0s autopkgtest [02:33:18]: starting date and time: 2025-01-15 02:33:18+0000 0s autopkgtest [02:33:18]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [02:33:18]: host juju-7f2275-prod-proposed-migration-environment-9; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.hez261bk/out --timeout-copy=6000 --setup-commands 'ln -s /dev/null /etc/systemd/system/bluetooth.service; printf "http_proxy=http://squid.internal:3128\nhttps_proxy=http://squid.internal:3128\nno_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com\n" >> /etc/environment' --apt-pocket=proposed=src:sssd,src:adequate,src:apbs,src:binutils,src:boost1.83,src:createrepo-c,src:dotnet8,src:dotnet9,src:dovecot,src:dpdk,src:freeradius,src:gcc-11,src:gcc-14,src:libixion,src:liborcus,src:libreoffice,src:libsbml,src:libzstd,src:link-grammar,src:linux-aws,src:linux-azure,src:linux-gcp,src:linux-lowlatency,src:linux-oracle,src:linux-riscv,src:linux,src:mmdebstrap,src:nftables,src:nodejs,src:open-iscsi,src:postfix,src:pyside2,src:python3-defaults,src:samba,src:squid,src:systemd,src:tdb,src:tifffile,src:tzdata,src:vim --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=sssd/2.10.1-2ubuntu1 adequate/0.17.5 apbs/3.4.1-6build2 binutils/2.43.50.20250108-1ubuntu1 boost1.83/1.83.0-4ubuntu2 createrepo-c/0.17.3-6build1 dotnet8/8.0.112-8.0.12-0ubuntu1 dotnet9/9.0.102-9.0.1-0ubuntu1 dovecot/1:2.3.21.1+dfsg1-1ubuntu2 dpdk/24.11.1-1 freeradius/3.2.6+dfsg-3 gcc-11/11.5.0-2ubuntu1 gcc-14/14.2.0-13ubuntu1 libixion/0.19.0-6build1 liborcus/0.19.2-6build1 libreoffice/4:24.8.4~rc2-0ubuntu4 libsbml/5.20.4+dfsg-0.1 libzstd/1.5.6+dfsg-2 link-grammar/5.12.5~dfsg-1build1 linux-aws/6.11.0-1005.5 linux-azure/6.11.0-1005.5 linux-gcp/6.11.0-1004.4 linux-lowlatency/6.11.0-1005.5 linux-oracle/6.11.0-1007.7 linux-riscv/6.11.0-8.8.1build1 linux/6.11.0-9.9build1 mmdebstrap/1.5.6-2 nftables/1.1.1-1build1 nodejs/20.18.1+dfsg-1ubuntu2 open-iscsi/2.1.10-3ubuntu1 postfix/3.9.1-10 pyside2/5.15.16-2 python3-defaults/3.13.1-1~exp2 samba/2:4.20.4+dfsg-1ubuntu5 squid/6.10-1ubuntu2 systemd/257.1-7ubuntu1 tdb/1.4.12-1build1 tifffile/20250110-1 tzdata/2024b-6ubuntu1 vim/2:9.1.0967-1ubuntu1' -- lxd -r lxd-armhf-10.145.243.201 lxd-armhf-10.145.243.201:autopkgtest/ubuntu/plucky/armhf 23s autopkgtest [02:33:41]: testbed dpkg architecture: armhf 25s autopkgtest [02:33:43]: testbed apt version: 2.9.18 30s autopkgtest [02:33:48]: @@@@@@@@@@@@@@@@@@@@ test bed setup 32s autopkgtest [02:33:50]: testbed release detected to be: None 40s autopkgtest [02:33:58]: updating testbed package index (apt update) 42s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 42s Get:2 http://ftpmaster.internal/ubuntu plucky InRelease [213 kB] 43s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 43s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 43s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 43s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [12.3 kB] 43s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [880 kB] 43s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [149 kB] 43s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf Packages [245 kB] 43s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted armhf Packages [756 B] 43s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf Packages [904 kB] 43s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse armhf Packages [3392 B] 43s Get:13 http://ftpmaster.internal/ubuntu plucky/universe Sources [20.9 MB] 44s Get:14 http://ftpmaster.internal/ubuntu plucky/main Sources [1382 kB] 44s Get:15 http://ftpmaster.internal/ubuntu plucky/main armhf Packages [1359 kB] 44s Get:16 http://ftpmaster.internal/ubuntu plucky/universe armhf Packages [14.9 MB] 47s Fetched 41.1 MB in 5s (7791 kB/s) 48s Reading package lists... 55s autopkgtest [02:34:13]: upgrading testbed (apt dist-upgrade and autopurge) 57s Reading package lists... 57s Building dependency tree... 57s Reading state information... 57s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 58s Starting 2 pkgProblemResolver with broken count: 0 58s Done 58s Entering ResolveByKeep 59s 59s The following packages were automatically installed and are no longer required: 59s libnsl2 libpython3.12-minimal libpython3.12-stdlib python3.12 59s python3.12-minimal 59s Use 'apt autoremove' to remove them. 59s The following NEW packages will be installed: 59s libpython3.13-minimal libpython3.13-stdlib python3.13 python3.13-minimal 59s The following packages have been kept back: 59s libnftables1 nftables 59s The following packages will be upgraded: 59s binutils binutils-arm-linux-gnueabihf binutils-common dpkg dpkg-dev 59s gcc-14-base libatomic1 libbinutils libctf-nobfd0 libctf0 libdpkg-perl 59s libgcc-s1 libnss-systemd libpam-systemd libpython3-stdlib libsframe1 59s libstdc++6 libsystemd-shared libsystemd0 libudev1 libzstd1 python3 59s python3-minimal systemd systemd-cryptsetup systemd-resolved systemd-sysv 59s systemd-timesyncd tzdata udev vim-common vim-tiny xxd zstd 59s 34 upgraded, 4 newly installed, 0 to remove and 2 not upgraded. 59s Need to get 24.5 MB of archives. 59s After this operation, 25.6 MB of additional disk space will be used. 59s Get:1 http://ftpmaster.internal/ubuntu plucky/main armhf dpkg armhf 1.22.11ubuntu4 [1242 kB] 60s Get:2 http://ftpmaster.internal/ubuntu plucky/main armhf libpython3.13-minimal armhf 3.13.1-2 [868 kB] 60s Get:3 http://ftpmaster.internal/ubuntu plucky/main armhf python3.13-minimal armhf 3.13.1-2 [2036 kB] 60s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf python3-minimal armhf 3.13.1-1~exp2 [27.6 kB] 60s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf python3 armhf 3.13.1-1~exp2 [23.9 kB] 60s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf tzdata all 2024b-6ubuntu1 [197 kB] 60s Get:7 http://ftpmaster.internal/ubuntu plucky/main armhf libpython3.13-stdlib armhf 3.13.1-2 [1970 kB] 60s Get:8 http://ftpmaster.internal/ubuntu plucky/main armhf python3.13 armhf 3.13.1-2 [729 kB] 60s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libpython3-stdlib armhf 3.13.1-1~exp2 [10.2 kB] 60s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd-timesyncd armhf 257.1-7ubuntu1 [42.0 kB] 60s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd-resolved armhf 257.1-7ubuntu1 [311 kB] 60s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd-cryptsetup armhf 257.1-7ubuntu1 [126 kB] 60s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsystemd-shared armhf 257.1-7ubuntu1 [2201 kB] 60s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsystemd0 armhf 257.1-7ubuntu1 [494 kB] 60s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd-sysv armhf 257.1-7ubuntu1 [11.8 kB] 60s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libnss-systemd armhf 257.1-7ubuntu1 [164 kB] 60s Get:17 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libpam-systemd armhf 257.1-7ubuntu1 [238 kB] 60s Get:18 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd armhf 257.1-7ubuntu1 [3553 kB] 60s Get:19 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf udev armhf 257.1-7ubuntu1 [1979 kB] 60s Get:20 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libudev1 armhf 257.1-7ubuntu1 [192 kB] 60s Get:21 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf gcc-14-base armhf 14.2.0-13ubuntu1 [53.0 kB] 60s Get:22 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libstdc++6 armhf 14.2.0-13ubuntu1 [711 kB] 60s Get:23 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libatomic1 