p11_child[2238]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2238]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2238]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2238]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2238]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2238]] [do_card] (0x4000): Login NOT required. 394s [p11_child[2238]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2238]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[2238]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2238]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2238]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s + local found_md5 expected_md5 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + expected_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690-auth.output 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690-auth.output .output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690-auth.pem 394s + echo -n 053350 394s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 394s [p11_child[2246]] [main] (0x0400): p11_child started. 394s [p11_child[2246]] [main] (0x2000): Running in [auth] mode. 394s [p11_child[2246]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2246]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2246]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 394s [p11_child[2246]] [do_card] (0x4000): Module List: 394s [p11_child[2246]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2246]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2246]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2246]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2246]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2246]] [do_card] (0x4000): Login required. 394s [p11_child[2246]] [do_card] (0x4000): Token flags [1069]. 394s [p11_child[2246]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2246]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 394s [p11_child[2246]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2246]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x74638be9;slot-manufacturer=SoftHSM%20project;slot-id=1952680937;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7fb5272b74638be9;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 394s [p11_child[2246]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 394s [p11_child[2246]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 394s [p11_child[2246]] [do_card] (0x4000): Certificate verified and validated. 394s [p11_child[2246]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690-auth.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690-auth.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690-auth.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 3 (0x3) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:d3:53:a6:1d:ce:a5:a9:50:22:a5:d8:0c:67:4e: 394s a0:69:ad:1a:a8:a9:2c:3a:85:2b:aa:bc:f1:a7:bb: 394s 52:7e:d6:d1:00:51:3f:72:24:dd:d4:92:b8:85:83: 394s 8a:ae:f9:35:73:51:d7:86:69:bd:9e:33:33:71:60: 394s af:f4:07:9c:91:47:5c:2e:96:68:9c:a8:2a:5d:32: 394s 41:0f:b0:46:45:32:71:5b:06:66:38:85:62:d1:f1: 394s 30:60:27:8a:3a:a2:ff:01:16:51:a1:b0:f6:9f:31: 394s f6:6d:b0:8e:80:d8:89:85:9e:e1:66:a8:78:dd:83: 394s 8a:db:a6:b0:fc:42:f3:7a:53 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s F5:C9:8D:BA:16:7B:2B:4E:66:EA:71:7D:47:06:34:AB:94:63:0B:79 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Root CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 9B:DA:1D:5A:D7:A9:E0:9B:F1:A0:2F:70:5A:35:1A:15:7E:B1:70:C6 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 8b:af:a0:c8:08:6d:2d:96:bd:4a:2c:7e:71:50:1d:ae:f2:67: 394s 27:f2:e7:09:45:60:5a:09:5c:be:ff:28:7d:34:65:9d:e9:bb: 394s 11:66:32:b3:6e:cd:77:02:45:07:46:20:34:4b:85:1d:b7:a7: 394s 32:be:fc:80:9e:94:98:19:c1:d6:ae:cc:17:98:c4:16:37:a1: 394s 62:05:67:c6:83:1a:00:b8:a7:68:99:cd:81:fb:92:71:9b:55: 394s f2:54:b4:f9:98:0e:5c:04:e1:00:7f:5a:f2:4e:1d:26:0f:e7: 394s 24:96:5c:f3:ef:84:af:ce:83:6e:76:1d:06:52:81:22:3b:45: 394s 0f:17 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-7690-auth.pem 394s + found_md5=Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 394s + '[' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 '!=' Modulus=D353A61DCEA5A95022A5D80C674EA069AD1AA8A92C3A852BAABCF1A7BB527ED6D100513F7224DDD492B885838AAEF9357351D78669BD9E33337160AFF4079C91475C2E96689CA82A5D32410FB0464532715B0666388562D1F13060278A3AA2FF011651A1B0F69F31F66DB08E80D889859EE166A878DD838ADBA6B0FC42F37A53 ']' 394s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 394s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 394s + local verify_option= 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-root-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Root Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 394s Test Organization Root Tr Token 394s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 394s + token_name='Test Organization Root Tr Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Root Tr Token' 394s + '[' -n '' ']' 394s + local output_base_name=SSSD-child-20678 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-20678.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-20678.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 394s [p11_child[2256]] [main] (0x0400): p11_child started. 394s [p11_child[2256]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2256]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2256]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2256]] [do_card] (0x4000): Module List: 394s [p11_child[2256]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2256]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2256]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2256]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2256]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2256]] [do_card] (0x4000): Login NOT required. 394s [p11_child[2256]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2256]] [do_verification] (0x0040): X509_verify_cert failed [0]. 394s [p11_child[2256]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 394s [p11_child[2256]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 394s [p11_child[2256]] [do_card] (0x4000): No certificate found. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-20678.output 394s + return 2 394s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem partial_chain 394s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem partial_chain 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 394s + local verify_option=partial_chain 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-15181 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-root-ca-trusted-cert-0001-15181 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-root-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-root-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Root Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 394s Test Organization Root Tr Token 394s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 394s + token_name='Test Organization Root Tr Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-root-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Root Tr Token' 394s + '[' -n partial_chain ']' 394s + local verify_arg=--verify=partial_chain 394s + local output_base_name=SSSD-child-24007 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-24007.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-24007.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 394s [p11_child[2263]] [main] (0x0400): p11_child started. 394s [p11_child[2263]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2263]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2263]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2263]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 394s [p11_child[2263]] [do_card] (0x4000): Module List: 394s [p11_child[2263]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2263]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2263]] [do_card] (0x4000): Description [SoftHSM slot ID 0x74638be9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2263]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 394s [p11_child[2263]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x74638be9][1952680937] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2263]] [do_card] (0x4000): Login NOT required. 394s [p11_child[2263]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 394s [p11_child[2263]] [do_verification] (0x0040): X509_verify_cert failed [0]. 394s [p11_child[2263]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 394s [p11_child[2263]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 394s [p11_child[2263]] [do_card] (0x4000): No certificate found. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24007.output 394s + return 2 394s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /dev/null 394s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /dev/null 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 394s + local key_ring=/dev/null 394s + local verify_option= 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-intermediate-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 394s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 394s + token_name='Test Organization Interme Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 394s + local key_file 394s + local decrypted_key 394s + mkdir -p /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 394s + key_file=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-key.pem 394s + decrypted_key=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 394s + cat 394s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 394s Slot 0 has a free/uninitialized token. 394s The token has been initialized and is reassigned to slot 686363881 394s + softhsm2-util --show-slots 394s Available slots: 394s Slot 686363881 394s Slot info: 394s Description: SoftHSM slot ID 0x28e914e9 394s Manufacturer ID: SoftHSM project 394s Hardware version: 2.6 394s Firmware version: 2.6 394s Token present: yes 394s Token info: 394s Manufacturer ID: SoftHSM project 394s Model: SoftHSM v2 394s Hardware version: 2.6 394s Firmware version: 2.6 394s Serial number: d9112a60a8e914e9 394s Initialized: yes 394s User PIN init.: yes 394s Label: Test Organization Interme Token 394s Slot 1 394s Slot info: 394s Description: SoftHSM slot ID 0x1 394s Manufacturer ID: SoftHSM project 394s Hardware version: 2.6 394s Firmware version: 2.6 394s Token present: yes 394s Token info: 394s Manufacturer ID: SoftHSM project 394s Model: SoftHSM v2 394s Hardware version: 2.6 394s Firmware version: 2.6 394s Serial number: 394s Initialized: no 394s User PIN init.: no 394s Label: 394s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 394s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-7411 -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 394s writing RSA key 394s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 394s + rm /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 394s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 394s Object 0: 394s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9112a60a8e914e9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 394s Type: X.509 Certificate (RSA-1024) 394s Expires: Mon Mar 16 00:31:39 2026 394s Label: Test Organization Intermediate Trusted Certificate 0001 394s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 394s 394s Test Organization Interme Token 394s + echo 'Test Organization Interme Token' 394s + '[' -n '' ']' 394s + local output_base_name=SSSD-child-3440 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-3440.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-3440.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 394s [p11_child[2279]] [main] (0x0400): p11_child started. 394s [p11_child[2279]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2279]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2279]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2279]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 394s [p11_child[2279]] [do_work] (0x0040): init_verification failed. 394s [p11_child[2279]] [main] (0x0020): p11_child failed (5) 394s + return 2 394s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /dev/null no_verification 394s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /dev/null no_verification 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 394s + local key_ring=/dev/null 394s + local verify_option=no_verification 394s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 394s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 394s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 394s + local key_cn 394s + local key_name 394s + local tokens_dir 394s + local output_cert_file 394s + token_name= 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem .pem 394s + key_name=test-intermediate-CA-trusted-certificate-0001 394s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 394s ++ sed -n 's/ *commonName *= //p' 394s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 394s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 394s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 394s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 394s Test Organization Interme Token 394s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 394s + token_name='Test Organization Interme Token' 394s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 394s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 394s + echo 'Test Organization Interme Token' 394s + '[' -n no_verification ']' 394s + local verify_arg=--verify=no_verification 394s + local output_base_name=SSSD-child-29441 394s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441.output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441.pem 394s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 394s [p11_child[2285]] [main] (0x0400): p11_child started. 394s [p11_child[2285]] [main] (0x2000): Running in [pre-auth] mode. 394s [p11_child[2285]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2285]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2285]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 394s [p11_child[2285]] [do_card] (0x4000): Module List: 394s [p11_child[2285]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2285]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2285]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2285]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 394s [p11_child[2285]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2285]] [do_card] (0x4000): Login NOT required. 394s [p11_child[2285]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 394s [p11_child[2285]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2285]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x28e914e9;slot-manufacturer=SoftHSM%20project;slot-id=686363881;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9112a60a8e914e9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2285]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441.pem 394s Certificate: 394s Data: 394s Version: 3 (0x2) 394s Serial Number: 4 (0x4) 394s Signature Algorithm: sha256WithRSAEncryption 394s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 394s Validity 394s Not Before: Mar 16 00:31:39 2025 GMT 394s Not After : Mar 16 00:31:39 2026 GMT 394s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 394s Subject Public Key Info: 394s Public Key Algorithm: rsaEncryption 394s Public-Key: (1024 bit) 394s Modulus: 394s 00:c9:c7:8d:9f:20:cb:d7:3f:ad:d2:12:72:4a:54: 394s 6d:60:f9:56:c2:e2:b8:81:0e:ac:3f:e8:29:c9:eb: 394s 83:a1:85:41:21:6d:f8:b4:e1:f3:87:a2:92:e5:4a: 394s b6:28:61:ed:8e:e5:e0:79:2d:aa:4f:a4:69:fe:f1: 394s 86:34:e9:5e:fb:67:d0:db:9b:ad:25:19:c3:6b:38: 394s d8:9d:33:eb:0f:2a:4e:9b:de:56:4d:ef:d2:da:2c: 394s 22:b4:67:b8:e6:37:fd:8a:9e:ee:f4:fd:8f:1f:0b: 394s a8:fc:40:e0:db:ed:f1:b8:7c:ee:e2:b1:74:21:d3: 394s 9e:5c:d6:1d:95:bd:20:05:d3 394s Exponent: 65537 (0x10001) 394s X509v3 extensions: 394s X509v3 Authority Key Identifier: 394s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 394s X509v3 Basic Constraints: 394s CA:FALSE 394s Netscape Cert Type: 394s SSL Client, S/MIME 394s Netscape Comment: 394s Test Organization Intermediate CA trusted Certificate 394s X509v3 Subject Key Identifier: 394s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 394s X509v3 Key Usage: critical 394s Digital Signature, Non Repudiation, Key Encipherment 394s X509v3 Extended Key Usage: 394s TLS Web Client Authentication, E-mail Protection 394s X509v3 Subject Alternative Name: 394s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 394s Signature Algorithm: sha256WithRSAEncryption 394s Signature Value: 394s 5b:2b:9f:27:db:ae:28:dd:71:5e:e7:17:15:9a:3b:34:07:76: 394s b1:95:d1:d4:b2:c7:eb:52:c4:b9:37:d1:51:c4:9a:ee:b7:e4: 394s 54:5f:b2:b7:52:07:1c:b9:e9:12:9d:99:b0:d4:a4:84:26:50: 394s 8e:a1:74:97:7a:50:21:f5:fa:bc:89:27:de:47:a1:ba:ab:55: 394s 69:56:4a:e7:07:80:15:42:23:a9:b2:ca:27:d6:bd:d6:f8:6a: 394s 4a:b9:ea:8b:bd:a6:28:3c:49:15:7c:27:1c:7c:dc:6c:4f:88: 394s bb:a5:93:a3:f9:90:3f:ad:b0:49:2f:25:d8:87:cc:d7:4b:57: 394s b6:8c 394s + local found_md5 expected_md5 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 394s + expected_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 394s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441.pem 394s + found_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 394s + '[' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 '!=' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 ']' 394s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441-auth.output 394s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441-auth.output .output 394s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441-auth.pem 394s + echo -n 053350 394s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 394s [p11_child[2293]] [main] (0x0400): p11_child started. 394s [p11_child[2293]] [main] (0x2000): Running in [auth] mode. 394s [p11_child[2293]] [main] (0x2000): Running with effective IDs: [0][0]. 394s [p11_child[2293]] [main] (0x2000): Running with real IDs [0][0]. 394s [p11_child[2293]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 394s [p11_child[2293]] [do_card] (0x4000): Module List: 394s [p11_child[2293]] [do_card] (0x4000): common name: [softhsm2]. 394s [p11_child[2293]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2293]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 394s [p11_child[2293]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 394s [p11_child[2293]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 394s [p11_child[2293]] [do_card] (0x4000): Login required. 394s [p11_child[2293]] [do_card] (0x4000): Token flags [1069]. 