armhf 14.2.0-13ubuntu1 [7890 B] 60s Get:24 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libgcc-s1 armhf 14.2.0-13ubuntu1 [40.6 kB] 60s Get:25 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libzstd1 armhf 1.5.6+dfsg-2 [266 kB] 60s Get:26 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf vim-tiny armhf 2:9.1.0967-1ubuntu1 [696 kB] 60s Get:27 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf vim-common all 2:9.1.0967-1ubuntu1 [396 kB] 60s Get:28 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf xxd armhf 2:9.1.0967-1ubuntu1 [67.3 kB] 60s Get:29 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libctf0 armhf 2.43.50.20250108-1ubuntu1 [74.5 kB] 60s Get:30 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libctf-nobfd0 armhf 2.43.50.20250108-1ubuntu1 [77.4 kB] 60s Get:31 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf binutils-arm-linux-gnueabihf armhf 2.43.50.20250108-1ubuntu1 [2960 kB] 60s Get:32 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libbinutils armhf 2.43.50.20250108-1ubuntu1 [403 kB] 60s Get:33 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf binutils armhf 2.43.50.20250108-1ubuntu1 [3084 B] 60s Get:34 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf binutils-common armhf 2.43.50.20250108-1ubuntu1 [222 kB] 60s Get:35 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsframe1 armhf 2.43.50.20250108-1ubuntu1 [12.2 kB] 60s Get:36 http://ftpmaster.internal/ubuntu plucky/main armhf dpkg-dev all 1.22.11ubuntu4 [1088 kB] 60s Get:37 http://ftpmaster.internal/ubuntu plucky/main armhf libdpkg-perl all 1.22.11ubuntu4 [279 kB] 60s Get:38 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf zstd armhf 1.5.6+dfsg-2 [690 kB] 61s Preconfiguring packages ... 61s Fetched 24.5 MB in 1s (18.3 MB/s) 61s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59676 files and directories currently installed.) 61s Preparing to unpack .../dpkg_1.22.11ubuntu4_armhf.deb ... 61s Unpacking dpkg (1.22.11ubuntu4) over (1.22.11ubuntu3) ... 62s Setting up dpkg (1.22.11ubuntu4) ... 62s Selecting previously unselected package libpython3.13-minimal:armhf. 62s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59676 files and directories currently installed.) 62s Preparing to unpack .../libpython3.13-minimal_3.13.1-2_armhf.deb ... 62s Unpacking libpython3.13-minimal:armhf (3.13.1-2) ... 62s Selecting previously unselected package python3.13-minimal. 62s Preparing to unpack .../python3.13-minimal_3.13.1-2_armhf.deb ... 62s Unpacking python3.13-minimal (3.13.1-2) ... 62s Setting up libpython3.13-minimal:armhf (3.13.1-2) ... 62s Setting up python3.13-minimal (3.13.1-2) ... 63s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59996 files and directories currently installed.) 63s Preparing to unpack .../python3-minimal_3.13.1-1~exp2_armhf.deb ... 63s Unpacking python3-minimal (3.13.1-1~exp2) over (3.12.8-1) ... 63s Setting up python3-minimal (3.13.1-1~exp2) ... 64s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59996 files and directories currently installed.) 64s Preparing to unpack .../0-python3_3.13.1-1~exp2_armhf.deb ... 64s Unpacking python3 (3.13.1-1~exp2) over (3.12.8-1) ... 64s Preparing to unpack .../1-tzdata_2024b-6ubuntu1_all.deb ... 64s Unpacking tzdata (2024b-6ubuntu1) over (2024b-4ubuntu1) ... 64s Selecting previously unselected package libpython3.13-stdlib:armhf. 64s Preparing to unpack .../2-libpython3.13-stdlib_3.13.1-2_armhf.deb ... 64s Unpacking libpython3.13-stdlib:armhf (3.13.1-2) ... 64s Selecting previously unselected package python3.13. 64s Preparing to unpack .../3-python3.13_3.13.1-2_armhf.deb ... 64s Unpacking python3.13 (3.13.1-2) ... 64s Preparing to unpack .../4-libpython3-stdlib_3.13.1-1~exp2_armhf.deb ... 64s Unpacking libpython3-stdlib:armhf (3.13.1-1~exp2) over (3.12.8-1) ... 64s Preparing to unpack .../5-systemd-timesyncd_257.1-7ubuntu1_armhf.deb ... 64s Unpacking systemd-timesyncd (257.1-7ubuntu1) over (257-2ubuntu1) ... 64s Preparing to unpack .../6-systemd-resolved_257.1-7ubuntu1_armhf.deb ... 64s Unpacking systemd-resolved (257.1-7ubuntu1) over (257-2ubuntu1) ... 64s Preparing to unpack .../7-systemd-cryptsetup_257.1-7ubuntu1_armhf.deb ... 64s Unpacking systemd-cryptsetup (257.1-7ubuntu1) over (257-2ubuntu1) ... 64s Preparing to unpack .../8-libsystemd-shared_257.1-7ubuntu1_armhf.deb ... 64s Unpacking libsystemd-shared:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 65s Preparing to unpack .../9-libsystemd0_257.1-7ubuntu1_armhf.deb ... 65s Unpacking libsystemd0:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 65s Setting up libsystemd0:armhf (257.1-7ubuntu1) ... 65s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60413 files and directories currently installed.) 65s Preparing to unpack .../0-systemd-sysv_257.1-7ubuntu1_armhf.deb ... 65s Unpacking systemd-sysv (257.1-7ubuntu1) over (257-2ubuntu1) ... 65s Preparing to unpack .../1-libnss-systemd_257.1-7ubuntu1_armhf.deb ... 65s Unpacking libnss-systemd:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 65s Preparing to unpack .../2-libpam-systemd_257.1-7ubuntu1_armhf.deb ... 65s Unpacking libpam-systemd:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 65s Preparing to unpack .../3-systemd_257.1-7ubuntu1_armhf.deb ... 65s Unpacking systemd (257.1-7ubuntu1) over (257-2ubuntu1) ... 65s Preparing to unpack .../4-udev_257.1-7ubuntu1_armhf.deb ... 65s Unpacking udev (257.1-7ubuntu1) over (257-2ubuntu1) ... 66s Preparing to unpack .../5-libudev1_257.1-7ubuntu1_armhf.deb ... 66s Unpacking libudev1:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 66s Setting up libudev1:armhf (257.1-7ubuntu1) ... 66s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 66s Preparing to unpack .../gcc-14-base_14.2.0-13ubuntu1_armhf.deb ... 66s Unpacking gcc-14-base:armhf (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 66s Setting up gcc-14-base:armhf (14.2.0-13ubuntu1) ... 66s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 66s Preparing to unpack .../libstdc++6_14.2.0-13ubuntu1_armhf.deb ... 66s Unpacking libstdc++6:armhf (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 66s Setting up libstdc++6:armhf (14.2.0-13ubuntu1) ... 66s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 66s Preparing to unpack .../libatomic1_14.2.0-13ubuntu1_armhf.deb ... 66s Unpacking libatomic1:armhf (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 66s Preparing to unpack .../libgcc-s1_14.2.0-13ubuntu1_armhf.deb ... 66s Unpacking libgcc-s1:armhf (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 66s Setting up libgcc-s1:armhf (14.2.0-13ubuntu1) ... 66s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 66s Preparing to unpack .../libzstd1_1.5.6+dfsg-2_armhf.deb ... 66s Unpacking libzstd1:armhf (1.5.6+dfsg-2) over (1.5.6+dfsg-1) ... 66s Setting up libzstd1:armhf (1.5.6+dfsg-2) ... 66s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 66s Preparing to unpack .../00-vim-tiny_2%3a9.1.0967-1ubuntu1_armhf.deb ... 66s Unpacking vim-tiny (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 66s Preparing to unpack .../01-vim-common_2%3a9.1.0967-1ubuntu1_all.deb ... 66s Unpacking vim-common (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 66s Preparing to unpack .../02-xxd_2%3a9.1.0967-1ubuntu1_armhf.deb ... 66s Unpacking xxd (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 66s Preparing to unpack .../03-libctf0_2.43.50.20250108-1ubuntu1_armhf.deb ... 