394s [p11_child[2293]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 394s [p11_child[2293]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 394s [p11_child[2293]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x28e914e9;slot-manufacturer=SoftHSM%20project;slot-id=686363881;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9112a60a8e914e9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 394s [p11_child[2293]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 394s [p11_child[2293]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 394s [p11_child[2293]] [do_card] (0x4000): Certificate verified and validated. 394s [p11_child[2293]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 394s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441-auth.output 394s + echo '-----BEGIN CERTIFICATE-----' 394s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441-auth.output 394s + echo '-----END CERTIFICATE-----' 394s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441-auth.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 4 (0x4) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c9:c7:8d:9f:20:cb:d7:3f:ad:d2:12:72:4a:54: 395s 6d:60:f9:56:c2:e2:b8:81:0e:ac:3f:e8:29:c9:eb: 395s 83:a1:85:41:21:6d:f8:b4:e1:f3:87:a2:92:e5:4a: 395s b6:28:61:ed:8e:e5:e0:79:2d:aa:4f:a4:69:fe:f1: 395s 86:34:e9:5e:fb:67:d0:db:9b:ad:25:19:c3:6b:38: 395s d8:9d:33:eb:0f:2a:4e:9b:de:56:4d:ef:d2:da:2c: 395s 22:b4:67:b8:e6:37:fd:8a:9e:ee:f4:fd:8f:1f:0b: 395s a8:fc:40:e0:db:ed:f1:b8:7c:ee:e2:b1:74:21:d3: 395s 9e:5c:d6:1d:95:bd:20:05:d3 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 5b:2b:9f:27:db:ae:28:dd:71:5e:e7:17:15:9a:3b:34:07:76: 395s b1:95:d1:d4:b2:c7:eb:52:c4:b9:37:d1:51:c4:9a:ee:b7:e4: 395s 54:5f:b2:b7:52:07:1c:b9:e9:12:9d:99:b0:d4:a4:84:26:50: 395s 8e:a1:74:97:7a:50:21:f5:fa:bc:89:27:de:47:a1:ba:ab:55: 395s 69:56:4a:e7:07:80:15:42:23:a9:b2:ca:27:d6:bd:d6:f8:6a: 395s 4a:b9:ea:8b:bd:a6:28:3c:49:15:7c:27:1c:7c:dc:6c:4f:88: 395s bb:a5:93:a3:f9:90:3f:ad:b0:49:2f:25:d8:87:cc:d7:4b:57: 395s b6:8c 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-29441-auth.pem 395s + found_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s + '[' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 '!=' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 ']' 395s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s + local verify_option= 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s Test Organization Interme Token 395s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Interme Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Interme Token' 395s + '[' -n '' ']' 395s + local output_base_name=SSSD-child-11935 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-11935.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-11935.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s [p11_child[2303]] [main] (0x0400): p11_child started. 395s [p11_child[2303]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2303]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2303]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2303]] [do_card] (0x4000): Module List: 395s [p11_child[2303]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2303]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2303]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2303]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 395s [p11_child[2303]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2303]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2303]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 395s [p11_child[2303]] [do_verification] (0x0040): X509_verify_cert failed [0]. 395s [p11_child[2303]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 395s [p11_child[2303]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 395s [p11_child[2303]] [do_card] (0x4000): No certificate found. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-11935.output 395s + return 2 395s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 395s Test Organization Interme Token 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Interme Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Interme Token' 395s + '[' -n partial_chain ']' 395s + local verify_arg=--verify=partial_chain 395s + local output_base_name=SSSD-child-9139 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-9139.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-9139.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s [p11_child[2310]] [main] (0x0400): p11_child started. 395s [p11_child[2310]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2310]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2310]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2310]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[2310]] [do_card] (0x4000): Module List: 395s [p11_child[2310]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2310]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2310]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2310]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 395s [p11_child[2310]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2310]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2310]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 395s [p11_child[2310]] [do_verification] (0x0040): X509_verify_cert failed [0]. 395s [p11_child[2310]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 395s [p11_child[2310]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 395s [p11_child[2310]] [do_card] (0x4000): No certificate found. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-9139.output 395s + return 2 395s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s + local verify_option= 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 395s Test Organization Interme Token 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Interme Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Interme Token' 395s + '[' -n '' ']' 395s + local output_base_name=SSSD-child-8314 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s [p11_child[2317]] [main] (0x0400): p11_child started. 395s [p11_child[2317]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2317]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2317]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2317]] [do_card] (0x4000): Module List: 395s [p11_child[2317]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2317]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2317]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2317]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 395s [p11_child[2317]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2317]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2317]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 395s [p11_child[2317]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2317]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2317]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x28e914e9;slot-manufacturer=SoftHSM%20project;slot-id=686363881;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9112a60a8e914e9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2317]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 4 (0x4) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c9:c7:8d:9f:20:cb:d7:3f:ad:d2:12:72:4a:54: 395s 6d:60:f9:56:c2:e2:b8:81:0e:ac:3f:e8:29:c9:eb: 395s 83:a1:85:41:21:6d:f8:b4:e1:f3:87:a2:92:e5:4a: 395s b6:28:61:ed:8e:e5:e0:79:2d:aa:4f:a4:69:fe:f1: 395s 86:34:e9:5e:fb:67:d0:db:9b:ad:25:19:c3:6b:38: 395s d8:9d:33:eb:0f:2a:4e:9b:de:56:4d:ef:d2:da:2c: 395s 22:b4:67:b8:e6:37:fd:8a:9e:ee:f4:fd:8f:1f:0b: 395s a8:fc:40:e0:db:ed:f1:b8:7c:ee:e2:b1:74:21:d3: 395s 9e:5c:d6:1d:95:bd:20:05:d3 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 5b:2b:9f:27:db:ae:28:dd:71:5e:e7:17:15:9a:3b:34:07:76: 395s b1:95:d1:d4:b2:c7:eb:52:c4:b9:37:d1:51:c4:9a:ee:b7:e4: 395s 54:5f:b2:b7:52:07:1c:b9:e9:12:9d:99:b0:d4:a4:84:26:50: 395s 8e:a1:74:97:7a:50:21:f5:fa:bc:89:27:de:47:a1:ba:ab:55: 395s 69:56:4a:e7:07:80:15:42:23:a9:b2:ca:27:d6:bd:d6:f8:6a: 395s 4a:b9:ea:8b:bd:a6:28:3c:49:15:7c:27:1c:7c:dc:6c:4f:88: 395s bb:a5:93:a3:f9:90:3f:ad:b0:49:2f:25:d8:87:cc:d7:4b:57: 395s b6:8c 395s + local found_md5 expected_md5 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + expected_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314.pem 395s + found_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s + '[' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 '!=' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 ']' 395s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314-auth.output 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314-auth.output .output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314-auth.pem 395s + echo -n 053350 395s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 395s [p11_child[2325]] [main] (0x0400): p11_child started. 395s [p11_child[2325]] [main] (0x2000): Running in [auth] mode. 395s [p11_child[2325]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2325]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2325]] [do_card] (0x4000): Module List: 395s [p11_child[2325]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2325]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2325]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2325]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 395s [p11_child[2325]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2325]] [do_card] (0x4000): Login required. 395s [p11_child[2325]] [do_card] (0x4000): Token flags [1069]. 395s [p11_child[2325]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 395s [p11_child[2325]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2325]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2325]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x28e914e9;slot-manufacturer=SoftHSM%20project;slot-id=686363881;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9112a60a8e914e9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 395s [p11_child[2325]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 395s [p11_child[2325]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 395s [p11_child[2325]] [do_card] (0x4000): Certificate verified and validated. 395s [p11_child[2325]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314-auth.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314-auth.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314-auth.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 4 (0x4) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c9:c7:8d:9f:20:cb:d7:3f:ad:d2:12:72:4a:54: 395s 6d:60:f9:56:c2:e2:b8:81:0e:ac:3f:e8:29:c9:eb: 395s 83:a1:85:41:21:6d:f8:b4:e1:f3:87:a2:92:e5:4a: 395s b6:28:61:ed:8e:e5:e0:79:2d:aa:4f:a4:69:fe:f1: 395s 86:34:e9:5e:fb:67:d0:db:9b:ad:25:19:c3:6b:38: 395s d8:9d:33:eb:0f:2a:4e:9b:de:56:4d:ef:d2:da:2c: 395s 22:b4:67:b8:e6:37:fd:8a:9e:ee:f4:fd:8f:1f:0b: 395s a8:fc:40:e0:db:ed:f1:b8:7c:ee:e2:b1:74:21:d3: 395s 9e:5c:d6:1d:95:bd:20:05:d3 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 5b:2b:9f:27:db:ae:28:dd:71:5e:e7:17:15:9a:3b:34:07:76: 395s b1:95:d1:d4:b2:c7:eb:52:c4:b9:37:d1:51:c4:9a:ee:b7:e4: 395s 54:5f:b2:b7:52:07:1c:b9:e9:12:9d:99:b0:d4:a4:84:26:50: 395s 8e:a1:74:97:7a:50:21:f5:fa:bc:89:27:de:47:a1:ba:ab:55: 395s 69:56:4a:e7:07:80:15:42:23:a9:b2:ca:27:d6:bd:d6:f8:6a: 395s 4a:b9:ea:8b:bd:a6:28:3c:49:15:7c:27:1c:7c:dc:6c:4f:88: 395s bb:a5:93:a3:f9:90:3f:ad:b0:49:2f:25:d8:87:cc:d7:4b:57: 395s b6:8c 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-8314-auth.pem 395s + found_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s + '[' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 '!=' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 ']' 395s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s Test Organization Interme Token 395s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Interme Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Interme Token' 395s + '[' -n partial_chain ']' 395s + local verify_arg=--verify=partial_chain 395s + local output_base_name=SSSD-child-24564 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s [p11_child[2335]] [main] (0x0400): p11_child started. 395s [p11_child[2335]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2335]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2335]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2335]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[2335]] [do_card] (0x4000): Module List: 395s [p11_child[2335]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2335]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2335]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2335]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 395s [p11_child[2335]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2335]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2335]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 395s [p11_child[2335]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2335]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2335]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x28e914e9;slot-manufacturer=SoftHSM%20project;slot-id=686363881;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9112a60a8e914e9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2335]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 4 (0x4) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c9:c7:8d:9f:20:cb:d7:3f:ad:d2:12:72:4a:54: 395s 6d:60:f9:56:c2:e2:b8:81:0e:ac:3f:e8:29:c9:eb: 395s 83:a1:85:41:21:6d:f8:b4:e1:f3:87:a2:92:e5:4a: 395s b6:28:61:ed:8e:e5:e0:79:2d:aa:4f:a4:69:fe:f1: 395s 86:34:e9:5e:fb:67:d0:db:9b:ad:25:19:c3:6b:38: 395s d8:9d:33:eb:0f:2a:4e:9b:de:56:4d:ef:d2:da:2c: 395s 22:b4:67:b8:e6:37:fd:8a:9e:ee:f4:fd:8f:1f:0b: 395s a8:fc:40:e0:db:ed:f1:b8:7c:ee:e2:b1:74:21:d3: 395s 9e:5c:d6:1d:95:bd:20:05:d3 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 5b:2b:9f:27:db:ae:28:dd:71:5e:e7:17:15:9a:3b:34:07:76: 395s b1:95:d1:d4:b2:c7:eb:52:c4:b9:37:d1:51:c4:9a:ee:b7:e4: 395s 54:5f:b2:b7:52:07:1c:b9:e9:12:9d:99:b0:d4:a4:84:26:50: 395s 8e:a1:74:97:7a:50:21:f5:fa:bc:89:27:de:47:a1:ba:ab:55: 395s 69:56:4a:e7:07:80:15:42:23:a9:b2:ca:27:d6:bd:d6:f8:6a: 395s 4a:b9:ea:8b:bd:a6:28:3c:49:15:7c:27:1c:7c:dc:6c:4f:88: 395s bb:a5:93:a3:f9:90:3f:ad:b0:49:2f:25:d8:87:cc:d7:4b:57: 395s b6:8c 395s + local found_md5 expected_md5 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + expected_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564.pem 395s + found_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s + '[' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 '!=' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 ']' 395s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564-auth.output 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564-auth.output .output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564-auth.pem 395s + echo -n 053350 395s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 395s [p11_child[2343]] [main] (0x0400): p11_child started. 395s [p11_child[2343]] [main] (0x2000): Running in [auth] mode. 395s [p11_child[2343]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2343]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2343]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[2343]] [do_card] (0x4000): Module List: 395s [p11_child[2343]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2343]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2343]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2343]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 395s [p11_child[2343]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2343]] [do_card] (0x4000): Login required. 395s [p11_child[2343]] [do_card] (0x4000): Token flags [1069]. 395s [p11_child[2343]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 395s [p11_child[2343]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2343]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2343]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x28e914e9;slot-manufacturer=SoftHSM%20project;slot-id=686363881;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9112a60a8e914e9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 395s [p11_child[2343]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 395s [p11_child[2343]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 395s [p11_child[2343]] [do_card] (0x4000): Certificate verified and validated. 395s [p11_child[2343]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564-auth.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564-auth.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564-auth.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 4 (0x4) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c9:c7:8d:9f:20:cb:d7:3f:ad:d2:12:72:4a:54: 395s 6d:60:f9:56:c2:e2:b8:81:0e:ac:3f:e8:29:c9:eb: 395s 83:a1:85:41:21:6d:f8:b4:e1:f3:87:a2:92:e5:4a: 395s b6:28:61:ed:8e:e5:e0:79:2d:aa:4f:a4:69:fe:f1: 395s 86:34:e9:5e:fb:67:d0:db:9b:ad:25:19:c3:6b:38: 395s d8:9d:33:eb:0f:2a:4e:9b:de:56:4d:ef:d2:da:2c: 395s 22:b4:67:b8:e6:37:fd:8a:9e:ee:f4:fd:8f:1f:0b: 395s a8:fc:40:e0:db:ed:f1:b8:7c:ee:e2:b1:74:21:d3: 395s 9e:5c:d6:1d:95:bd:20:05:d3 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 5b:2b:9f:27:db:ae:28:dd:71:5e:e7:17:15:9a:3b:34:07:76: 395s b1:95:d1:d4:b2:c7:eb:52:c4:b9:37:d1:51:c4:9a:ee:b7:e4: 395s 54:5f:b2:b7:52:07:1c:b9:e9:12:9d:99:b0:d4:a4:84:26:50: 395s 8e:a1:74:97:7a:50:21:f5:fa:bc:89:27:de:47:a1:ba:ab:55: 395s 69:56:4a:e7:07:80:15:42:23:a9:b2:ca:27:d6:bd:d6:f8:6a: 395s 4a:b9:ea:8b:bd:a6:28:3c:49:15:7c:27:1c:7c:dc:6c:4f:88: 395s bb:a5:93:a3:f9:90:3f:ad:b0:49:2f:25:d8:87:cc:d7:4b:57: 395s b6:8c 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-24564-auth.pem 395s + found_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s + '[' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 '!=' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 ']' 395s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 395s + local verify_option= 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s Test Organization Interme Token 395s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Interme Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Interme Token' 395s + '[' -n '' ']' 395s + local output_base_name=SSSD-child-13746 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-13746.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-13746.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 395s [p11_child[2353]] [main] (0x0400): p11_child started. 395s [p11_child[2353]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2353]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2353]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2353]] [do_card] (0x4000): Module List: 395s [p11_child[2353]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2353]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2353]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2353]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 395s [p11_child[2353]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2353]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2353]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 395s [p11_child[2353]] [do_verification] (0x0040): X509_verify_cert failed [0]. 