66s Unpacking libctf0:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 67s Preparing to unpack .../04-libctf-nobfd0_2.43.50.20250108-1ubuntu1_armhf.deb ... 67s Unpacking libctf-nobfd0:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 67s Preparing to unpack .../05-binutils-arm-linux-gnueabihf_2.43.50.20250108-1ubuntu1_armhf.deb ... 67s Unpacking binutils-arm-linux-gnueabihf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 67s Preparing to unpack .../06-libbinutils_2.43.50.20250108-1ubuntu1_armhf.deb ... 67s Unpacking libbinutils:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 67s Preparing to unpack .../07-binutils_2.43.50.20250108-1ubuntu1_armhf.deb ... 67s Unpacking binutils (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 67s Preparing to unpack .../08-binutils-common_2.43.50.20250108-1ubuntu1_armhf.deb ... 67s Unpacking binutils-common:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 67s Preparing to unpack .../09-libsframe1_2.43.50.20250108-1ubuntu1_armhf.deb ... 67s Unpacking libsframe1:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 67s Preparing to unpack .../10-dpkg-dev_1.22.11ubuntu4_all.deb ... 67s Unpacking dpkg-dev (1.22.11ubuntu4) over (1.22.11ubuntu3) ... 67s Preparing to unpack .../11-libdpkg-perl_1.22.11ubuntu4_all.deb ... 67s Unpacking libdpkg-perl (1.22.11ubuntu4) over (1.22.11ubuntu3) ... 67s Preparing to unpack .../12-zstd_1.5.6+dfsg-2_armhf.deb ... 67s Unpacking zstd (1.5.6+dfsg-2) over (1.5.6+dfsg-1) ... 67s Setting up binutils-common:armhf (2.43.50.20250108-1ubuntu1) ... 67s Setting up libctf-nobfd0:armhf (2.43.50.20250108-1ubuntu1) ... 67s Setting up xxd (2:9.1.0967-1ubuntu1) ... 67s Setting up libsframe1:armhf (2.43.50.20250108-1ubuntu1) ... 67s Setting up tzdata (2024b-6ubuntu1) ... 67s 67s Current default time zone: 'Etc/UTC' 67s Local time is now: Wed Jan 15 02:34:25 UTC 2025. 67s Universal Time is now: Wed Jan 15 02:34:25 UTC 2025. 67s Run 'dpkg-reconfigure tzdata' if you wish to change it. 67s 67s Setting up vim-common (2:9.1.0967-1ubuntu1) ... 67s Setting up libatomic1:armhf (14.2.0-13ubuntu1) ... 67s Setting up libsystemd-shared:armhf (257.1-7ubuntu1) ... 67s Setting up libdpkg-perl (1.22.11ubuntu4) ... 67s Setting up libbinutils:armhf (2.43.50.20250108-1ubuntu1) ... 67s Setting up libpython3.13-stdlib:armhf (3.13.1-2) ... 67s Setting up zstd (1.5.6+dfsg-2) ... 67s Setting up libpython3-stdlib:armhf (3.13.1-1~exp2) ... 67s Setting up libctf0:armhf (2.43.50.20250108-1ubuntu1) ... 67s Setting up python3.13 (3.13.1-2) ... 68s Setting up python3 (3.13.1-1~exp2) ... 69s /usr/bin/py3clean:101: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 69s for fn in glob1(directory, "%s.*" % fname): 69s Setting up systemd (257.1-7ubuntu1) ... 69s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 69s Created symlink '/run/systemd/system/tmp.mount' → '/dev/null'. 69s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 70s Setting up vim-tiny (2:9.1.0967-1ubuntu1) ... 70s Setting up systemd-cryptsetup (257.1-7ubuntu1) ... 70s Setting up systemd-timesyncd (257.1-7ubuntu1) ... 70s systemd-time-wait-sync.service is a disabled or a static unit not running, not starting it. 70s Setting up udev (257.1-7ubuntu1) ... 71s Setting up binutils-arm-linux-gnueabihf (2.43.50.20250108-1ubuntu1) ... 71s Setting up systemd-resolved (257.1-7ubuntu1) ... 72s Setting up systemd-sysv (257.1-7ubuntu1) ... 72s Setting up libnss-systemd:armhf (257.1-7ubuntu1) ... 72s Setting up binutils (2.43.50.20250108-1ubuntu1) ... 72s Setting up dpkg-dev (1.22.11ubuntu4) ... 72s Setting up libpam-systemd:armhf (257.1-7ubuntu1) ... 72s Processing triggers for libc-bin (2.40-4ubuntu1) ... 72s Processing triggers for man-db (2.13.0-1) ... 74s Processing triggers for dbus (1.14.10-4ubuntu5) ... 74s Processing triggers for shared-mime-info (2.4-5) ... 74s Warning: program compiled against libxml 212 using older 209 74s Processing triggers for initramfs-tools (0.142ubuntu35) ... 76s Reading package lists... 77s Building dependency tree... 77s Reading state information... 77s Starting pkgProblemResolver with broken count: 0 77s Starting 2 pkgProblemResolver with broken count: 0 77s Done 78s The following packages will be REMOVED: 78s libnsl2* libpython3.12-minimal* libpython3.12-stdlib* python3.12* 78s python3.12-minimal* 79s 0 upgraded, 0 newly installed, 5 to remove and 2 not upgraded. 79s After this operation, 19.9 MB disk space will be freed. 79s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 79s Removing python3.12 (3.12.8-3) ... 79s Removing libpython3.12-stdlib:armhf (3.12.8-3) ... 79s Removing libnsl2:armhf (1.3.0-3build3) ... 79s Removing python3.12-minimal (3.12.8-3) ... 79s /usr/bin/py3clean:125: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 79s for fn in glob1(directory, "%s.%s.py[co]" % (fname, magic_tag)): 80s Removing libpython3.12-minimal:armhf (3.12.8-3) ... 80s Processing triggers for systemd (257.1-7ubuntu1) ... 80s Processing triggers for man-db (2.13.0-1) ... 80s Processing triggers for libc-bin (2.40-4ubuntu1) ... 80s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59699 files and directories currently installed.) 80s Purging configuration files for python3.12-minimal (3.12.8-3) ... 80s Purging configuration files for libpython3.12-minimal:armhf (3.12.8-3) ... 83s autopkgtest [02:34:41]: rebooting testbed after setup commands that affected boot 126s autopkgtest [02:35:24]: testbed running kernel: Linux 6.8.0-49-generic #49~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 6 18:12:14 UTC 2 152s autopkgtest [02:35:50]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 277s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (dsc) [5330 B] 277s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (tar) [9197 kB] 277s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (asc) [833 B] 277s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (diff) [49.9 kB] 277s gpgv: Signature made Tue Jan 14 21:45:37 2025 UTC 277s gpgv: using RSA key E92FD0B36B14F1F4D8E0EB2F106DA1C8C3CBBF14 277s gpgv: Can't check signature: No public key 277s dpkg-source: warning: cannot verify inline signature for ./sssd_2.10.1-2ubuntu1.dsc: no acceptable signature found 278s autopkgtest [02:37:56]: testing package sssd version 2.10.1-2ubuntu1 287s autopkgtest [02:38:05]: build not needed 300s autopkgtest [02:38:18]: test ldap-user-group-ldap-auth: preparing testbed 302s Reading package lists... 303s Building dependency tree... 303s Reading state information... 303s Starting pkgProblemResolver with broken count: 0 303s Starting 2 pkgProblemResolver with broken count: 0 303s Done 304s The following NEW packages will be installed: 304s expect ldap-utils libargon2-1 libavahi-client3 libavahi-common-data 304s libavahi-common3 libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 304s libdhash1t64 libevent-2.1-7t64 libini-config5t64 libipa-hbac-dev 304s libipa-hbac0t64 libjose0 libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss 304s libnss-sudo libodbc2 libpam-pwquality libpam-sss libpath-utils1t64 304s libpwquality-common libpwquality1 libref-array1t64 libsmbclient0 304s libsss-certmap-dev libsss-certmap0 libsss-idmap-dev libsss-idmap0 304s libsss-nss-idmap-dev libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 304s libtdb1 libtevent0t64 libverto-libevent1t64 libverto1t64 libwbclient0 304s python3-libipa-hbac python3-libsss-nss-idmap python3-sss samba-libs slapd 304s sssd sssd-ad sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm 304s sssd-krb5 sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools 304s tcl-expect tcl8.6 304s 0 upgraded, 65 newly installed, 0 to remove and 2 not upgraded. 304s Need to get 12.1 MB of archives. 304s After this operation, 45.8 MB of additional disk space will be used. 304s Get:1 http://ftpmaster.internal/ubuntu plucky/main armhf libargon2-1 armhf 0~20190702+dfsg-4build1 [22.6 kB] 304s Get:2 http://ftpmaster.internal/ubuntu plucky/main armhf libltdl7 armhf 2.4.7-8 [37.7 kB] 304s Get:3 http://ftpmaster.internal/ubuntu plucky/main armhf libodbc2 armhf 2.3.12-1ubuntu1 [144 kB] 304s Get:4 http://ftpmaster.internal/ubuntu plucky/main armhf slapd armhf 2.6.8+dfsg-1~exp4ubuntu3 [1444 kB] 305s Get:5 http://ftpmaster.internal/ubuntu plucky/main armhf libtcl8.6 armhf 8.6.15+dfsg-2 [909 kB] 305s Get:6 http://ftpmaster.internal/ubuntu plucky/main armhf tcl8.6 armhf 8.6.15+dfsg-2 [14.7 kB] 305s Get:7 http://ftpmaster.internal/ubuntu plucky/universe armhf tcl-expect armhf 5.45.4-3 [99.5 kB] 305s Get:8 http://ftpmaster.internal/ubuntu plucky/universe armhf expect armhf 5.45.4-3 [136 kB] 305s Get:9 http://ftpmaster.internal/ubuntu plucky/main armhf ldap-utils armhf 2.6.8+dfsg-1~exp4ubuntu3 [132 kB] 305s Get:10 http://ftpmaster.internal/ubuntu plucky/main armhf libavahi-common-data armhf 0.8-14ubuntu1 [30.5 kB] 305s Get:11 http://ftpmaster.internal/ubuntu plucky/main armhf libavahi-common3 armhf 0.8-14ubuntu1 [19.5 kB] 305s Get:12 http://ftpmaster.internal/ubuntu plucky/main armhf libavahi-client3 armhf 0.8-14ubuntu1 [23.6 kB] 305s Get:13 http://ftpmaster.internal/ubuntu plucky/main armhf libbasicobjects0t64 armhf 0.6.2-3 [5434 B] 305s Get:14 http://ftpmaster.internal/ubuntu plucky/main armhf libcares2 armhf 1.34.4-2.1 [85.0 kB] 305s Get:15 http://ftpmaster.internal/ubuntu plucky/main armhf libcollection4t64 armhf 0.6.2-3 [18.8 kB] 305s Get:16 http://ftpmaster.internal/ubuntu plucky/main armhf libcrack2 armhf 2.9.6-5.2 [27.4 kB] 305s Get:17 http://ftpmaster.internal/ubuntu plucky/main armhf libdhash1t64 armhf 0.6.2-3 [7876 B] 305s Get:18 http://ftpmaster.internal/ubuntu plucky/main armhf libevent-2.1-7t64 armhf 2.1.12-stable-10 [127 kB] 305s Get:19 http://ftpmaster.internal/ubuntu plucky/main armhf libpath-utils1t64 armhf 0.6.2-3 [7776 B] 305s Get:20 http://ftpmaster.internal/ubuntu plucky/main armhf libref-array1t64 armhf 0.6.2-3 [6382 B] 305s Get:21 http://ftpmaster.internal/ubuntu plucky/main armhf libini-config5t64 armhf 0.6.2-3 [37.2 kB] 305s Get:22 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libipa-hbac0t64 armhf 2.10.1-2ubuntu1 [18.0 kB] 305s Get:23 http://ftpmaster.internal/ubuntu plucky/universe armhf libjose0 armhf 14-1 [39.7 kB] 305s Get:24 http://ftpmaster.internal/ubuntu plucky/main armhf libverto-libevent1t64 armhf 0.3.1-1.2ubuntu3 [6324 B] 305s Get:25 http://ftpmaster.internal/ubuntu plucky/main armhf libverto1t64 armhf 0.3.1-1.2ubuntu3 [9364 B] 305s Get:26 http://ftpmaster.internal/ubuntu plucky/main armhf libkrad0 armhf 1.21.3-3 [20.2 kB] 305s Get:27 http://ftpmaster.internal/ubuntu plucky/main armhf libtalloc2 armhf 2.4.2-1build2 [25.9 kB] 305s Get:28 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libtdb1 armhf 1.4.12-1build1 [43.4 kB] 305s Get:29 http://ftpmaster.internal/ubuntu plucky/main armhf libtevent0t64 armhf 0.16.1-3 [38.3 kB] 305s Get:30 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libldb2 armhf 2:2.9.1+samba4.20.4+dfsg-1ubuntu5 [168 kB] 305s Get:31 http://ftpmaster.internal/ubuntu plucky/main armhf libnfsidmap1 armhf 1:2.6.4-4ubuntu1 [54.8 kB] 305s Get:32 http://ftpmaster.internal/ubuntu plucky/universe armhf libnss-sudo all 1.9.15p5-3ubuntu5 [15.2 kB] 305s Get:33 http://ftpmaster.internal/ubuntu plucky/main armhf libpwquality-common all 1.4.5-3build1 [7748 B] 305s Get:34 http://ftpmaster.internal/ubuntu plucky/main armhf libpwquality1 armhf 1.4.5-3build1 [12.2 kB] 305s Get:35 http://ftpmaster.internal/ubuntu plucky/main armhf libpam-pwquality armhf 1.4.5-3build1 [11.4 kB] 305s Get:36 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libwbclient0 armhf 2:4.20.4+dfsg-1ubuntu5 [72.3 kB] 305s Get:37 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf samba-libs armhf 2:4.20.4+dfsg-1ubuntu5 [5913 kB] 306s Get:38 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsmbclient0 armhf 2:4.20.4+dfsg-1ubuntu5 [58.4 kB] 306s Get:39 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libnss-sss armhf 2.10.1-2ubuntu1 [30.0 kB] 306s Get:40 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libpam-sss armhf 2.10.1-2ubuntu1 [46.4 kB] 306s Get:41 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf python3-sss armhf 2.10.1-2ubuntu1 [45.3 kB] 306s Get:42 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsss-certmap0 armhf 2.10.1-2ubuntu1 [44.1 kB] 306s Get:43 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsss-idmap0 armhf 2.10.1-2ubuntu1 [21.1 kB] 306s Get:44 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsss-nss-idmap0 armhf 2.10.1-2ubuntu1 [28.4 kB] 306s Get:45 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-common armhf 2.10.1-2ubuntu1 [1054 kB] 306s Get:46 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf sssd-idp armhf 2.10.1-2ubuntu1 [25.3 kB] 306s Get:47 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf sssd-passkey armhf 2.10.1-2ubuntu1 [29.5 kB] 306s Get:48 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libipa-hbac-dev armhf 2.10.1-2ubuntu1 [6670 B] 306s Get:49 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsss-certmap-dev armhf 2.10.1-2ubuntu1 [5734 B] 306s Get:50 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsss-idmap-dev armhf 2.10.1-2ubuntu1 [8386 B] 306s Get:51 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsss-nss-idmap-dev armhf 2.10.1-2ubuntu1 [6720 B] 306s Get:52 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf libsss-sudo armhf 2.10.1-2ubuntu1 [20.3 kB] 306s Get:53 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf python3-libipa-hbac armhf 2.10.1-2ubuntu1 [14.6 kB] 306s Get:54 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf python3-libsss-nss-idmap armhf 2.10.1-2ubuntu1 [8484 B] 306s Get:55 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-ad-common armhf 2.10.1-2ubuntu1 [67.7 kB] 306s Get:56 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-krb5-common armhf 2.10.1-2ubuntu1 [82.0 kB] 306s Get:57 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-ad armhf 2.10.1-2ubuntu1 [130 kB] 306s Get:58 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-ipa armhf 2.10.1-2ubuntu1 [214 kB] 306s Get:59 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-krb5 armhf 2.10.1-2ubuntu1 [14.0 kB] 306s Get:60 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-ldap armhf 2.10.1-2ubuntu1 [31.2 kB] 306s Get:61 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-proxy armhf 2.10.1-2ubuntu1 [43.4 kB] 306s Get:62 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd armhf 2.10.1-2ubuntu1 [4116 B] 306s Get:63 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-dbus armhf 2.10.1-2ubuntu1 [92.3 kB] 306s Get:64 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf sssd-kcm armhf 2.10.1-2ubuntu1 [128 kB] 306s Get:65 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-tools armhf 2.10.1-2ubuntu1 [94.8 kB] 307s Preconfiguring packages ... 