395s [p11_child[2353]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 395s [p11_child[2353]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 395s [p11_child[2353]] [do_card] (0x4000): No certificate found. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13746.output 395s + return 2 395s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-7411 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s Test Organization Interme Token 395s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Interme Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Interme Token' 395s + '[' -n partial_chain ']' 395s + local verify_arg=--verify=partial_chain 395s + local output_base_name=SSSD-child-26666 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem 395s [p11_child[2360]] [main] (0x0400): p11_child started. 395s [p11_child[2360]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2360]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2360]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2360]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 4 (0x4) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c9:c7:8d:9f:20:cb:d7:3f:ad:d2:12:72:4a:54: 395s 6d:60:f9:56:c2:e2:b8:81:0e:ac:3f:e8:29:c9:eb: 395s 83:a1:85:41:21:6d:f8:b4:e1:f3:87:a2:92:e5:4a: 395s b6:28:61:ed:8e:e5:e0:79:2d:aa:4f:a4:69:fe:f1: 395s 86:34:e9:5e:fb:67:d0:db:9b:ad:25:19:c3:6b:38: 395s d8:9d:33:eb:0f:2a:4e:9b:de:56:4d:ef:d2:da:2c: 395s 22:b4:67:b8:e6:37:fd:8a:9e:ee:f4:fd:8f:1f:0b: 395s a8:fc:40:e0:db:ed:f1:b8:7c:ee:e2:b1:74:21:d3: 395s 9e:5c:d6:1d:95:bd:20:05:d3 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 5b:2b:9f:27:db:ae:28:dd:71:5e:e7:17:15:9a:3b:34:07:76: 395s b1:95:d1:d4:b2:c7:eb:52:c4:b9:37:d1:51:c4:9a:ee:b7:e4: 395s 54:5f:b2:b7:52:07:1c:b9:e9:12:9d:99:b0:d4:a4:84:26:50: 395s 8e:a1:74:97:7a:50:21:f5:fa:bc:89:27:de:47:a1:ba:ab:55: 395s 69:56:4a:e7:07:80:15:42:23:a9:b2:ca:27:d6:bd:d6:f8:6a: 395s 4a:b9:ea:8b:bd:a6:28:3c:49:15:7c:27:1c:7c:dc:6c:4f:88: 395s bb:a5:93:a3:f9:90:3f:ad:b0:49:2f:25:d8:87:cc:d7:4b:57: 395s b6:8c 395s [p11_child[2360]] [do_card] (0x4000): Module List: 395s [p11_child[2360]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2360]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2360]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2360]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 395s [p11_child[2360]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2360]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2360]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 395s [p11_child[2360]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2360]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2360]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x28e914e9;slot-manufacturer=SoftHSM%20project;slot-id=686363881;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9112a60a8e914e9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2360]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666.pem 395s + local found_md5 expected_md5 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA-trusted-certificate-0001.pem 395s + expected_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666.pem 395s + found_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s + '[' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 '!=' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 ']' 395s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666-auth.output 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666-auth.output .output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666-auth.pem 395s + echo -n 053350 395s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 395s [p11_child[2368]] [main] (0x0400): p11_child started. 395s [p11_child[2368]] [main] (0x2000): Running in [auth] mode. 395s [p11_child[2368]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2368]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2368]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[2368]] [do_card] (0x4000): Module List: 395s [p11_child[2368]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2368]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2368]] [do_card] (0x4000): Description [SoftHSM slot ID 0x28e914e9] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2368]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 395s [p11_child[2368]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x28e914e9][686363881] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2368]] [do_card] (0x4000): Login required. 395s [p11_child[2368]] [do_card] (0x4000): Token flags [1069]. 395s [p11_child[2368]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 395s [p11_child[2368]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2368]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2368]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x28e914e9;slot-manufacturer=SoftHSM%20project;slot-id=686363881;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=d9112a60a8e914e9;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 395s [p11_child[2368]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 395s [p11_child[2368]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 395s [p11_child[2368]] [do_card] (0x4000): Certificate verified and validated. 395s [p11_child[2368]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666-auth.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666-auth.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666-auth.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 4 (0x4) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c9:c7:8d:9f:20:cb:d7:3f:ad:d2:12:72:4a:54: 395s 6d:60:f9:56:c2:e2:b8:81:0e:ac:3f:e8:29:c9:eb: 395s 83:a1:85:41:21:6d:f8:b4:e1:f3:87:a2:92:e5:4a: 395s b6:28:61:ed:8e:e5:e0:79:2d:aa:4f:a4:69:fe:f1: 395s 86:34:e9:5e:fb:67:d0:db:9b:ad:25:19:c3:6b:38: 395s d8:9d:33:eb:0f:2a:4e:9b:de:56:4d:ef:d2:da:2c: 395s 22:b4:67:b8:e6:37:fd:8a:9e:ee:f4:fd:8f:1f:0b: 395s a8:fc:40:e0:db:ed:f1:b8:7c:ee:e2:b1:74:21:d3: 395s 9e:5c:d6:1d:95:bd:20:05:d3 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 9E:8F:E6:79:A1:ED:87:6B:20:FB:8A:32:19:A2:0C:4A:35:EB:E1:96 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 5B:6B:91:05:73:23:92:B8:6E:38:41:E3:AF:51:42:ED:18:7F:24:88 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s 5b:2b:9f:27:db:ae:28:dd:71:5e:e7:17:15:9a:3b:34:07:76: 395s b1:95:d1:d4:b2:c7:eb:52:c4:b9:37:d1:51:c4:9a:ee:b7:e4: 395s 54:5f:b2:b7:52:07:1c:b9:e9:12:9d:99:b0:d4:a4:84:26:50: 395s 8e:a1:74:97:7a:50:21:f5:fa:bc:89:27:de:47:a1:ba:ab:55: 395s 69:56:4a:e7:07:80:15:42:23:a9:b2:ca:27:d6:bd:d6:f8:6a: 395s 4a:b9:ea:8b:bd:a6:28:3c:49:15:7c:27:1c:7c:dc:6c:4f:88: 395s bb:a5:93:a3:f9:90:3f:ad:b0:49:2f:25:d8:87:cc:d7:4b:57: 395s b6:8c 395s Slot 0 has a free/uninitialized token. 395s The token has been initialized and is reassigned to slot 1513431686 395s Available slots: 395s Slot 1513431686 395s Slot info: 395s Description: SoftHSM slot ID 0x5a352286 395s Manufacturer ID: SoftHSM project 395s Hardware version: 2.6 395s Firmware version: 2.6 395s Token present: yes 395s Token info: 395s Manufacturer ID: SoftHSM project 395s Model: SoftHSM v2 395s Hardware version: 2.6 395s Firmware version: 2.6 395s Serial number: 05786b375a352286 395s Initialized: yes 395s User PIN init.: yes 395s Label: Test Organization Sub Int Token 395s Slot 1 395s Slot info: 395s Description: SoftHSM slot ID 0x1 395s Manufacturer ID: SoftHSM project 395s Hardware version: 2.6 395s Firmware version: 2.6 395s Token present: yes 395s Token info: 395s Manufacturer ID: SoftHSM project 395s Model: SoftHSM v2 395s Hardware version: 2.6 395s Firmware version: 2.6 395s Serial number: 395s Initialized: no 395s User PIN init.: no 395s Label: 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-26666-auth.pem 395s + found_md5=Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 395s + '[' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 '!=' Modulus=C9C78D9F20CBD73FADD212724A546D60F956C2E2B8810EAC3FE829C9EB83A18541216DF8B4E1F387A292E54AB62861ED8EE5E0792DAA4FA469FEF18634E95EFB67D0DB9BAD2519C36B38D89D33EB0F2A4E9BDE564DEFD2DA2C22B467B8E637FD8A9EEEF4FD8F1F0BA8FC40E0DBEDF1B87CEEE2B17421D39E5CD61D95BD2005D3 ']' 395s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s + local verify_option= 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + local key_file 395s + local decrypted_key 395s + mkdir -p /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + key_file=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 395s + decrypted_key=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 395s + cat 395s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 395s + softhsm2-util --show-slots 395s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 395s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-10927 -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 395s writing RSA key 395s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 395s + rm /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 395s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 395s Object 0: 395s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=05786b375a352286;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 395s Type: X.509 Certificate (RSA-1024) 395s Expires: Mon Mar 16 00:31:39 2026 395s Label: Test Organization Sub Intermediate Trusted Certificate 0001 395s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 395s 395s + echo 'Test Organization Sub Int Token' 395s Test Organization Sub Int Token 395s + '[' -n '' ']' 395s + local output_base_name=SSSD-child-3462 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-3462.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-3462.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s [p11_child[2387]] [main] (0x0400): p11_child started. 395s [p11_child[2387]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2387]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2387]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2387]] [do_card] (0x4000): Module List: 395s [p11_child[2387]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2387]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2387]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2387]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[2387]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2387]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2387]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[2387]] [do_verification] (0x0040): X509_verify_cert failed [0]. 395s [p11_child[2387]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 395s [p11_child[2387]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 395s [p11_child[2387]] [do_card] (0x4000): No certificate found. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-3462.output 395s + return 2 395s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s Test Organization Sub Int Token 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Sub Int Token' 395s + '[' -n partial_chain ']' 395s + local verify_arg=--verify=partial_chain 395s + local output_base_name=SSSD-child-28102 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-28102.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-28102.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-root-CA.pem 395s [p11_child[2394]] [main] (0x0400): p11_child started. 395s [p11_child[2394]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2394]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2394]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2394]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[2394]] [do_card] (0x4000): Module List: 395s [p11_child[2394]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2394]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2394]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2394]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[2394]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2394]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2394]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[2394]] [do_verification] (0x0040): X509_verify_cert failed [0]. 395s [p11_child[2394]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 395s [p11_child[2394]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 395s [p11_child[2394]] [do_card] (0x4000): No certificate found. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-28102.output 395s + return 2 395s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s + local verify_option= 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s Test Organization Sub Int Token 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Sub Int Token' 395s + '[' -n '' ']' 395s + local output_base_name=SSSD-child-5667 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s [p11_child[2401]] [main] (0x0400): p11_child started. 395s [p11_child[2401]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2401]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2401]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2401]] [do_card] (0x4000): Module List: 395s [p11_child[2401]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2401]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2401]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2401]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[2401]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2401]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2401]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[2401]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2401]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2401]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5a352286;slot-manufacturer=SoftHSM%20project;slot-id=1513431686;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=05786b375a352286;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2401]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667.output 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 5 (0x5) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c8:ca:c2:55:47:db:43:9e:a2:08:d0:62:17:69: 395s 82:c3:8c:47:6f:f6:30:e8:99:2a:0d:41:ea:e7:7d: 395s 3d:1b:08:87:ab:1e:4e:13:7d:71:e2:a0:b2:71:82: 395s ee:d0:27:3c:42:f7:31:05:b0:eb:e6:66:5e:88:37: 395s 03:27:45:8a:f0:f3:1c:c1:26:35:83:91:7f:df:2e: 395s 3d:98:67:da:47:6c:a0:35:c2:4b:e1:8d:8f:11:cf: 395s f3:d9:8c:34:49:4a:16:f3:ba:9d:8f:05:cf:3e:51: 395s 54:86:ca:d3:51:0d:12:e9:3b:ca:7d:df:0f:1e:4b: 395s 11:ca:3c:0b:f2:b4:91:72:3f 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Sub Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s b2:b5:7d:73:7e:cf:3b:67:af:a5:7a:86:1f:e2:7e:81:0b:c7: 395s 5c:9f:de:0a:82:54:65:22:d3:70:f8:98:58:88:9a:71:78:06: 395s 54:9c:46:ad:ac:11:55:3a:ed:04:8e:a9:d3:58:77:68:f6:b1: 395s f9:b0:41:cf:59:c6:b4:4e:e8:ae:3d:66:c8:79:85:1a:50:3c: 395s 05:fa:eb:50:07:29:a1:1c:1f:b5:70:d5:09:3e:61:d4:0d:69: 395s a5:05:0a:8e:4c:be:64:22:f5:46:31:0b:32:38:1f:10:8e:f9: 395s c8:db:90:6f:57:62:54:17:34:c0:93:48:5f:ff:77:3a:bd:a4: 395s 4e:d3 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667.pem 395s + local found_md5 expected_md5 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + expected_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667.pem 395s + found_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 395s + '[' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F '!=' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F ']' 395s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667-auth.output 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667-auth.output .output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667-auth.pem 395s + echo -n 053350 395s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 395s [p11_child[2409]] [main] (0x0400): p11_child started. 395s [p11_child[2409]] [main] (0x2000): Running in [auth] mode. 395s [p11_child[2409]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2409]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2409]] [do_card] (0x4000): Module List: 395s [p11_child[2409]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2409]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2409]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2409]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[2409]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2409]] [do_card] (0x4000): Login required. 395s [p11_child[2409]] [do_card] (0x4000): Token flags [1069]. 395s [p11_child[2409]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[2409]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2409]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2409]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5a352286;slot-manufacturer=SoftHSM%20project;slot-id=1513431686;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=05786b375a352286;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 395s [p11_child[2409]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 395s [p11_child[2409]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 395s [p11_child[2409]] [do_card] (0x4000): Certificate verified and validated. 395s [p11_child[2409]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667-auth.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667-auth.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667-auth.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 5 (0x5) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c8:ca:c2:55:47:db:43:9e:a2:08:d0:62:17:69: 395s 82:c3:8c:47:6f:f6:30:e8:99:2a:0d:41:ea:e7:7d: 395s 3d:1b:08:87:ab:1e:4e:13:7d:71:e2:a0:b2:71:82: 395s ee:d0:27:3c:42:f7:31:05:b0:eb:e6:66:5e:88:37: 395s 03:27:45:8a:f0:f3:1c:c1:26:35:83:91:7f:df:2e: 395s 3d:98:67:da:47:6c:a0:35:c2:4b:e1:8d:8f:11:cf: 395s f3:d9:8c:34:49:4a:16:f3:ba:9d:8f:05:cf:3e:51: 395s 54:86:ca:d3:51:0d:12:e9:3b:ca:7d:df:0f:1e:4b: 395s 11:ca:3c:0b:f2:b4:91:72:3f 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Sub Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s b2:b5:7d:73:7e:cf:3b:67:af:a5:7a:86:1f:e2:7e:81:0b:c7: 395s 5c:9f:de:0a:82:54:65:22:d3:70:f8:98:58:88:9a:71:78:06: 395s 54:9c:46:ad:ac:11:55:3a:ed:04:8e:a9:d3:58:77:68:f6:b1: 395s f9:b0:41:cf:59:c6:b4:4e:e8:ae:3d:66:c8:79:85:1a:50:3c: 395s 05:fa:eb:50:07:29:a1:1c:1f:b5:70:d5:09:3e:61:d4:0d:69: 395s a5:05:0a:8e:4c:be:64:22:f5:46:31:0b:32:38:1f:10:8e:f9: 395s c8:db:90:6f:57:62:54:17:34:c0:93:48:5f:ff:77:3a:bd:a4: 395s 4e:d3 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-5667-auth.pem 395s + found_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 395s + '[' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F '!=' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F ']' 395s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s Test Organization Sub Int Token 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Sub Int Token' 395s + '[' -n partial_chain ']' 395s + local verify_arg=--verify=partial_chain 395s + local output_base_name=SSSD-child-332 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-332.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-332.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem 395s [p11_child[2419]] [main] (0x0400): p11_child started. 395s [p11_child[2419]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2419]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2419]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2419]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[2419]] [do_card] (0x4000): Module List: 395s [p11_child[2419]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2419]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2419]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2419]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[2419]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2419]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2419]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[2419]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2419]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2419]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5a352286;slot-manufacturer=SoftHSM%20project;slot-id=1513431686;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=05786b375a352286;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2419]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-332.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-332.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-332.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 5 (0x5) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c8:ca:c2:55:47:db:43:9e:a2:08:d0:62:17:69: 395s 82:c3:8c:47:6f:f6:30:e8:99:2a:0d:41:ea:e7:7d: 395s 3d:1b:08:87:ab:1e:4e:13:7d:71:e2:a0:b2:71:82: 395s ee:d0:27:3c:42:f7:31:05:b0:eb:e6:66:5e:88:37: 395s 03:27:45:8a:f0:f3:1c:c1:26:35:83:91:7f:df:2e: 395s 3d:98:67:da:47:6c:a0:35:c2:4b:e1:8d:8f:11:cf: 395s f3:d9:8c:34:49:4a:16:f3:ba:9d:8f:05:cf:3e:51: 395s 54:86:ca:d3:51:0d:12:e9:3b:ca:7d:df:0f:1e:4b: 395s 11:ca:3c:0b:f2:b4:91:72:3f 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Sub Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s b2:b5:7d:73:7e:cf:3b:67:af:a5:7a:86:1f:e2:7e:81:0b:c7: 395s 5c:9f:de:0a:82:54:65:22:d3:70:f8:98:58:88:9a:71:78:06: 395s 54:9c:46:ad:ac:11:55:3a:ed:04:8e:a9:d3:58:77:68:f6:b1: 395s f9:b0:41:cf:59:c6:b4:4e:e8:ae:3d:66:c8:79:85:1a:50:3c: 395s 05:fa:eb:50:07:29:a1:1c:1f:b5:70:d5:09:3e:61:d4:0d:69: 395s a5:05:0a:8e:4c:be:64:22:f5:46:31:0b:32:38:1f:10:8e:f9: 395s c8:db:90:6f:57:62:54:17:34:c0:93:48:5f:ff:77:3a:bd:a4: 395s 4e:d3 395s + local found_md5 expected_md5 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + expected_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-332.pem 395s + found_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 395s + '[' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F '!=' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F ']' 395s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-332-auth.output 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-332-auth.output .output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-332-auth.pem 395s + echo -n 053350 395s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 395s [p11_child[2427]] [main] (0x0400): p11_child started. 395s [p11_child[2427]] [main] (0x2000): Running in [auth] mode. 395s [p11_child[2427]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2427]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2427]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[2427]] [do_card] (0x4000): Module List: 395s [p11_child[2427]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2427]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2427]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2427]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[2427]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2427]] [do_card] (0x4000): Login required. 395s [p11_child[2427]] [do_card] (0x4000): Token flags [1069]. 395s [p11_child[2427]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[2427]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 395s [p11_child[2427]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 395s [p11_child[2427]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5a352286;slot-manufacturer=SoftHSM%20project;slot-id=1513431686;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=05786b375a352286;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 395s [p11_child[2427]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 395s [p11_child[2427]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 395s [p11_child[2427]] [do_card] (0x4000): Certificate verified and validated. 395s [p11_child[2427]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-332-auth.output 395s + echo '-----BEGIN CERTIFICATE-----' 395s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-332-auth.output 395s + echo '-----END CERTIFICATE-----' 395s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-332-auth.pem 395s Certificate: 395s Data: 395s Version: 3 (0x2) 395s Serial Number: 5 (0x5) 395s Signature Algorithm: sha256WithRSAEncryption 395s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 395s Validity 395s Not Before: Mar 16 00:31:39 2025 GMT 395s Not After : Mar 16 00:31:39 2026 GMT 395s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 395s Subject Public Key Info: 395s Public Key Algorithm: rsaEncryption 395s Public-Key: (1024 bit) 395s Modulus: 395s 00:c8:ca:c2:55:47:db:43:9e:a2:08:d0:62:17:69: 395s 82:c3:8c:47:6f:f6:30:e8:99:2a:0d:41:ea:e7:7d: 395s 3d:1b:08:87:ab:1e:4e:13:7d:71:e2:a0:b2:71:82: 395s ee:d0:27:3c:42:f7:31:05:b0:eb:e6:66:5e:88:37: 395s 03:27:45:8a:f0:f3:1c:c1:26:35:83:91:7f:df:2e: 395s 3d:98:67:da:47:6c:a0:35:c2:4b:e1:8d:8f:11:cf: 395s f3:d9:8c:34:49:4a:16:f3:ba:9d:8f:05:cf:3e:51: 395s 54:86:ca:d3:51:0d:12:e9:3b:ca:7d:df:0f:1e:4b: 395s 11:ca:3c:0b:f2:b4:91:72:3f 395s Exponent: 65537 (0x10001) 395s X509v3 extensions: 395s X509v3 Authority Key Identifier: 395s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 395s X509v3 Basic Constraints: 395s CA:FALSE 395s Netscape Cert Type: 395s SSL Client, S/MIME 395s Netscape Comment: 395s Test Organization Sub Intermediate CA trusted Certificate 395s X509v3 Subject Key Identifier: 395s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 395s X509v3 Key Usage: critical 395s Digital Signature, Non Repudiation, Key Encipherment 395s X509v3 Extended Key Usage: 395s TLS Web Client Authentication, E-mail Protection 395s X509v3 Subject Alternative Name: 395s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 395s Signature Algorithm: sha256WithRSAEncryption 395s Signature Value: 395s b2:b5:7d:73:7e:cf:3b:67:af:a5:7a:86:1f:e2:7e:81:0b:c7: 395s 5c:9f:de:0a:82:54:65:22:d3:70:f8:98:58:88:9a:71:78:06: 395s 54:9c:46:ad:ac:11:55:3a:ed:04:8e:a9:d3:58:77:68:f6:b1: 395s f9:b0:41:cf:59:c6:b4:4e:e8:ae:3d:66:c8:79:85:1a:50:3c: 395s 05:fa:eb:50:07:29:a1:1c:1f:b5:70:d5:09:3e:61:d4:0d:69: 395s a5:05:0a:8e:4c:be:64:22:f5:46:31:0b:32:38:1f:10:8e:f9: 395s c8:db:90:6f:57:62:54:17:34:c0:93:48:5f:ff:77:3a:bd:a4: 395s 4e:d3 395s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-332-auth.pem 395s + found_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 395s + '[' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F '!=' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F ']' 395s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 395s + local verify_option= 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s Test Organization Sub Int Token 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Sub Int Token' 395s + '[' -n '' ']' 395s + local output_base_name=SSSD-child-27686 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-27686.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-27686.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 395s [p11_child[2437]] [main] (0x0400): p11_child started. 395s [p11_child[2437]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2437]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2437]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2437]] [do_card] (0x4000): Module List: 395s [p11_child[2437]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2437]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2437]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2437]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[2437]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2437]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2437]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[2437]] [do_verification] (0x0040): X509_verify_cert failed [0]. 395s [p11_child[2437]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 395s [p11_child[2437]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 395s [p11_child[2437]] [do_card] (0x4000): No certificate found. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-27686.output 395s + return 2 395s + invalid_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-root-intermediate-chain-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-root-intermediate-chain-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-root-intermediate-chain-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 395s Test Organization Sub Int Token 395s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 395s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 395s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 395s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 395s + token_name='Test Organization Sub Int Token' 395s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 395s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 395s + echo 'Test Organization Sub Int Token' 395s + '[' -n partial_chain ']' 395s + local verify_arg=--verify=partial_chain 395s + local output_base_name=SSSD-child-17841 395s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-17841.output 395s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-17841.pem 395s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-root-intermediate-chain-CA.pem 395s [p11_child[2444]] [main] (0x0400): p11_child started. 395s [p11_child[2444]] [main] (0x2000): Running in [pre-auth] mode. 395s [p11_child[2444]] [main] (0x2000): Running with effective IDs: [0][0]. 395s [p11_child[2444]] [main] (0x2000): Running with real IDs [0][0]. 395s [p11_child[2444]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 395s [p11_child[2444]] [do_card] (0x4000): Module List: 395s [p11_child[2444]] [do_card] (0x4000): common name: [softhsm2]. 395s [p11_child[2444]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2444]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 395s [p11_child[2444]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 395s [p11_child[2444]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 395s [p11_child[2444]] [do_card] (0x4000): Login NOT required. 395s [p11_child[2444]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 395s [p11_child[2444]] [do_verification] (0x0040): X509_verify_cert failed [0]. 395s [p11_child[2444]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 395s [p11_child[2444]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 395s [p11_child[2444]] [do_card] (0x4000): No certificate found. 395s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-17841.output 395s + return 2 395s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem partial_chain 395s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem partial_chain 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 395s + local verify_option=partial_chain 395s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 395s + local key_cn 395s + local key_name 395s + local tokens_dir 395s + local output_cert_file 395s + token_name= 395s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 395s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 395s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 395s ++ sed -n 's/ *commonName *= //p' 396s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 396s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 396s Test Organization Sub Int Token 396s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 396s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 396s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 396s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 396s + token_name='Test Organization Sub Int Token' 396s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 396s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 396s + echo 'Test Organization Sub Int Token' 396s + '[' -n partial_chain ']' 396s + local verify_arg=--verify=partial_chain 396s + local output_base_name=SSSD-child-23872 396s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872.output 396s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872.pem 396s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem 396s [p11_child[2451]] [main] (0x0400): p11_child started. 396s [p11_child[2451]] [main] (0x2000): Running in [pre-auth] mode. 396s [p11_child[2451]] [main] (0x2000): Running with effective IDs: [0][0]. 396s [p11_child[2451]] [main] (0x2000): Running with real IDs [0][0]. 396s [p11_child[2451]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 396s [p11_child[2451]] [do_card] (0x4000): Module List: 396s [p11_child[2451]] [do_card] (0x4000): common name: [softhsm2]. 396s [p11_child[2451]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[2451]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 396s [p11_child[2451]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 396s [p11_child[2451]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[2451]] [do_card] (0x4000): Login NOT required. 396s [p11_child[2451]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 396s [p11_child[2451]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 396s [p11_child[2451]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 396s [p11_child[2451]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5a352286;slot-manufacturer=SoftHSM%20project;slot-id=1513431686;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=05786b375a352286;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 396s [p11_child[2451]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 396s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872.output 396s + echo '-----BEGIN CERTIFICATE-----' 396s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872.output 396s + echo '-----END CERTIFICATE-----' 396s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872.pem 396s Certificate: 396s Data: 396s Version: 3 (0x2) 396s Serial Number: 5 (0x5) 396s Signature Algorithm: sha256WithRSAEncryption 396s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 396s Validity 396s Not Before: Mar 16 00:31:39 2025 GMT 396s Not After : Mar 16 00:31:39 2026 GMT 396s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 396s Subject Public Key Info: 396s Public Key Algorithm: rsaEncryption 396s Public-Key: (1024 bit) 396s Modulus: 396s 00:c8:ca:c2:55:47:db:43:9e:a2:08:d0:62:17:69: 396s 82:c3:8c:47:6f:f6:30:e8:99:2a:0d:41:ea:e7:7d: 396s 3d:1b:08:87:ab:1e:4e:13:7d:71:e2:a0:b2:71:82: 396s ee:d0:27:3c:42:f7:31:05:b0:eb:e6:66:5e:88:37: 396s 03:27:45:8a:f0:f3:1c:c1:26:35:83:91:7f:df:2e: 396s 3d:98:67:da:47:6c:a0:35:c2:4b:e1:8d:8f:11:cf: 396s f3:d9:8c:34:49:4a:16:f3:ba:9d:8f:05:cf:3e:51: 396s 54:86:ca:d3:51:0d:12:e9:3b:ca:7d:df:0f:1e:4b: 396s 11:ca:3c:0b:f2:b4:91:72:3f 396s Exponent: 65537 (0x10001) 396s X509v3 extensions: 396s X509v3 Authority Key Identifier: 396s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 396s X509v3 Basic Constraints: 396s CA:FALSE 396s Netscape Cert Type: 396s SSL Client, S/MIME 396s Netscape Comment: 396s Test Organization Sub Intermediate CA trusted Certificate 396s X509v3 Subject Key Identifier: 396s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 396s X509v3 Key Usage: critical 396s Digital Signature, Non Repudiation, Key Encipherment 396s X509v3 Extended Key Usage: 396s TLS Web Client Authentication, E-mail Protection 396s X509v3 Subject Alternative Name: 396s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 396s Signature Algorithm: sha256WithRSAEncryption 396s Signature Value: 396s b2:b5:7d:73:7e:cf:3b:67:af:a5:7a:86:1f:e2:7e:81:0b:c7: 396s 5c:9f:de:0a:82:54:65:22:d3:70:f8:98:58:88:9a:71:78:06: 396s 54:9c:46:ad:ac:11:55:3a:ed:04:8e:a9:d3:58:77:68:f6:b1: 396s f9:b0:41:cf:59:c6:b4:4e:e8:ae:3d:66:c8:79:85:1a:50:3c: 396s 05:fa:eb:50:07:29:a1:1c:1f:b5:70:d5:09:3e:61:d4:0d:69: 396s a5:05:0a:8e:4c:be:64:22:f5:46:31:0b:32:38:1f:10:8e:f9: 396s c8:db:90:6f:57:62:54:17:34:c0:93:48:5f:ff:77:3a:bd:a4: 396s 4e:d3 396s + local found_md5 expected_md5 396s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 396s + expected_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 396s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872.pem 396s + found_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 396s + '[' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F '!=' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F ']' 396s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872-auth.output 396s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872-auth.output .output 396s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872-auth.pem 396s + echo -n 053350 396s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 396s [p11_child[2459]] [main] (0x0400): p11_child started. 396s [p11_child[2459]] [main] (0x2000): Running in [auth] mode. 396s [p11_child[2459]] [main] (0x2000): Running with effective IDs: [0][0]. 396s [p11_child[2459]] [main] (0x2000): Running with real IDs [0][0]. 396s [p11_child[2459]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 396s [p11_child[2459]] [do_card] (0x4000): Module List: 396s [p11_child[2459]] [do_card] (0x4000): common name: [softhsm2]. 396s [p11_child[2459]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[2459]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 396s [p11_child[2459]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 396s [p11_child[2459]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[2459]] [do_card] (0x4000): Login required. 396s [p11_child[2459]] [do_card] (0x4000): Token flags [1069]. 396s [p11_child[2459]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 396s [p11_child[2459]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 396s [p11_child[2459]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 396s [p11_child[2459]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5a352286;slot-manufacturer=SoftHSM%20project;slot-id=1513431686;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=05786b375a352286;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 396s [p11_child[2459]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 396s [p11_child[2459]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 396s [p11_child[2459]] [do_card] (0x4000): Certificate verified and validated. 