307s Fetched 12.1 MB in 2s (5295 kB/s) 307s Selecting previously unselected package libargon2-1:armhf. 307s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59697 files and directories currently installed.) 307s Preparing to unpack .../00-libargon2-1_0~20190702+dfsg-4build1_armhf.deb ... 307s Unpacking libargon2-1:armhf (0~20190702+dfsg-4build1) ... 307s Selecting previously unselected package libltdl7:armhf. 307s Preparing to unpack .../01-libltdl7_2.4.7-8_armhf.deb ... 307s Unpacking libltdl7:armhf (2.4.7-8) ... 307s Selecting previously unselected package libodbc2:armhf. 307s Preparing to unpack .../02-libodbc2_2.3.12-1ubuntu1_armhf.deb ... 307s Unpacking libodbc2:armhf (2.3.12-1ubuntu1) ... 307s Selecting previously unselected package slapd. 307s Preparing to unpack .../03-slapd_2.6.8+dfsg-1~exp4ubuntu3_armhf.deb ... 307s Unpacking slapd (2.6.8+dfsg-1~exp4ubuntu3) ... 307s Selecting previously unselected package libtcl8.6:armhf. 307s Preparing to unpack .../04-libtcl8.6_8.6.15+dfsg-2_armhf.deb ... 307s Unpacking libtcl8.6:armhf (8.6.15+dfsg-2) ... 307s Selecting previously unselected package tcl8.6. 307s Preparing to unpack .../05-tcl8.6_8.6.15+dfsg-2_armhf.deb ... 307s Unpacking tcl8.6 (8.6.15+dfsg-2) ... 307s Selecting previously unselected package tcl-expect:armhf. 307s Preparing to unpack .../06-tcl-expect_5.45.4-3_armhf.deb ... 307s Unpacking tcl-expect:armhf (5.45.4-3) ... 307s Selecting previously unselected package expect. 307s Preparing to unpack .../07-expect_5.45.4-3_armhf.deb ... 307s Unpacking expect (5.45.4-3) ... 307s Selecting previously unselected package ldap-utils. 307s Preparing to unpack .../08-ldap-utils_2.6.8+dfsg-1~exp4ubuntu3_armhf.deb ... 307s Unpacking ldap-utils (2.6.8+dfsg-1~exp4ubuntu3) ... 307s Selecting previously unselected package libavahi-common-data:armhf. 307s Preparing to unpack .../09-libavahi-common-data_0.8-14ubuntu1_armhf.deb ... 307s Unpacking libavahi-common-data:armhf (0.8-14ubuntu1) ... 307s Selecting previously unselected package libavahi-common3:armhf. 307s Preparing to unpack .../10-libavahi-common3_0.8-14ubuntu1_armhf.deb ... 307s Unpacking libavahi-common3:armhf (0.8-14ubuntu1) ... 307s Selecting previously unselected package libavahi-client3:armhf. 307s Preparing to unpack .../11-libavahi-client3_0.8-14ubuntu1_armhf.deb ... 307s Unpacking libavahi-client3:armhf (0.8-14ubuntu1) ... 307s Selecting previously unselected package libbasicobjects0t64:armhf. 307s Preparing to unpack .../12-libbasicobjects0t64_0.6.2-3_armhf.deb ... 307s Unpacking libbasicobjects0t64:armhf (0.6.2-3) ... 307s Selecting previously unselected package libcares2:armhf. 308s Preparing to unpack .../13-libcares2_1.34.4-2.1_armhf.deb ... 308s Unpacking libcares2:armhf (1.34.4-2.1) ... 308s Selecting previously unselected package libcollection4t64:armhf. 308s Preparing to unpack .../14-libcollection4t64_0.6.2-3_armhf.deb ... 308s Unpacking libcollection4t64:armhf (0.6.2-3) ... 308s Selecting previously unselected package libcrack2:armhf. 308s Preparing to unpack .../15-libcrack2_2.9.6-5.2_armhf.deb ... 308s Unpacking libcrack2:armhf (2.9.6-5.2) ... 308s Selecting previously unselected package libdhash1t64:armhf. 308s Preparing to unpack .../16-libdhash1t64_0.6.2-3_armhf.deb ... 308s Unpacking libdhash1t64:armhf (0.6.2-3) ... 308s Selecting previously unselected package libevent-2.1-7t64:armhf. 308s Preparing to unpack .../17-libevent-2.1-7t64_2.1.12-stable-10_armhf.deb ... 308s Unpacking libevent-2.1-7t64:armhf (2.1.12-stable-10) ... 308s Selecting previously unselected package libpath-utils1t64:armhf. 308s Preparing to unpack .../18-libpath-utils1t64_0.6.2-3_armhf.deb ... 308s Unpacking libpath-utils1t64:armhf (0.6.2-3) ... 308s Selecting previously unselected package libref-array1t64:armhf. 308s Preparing to unpack .../19-libref-array1t64_0.6.2-3_armhf.deb ... 308s Unpacking libref-array1t64:armhf (0.6.2-3) ... 308s Selecting previously unselected package libini-config5t64:armhf. 308s Preparing to unpack .../20-libini-config5t64_0.6.2-3_armhf.deb ... 308s Unpacking libini-config5t64:armhf (0.6.2-3) ... 308s Selecting previously unselected package libipa-hbac0t64. 308s Preparing to unpack .../21-libipa-hbac0t64_2.10.1-2ubuntu1_armhf.deb ... 308s Unpacking libipa-hbac0t64 (2.10.1-2ubuntu1) ... 308s Selecting previously unselected package libjose0:armhf. 308s Preparing to unpack .../22-libjose0_14-1_armhf.deb ... 308s Unpacking libjose0:armhf (14-1) ... 308s Selecting previously unselected package libverto-libevent1t64:armhf. 308s Preparing to unpack .../23-libverto-libevent1t64_0.3.1-1.2ubuntu3_armhf.deb ... 308s Unpacking libverto-libevent1t64:armhf (0.3.1-1.2ubuntu3) ... 308s Selecting previously unselected package libverto1t64:armhf. 308s Preparing to unpack .../24-libverto1t64_0.3.1-1.2ubuntu3_armhf.deb ... 308s Unpacking libverto1t64:armhf (0.3.1-1.2ubuntu3) ... 308s Selecting previously unselected package libkrad0:armhf. 308s Preparing to unpack .../25-libkrad0_1.21.3-3_armhf.deb ... 308s Unpacking libkrad0:armhf (1.21.3-3) ... 308s Selecting previously unselected package libtalloc2:armhf. 308s Preparing to unpack .../26-libtalloc2_2.4.2-1build2_armhf.deb ... 308s Unpacking libtalloc2:armhf (2.4.2-1build2) ... 308s Selecting previously unselected package libtdb1:armhf. 308s Preparing to unpack .../27-libtdb1_1.4.12-1build1_armhf.deb ... 308s Unpacking libtdb1:armhf (1.4.12-1build1) ... 308s Selecting previously unselected package libtevent0t64:armhf. 308s Preparing to unpack .../28-libtevent0t64_0.16.1-3_armhf.deb ... 308s Unpacking libtevent0t64:armhf (0.16.1-3) ... 308s Selecting previously unselected package libldb2:armhf. 308s Preparing to unpack .../29-libldb2_2%3a2.9.1+samba4.20.4+dfsg-1ubuntu5_armhf.deb ... 308s Unpacking libldb2:armhf (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 308s Selecting previously unselected package libnfsidmap1:armhf. 308s Preparing to unpack .../30-libnfsidmap1_1%3a2.6.4-4ubuntu1_armhf.deb ... 308s Unpacking libnfsidmap1:armhf (1:2.6.4-4ubuntu1) ... 308s Selecting previously unselected package libnss-sudo. 308s Preparing to unpack .../31-libnss-sudo_1.9.15p5-3ubuntu5_all.deb ... 308s Unpacking libnss-sudo (1.9.15p5-3ubuntu5) ... 308s Selecting previously unselected package libpwquality-common. 308s Preparing to unpack .../32-libpwquality-common_1.4.5-3build1_all.deb ... 308s Unpacking libpwquality-common (1.4.5-3build1) ... 308s Selecting previously unselected package libpwquality1:armhf. 308s Preparing to unpack .../33-libpwquality1_1.4.5-3build1_armhf.deb ... 308s Unpacking libpwquality1:armhf (1.4.5-3build1) ... 308s Selecting previously unselected package libpam-pwquality:armhf. 308s Preparing to unpack .../34-libpam-pwquality_1.4.5-3build1_armhf.deb ... 308s Unpacking libpam-pwquality:armhf (1.4.5-3build1) ... 308s Selecting previously unselected package libwbclient0:armhf. 308s Preparing to unpack .../35-libwbclient0_2%3a4.20.4+dfsg-1ubuntu5_armhf.deb ... 308s Unpacking libwbclient0:armhf (2:4.20.4+dfsg-1ubuntu5) ... 308s Selecting previously unselected package samba-libs:armhf. 308s Preparing to unpack .../36-samba-libs_2%3a4.20.4+dfsg-1ubuntu5_armhf.deb ... 308s Unpacking samba-libs:armhf (2:4.20.4+dfsg-1ubuntu5) ... 309s Selecting previously unselected package libsmbclient0:armhf. 309s Preparing to unpack .../37-libsmbclient0_2%3a4.20.4+dfsg-1ubuntu5_armhf.deb ... 309s Unpacking libsmbclient0:armhf (2:4.20.4+dfsg-1ubuntu5) ... 309s Selecting previously unselected package libnss-sss:armhf. 309s Preparing to unpack .../38-libnss-sss_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libnss-sss:armhf (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package libpam-sss:armhf. 309s Preparing to unpack .../39-libpam-sss_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libpam-sss:armhf (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package python3-sss. 309s Preparing to unpack .../40-python3-sss_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking python3-sss (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package libsss-certmap0. 309s Preparing to unpack .../41-libsss-certmap0_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libsss-certmap0 (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package libsss-idmap0. 309s Preparing to unpack .../42-libsss-idmap0_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libsss-idmap0 (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package libsss-nss-idmap0. 309s Preparing to unpack .../43-libsss-nss-idmap0_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-common. 309s Preparing to unpack .../44-sssd-common_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-common (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-idp. 309s Preparing to unpack .../45-sssd-idp_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-idp (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-passkey. 309s Preparing to unpack .../46-sssd-passkey_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-passkey (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package libipa-hbac-dev. 309s Preparing to unpack .../47-libipa-hbac-dev_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libipa-hbac-dev (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package libsss-certmap-dev. 309s Preparing to unpack .../48-libsss-certmap-dev_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libsss-certmap-dev (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package libsss-idmap-dev. 309s Preparing to unpack .../49-libsss-idmap-dev_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libsss-idmap-dev (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package libsss-nss-idmap-dev. 309s Preparing to unpack .../50-libsss-nss-idmap-dev_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libsss-nss-idmap-dev (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package libsss-sudo. 309s Preparing to unpack .../51-libsss-sudo_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking libsss-sudo (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package python3-libipa-hbac. 309s Preparing to unpack .../52-python3-libipa-hbac_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking python3-libipa-hbac (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package python3-libsss-nss-idmap. 309s Preparing to unpack .../53-python3-libsss-nss-idmap_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking python3-libsss-nss-idmap (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-ad-common. 309s Preparing to unpack .../54-sssd-ad-common_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-ad-common (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-krb5-common. 309s Preparing to unpack .../55-sssd-krb5-common_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-krb5-common (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-ad. 309s Preparing to unpack .../56-sssd-ad_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-ad (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-ipa. 309s Preparing to unpack .../57-sssd-ipa_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-ipa (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-krb5. 309s Preparing to unpack .../58-sssd-krb5_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-krb5 (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-ldap. 309s Preparing to unpack .../59-sssd-ldap_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-ldap (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd-proxy. 309s Preparing to unpack .../60-sssd-proxy_2.10.1-2ubuntu1_armhf.deb ... 309s Unpacking sssd-proxy (2.10.1-2ubuntu1) ... 309s Selecting previously unselected package sssd. 310s Preparing to unpack .../61-sssd_2.10.1-2ubuntu1_armhf.deb ... 310s Unpacking sssd (2.10.1-2ubuntu1) ... 310s Selecting previously unselected package sssd-dbus. 310s Preparing to unpack .../62-sssd-dbus_2.10.1-2ubuntu1_armhf.deb ... 310s Unpacking sssd-dbus (2.10.1-2ubuntu1) ... 310s Selecting previously unselected package sssd-kcm. 310s Preparing to unpack .../63-sssd-kcm_2.10.1-2ubuntu1_armhf.deb ... 310s Unpacking sssd-kcm (2.10.1-2ubuntu1) ... 310s Selecting previously unselected package sssd-tools. 310s Preparing to unpack .../64-sssd-tools_2.10.1-2ubuntu1_armhf.deb ... 310s Unpacking sssd-tools (2.10.1-2ubuntu1) ... 310s Setting up libpwquality-common (1.4.5-3build1) ... 310s Setting up libnfsidmap1:armhf (1:2.6.4-4ubuntu1) ... 310s Setting up libsss-idmap0 (2.10.1-2ubuntu1) ... 310s Setting up libbasicobjects0t64:armhf (0.6.2-3) ... 310s Setting up libipa-hbac0t64 (2.10.1-2ubuntu1) ... 310s Setting up libsss-idmap-dev (2.10.1-2ubuntu1) ... 310s Setting up libref-array1t64:armhf (0.6.2-3) ... 310s Setting up libipa-hbac-dev (2.10.1-2ubuntu1) ... 310s Setting up libtdb1:armhf (1.4.12-1build1) ... 310s Setting up libargon2-1:armhf (0~20190702+dfsg-4build1) ... 310s Setting up libcollection4t64:armhf (0.6.2-3) ... 310s Setting up libevent-2.1-7t64:armhf (2.1.12-stable-10) ... 310s Setting up ldap-utils (2.6.8+dfsg-1~exp4ubuntu3) ... 310s Setting up libjose0:armhf (14-1) ... 310s Setting up libwbclient0:armhf (2:4.20.4+dfsg-1ubuntu5) ... 310s Setting up libtalloc2:armhf (2.4.2-1build2) ... 310s Setting up libpath-utils1t64:armhf (0.6.2-3) ... 310s Setting up libavahi-common-data:armhf (0.8-14ubuntu1) ... 310s Setting up libcares2:armhf (1.34.4-2.1) ... 310s Setting up libdhash1t64:armhf (0.6.2-3) ... 310s Setting up libtcl8.6:armhf (8.6.15+dfsg-2) ... 310s Setting up libltdl7:armhf (2.4.7-8) ... 310s Setting up libcrack2:armhf (2.9.6-5.2) ... 310s Setting up libodbc2:armhf (2.3.12-1ubuntu1) ... 310s Setting up python3-libipa-hbac (2.10.1-2ubuntu1) ... 310s Setting up libnss-sudo (1.9.15p5-3ubuntu5) ... 310s Setting up libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 310s Setting up libini-config5t64:armhf (0.6.2-3) ... 310s Setting up libtevent0t64:armhf (0.16.1-3) ... 310s Setting up libnss-sss:armhf (2.10.1-2ubuntu1) ... 310s Setting up slapd (2.6.8+dfsg-1~exp4ubuntu3) ... 310s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 310s Can't find configuration db, was SSSD configured and run? 310s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 310s Can't find configuration db, was SSSD configured and run? 310s Creating new user openldap... [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 310s Can't find configuration db, was SSSD configured and run? 310s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 310s Can't find configuration db, was SSSD configured and run? 310s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 310s Can't find configuration db, was SSSD configured and run? 310s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 310s Can't find configuration db, was SSSD configured and run? 310s done. 310s Creating initial configuration... done. 310s Creating LDAP directory... done. 310s apparmor_parser: Unable to replace "/usr/sbin/slapd". apparmor_parser: Access denied. You need policy admin privileges to manage profiles. 