396s [p11_child[2459]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 396s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872-auth.output 396s + echo '-----BEGIN CERTIFICATE-----' 396s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872-auth.output 396s + echo '-----END CERTIFICATE-----' 396s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872-auth.pem 396s Certificate: 396s Data: 396s Version: 3 (0x2) 396s Serial Number: 5 (0x5) 396s Signature Algorithm: sha256WithRSAEncryption 396s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 396s Validity 396s Not Before: Mar 16 00:31:39 2025 GMT 396s Not After : Mar 16 00:31:39 2026 GMT 396s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 396s Subject Public Key Info: 396s Public Key Algorithm: rsaEncryption 396s Public-Key: (1024 bit) 396s Modulus: 396s 00:c8:ca:c2:55:47:db:43:9e:a2:08:d0:62:17:69: 396s 82:c3:8c:47:6f:f6:30:e8:99:2a:0d:41:ea:e7:7d: 396s 3d:1b:08:87:ab:1e:4e:13:7d:71:e2:a0:b2:71:82: 396s ee:d0:27:3c:42:f7:31:05:b0:eb:e6:66:5e:88:37: 396s 03:27:45:8a:f0:f3:1c:c1:26:35:83:91:7f:df:2e: 396s 3d:98:67:da:47:6c:a0:35:c2:4b:e1:8d:8f:11:cf: 396s f3:d9:8c:34:49:4a:16:f3:ba:9d:8f:05:cf:3e:51: 396s 54:86:ca:d3:51:0d:12:e9:3b:ca:7d:df:0f:1e:4b: 396s 11:ca:3c:0b:f2:b4:91:72:3f 396s Exponent: 65537 (0x10001) 396s X509v3 extensions: 396s X509v3 Authority Key Identifier: 396s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 396s X509v3 Basic Constraints: 396s CA:FALSE 396s Netscape Cert Type: 396s SSL Client, S/MIME 396s Netscape Comment: 396s Test Organization Sub Intermediate CA trusted Certificate 396s X509v3 Subject Key Identifier: 396s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 396s X509v3 Key Usage: critical 396s Digital Signature, Non Repudiation, Key Encipherment 396s X509v3 Extended Key Usage: 396s TLS Web Client Authentication, E-mail Protection 396s X509v3 Subject Alternative Name: 396s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 396s Signature Algorithm: sha256WithRSAEncryption 396s Signature Value: 396s b2:b5:7d:73:7e:cf:3b:67:af:a5:7a:86:1f:e2:7e:81:0b:c7: 396s 5c:9f:de:0a:82:54:65:22:d3:70:f8:98:58:88:9a:71:78:06: 396s 54:9c:46:ad:ac:11:55:3a:ed:04:8e:a9:d3:58:77:68:f6:b1: 396s f9:b0:41:cf:59:c6:b4:4e:e8:ae:3d:66:c8:79:85:1a:50:3c: 396s 05:fa:eb:50:07:29:a1:1c:1f:b5:70:d5:09:3e:61:d4:0d:69: 396s a5:05:0a:8e:4c:be:64:22:f5:46:31:0b:32:38:1f:10:8e:f9: 396s c8:db:90:6f:57:62:54:17:34:c0:93:48:5f:ff:77:3a:bd:a4: 396s 4e:d3 396s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-23872-auth.pem 396s + found_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 396s + '[' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F '!=' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F ']' 396s + valid_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-sub-chain-CA.pem partial_chain 396s + check_certificate /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 /tmp/sssd-softhsm2-MkMiAn/test-intermediate-sub-chain-CA.pem partial_chain 396s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 396s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 396s + local key_ring=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-sub-chain-CA.pem 396s + local verify_option=partial_chain 396s + prepare_softhsm2_card /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-10927 396s + local certificate=/tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 396s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-10927 396s + local key_cn 396s + local key_name 396s + local tokens_dir 396s + local output_cert_file 396s + token_name= 396s ++ basename /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 396s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 396s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 396s ++ sed -n 's/ *commonName *= //p' 396s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 396s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 396s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 396s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 396s ++ basename /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 396s Test Organization Sub Int Token 396s + tokens_dir=/tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 396s + token_name='Test Organization Sub Int Token' 396s + '[' '!' -e /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 396s + '[' '!' -d /tmp/sssd-softhsm2-MkMiAn/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 396s + echo 'Test Organization Sub Int Token' 396s + '[' -n partial_chain ']' 396s + local verify_arg=--verify=partial_chain 396s + local output_base_name=SSSD-child-13097 396s + local output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097.output 396s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097.pem 396s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-sub-chain-CA.pem 396s [p11_child[2469]] [main] (0x0400): p11_child started. 396s [p11_child[2469]] [main] (0x2000): Running in [pre-auth] mode. 396s [p11_child[2469]] [main] (0x2000): Running with effective IDs: [0][0]. 396s [p11_child[2469]] [main] (0x2000): Running with real IDs [0][0]. 396s [p11_child[2469]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 396s [p11_child[2469]] [do_card] (0x4000): Module List: 396s [p11_child[2469]] [do_card] (0x4000): common name: [softhsm2]. 396s [p11_child[2469]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[2469]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 396s [p11_child[2469]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 396s [p11_child[2469]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[2469]] [do_card] (0x4000): Login NOT required. 396s [p11_child[2469]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 396s [p11_child[2469]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 396s [p11_child[2469]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 396s [p11_child[2469]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5a352286;slot-manufacturer=SoftHSM%20project;slot-id=1513431686;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=05786b375a352286;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 396s [p11_child[2469]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 396s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097.output 396s + echo '-----BEGIN CERTIFICATE-----' 396s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097.output 396s + echo '-----END CERTIFICATE-----' 396s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097.pem 396s Certificate: 396s Data: 396s Version: 3 (0x2) 396s Serial Number: 5 (0x5) 396s Signature Algorithm: sha256WithRSAEncryption 396s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 396s Validity 396s Not Before: Mar 16 00:31:39 2025 GMT 396s Not After : Mar 16 00:31:39 2026 GMT 396s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 396s Subject Public Key Info: 396s Public Key Algorithm: rsaEncryption 396s Public-Key: (1024 bit) 396s Modulus: 396s 00:c8:ca:c2:55:47:db:43:9e:a2:08:d0:62:17:69: 396s 82:c3:8c:47:6f:f6:30:e8:99:2a:0d:41:ea:e7:7d: 396s 3d:1b:08:87:ab:1e:4e:13:7d:71:e2:a0:b2:71:82: 396s ee:d0:27:3c:42:f7:31:05:b0:eb:e6:66:5e:88:37: 396s 03:27:45:8a:f0:f3:1c:c1:26:35:83:91:7f:df:2e: 396s 3d:98:67:da:47:6c:a0:35:c2:4b:e1:8d:8f:11:cf: 396s f3:d9:8c:34:49:4a:16:f3:ba:9d:8f:05:cf:3e:51: 396s 54:86:ca:d3:51:0d:12:e9:3b:ca:7d:df:0f:1e:4b: 396s 11:ca:3c:0b:f2:b4:91:72:3f 396s Exponent: 65537 (0x10001) 396s X509v3 extensions: 396s X509v3 Authority Key Identifier: 396s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 396s X509v3 Basic Constraints: 396s CA:FALSE 396s Netscape Cert Type: 396s SSL Client, S/MIME 396s Netscape Comment: 396s Test Organization Sub Intermediate CA trusted Certificate 396s X509v3 Subject Key Identifier: 396s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 396s X509v3 Key Usage: critical 396s Digital Signature, Non Repudiation, Key Encipherment 396s X509v3 Extended Key Usage: 396s TLS Web Client Authentication, E-mail Protection 396s X509v3 Subject Alternative Name: 396s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 396s Signature Algorithm: sha256WithRSAEncryption 396s Signature Value: 396s b2:b5:7d:73:7e:cf:3b:67:af:a5:7a:86:1f:e2:7e:81:0b:c7: 396s 5c:9f:de:0a:82:54:65:22:d3:70:f8:98:58:88:9a:71:78:06: 396s 54:9c:46:ad:ac:11:55:3a:ed:04:8e:a9:d3:58:77:68:f6:b1: 396s f9:b0:41:cf:59:c6:b4:4e:e8:ae:3d:66:c8:79:85:1a:50:3c: 396s 05:fa:eb:50:07:29:a1:1c:1f:b5:70:d5:09:3e:61:d4:0d:69: 396s a5:05:0a:8e:4c:be:64:22:f5:46:31:0b:32:38:1f:10:8e:f9: 396s c8:db:90:6f:57:62:54:17:34:c0:93:48:5f:ff:77:3a:bd:a4: 396s 4e:d3 396s + local found_md5 expected_md5 396s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/test-sub-intermediate-CA-trusted-certificate-0001.pem 396s + expected_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 396s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097.pem 396s + found_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 396s + '[' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F '!=' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F ']' 396s + output_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097-auth.output 396s ++ basename /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097-auth.output .output 396s + output_cert_file=/tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097-auth.pem 396s + echo -n 053350 396s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-MkMiAn/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 396s [p11_child[2477]] [main] (0x0400): p11_child started. 396s [p11_child[2477]] [main] (0x2000): Running in [auth] mode. 396s [p11_child[2477]] [main] (0x2000): Running with effective IDs: [0][0]. 396s [p11_child[2477]] [main] (0x2000): Running with real IDs [0][0]. 396s [p11_child[2477]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 396s [p11_child[2477]] [do_card] (0x4000): Module List: 396s [p11_child[2477]] [do_card] (0x4000): common name: [softhsm2]. 396s [p11_child[2477]] [do_card] (0x4000): dll name: [/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[2477]] [do_card] (0x4000): Description [SoftHSM slot ID 0x5a352286] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 396s [p11_child[2477]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 396s [p11_child[2477]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x5a352286][1513431686] of module [0][/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so]. 396s [p11_child[2477]] [do_card] (0x4000): Login required. 396s [p11_child[2477]] [do_card] (0x4000): Token flags [1069]. 396s [p11_child[2477]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 396s [p11_child[2477]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 396s [p11_child[2477]] [do_card] (0x4000): /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 396s [p11_child[2477]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x5a352286;slot-manufacturer=SoftHSM%20project;slot-id=1513431686;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=05786b375a352286;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 396s [p11_child[2477]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 396s [p11_child[2477]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 396s [p11_child[2477]] [do_card] (0x4000): Certificate verified and validated. 396s [p11_child[2477]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 396s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097-auth.output 396s + echo '-----BEGIN CERTIFICATE-----' 396s + tail -n1 /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097-auth.output 396s + echo '-----END CERTIFICATE-----' 396s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097-auth.pem 396s Certificate: 396s Data: 396s Version: 3 (0x2) 396s Serial Number: 5 (0x5) 396s Signature Algorithm: sha256WithRSAEncryption 396s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 396s Validity 396s Not Before: Mar 16 00:31:39 2025 GMT 396s Not After : Mar 16 00:31:39 2026 GMT 396s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 396s Subject Public Key Info: 396s Public Key Algorithm: rsaEncryption 396s Public-Key: (1024 bit) 396s Modulus: 396s 00:c8:ca:c2:55:47:db:43:9e:a2:08:d0:62:17:69: 396s 82:c3:8c:47:6f:f6:30:e8:99:2a:0d:41:ea:e7:7d: 396s 3d:1b:08:87:ab:1e:4e:13:7d:71:e2:a0:b2:71:82: 396s ee:d0:27:3c:42:f7:31:05:b0:eb:e6:66:5e:88:37: 396s 03:27:45:8a:f0:f3:1c:c1:26:35:83:91:7f:df:2e: 396s 3d:98:67:da:47:6c:a0:35:c2:4b:e1:8d:8f:11:cf: 396s f3:d9:8c:34:49:4a:16:f3:ba:9d:8f:05:cf:3e:51: 396s 54:86:ca:d3:51:0d:12:e9:3b:ca:7d:df:0f:1e:4b: 396s 11:ca:3c:0b:f2:b4:91:72:3f 396s Exponent: 65537 (0x10001) 396s X509v3 extensions: 396s X509v3 Authority Key Identifier: 396s 67:87:8B:BF:51:D8:9F:96:6C:A0:52:A5:07:51:B7:77:AA:61:41:15 396s X509v3 Basic Constraints: 396s CA:FALSE 396s Netscape Cert Type: 396s SSL Client, S/MIME 396s Netscape Comment: 396s Test Organization Sub Intermediate CA trusted Certificate 396s X509v3 Subject Key Identifier: 396s 3F:61:BB:B2:AF:72:64:73:06:04:06:88:71:6B:4E:6F:68:62:3F:F7 396s X509v3 Key Usage: critical 396s Digital Signature, Non Repudiation, Key Encipherment 396s X509v3 Extended Key Usage: 396s TLS Web Client Authentication, E-mail Protection 396s X509v3 Subject Alternative Name: 396s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 396s Signature Algorithm: sha256WithRSAEncryption 396s Signature Value: 396s b2:b5:7d:73:7e:cf:3b:67:af:a5:7a:86:1f:e2:7e:81:0b:c7: 396s 5c:9f:de:0a:82:54:65:22:d3:70:f8:98:58:88:9a:71:78:06: 396s 54:9c:46:ad:ac:11:55:3a:ed:04:8e:a9:d3:58:77:68:f6:b1: 396s f9:b0:41:cf:59:c6:b4:4e:e8:ae:3d:66:c8:79:85:1a:50:3c: 396s 05:fa:eb:50:07:29:a1:1c:1f:b5:70:d5:09:3e:61:d4:0d:69: 396s a5:05:0a:8e:4c:be:64:22:f5:46:31:0b:32:38:1f:10:8e:f9: 396s c8:db:90:6f:57:62:54:17:34:c0:93:48:5f:ff:77:3a:bd:a4: 396s 4e:d3 396s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-MkMiAn/SSSD-child-13097-auth.pem 396s + found_md5=Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F 396s + '[' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F '!=' Modulus=C8CAC25547DB439EA208D062176982C38C476FF630E8992A0D41EAE77D3D1B0887AB1E4E137D71E2A0B27182EED0273C42F73105B0EBE6665E88370327458AF0F31CC1263583917FDF2E3D9867DA476CA035C24BE18D8F11CFF3D98C34494A16F3BA9D8F05CF3E515486CAD3510D12E93BCA7DDF0F1E4B11CA3C0BF2B491723F ']' 396s + set +x 396s 396s Test completed, Root CA and intermediate issued certificates verified! 396s autopkgtest [00:31:42]: test sssd-softhism2-certificates-tests.sh: -----------------------] 396s autopkgtest [00:31:42]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 396s sssd-softhism2-certificates-tests.sh PASS 397s autopkgtest [00:31:43]: test sssd-smart-card-pam-auth-configs: preparing testbed 397s Reading package lists... 397s Building dependency tree... 397s Reading state information... 397s Starting pkgProblemResolver with broken count: 0 397s Starting 2 pkgProblemResolver with broken count: 0 397s Done 398s The following NEW packages will be installed: 398s pamtester 398s 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. 398s Need to get 12.7 kB of archives. 398s After this operation, 36.9 kB of additional disk space will be used. 398s Get:1 http://ftpmaster.internal/ubuntu plucky/universe amd64 pamtester amd64 0.1.2-4 [12.7 kB] 398s Fetched 12.7 kB in 0s (414 kB/s) 398s Selecting previously unselected package pamtester. 398s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 77553 files and directories currently installed.) 398s Preparing to unpack .../pamtester_0.1.2-4_amd64.deb ... 398s Unpacking pamtester (0.1.2-4) ... 398s Setting up pamtester (0.1.2-4) ... 398s Processing triggers for man-db (2.13.0-1) ... 399s autopkgtest [00:31:45]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 399s autopkgtest [00:31:45]: test sssd-smart-card-pam-auth-configs: [----------------------- 399s + '[' -z ubuntu ']' 399s + export DEBIAN_FRONTEND=noninteractive 399s + DEBIAN_FRONTEND=noninteractive 399s + required_tools=(pamtester softhsm2-util sssd) 399s + [[ ! -v OFFLINE_MODE ]] 399s + for cmd in "${required_tools[@]}" 399s + command -v pamtester 399s + for cmd in "${required_tools[@]}" 399s + command -v softhsm2-util 399s + for cmd in "${required_tools[@]}" 399s + command -v sssd 399s + PIN=123456 399s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 399s + tmpdir=/tmp/sssd-softhsm2-certs-sjMXuB 399s + backupsdir= 399s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 399s + declare -a restore_paths 399s + declare -a delete_paths 399s + trap handle_exit EXIT 399s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 399s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 399s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 399s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 399s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-sjMXuB GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 399s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-sjMXuB 399s + GENERATE_SMART_CARDS=1 399s + KEEP_TEMPORARY_FILES=1 399s + NO_SSSD_TESTS=1 399s + bash debian/tests/sssd-softhism2-certificates-tests.sh 399s + '[' -z ubuntu ']' 399s + required_tools=(p11tool openssl softhsm2-util) 399s + for cmd in "${required_tools[@]}" 399s + command -v p11tool 399s + for cmd in "${required_tools[@]}" 399s + command -v openssl 399s + for cmd in "${required_tools[@]}" 399s + command -v softhsm2-util 399s + PIN=123456 399s +++ find /usr/lib/softhsm/libsofthsm2.so 399s +++ head -n 1 399s ++ realpath /usr/lib/softhsm/libsofthsm2.so 399s + SOFTHSM2_MODULE=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so 399s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 399s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 399s + '[' '!' -v NO_SSSD_TESTS ']' 399s + '[' '!' -e /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ']' 399s + tmpdir=/tmp/sssd-softhsm2-certs-sjMXuB 399s + keys_size=1024 399s + [[ ! -v KEEP_TEMPORARY_FILES ]] 399s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 399s + echo -n 01 399s + touch /tmp/sssd-softhsm2-certs-sjMXuB/index.txt 399s + mkdir -p /tmp/sssd-softhsm2-certs-sjMXuB/new_certs 399s + cat 399s + root_ca_key_pass=pass:random-root-CA-password-9839 399s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-key.pem -passout pass:random-root-CA-password-9839 1024 399s + openssl req -passin pass:random-root-CA-password-9839 -batch -config /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.pem 399s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.pem 399s + cat 399s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-10081 399s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-10081 1024 399s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-10081 -config /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-9839 -sha256 -out /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-certificate-request.pem 399s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-certificate-request.pem 399s Certificate Request: 399s Data: 399s Version: 1 (0x0) 399s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 399s Subject Public Key Info: 399s Public Key Algorithm: rsaEncryption 399s Public-Key: (1024 bit) 399s Modulus: 399s 00:d4:d5:ef:7d:10:e3:87:5e:5b:db:bc:ba:54:54: 399s f6:7a:1f:27:3b:6b:e4:65:7f:16:54:f0:e2:ba:30: 399s f2:40:4f:d9:9e:ca:93:c2:52:ed:ab:8c:45:8e:02: 399s