310s 311s Setting up tcl8.6 (8.6.15+dfsg-2) ... 311s Setting up libsss-sudo (2.10.1-2ubuntu1) ... 311s Setting up libsss-nss-idmap-dev (2.10.1-2ubuntu1) ... 311s Setting up libavahi-common3:armhf (0.8-14ubuntu1) ... 311s Setting up tcl-expect:armhf (5.45.4-3) ... 311s Setting up libsss-certmap0 (2.10.1-2ubuntu1) ... 311s Setting up libpwquality1:armhf (1.4.5-3build1) ... 311s Setting up python3-libsss-nss-idmap (2.10.1-2ubuntu1) ... 311s Setting up libldb2:armhf (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 311s Setting up libavahi-client3:armhf (0.8-14ubuntu1) ... 311s Setting up expect (5.45.4-3) ... 311s Setting up libpam-pwquality:armhf (1.4.5-3build1) ... 311s Setting up samba-libs:armhf (2:4.20.4+dfsg-1ubuntu5) ... 311s Setting up libsss-certmap-dev (2.10.1-2ubuntu1) ... 311s Setting up python3-sss (2.10.1-2ubuntu1) ... 311s Setting up libsmbclient0:armhf (2:4.20.4+dfsg-1ubuntu5) ... 311s Setting up libpam-sss:armhf (2.10.1-2ubuntu1) ... 311s Setting up sssd-common (2.10.1-2ubuntu1) ... 311s Creating SSSD system user & group... 311s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 311s Can't find configuration db, was SSSD configured and run? 311s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 311s Can't find configuration db, was SSSD configured and run? 311s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 311s Can't find configuration db, was SSSD configured and run? 311s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 311s Can't find configuration db, was SSSD configured and run? 311s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 311s Can't find configuration db, was SSSD configured and run? 311s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 311s Can't find configuration db, was SSSD configured and run? 311s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 311s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 311s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 311s apparmor_parser: Unable to replace "/usr/sbin/sssd". apparmor_parser: Access denied. You need policy admin privileges to manage profiles. 311s 312s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-autofs.socket' → '/usr/lib/systemd/system/sssd-autofs.socket'. 312s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-nss.socket' → '/usr/lib/systemd/system/sssd-nss.socket'. 313s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pam.socket' → '/usr/lib/systemd/system/sssd-pam.socket'. 313s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-ssh.socket' → '/usr/lib/systemd/system/sssd-ssh.socket'. 313s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-sudo.socket' → '/usr/lib/systemd/system/sssd-sudo.socket'. 314s Created symlink '/etc/systemd/system/multi-user.target.wants/sssd.service' → '/usr/lib/systemd/system/sssd.service'. 314s sssd-autofs.service is a disabled or a static unit, not starting it. 314s sssd-nss.service is a disabled or a static unit, not starting it. 314s sssd-pam.service is a disabled or a static unit, not starting it. 314s sssd-ssh.service is a disabled or a static unit, not starting it. 314s sssd-sudo.service is a disabled or a static unit, not starting it. 314s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 314s Setting up sssd-proxy (2.10.1-2ubuntu1) ... 314s Setting up sssd-kcm (2.10.1-2ubuntu1) ... 314s Created symlink '/etc/systemd/system/sockets.target.wants/sssd-kcm.socket' → '/usr/lib/systemd/system/sssd-kcm.socket'. 315s sssd-kcm.service is a disabled or a static unit, not starting it. 315s Setting up sssd-dbus (2.10.1-2ubuntu1) ... 315s sssd-ifp.service is a disabled or a static unit, not starting it. 315s Setting up sssd-ad-common (2.10.1-2ubuntu1) ... 315s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pac.socket' → '/usr/lib/systemd/system/sssd-pac.socket'. 316s sssd-pac.service is a disabled or a static unit, not starting it. 316s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 316s Setting up sssd-krb5-common (2.10.1-2ubuntu1) ... 316s Setting up sssd-krb5 (2.10.1-2ubuntu1) ... 316s Setting up sssd-ldap (2.10.1-2ubuntu1) ... 316s Setting up sssd-ad (2.10.1-2ubuntu1) ... 316s Setting up sssd-tools (2.10.1-2ubuntu1) ... 316s Setting up sssd-ipa (2.10.1-2ubuntu1) ... 316s Setting up sssd (2.10.1-2ubuntu1) ... 316s Setting up libverto1t64:armhf (0.3.1-1.2ubuntu3) ... 316s Setting up libkrad0:armhf (1.21.3-3) ... 316s Setting up libverto-libevent1t64:armhf (0.3.1-1.2ubuntu3) ... 316s Setting up sssd-passkey (2.10.1-2ubuntu1) ... 316s Setting up sssd-idp (2.10.1-2ubuntu1) ... 316s Processing triggers for libc-bin (2.40-4ubuntu1) ... 316s Processing triggers for ufw (0.36.2-8) ... 316s Processing triggers for man-db (2.13.0-1) ... 317s Processing triggers for dbus (1.14.10-4ubuntu5) ... 384s autopkgtest [02:39:42]: test ldap-user-group-ldap-auth: [----------------------- 386s + . debian/tests/util 386s + . debian/tests/common-tests 386s + trap cleanup EXIT 386s + mydomain=example.com 386s + myhostname=ldap.example.com 386s + mysuffix=dc=example,dc=com 386s + admin_dn=cn=admin,dc=example,dc=com 386s + admin_pw=secret 386s + ldap_user=testuser1 386s + ldap_user_pw=testuser1secret 386s + ldap_group=ldapusers 386s + adjust_hostname ldap.example.com 386s + local myhostname=ldap.example.com 386s + echo ldap.example.com 386s + hostname ldap.example.com 386s + grep -qE ldap.example.com /etc/hosts 386s + echo 127.0.1.10 ldap.example.com 386s + reconfigure_slapd 386s + debconf-set-selections 386s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 386s + dpkg-reconfigure -fnoninteractive -pcritical slapd 387s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.8+dfsg-1~exp4ubuntu3... done. 387s Moving old database directory to /var/backups: 387s - directory unknown... done. 387s Creating initial configuration... done. 387s Creating LDAP directory... done. 387s apparmor_parser: Unable to replace "/usr/sbin/slapd". apparmor_parser: Access denied. You need policy admin privileges to manage profiles. 387s 387s + generate_certs ldap.example.com 387s + local cn=ldap.example.com 387s + local cert=/etc/ldap/server.pem 387s + local key=/etc/ldap/server.key 387s + local cnf=/etc/ldap/openssl.cnf 387s + cat 387s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 387s ..........+..+.+...............+..+.......+...+..+++++++++++++++++++++++++++++++++++++++*....+.+..+...+...................+...........+...+.......+++++++++++++++++++++++++++++++++++++++*....+..........+...+...+...+.....+....+..+.............+..+...+.+..+..........+...+...........+.+..................+.................+.......++++++ 388s ..........+++++++++++++++++++++++++++++++++++++++*..............+++++++++++++++++++++++++++++++++++++++*...........+......+......+.........+.+...+......