af:96:33:f2:66:66:71:3c:44:aa:26:2c:bd:e4:8a: 399s e9:95:61:3c:66:de:4e:59:8c:60:44:be:27:58:18: 399s 58:cd:fe:4b:46:bf:20:c7:24:14:74:b2:fd:b1:e3: 399s 5c:f5:96:8d:b4:77:b4:3c:74:65:c1:67:79:04:d1: 399s 97:42:7c:e5:2b:5b:a1:46:64:83:8e:2e:bb:3b:db: 399s f3:e5:68:04:63:94:2f:ae:5b 399s Exponent: 65537 (0x10001) 399s Attributes: 399s (none) 399s Requested Extensions: 399s Signature Algorithm: sha256WithRSAEncryption 399s Signature Value: 399s 1f:f7:05:1a:56:e5:fe:9c:2a:ed:c0:45:d7:67:fc:3e:5c:19: 399s a6:28:85:75:58:13:6e:c3:ac:9a:e2:a7:65:6d:03:af:2f:05: 399s 6c:c4:6b:80:5a:cb:f0:ce:9b:29:4e:33:1b:c2:24:7b:eb:47: 399s 4e:00:a4:72:bd:32:c8:36:3f:f1:c7:73:9c:cb:fa:47:ca:7a: 399s bf:f0:12:47:68:db:6b:80:c7:fa:d6:2a:40:af:f3:1f:d1:10: 399s 99:01:fd:fa:ea:01:54:ae:8e:fb:49:62:ba:d9:8b:65:b7:c7: 399s b2:98:c9:33:1c:8d:cd:e5:2b:58:9c:50:b8:96:10:a1:b2:f0: 399s e3:3a 399s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.config -passin pass:random-root-CA-password-9839 -keyfile /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem 399s Using configuration from /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.config 399s Check that the request matches the signature 399s Signature ok 399s Certificate Details: 399s Serial Number: 1 (0x1) 399s Validity 399s Not Before: Mar 16 00:31:45 2025 GMT 399s Not After : Mar 16 00:31:45 2026 GMT 399s Subject: 399s organizationName = Test Organization 399s organizationalUnitName = Test Organization Unit 399s commonName = Test Organization Intermediate CA 399s X509v3 extensions: 399s X509v3 Subject Key Identifier: 399s 38:6D:A3:AB:99:68:D5:E4:AE:69:67:B4:EA:4D:41:C0:F6:66:43:DC 399s X509v3 Authority Key Identifier: 399s keyid:F3:1F:BC:95:CC:02:B8:44:0F:99:FD:71:74:7D:8A:5E:85:67:A0:A7 399s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 399s serial:00 399s X509v3 Basic Constraints: 399s CA:TRUE 399s X509v3 Key Usage: critical 399s Digital Signature, Certificate Sign, CRL Sign 399s Certificate is to be certified until Mar 16 00:31:45 2026 GMT (365 days) 399s 399s Write out database with 1 new entries 399s Database updated 399s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem 399s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem 399s /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem: OK 399s + cat 399s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-28623 399s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-28623 1024 399s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-28623 -config /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-10081 -sha256 -out /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-certificate-request.pem 399s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-certificate-request.pem 399s Certificate Request: 399s Data: 399s Version: 1 (0x0) 399s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 399s Subject Public Key Info: 399s Public Key Algorithm: rsaEncryption 399s Public-Key: (1024 bit) 399s Modulus: 399s 00:ae:92:e0:f3:fe:0d:56:07:f5:fc:7c:60:f0:e6: 399s 00:f4:d5:81:bd:bc:fb:b7:6b:be:8f:e1:f2:62:54: 399s e6:89:50:b9:51:20:85:6a:ec:b6:4b:d2:b5:8f:51: 399s f3:75:cc:46:68:9e:7b:80:1e:aa:f2:c4:98:40:33: 399s 05:e9:f7:08:5d:6c:5e:ce:21:46:5f:87:f8:11:a9: 399s d6:8d:4f:9a:86:b0:1d:e2:71:16:f2:9b:b5:0f:ca: 399s 08:da:de:25:69:6f:5c:77:69:fe:26:64:77:4a:68: 399s 82:ac:06:77:a3:74:67:57:18:c6:fa:7d:70:5f:f8: 399s 34:f0:d7:d1:3a:73:21:d0:f5 399s Exponent: 65537 (0x10001) 399s Attributes: 399s (none) 399s Requested Extensions: 399s Signature Algorithm: sha256WithRSAEncryption 399s Signature Value: 399s 77:ec:fb:49:e3:cb:30:a6:dc:b4:85:57:17:2e:47:7e:19:03: 399s a1:6c:00:14:bf:69:da:1d:62:11:e2:b5:e4:54:b3:af:05:6a: 399s 0b:73:17:56:eb:69:05:ee:ac:ba:c5:f7:9d:62:9f:44:46:9b: 399s fd:7b:92:ad:fd:e7:f4:2b:6f:95:1f:7e:58:8e:11:80:91:3a: 399s 8a:7d:f7:bd:5f:81:bb:35:4a:8f:5b:49:b2:3a:2b:e8:2f:4f: 399s 36:43:9f:8a:de:d0:a0:7d:be:ec:18:58:73:03:24:5b:ca:af: 399s 28:7a:5e:b2:67:f4:8b:d3:e4:d7:e0:8e:f4:9e:a1:3d:70:e0: 399s 07:8b 399s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-10081 -keyfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem 399s Using configuration from /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.config 399s Check that the request matches the signature 399s Signature ok 399s Certificate Details: 399s Serial Number: 2 (0x2) 399s Validity 399s Not Before: Mar 16 00:31:45 2025 GMT 399s Not After : Mar 16 00:31:45 2026 GMT 399s Subject: 399s organizationName = Test Organization 399s organizationalUnitName = Test Organization Unit 399s commonName = Test Organization Sub Intermediate CA 399s X509v3 extensions: 399s X509v3 Subject Key Identifier: 399s 1F:2C:10:CE:EA:E6:3F:F4:F8:5C:6A:91:80:D1:3B:0A:17:02:AD:2C 399s X509v3 Authority Key Identifier: 399s keyid:38:6D:A3:AB:99:68:D5:E4:AE:69:67:B4:EA:4D:41:C0:F6:66:43:DC 399s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 399s serial:01 399s X509v3 Basic Constraints: 399s CA:TRUE 399s X509v3 Key Usage: critical 399s Digital Signature, Certificate Sign, CRL Sign 399s Certificate is to be certified until Mar 16 00:31:45 2026 GMT (365 days) 399s 399s Write out database with 1 new entries 399s Database updated 399s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem 399s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem 399s /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem: OK 399s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem 399s + local cmd=openssl 399s + shift 399s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem 399s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 399s error 20 at 0 depth lookup: unable to get local issuer certificate 399s error /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem: verification failed 399s + cat 399s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-2454 399s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-2454 1024 399s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-2454 -key /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-request.pem 399s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-request.pem 399s Certificate Request: 399s Data: 399s Version: 1 (0x0) 399s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 399s Subject Public Key Info: 399s Public Key Algorithm: rsaEncryption 399s Public-Key: (1024 bit) 399s Modulus: 399s 00:c9:22:63:be:3f:a5:a1:72:41:ff:05:b6:c3:ef: 399s fa:ea:60:66:3e:a8:d0:ed:3d:44:f2:1b:5c:d9:e1: 399s 0d:3f:75:37:27:3b:a2:20:b2:3c:fe:98:c1:e8:95: 399s 36:ff:dc:5c:7e:c6:e8:fc:43:a8:71:f3:e4:ee:57: 399s e9:85:d5:1c:f1:df:94:ad:e7:15:64:73:ea:eb:22: 399s 88:ef:4c:4e:ee:1a:b3:05:14:fc:58:00:c8:8d:f1: 399s 9b:70:d7:73:67:bb:da:f6:17:02:5c:0f:bd:f2:5c: 399s b2:dd:c9:fa:07:db:06:c6:49:9d:a9:97:61:c3:f8: 399s 4a:df:5d:ad:09:65:a5:e7:87 399s Exponent: 65537 (0x10001) 399s Attributes: 399s Requested Extensions: 399s X509v3 Basic Constraints: 399s CA:FALSE 399s Netscape Cert Type: 399s SSL Client, S/MIME 399s Netscape Comment: 399s Test Organization Root CA trusted Certificate 399s X509v3 Subject Key Identifier: 399s 0D:95:B4:FD:EC:CB:06:17:30:71:05:ED:B0:5E:FC:AB:C7:93:AC:09 399s X509v3 Key Usage: critical 399s Digital Signature, Non Repudiation, Key Encipherment 399s X509v3 Extended Key Usage: 399s TLS Web Client Authentication, E-mail Protection 399s X509v3 Subject Alternative Name: 399s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 399s Signature Algorithm: sha256WithRSAEncryption 399s Signature Value: 399s 0e:d0:20:83:2f:02:17:09:1a:3e:c3:f3:a2:49:1c:6e:78:0d: 399s 3b:e6:f2:4d:11:6a:36:91:c2:61:12:1a:17:4f:b0:79:aa:af: 399s 39:c0:0a:53:7a:8c:26:e0:62:83:b1:96:ce:a4:20:1c:b3:e8: 399s d3:54:7a:2d:28:c3:71:88:ff:ca:e0:4b:3f:6e:db:e9:18:fb: 399s 7e:55:e8:14:5f:3d:0f:a8:31:ce:b3:24:45:d6:7a:34:a8:79: 399s 16:ae:fd:7e:e0:c3:9b:11:d4:db:b7:07:3e:a2:ea:c6:be:01: 399s 67:e3:c0:ad:f9:45:e2:5b:7a:18:53:2e:b3:1d:f1:b4:ba:e0: 399s 38:1f 399s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.config -passin pass:random-root-CA-password-9839 -keyfile /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem 399s Using configuration from /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.config 399s Check that the request matches the signature 399s Signature ok 399s Certificate Details: 399s Serial Number: 3 (0x3) 399s Validity 399s Not Before: Mar 16 00:31:45 2025 GMT 399s Not After : Mar 16 00:31:45 2026 GMT 399s Subject: 399s organizationName = Test Organization 399s organizationalUnitName = Test Organization Unit 399s commonName = Test Organization Root Trusted Certificate 0001 399s X509v3 extensions: 399s X509v3 Authority Key Identifier: 399s F3:1F:BC:95:CC:02:B8:44:0F:99:FD:71:74:7D:8A:5E:85:67:A0:A7 399s X509v3 Basic Constraints: 399s CA:FALSE 399s Netscape Cert Type: 399s SSL Client, S/MIME 399s Netscape Comment: 399s Test Organization Root CA trusted Certificate 399s X509v3 Subject Key Identifier: 399s 0D:95:B4:FD:EC:CB:06:17:30:71:05:ED:B0:5E:FC:AB:C7:93:AC:09 399s X509v3 Key Usage: critical 399s Digital Signature, Non Repudiation, Key Encipherment 399s X509v3 Extended Key Usage: 399s TLS Web Client Authentication, E-mail Protection 399s X509v3 Subject Alternative Name: 399s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 399s Certificate is to be certified until Mar 16 00:31:45 2026 GMT (365 days) 399s 399s Write out database with 1 new entries 399s Database updated 399s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem 399s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem 399s /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem: OK 399s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem 399s + local cmd=openssl 399s + shift 399s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem 399s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 399s error 20 at 0 depth lookup: unable to get local issuer certificate 399s error /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem: verification failed 399s + cat 399s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-10645 399s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-10645 1024 399s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-10645 -key /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-request.pem 399s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-request.pem 399s Certificate Request: 399s Data: 399s Version: 1 (0x0) 399s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 399s Subject Public Key Info: 399s Public Key Algorithm: rsaEncryption 399s Public-Key: (1024 bit) 399s Modulus: 399s 00:b2:41:10:d9:2c:c3:1d:ae:d3:c9:fe:81:1c:63: 399s b6:e2:b9:2d:11:d1:20:bf:ef:78:e9:11:5a:48:88: 399s 00:ca:d6:a3:b4:d5:05:03:0e:20:80:bb:9c:db:f4: 399s 0b:93:f5:c2:00:8b:de:1d:d5:0b:bf:a0:f2:ae:f9: 399s 81:b4:de:c5:cd:18:07:03:cd:4e:0c:68:58:22:d0: 399s 1c:8f:02:19:eb:77:05:85:10:de:54:73:4b:3b:e4: 399s c9:20:52:a1:00:16:d8:46:71:55:84:86:34:f9:35: 399s 07:31:0b:c0:c7:16:75:0d:6c:d6:19:42:b3:77:88: 399s 0a:eb:9a:61:e5:62:73:db:69 399s Exponent: 65537 (0x10001) 399s Attributes: 399s Requested Extensions: 399s X509v3 Basic Constraints: 399s CA:FALSE 399s Netscape Cert Type: 399s SSL Client, S/MIME 399s Netscape Comment: 399s Test Organization Intermediate CA trusted Certificate 399s X509v3 Subject Key Identifier: 399s 6B:BE:4E:B7:86:06:BF:44:4C:22:3B:1E:1E:08:74:F9:F5:4F:0D:80 399s X509v3 Key Usage: critical 399s Digital Signature, Non Repudiation, Key Encipherment 399s X509v3 Extended Key Usage: 399s TLS Web Client Authentication, E-mail Protection 399s X509v3 Subject Alternative Name: 399s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 399s Signature Algorithm: sha256WithRSAEncryption 399s Signature Value: 399s ae:4a:b7:e1:7c:69:eb:92:3a:b6:0a:c7:00:83:ff:80:80:c8: 399s 93:5d:79:c6:9f:8a:67:2f:23:cf:3d:7a:31:d6:3e:7a:7d:d2: 399s a2:4c:da:b9:2a:db:b3:9c:4c:aa:bc:f5:b5:c2:97:56:1d:fb: 399s 37:76:38:e5:c5:b7:8d:67:df:4c:42:29:85:d1:4e:6a:f9:d1: 399s 59:1c:73:33:f0:21:d8:f9:eb:0e:c7:1a:5b:d6:55:7c:a3:30: 399s 92:4d:ac:f2:0f:37:b5:cd:10:82:84:a4:19:86:76:61:d8:da: 399s 58:27:1a:2c:6b:e8:42:06:04:0c:78:be:6b:36:92:6c:1c:f4: 399s e9:85 399s + openssl ca -passin pass:random-intermediate-CA-password-10081 -config /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem 399s Using configuration from /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.config 399s Check that the request matches the signature 399s Signature ok 399s Certificate Details: 399s Serial Number: 4 (0x4) 399s Validity 399s Not Before: Mar 16 00:31:45 2025 GMT 399s Not After : Mar 16 00:31:45 2026 GMT 399s Subject: 399s organizationName = Test Organization 399s organizationalUnitName = Test Organization Unit 399s commonName = Test Organization Intermediate Trusted Certificate 0001 399s X509v3 extensions: 399s X509v3 Authority Key Identifier: 399s 38:6D:A3:AB:99:68:D5:E4:AE:69:67:B4:EA:4D:41:C0:F6:66:43:DC 399s X509v3 Basic Constraints: 399s CA:FALSE 399s Netscape Cert Type: 399s SSL Client, S/MIME 399s Netscape Comment: 399s Test Organization Intermediate CA trusted Certificate 399s X509v3 Subject Key Identifier: 399s 6B:BE:4E:B7:86:06:BF:44:4C:22:3B:1E:1E:08:74:F9:F5:4F:0D:80 399s X509v3 Key Usage: critical 399s Digital Signature, Non Repudiation, Key Encipherment 399s X509v3 Extended Key Usage: 399s TLS Web Client Authentication, E-mail Protection 399s X509v3 Subject Alternative Name: 399s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 399s Certificate is to be certified until Mar 16 00:31:45 2026 GMT (365 days) 399s 399s Write out database with 1 new entries 399s Database updated 399s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem 399s This certificate should not be trusted fully 399s + echo 'This certificate should not be trusted fully' 399s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem 399s + local cmd=openssl 399s + shift 399s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem 399s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 399s error 2 at 1 depth lookup: unable to get issuer certificate 399s error /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 399s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem 399s /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem: OK 399s + cat 399s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-31347 399s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-31347 1024 399s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-31347 -key /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 399s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 399s Certificate Request: 399s Data: 399s Version: 1 (0x0) 399s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 399s Subject Public Key Info: 399s Public Key Algorithm: rsaEncryption 399s Public-Key: (1024 bit) 399s Modulus: 399s 00:ba:1a:72:e8:35:c7:70:50:de:02:80:0b:ef:98: 399s b1:2f:58:19:6c:f0:a4:a7:c8:46:c9:04:a6:2f:20: 399s 32:43:d1:08:12:4f:23:95:61:c8:85:12:83:9f:23: 399s 60:3b:13:67:24:d0:c6:b0:68:dd:82:e8:3e:46:00: 399s 5b:e2:3b:08:94:05:d7:66:08:e1:2f:e7:f9:b5:ba: 399s 99:1a:77:c8:6b:10:85:05:fe:16:65:60:7e:9a:b0: 399s 3f:64:e0:da:db:9b:7d:c0:2d:6c:64:9e:3b:58:d2: 399s 7f:84:6b:bc:d3:80:a6:2c:07:d5:04:37:4e:28:1f: 399s 0f:18:3f:7a:89:ee:c5:9a:37 399s Exponent: 65537 (0x10001) 399s Attributes: 399s Requested Extensions: 399s X509v3 Basic Constraints: 399s CA:FALSE 399s Netscape Cert Type: 399s SSL Client, S/MIME 399s Netscape Comment: 399s Test Organization Sub Intermediate CA trusted Certificate 399s X509v3 Subject Key Identifier: 399s 8E:7D:29:03:41:3C:0F:D5:F6:A9:88:56:D8:5A:3C:70:D2:DB:D3:6F 399s X509v3 Key Usage: critical 399s Digital Signature, Non Repudiation, Key Encipherment 399s X509v3 Extended Key Usage: 399s TLS Web Client Authentication, E-mail Protection 399s X509v3 Subject Alternative Name: 399s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 399s Signature Algorithm: sha256WithRSAEncryption 399s Signature Value: 399s 79:fc:67:e8:57:58:87:a6:9c:0f:a8:12:0c:cf:74:cc:99:cf: 399s a9:2c:b7:73:a9:a9:6c:fd:a2:ad:f2:74:d1:1d:b0:a5:33:ba: 399s 07:ec:c8:2f:d1:2a:e9:9e:d9:22:a5:0c:4f:e4:e4:07:bc:95: 399s 14:9a:0b:16:65:d4:1b:f1:79:13:d0:31:03:a0:f5:2c:72:32: 399s 5c:aa:28:9d:45:5f:fe:a1:3b:0e:6e:8a:1f:d5:8a:d1:27:5a: 399s 31:b3:43:b7:f5:ad:65:7c:82:4e:de:a0:67:78:f2:23:02:e8: 399s 9d:8a:27:7c:f4:66:51:56:03:c5:6f:de:11:16:d3:2f:42:51: 399s 7c:74 399s + openssl ca -passin pass:random-sub-intermediate-CA-password-28623 -config /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 399s Using configuration from /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.config 399s Check that the request matches the signature 399s Signature ok 399s Certificate Details: 399s Serial Number: 5 (0x5) 399s Validity 399s Not Before: Mar 16 00:31:45 2025 GMT 399s Not After : Mar 16 00:31:45 2026 GMT 399s Subject: 399s organizationName = Test Organization 399s organizationalUnitName = Test Organization Unit 399s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 399s X509v3 extensions: 399s X509v3 Authority Key Identifier: 399s 1F:2C:10:CE:EA:E6:3F:F4:F8:5C:6A:91:80:D1:3B:0A:17:02:AD:2C 399s X509v3 Basic Constraints: 399s CA:FALSE 399s Netscape Cert Type: 399s SSL Client, S/MIME 399s Netscape Comment: 399s Test Organization Sub Intermediate CA trusted Certificate 399s X509v3 Subject Key Identifier: 399s 8E:7D:29:03:41:3C:0F:D5:F6:A9:88:56:D8:5A:3C:70:D2:DB:D3:6F 399s X509v3 Key Usage: critical 399s Digital Signature, Non Repudiation, Key Encipherment 399s X509v3 Extended Key Usage: 399s TLS Web Client Authentication, E-mail Protection 399s X509v3 Subject Alternative Name: 399s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 399s Certificate is to be certified until Mar 16 00:31:45 2026 GMT (365 days) 399s 399s Write out database with 1 new entries 399s Database updated 399s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s This certificate should not be trusted fully 400s + echo 'This certificate should not be trusted fully' 400s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s + local cmd=openssl 400s + shift 400s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 400s error 2 at 1 depth lookup: unable to get issuer certificate 400s error /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 400s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s + local cmd=openssl 400s + shift 400s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 400s error 20 at 0 depth lookup: unable to get local issuer certificate 400s error /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 400s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 400s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s + local cmd=openssl 400s + shift 400s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 400s error 20 at 0 depth lookup: unable to get local issuer certificate 400s error /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 400s Building a the full-chain CA file... 400s + echo 'Building a the full-chain CA file...' 400s + cat /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem 400s + cat /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem 400s + cat /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem 400s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem 400s + openssl pkcs7 -print_certs -noout 400s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 400s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 400s 400s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 400s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 400s 400s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 400s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 400s 400s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem 400s /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA.pem: OK 400s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem 400s /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem: OK 400s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem 400s /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem: OK 400s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-root-intermediate-chain-CA.pem 400s /tmp/sssd-softhsm2-certs-sjMXuB/test-root-intermediate-chain-CA.pem: OK 400s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 400s Certificates generation completed! 400s + echo 'Certificates generation completed!' 400s + [[ -v NO_SSSD_TESTS ]] 400s + [[ -v GENERATE_SMART_CARDS ]] 400s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-2454 400s + local certificate=/tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem 400s + local key_pass=pass:random-root-ca-trusted-cert-0001-2454 400s + local key_cn 400s + local key_name 400s + local tokens_dir 400s + local output_cert_file 400s + token_name= 400s ++ basename /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem .pem 400s + key_name=test-root-CA-trusted-certificate-0001 400s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem 400s ++ sed -n 's/ *commonName *= //p' 400s + key_cn='Test Organization Root Trusted Certificate 0001' 400s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 400s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001.conf 400s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001.conf 400s ++ basename /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 400s + tokens_dir=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001 400s + token_name='Test Organization Root Tr Token' 400s + '[' '!' -e /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 400s + local key_file 400s + local decrypted_key 400s + mkdir -p /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001 400s + key_file=/tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-key.pem 400s + decrypted_key=/tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-key-decrypted.pem 400s + cat 400s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 400s Slot 0 has a free/uninitialized token. 400s The token has been initialized and is reassigned to slot 576207376 400s + softhsm2-util --show-slots 400s Available slots: 400s Slot 576207376 400s Slot info: 400s Description: SoftHSM slot ID 0x22583a10 400s Manufacturer ID: SoftHSM project 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Token present: yes 400s Token info: 400s Manufacturer ID: SoftHSM project 400s Model: SoftHSM v2 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Serial number: 1464ba9b22583a10 400s Initialized: yes 400s User PIN init.: yes 400s Label: Test Organization Root Tr Token 400s Slot 1 400s Slot info: 400s Description: SoftHSM slot ID 0x1 400s Manufacturer ID: SoftHSM project 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Token present: yes 400s Token info: 400s Manufacturer ID: SoftHSM project 400s Model: SoftHSM v2 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Serial number: 400s Initialized: no 400s User PIN init.: no 400s Label: 400s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 400s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-2454 -in /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-key-decrypted.pem 400s writing RSA key 400s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 400s + rm /tmp/sssd-softhsm2-certs-sjMXuB/test-root-CA-trusted-certificate-0001-key-decrypted.pem 400s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 400s Object 0: 400s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=1464ba9b22583a10;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 400s Type: X.509 Certificate (RSA-1024) 400s Expires: Mon Mar 16 00:31:45 2026 400s Label: Test Organization Root Trusted Certificate 0001 400s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 400s 400s Test Organization Root Tr Token 400s + echo 'Test Organization Root Tr Token' 400s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-10645 400s + local certificate=/tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem 400s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-10645 400s + local key_cn 400s + local key_name 400s + local tokens_dir 400s + local output_cert_file 400s + token_name= 400s ++ basename /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem .pem 400s + key_name=test-intermediate-CA-trusted-certificate-0001 400s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem 400s ++ sed -n 's/ *commonName *= //p' 400s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 400s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 400s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 400s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 400s ++ basename /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 400s + tokens_dir=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-intermediate-CA-trusted-certificate-0001 400s + token_name='Test Organization Interme Token' 400s + '[' '!' -e /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 400s + local key_file 400s + local decrypted_key 400s + mkdir -p /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-intermediate-CA-trusted-certificate-0001 400s + key_file=/tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-key.pem 400s + decrypted_key=/tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 400s + cat 400s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 400s Slot 0 has a free/uninitialized token. 400s The token has been initialized and is reassigned to slot 656697790 400s + softhsm2-util --show-slots 400s Available slots: 400s Slot 656697790 400s Slot info: 400s Description: SoftHSM slot ID 0x272469be 400s Manufacturer ID: SoftHSM project 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Token present: yes 400s Token info: 400s Manufacturer ID: SoftHSM project 400s Model: SoftHSM v2 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Serial number: 28a414cba72469be 400s Initialized: yes 400s User PIN init.: yes 400s Label: Test Organization Interme Token 400s Slot 1 400s Slot info: 400s Description: SoftHSM slot ID 0x1 400s Manufacturer ID: SoftHSM project 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Token present: yes 400s Token info: 400s Manufacturer ID: SoftHSM project 400s Model: SoftHSM v2 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Serial number: 400s Initialized: no 400s User PIN init.: no 400s Label: 400s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 400s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-10645 -in /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 400s writing RSA key 400s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 400s + rm /tmp/sssd-softhsm2-certs-sjMXuB/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 400s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 400s Object 0: 400s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=28a414cba72469be;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 400s Type: X.509 Certificate (RSA-1024) 400s Expires: Mon Mar 16 00:31:45 2026 400s Label: Test Organization Intermediate Trusted Certificate 0001 400s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 400s 400s Test Organization Interme Token 400s + echo 'Test Organization Interme Token' 400s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-31347 400s + local certificate=/tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-31347 400s + local key_cn 400s + local key_name 400s + local tokens_dir 400s + local output_cert_file 400s + token_name= 400s ++ basename /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 400s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 400s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem 400s ++ sed -n 's/ *commonName *= //p' 400s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 400s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 400s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 400s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 400s ++ basename /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 400s + tokens_dir=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 400s + token_name='Test Organization Sub Int Token' 400s + '[' '!' -e /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 400s + local key_file 400s + local decrypted_key 400s + mkdir -p /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 400s + key_file=/tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 400s + decrypted_key=/tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 400s + cat 400s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 400s Slot 0 has a free/uninitialized token. 400s The token has been initialized and is reassigned to slot 1830195860 400s + softhsm2-util --show-slots 400s Available slots: 400s Slot 1830195860 400s Slot info: 400s Description: SoftHSM slot ID 0x6d169294 400s Manufacturer ID: SoftHSM project 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Token present: yes 400s Token info: 400s Manufacturer ID: SoftHSM project 400s Model: SoftHSM v2 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Serial number: e4d8bad2ed169294 400s Initialized: yes 400s User PIN init.: yes 400s Label: Test Organization Sub Int Token 400s Slot 1 400s Slot info: 400s Description: SoftHSM slot ID 0x1 400s Manufacturer ID: SoftHSM project 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Token present: yes 400s Token info: 400s Manufacturer ID: SoftHSM project 400s Model: SoftHSM v2 400s Hardware version: 2.6 400s Firmware version: 2.6 400s Serial number: 400s Initialized: no 400s User PIN init.: no 400s Label: 400s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 400s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-31347 -in /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 400s writing RSA key 400s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 400s + rm /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 400s + p11tool --provider=/usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so --list-all 400s Object 0: 400s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e4d8bad2ed169294;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 400s Type: X.509 Certificate (RSA-1024) 400s Expires: Mon Mar 16 00:31:45 2026 400s Label: Test Organization Sub Intermediate Trusted Certificate 0001 400s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 400s 400s Test Organization Sub Int Token 400s Certificates generation completed! 400s + echo 'Test Organization Sub Int Token' 400s + echo 'Certificates generation completed!' 400s + exit 0 400s + find /tmp/sssd-softhsm2-certs-sjMXuB -type d -exec chmod 777 '{}' ';' 400s + find /tmp/sssd-softhsm2-certs-sjMXuB -type f -exec chmod 666 '{}' ';' 400s + backup_file /etc/sssd/sssd.conf 400s + '[' -z '' ']' 400s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 400s + backupsdir=/tmp/sssd-softhsm2-backups-2DalJC 400s + '[' -e /etc/sssd/sssd.conf ']' 400s + delete_paths+=("$1") 400s + rm -f /etc/sssd/sssd.conf 400s ++ runuser -u ubuntu -- sh -c 'echo ~' 400s + user_home=/home/ubuntu 400s + mkdir -p /home/ubuntu 400s + chown ubuntu:ubuntu /home/ubuntu 400s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 400s + user_config=/home/ubuntu/.config 400s + system_config=/etc 400s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 400s + for path_pair in "${softhsm2_conf_paths[@]}" 400s + IFS=: 400s + read -r -a path 400s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 400s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 400s + '[' -z /tmp/sssd-softhsm2-backups-2DalJC ']' 400s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 400s + delete_paths+=("$1") 400s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 400s + for path_pair in "${softhsm2_conf_paths[@]}" 400s + IFS=: 400s + read -r -a path 400s + path=/etc/softhsm/softhsm2.conf 400s + backup_file /etc/softhsm/softhsm2.conf 400s + '[' -z /tmp/sssd-softhsm2-backups-2DalJC ']' 400s + '[' -e /etc/softhsm/softhsm2.conf ']' 400s ++ dirname /etc/softhsm/softhsm2.conf 400s + local back_dir=/tmp/sssd-softhsm2-backups-2DalJC//etc/softhsm 400s ++ basename /etc/softhsm/softhsm2.conf 400s + local back_path=/tmp/sssd-softhsm2-backups-2DalJC//etc/softhsm/softhsm2.conf 400s + '[' '!' -e /tmp/sssd-softhsm2-backups-2DalJC//etc/softhsm/softhsm2.conf ']' 400s + mkdir -p /tmp/sssd-softhsm2-backups-2DalJC//etc/softhsm 400s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-2DalJC//etc/softhsm/softhsm2.conf 400s + restore_paths+=("$back_path") 400s + rm -f /etc/softhsm/softhsm2.conf 400s Using CA DB '/tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem' with verification options: '' 400s + test_authentication login /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem 400s + pam_service=login 400s + certificate_config=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001.conf 400s + ca_db=/tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem 400s + verification_options= 400s + mkdir -p -m 700 /etc/sssd 400s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 400s + cat 400s + chmod 600 /etc/sssd/sssd.conf 400s + for path_pair in "${softhsm2_conf_paths[@]}" 400s + IFS=: 400s + read -r -a path 400s + user=ubuntu 400s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 400s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 400s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 400s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 400s + runuser -u ubuntu -- softhsm2-util --show-slots 400s + grep 'Test Organization' 400s Label: Test Organization Root Tr Token 400s + for path_pair in "${softhsm2_conf_paths[@]}" 400s + IFS=: 400s + read -r -a path 400s + user=root 400s + path=/etc/softhsm/softhsm2.conf 400s ++ dirname /etc/softhsm/softhsm2.conf 400s + runuser -u root -- mkdir -p /etc/softhsm 400s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 400s + runuser -u root -- softhsm2-util --show-slots 400s + grep 'Test Organization' 400s Label: Test Organization Root Tr Token 400s + systemctl restart sssd 400s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 401s + for alternative in "${alternative_pam_configs[@]}" 401s + pam-auth-update --enable sss-smart-card-optional 401s + cat /etc/pam.d/common-auth 401s # 401s # /etc/pam.d/common-auth - authentication settings common to all services 401s # 401s # This file is included from other service-specific PAM config files, 401s # and should contain a list of the authentication modules that define 401s # the central authentication scheme for use on the system 401s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 401s # traditional Unix authentication mechanisms. 401s # 401s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 401s # To take advantage of this, it is recommended that you configure any 401s # local modules either before or after the default block, and use 401s # pam-auth-update to manage selection of other modules. See 401s # pam-auth-update(8) for details. 401s 401s # here are the per-package modules (the "Primary" block) 401s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 401s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 401s auth [success=1 default=ignore] pam_sss.so use_first_pass 401s # here's the fallback if no module succeeds 401s auth requisite pam_deny.so 401s # prime the stack with a positive return value if there isn't one already; 401s # this avoids us returning an error just because nothing sets a success code 401s # since the modules above will each just jump around 401s auth required pam_permit.so 401s # and here are more per-package modules (the "Additional" block) 401s auth optional pam_cap.so 401s # end of pam-auth-update config 401s + echo -n -e 123456 401s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 401s pamtester: invoking pam_start(login, ubuntu, ...) 401s pamtester: performing operation - authenticate 401s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 401s + echo -n -e 123456 401s + runuser -u ubuntu -- pamtester -v login '' authenticate 401s pamtester: invoking pam_start(login, , ...) 401s pamtester: performing operation - authenticate 401s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 401s + echo -n -e wrong123456 401s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 401s pamtester: invoking pam_start(login, ubuntu, ...) 401s pamtester: performing operation - authenticate 404s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 404s + echo -n -e wrong123456 404s + runuser -u ubuntu -- pamtester -v login '' authenticate 404s pamtester: invoking pam_start(login, , ...) 404s pamtester: performing operation - authenticate 407s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 407s + echo -n -e 123456 407s + pamtester -v login root authenticate 407s pamtester: invoking pam_start(login, root, ...) 407s pamtester: performing operation - authenticate 410s Password: pamtester: Authentication failure 410s + for alternative in "${alternative_pam_configs[@]}" 410s + pam-auth-update --enable sss-smart-card-required 410s PAM configuration 410s ----------------- 410s 410s Incompatible PAM profiles selected. 410s 410s The following PAM profiles cannot be used together: 410s 410s SSS required smart card authentication, SSS optional smart card 410s authentication 410s 410s Please select a different set of modules to enable. 410s 410s + cat /etc/pam.d/common-auth 410s # 410s # /etc/pam.d/common-auth - authentication settings common to all services 410s # 410s # This file is included from other service-specific PAM config files, 410s # and should contain a list of the authentication modules that define 410s # the central authentication scheme for use on the system 410s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 410s # traditional Unix authentication mechanisms. 410s # 410s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 410s # To take advantage of this, it is recommended that you configure any 410s # local modules either before or after the default block, and use 410s # pam-auth-update to manage selection of other modules. See 410s # pam-auth-update(8) for details. 410s 410s # here are the per-package modules (the "Primary" block) 410s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 410s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 410s auth [success=1 default=ignore] pam_sss.so use_first_pass 410s # here's the fallback if no module succeeds 410s auth requisite pam_deny.so 410s # prime the stack with a positive return value if there isn't one already; 410s # this avoids us returning an error just because nothing sets a success code 410s # since the modules above will each just jump around 410s auth required pam_permit.so 410s # and here are more per-package modules (the "Additional" block) 410s auth optional pam_cap.so 410s # end of pam-auth-update config 410s + echo -n -e 123456 410s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 410s pamtester: invoking pam_start(login, ubuntu, ...) 410s pamtester: performing operation - authenticate 410s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 410s + echo -n -e 123456 410s + runuser -u ubuntu -- pamtester -v login '' authenticate 410s pamtester: invoking pam_start(login, , ...) 410s pamtester: performing operation - authenticate 410s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 410s + echo -n -e wrong123456 410s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 410s pamtester: invoking pam_start(login, ubuntu, ...) 410s pamtester: performing operation - authenticate 413s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 413s + echo -n -e wrong123456 413s + runuser -u ubuntu -- pamtester -v login '' authenticate 413s pamtester: invoking pam_start(login, , ...) 413s pamtester: performing operation - authenticate 416s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 416s + echo -n -e 123456 416s + pamtester -v login root authenticate 416s pamtester: invoking pam_start(login, root, ...) 416s pamtester: performing operation - authenticate 420s pamtester: Authentication service cannot retrieve authentication info 420s + test_authentication login /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem 420s + pam_service=login 420s + certificate_config=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 420s + ca_db=/tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem 420s + verification_options= 420s + mkdir -p -m 700 /etc/sssd 420s Using CA DB '/tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem' with verification options: '' 420s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-sjMXuB/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 420s + cat 420s + chmod 600 /etc/sssd/sssd.conf 420s + for path_pair in "${softhsm2_conf_paths[@]}" 420s + IFS=: 420s + read -r -a path 420s + user=ubuntu 420s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 420s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 420s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 420s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 420s + runuser -u ubuntu -- softhsm2-util --show-slots 420s + grep 'Test Organization' 420s Label: Test Organization Sub Int Token 420s + for path_pair in "${softhsm2_conf_paths[@]}" 420s + IFS=: 420s + read -r -a path 420s + user=root 420s + path=/etc/softhsm/softhsm2.conf 420s ++ dirname /etc/softhsm/softhsm2.conf 420s + runuser -u root -- mkdir -p /etc/softhsm 420s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 420s + runuser -u root -- softhsm2-util --show-slots 420s + grep 'Test Organization' 420s Label: Test Organization Sub Int Token 420s + systemctl restart sssd 420s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 420s + for alternative in "${alternative_pam_configs[@]}" 420s + pam-auth-update --enable sss-smart-card-optional 420s + cat /etc/pam.d/common-auth 420s # 420s # /etc/pam.d/common-auth - authentication settings common to all services 420s # 420s # This file is included from other service-specific PAM config files, 420s # and should contain a list of the authentication modules that define 420s # the central authentication scheme for use on the system 420s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 420s # traditional Unix authentication mechanisms. 420s # 420s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 420s # To take advantage of this, it is recommended that you configure any 420s # local modules either before or after the default block, and use 420s # pam-auth-update to manage selection of other modules. See 420s # pam-auth-update(8) for details. 420s 420s # here are the per-package modules (the "Primary" block) 420s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 420s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 420s auth [success=1 default=ignore] pam_sss.so use_first_pass 420s # here's the fallback if no module succeeds 420s auth requisite pam_deny.so 420s # prime the stack with a positive return value if there isn't one already; 420s # this avoids us returning an error just because nothing sets a success code 420s # since the modules above will each just jump around 420s auth required pam_permit.so 420s # and here are more per-package modules (the "Additional" block) 420s auth optional pam_cap.so 420s # end of pam-auth-update config 420s + echo -n -e 123456 420s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 420s pamtester: invoking pam_start(login, ubuntu, ...) 420s pamtester: performing operation - authenticate 420s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 420s + echo -n -e 123456 420s + runuser -u ubuntu -- pamtester -v login '' authenticate 420s pamtester: invoking pam_start(login, , ...) 420s pamtester: performing operation - authenticate 421s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 421s + echo -n -e wrong123456 421s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 421s pamtester: invoking pam_start(login, ubuntu, ...) 421s pamtester: performing operation - authenticate 423s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 423s + echo -n -e wrong123456 423s + runuser -u ubuntu -- pamtester -v login '' authenticate 424s pamtester: invoking pam_start(login, , ...) 424s pamtester: performing operation - authenticate 427s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 427s + echo -n -e 123456 427s + pamtester -v login root authenticate 427s pamtester: invoking pam_start(login, root, ...) 427s pamtester: performing operation - authenticate 431s Password: pamtester: Authentication failure 431s + for alternative in "${alternative_pam_configs[@]}" 431s + pam-auth-update --enable sss-smart-card-required 431s PAM configuration 431s ----------------- 431s 431s Incompatible PAM profiles selected. 431s 431s The following PAM profiles cannot be used together: 431s 431s SSS required smart card authentication, SSS optional smart card 431s authentication 431s 431s Please select a different set of modules to enable. 431s 431s + cat /etc/pam.d/common-auth 431s + echo -n -e 123456 431s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 431s # 431s # /etc/pam.d/common-auth - authentication settings common to all services 431s # 431s # This file is included from other service-specific PAM config files, 431s # and should contain a list of the authentication modules that define 431s # the central authentication scheme for use on the system 431s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 431s # traditional Unix authentication mechanisms. 431s # 431s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 431s # To take advantage of this, it is recommended that you configure any 431s # local modules either before or after the default block, and use 431s # pam-auth-update to manage selection of other modules. See 431s # pam-auth-update(8) for details. 431s 431s # here are the per-package modules (the "Primary" block) 431s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 431s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 431s auth [success=1 default=ignore] pam_sss.so use_first_pass 431s # here's the fallback if no module succeeds 431s auth requisite pam_deny.so 431s # prime the stack with a positive return value if there isn't one already; 431s # this avoids us returning an error just because nothing sets a success code 431s # since the modules above will each just jump around 431s auth required pam_permit.so 431s # and here are more per-package modules (the "Additional" block) 431s auth optional pam_cap.so 431s # end of pam-auth-update config 431s pamtester: invoking pam_start(login, ubuntu, ...) 431s pamtester: performing operation - authenticate 431s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 431s + echo -n -e 123456 431s + runuser -u ubuntu -- pamtester -v login '' authenticate 431s pamtester: invoking pam_start(login, , ...) 431s pamtester: performing operation - authenticate 431s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 431s + echo -n -e wrong123456 431s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 431s pamtester: invoking pam_start(login, ubuntu, ...) 431s pamtester: performing operation - authenticate 434s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 434s + echo -n -e wrong123456 434s + runuser -u ubuntu -- pamtester -v login '' authenticate 434s pamtester: invoking pam_start(login, , ...) 434s pamtester: performing operation - authenticate 438s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 438s + echo -n -e 123456 438s + pamtester -v login root authenticate 438s pamtester: invoking pam_start(login, root, ...) 438s pamtester: performing operation - authenticate 441s pamtester: Authentication service cannot retrieve authentication info 441s + test_authentication login /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem partial_chain 441s + pam_service=login 441s + certificate_config=/tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 441s + ca_db=/tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem 441s + verification_options=partial_chain 441s + mkdir -p -m 700 /etc/sssd 441s Using CA DB '/tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 441s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-sjMXuB/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 441s + cat 441s + chmod 600 /etc/sssd/sssd.conf 441s + for path_pair in "${softhsm2_conf_paths[@]}" 441s + IFS=: 441s + read -r -a path 441s + user=ubuntu 441s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 441s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 441s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 441s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 441s + runuser -u ubuntu -- softhsm2-util --show-slots 441s + grep 'Test Organization' 441s Label: Test Organization Sub Int Token 441s + for path_pair in "${softhsm2_conf_paths[@]}" 441s + IFS=: 441s + read -r -a path 441s + user=root 441s + path=/etc/softhsm/softhsm2.conf 441s ++ dirname /etc/softhsm/softhsm2.conf 441s + runuser -u root -- mkdir -p /etc/softhsm 441s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-sjMXuB/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 441s + runuser -u root -- softhsm2-util --show-slots 441s + grep 'Test Organization' 441s Label: Test Organization Sub Int Token 441s + systemctl restart sssd 442s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 442s + for alternative in "${alternative_pam_configs[@]}" 442s + pam-auth-update --enable sss-smart-card-optional 442s + cat /etc/pam.d/common-auth 442s # 442s # /etc/pam.d/common-auth - authentication settings common to all services 442s # 442s # This file is included from other service-specific PAM config files, 442s # and should contain a list of the authentication modules that define 442s # the central authentication scheme for use on the system 442s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 442s # traditional Unix authentication mechanisms. 442s # 442s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 442s # To take advantage of this, it is recommended that you configure any 442s # local modules either before or after the default block, and use 442s # pam-auth-update to manage selection of other modules. See 442s # pam-auth-update(8) for details. 442s 442s # here are the per-package modules (the "Primary" block) 442s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 442s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 442s auth [success=1 default=ignore] pam_sss.so use_first_pass 442s # here's the fallback if no module succeeds 442s auth requisite pam_deny.so 442s # prime the stack with a positive return value if there isn't one already; 442s # this avoids us returning an error just because nothing sets a success code 442s # since the modules above will each just jump around 442s auth required pam_permit.so 442s # and here are more per-package modules (the "Additional" block) 442s auth optional pam_cap.so 442s # end of pam-auth-update config 442s + echo -n -e 123456 442s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 442s pamtester: invoking pam_start(login, ubuntu, ...) 442s pamtester: performing operation - authenticate 442s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 442s + echo -n -e 123456 442s + runuser -u ubuntu -- pamtester -v login '' authenticate 442s pamtester: invoking pam_start(login, , ...) 442s pamtester: performing operation - authenticate 442s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 442s + echo -n -e wrong123456 442s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 442s pamtester: invoking pam_start(login, ubuntu, ...) 442s pamtester: performing operation - authenticate 446s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 446s + echo -n -e wrong123456 446s + runuser -u ubuntu -- pamtester -v login '' authenticate 446s pamtester: invoking pam_start(login, , ...) 446s pamtester: performing operation - authenticate 449s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 449s + echo -n -e 123456 449s + pamtester -v login root authenticate 449s pamtester: invoking pam_start(login, root, ...) 449s pamtester: performing operation - authenticate 452s Password: pamtester: Authentication failure 452s + for alternative in "${alternative_pam_configs[@]}" 452s + pam-auth-update --enable sss-smart-card-required 452s PAM configuration 452s ----------------- 452s 452s Incompatible PAM profiles selected. 452s 452s The following PAM profiles cannot be used together: 452s 452s SSS required smart card authentication, SSS optional smart card 452s authentication 452s 452s Please select a different set of modules to enable. 452s 452s + cat /etc/pam.d/common-auth 452s # 452s # /etc/pam.d/common-auth - authentication settings common to all services 452s # 452s # This file is included from other service-specific PAM config files, 452s # and should contain a list of the authentication modules that define 452s # the central authentication scheme for use on the system 452s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 452s # traditional Unix authentication mechanisms. 452s # 452s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 452s # To take advantage of this, it is recommended that you configure any 452s # local modules either before or after the default block, and use 452s # pam-auth-update to manage selection of other modules. See 452s # pam-auth-update(8) for details. 452s 452s # here are the per-package modules (the "Primary" block) 452s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 452s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 452s auth [success=1 default=ignore] pam_sss.so use_first_pass 452s # here's the fallback if no module succeeds 452s auth requisite pam_deny.so 452s # prime the stack with a positive return value if there isn't one already; 452s # this avoids us returning an error just because nothing sets a success code 452s # since the modules above will each just jump around 452s auth required pam_permit.so 452s # and here are more per-package modules (the "Additional" block) 452s auth optional pam_cap.so 452s # end of pam-auth-update config 452s + echo -n -e 123456 452s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 452s pamtester: invoking pam_start(login, ubuntu, ...) 452s pamtester: performing operation - authenticate 452s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 452s + echo -n -e 123456 452s + runuser -u ubuntu -- pamtester -v login '' authenticate 452s pamtester: invoking pam_start(login, , ...) 452s pamtester: performing operation - authenticate 452s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 452s + echo -n -e wrong123456 452s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 452s pamtester: invoking pam_start(login, ubuntu, ...) 452s pamtester: performing operation - authenticate 455s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 455s + echo -n -e wrong123456 455s + runuser -u ubuntu -- pamtester -v login '' authenticate 455s pamtester: invoking pam_start(login, , ...) 455s pamtester: performing operation - authenticate 458s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 458s + echo -n -e 123456 458s + pamtester -v login root authenticate 458s pamtester: invoking pam_start(login, root, ...) 458s pamtester: performing operation - authenticate 462s pamtester: Authentication service cannot retrieve authentication info 462s + handle_exit 462s + exit_code=0 462s + restore_changes 462s + for path in "${restore_paths[@]}" 462s + local original_path 462s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-2DalJC /tmp/sssd-softhsm2-backups-2DalJC//etc/softhsm/softhsm2.conf 462s + original_path=/etc/softhsm/softhsm2.conf 462s + rm /etc/softhsm/softhsm2.conf 462s + mv /tmp/sssd-softhsm2-backups-2DalJC//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 462s + for path in "${delete_paths[@]}" 462s + rm -f /etc/sssd/sssd.conf 462s + for path in "${delete_paths[@]}" 462s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 462s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 462s + '[' -e /etc/sssd/sssd.conf ']' 462s + systemctl stop sssd 462s + '[' -e /etc/softhsm/softhsm2.conf ']' 462s + chmod 600 /etc/softhsm/softhsm2.conf 462s + rm -rf /tmp/sssd-softhsm2-certs-sjMXuB 462s Script completed successfully! 462s + '[' 0 = 0 ']' 462s + rm -rf /tmp/sssd-softhsm2-backups-2DalJC 462s + set +x 463s autopkgtest [00:32:49]: test sssd-smart-card-pam-auth-configs: -----------------------] 463s sssd-smart-card-pam-auth-configs PASS 463s autopkgtest [00:32:49]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 463s autopkgtest [00:32:49]: @@@@@@@@@@@@@@@@@@@@ summary 463s ldap-user-group-ldap-auth PASS 463s ldap-user-group-krb5-auth PASS 463s sssd-softhism2-certificates-tests.sh PASS 463s sssd-smart-card-pam-auth-configs PASS 479s nova [W] Skipping flock for amd64 479s Creating nova instance adt-plucky-amd64-sssd-20250315-231905-juju-7f2275-prod-proposed-migration-environment-2-e64cd8d8-a50d-4522-b89f-1d4135e93e22 from image adt/ubuntu-plucky-amd64-server-20250306.img (UUID 60d877d7-b74c-4f24-920d-f4570db0a338)... 479s nova [W] Timed out waiting for d6220b83-13a2-4ffe-bbd8-4ca77e0fc16a to get deleted. 479s nova [W] Skipping flock for amd64 479s Creating nova instance adt-plucky-amd64-sssd-20250315-231905-juju-7f2275-prod-proposed-migration-environment-2-e64cd8d8-a50d-4522-b89f-1d4135e93e22 from image adt/ubuntu-plucky-amd64-server-20250306.img (UUID 60d877d7-b74c-4f24-920d-f4570db0a338)... 479s nova [W] Timed out waiting for 32e01e35-dd2e-4e9a-b9a8-30e077f8d2bc to get deleted.