++++++ 388s ----- 388s + chmod 0640 /etc/ldap/server.key 388s + chgrp openldap /etc/ldap/server.key 388s + [ ! -f /etc/ldap/server.pem ] 388s + [ ! -f /etc/ldap/server.key ] 388s + enable_ldap_ssl 388s + cat 388s + cat 388s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 388s + populate_ldap_rfc2307 388s + cat 388s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 388s modifying entry "cn=config" 388s 388s + configure_sssd_ldap_rfc2307 388s + cat 388s + chmod 0600 /etc/sssd/sssd.conf 388s + systemctl restart sssd 388s adding new entry "ou=People,dc=example,dc=com" 388s 388s adding new entry "ou=Group,dc=example,dc=com" 388s 388s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 388s 388s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 388s 388s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 388s 388s + enable_pam_mkhomedir 388s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 388s + echo session optional pam_mkhomedir.so 388s + run_common_tests 388s + echo Assert local user databases do not have our LDAP test data 388s + check_local_user testuser1 388s + local local_user=testuser1 388s + grep -q ^testuser1 /etc/passwd 388s + check_local_group testuser1 388s + local local_group=testuser1 388s + grep -q ^testuser1 /etc/group 388s + check_local_group ldapusers 388s + local local_group=ldapusers 388s + grep -q ^ldapusers /etc/group 388s Assert local user databases do not have our LDAP test data 388s + echo The LDAP user is known to the system via getent 388s + check_getent_user testuser1 388s + local getent_user=testuser1 388s + local output 388s + getent passwd testuser1 388s The LDAP user is known to the system via getent 388s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 388s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 388s + echo The LDAP user's private group is known to the system via getent 388s + check_getent_group testuser1 388s + local getent_group=testuser1 388s + local output 388s + getent group testuser1 388s The LDAP user's private group is known to the system via getent 388s + output=testuser1:*:10001:testuser1 388s + [ -z testuser1:*:10001:testuser1 ] 388s + echo The LDAP group ldapusers is known to the system via getent 388s + check_getent_group ldapusers 388s + local getent_group=ldapusers 388s + local output 388s + getent group ldapusers 388s The LDAP group ldapusers is known to the system via getent 388s + output=ldapusers:*:10100:testuser1 388s + [ -z ldapusers:*:10100:testuser1 ] 388s + echo The id(1) command can resolve the group membership of the LDAP user 388s + id -Gn testuser1 388s The id(1) command can resolve the group membership of the LDAP user 388s + output=testuser1 ldapusers 388s + [ testuser1 ldapusers != testuser1 ldapusers ] 388s + echo The LDAP user can login via ssh 388s + setup_sshd_password_auth 388s + cat 388s + systemctl restart ssh 388s The LDAP user can login via ssh 388s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 388s spawn ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no testuser1@localhost 388s Warning: Permanently added 'localhost' (ED25519) to the list of known hosts. 388s testuser1@localhost's password: 389s Creating directory '/home/testuser1'. 389s Welcome to Ubuntu Plucky Puffin (development branch) (GNU/Linux 6.8.0-49-generic armv7l) 389s 389s * Documentation: https://help.ubuntu.com 389s * Management: https://landscape.canonical.com 389s * Support: https://ubuntu.com/pro 389s 389s The programs included with the Ubuntu system are free software; 389s the exact distribution terms for each program are described in the 389s individual files in /usr/share/doc/*/copyright. 389s 389s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 389s applicable law. 389s 389s testuser1@ldap:~$ + cleanup 389s + result=0 389s + set +e 389s + [ 0 -ne 0 ] 389s + echo ## All tests passed, phew 389s + cleanup_sshd_config 389s + rm -f /etc/ssh/sshd_config.d/00-dep8.conf 389s id -un 389s + systemctl restart ssh 389s testuser1 389s testuser1@ldap:~$ ## All tests passed, phew 389s autopkgtest [02:39:47]: test ldap-user-group-ldap-auth: -----------------------] 394s ldap-user-group-ldap-auth PASS 394s autopkgtest [02:39:52]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 398s autopkgtest [02:39:56]: test ldap-user-group-krb5-auth: preparing testbed 400s Reading package lists... 400s Building dependency tree... 400s Reading state information... 401s Starting pkgProblemResolver with broken count: 0 401s Starting 2 pkgProblemResolver with broken count: 0 401s Done 401s The following NEW packages will be installed: 401s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4t64 401s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 402s 0 upgraded, 8 newly installed, 0 to remove and 2 not upgraded. 402s Need to get 568 kB of archives. 402s After this operation, 1666 kB of additional disk space will be used. 402s Get:1 http://ftpmaster.internal/ubuntu plucky/main armhf krb5-config all 2.7 [22.0 kB] 402s Get:2 http://ftpmaster.internal/ubuntu plucky/main armhf libgssrpc4t64 armhf 1.21.3-3 [51.5 kB] 402s Get:3 http://ftpmaster.internal/ubuntu plucky/main armhf libkadm5clnt-mit12 armhf 1.21.3-3 [35.1 kB] 402s Get:4 http://ftpmaster.internal/ubuntu plucky/main armhf libkdb5-10t64 armhf 1.21.3-3 [35.1 kB] 402s Get:5 http://ftpmaster.internal/ubuntu plucky/main armhf libkadm5srv-mit12 armhf 1.21.3-3 [45.6 kB] 402s Get:6 http://ftpmaster.internal/ubuntu plucky/universe armhf krb5-user armhf 1.21.3-3 [111 kB] 402s Get:7 http://ftpmaster.internal/ubuntu plucky/universe armhf krb5-kdc armhf 1.21.3-3 [177 kB] 402s Get:8 http://ftpmaster.internal/ubuntu plucky/universe armhf krb5-admin-server armhf 1.21.3-3 [91.0 kB] 402s Preconfiguring packages ... 403s Fetched 568 kB in 1s (1108 kB/s) 403s Selecting previously unselected package krb5-config. 403s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60990 files and directories currently installed.) 403s Preparing to unpack .../0-krb5-config_2.7_all.deb ... 403s Unpacking krb5-config (2.7) ... 403s Selecting previously unselected package libgssrpc4t64:armhf. 403s Preparing to unpack .../1-libgssrpc4t64_1.21.3-3_armhf.deb ... 403s Unpacking libgssrpc4t64:armhf (1.21.3-3) ... 403s Selecting previously unselected package libkadm5clnt-mit12:armhf. 403s Preparing to unpack .../2-libkadm5clnt-mit12_1.21.3-3_armhf.deb ... 403s Unpacking libkadm5clnt-mit12:armhf (1.21.3-3) ... 403s Selecting previously unselected package libkdb5-10t64:armhf. 403s Preparing to unpack .../3-libkdb5-10t64_1.21.3-3_armhf.deb ... 403s Unpacking libkdb5-10t64:armhf (1.21.3-3) ... 403s Selecting previously unselected package libkadm5srv-mit12:armhf. 403s Preparing to unpack .../4-libkadm5srv-mit12_1.21.3-3_armhf.deb ... 403s Unpacking libkadm5srv-mit12:armhf (1.21.3-3) ... 403s Selecting previously unselected package krb5-user. 403s Preparing to unpack .../5-krb5-user_1.21.3-3_armhf.deb ... 403s Unpacking krb5-user (1.21.3-3) ... 403s Selecting previously unselected package krb5-kdc. 403s Preparing to unpack .../6-krb5-kdc_1.21.3-3_armhf.deb ... 403s Unpacking krb5-kdc (1.21.3-3) ... 403s Selecting previously unselected package krb5-admin-server. 404s Preparing to unpack .../7-krb5-admin-server_1.21.3-3_armhf.deb ... 404s Unpacking krb5-admin-server (1.21.3-3) ... 404s Setting up libgssrpc4t64:armhf (1.21.3-3) ... 404s Setting up krb5-config (2.7) ... 404s Setting up libkadm5clnt-mit12:armhf (1.21.3-3) ... 404s Setting up libkdb5-10t64:armhf (1.21.3-3) ... 404s Setting up libkadm5srv-mit12:armhf (1.21.3-3) ... 404s Setting up krb5-user (1.21.3-3) ... 404s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 404s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 404s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 404s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 404s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 404s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 404s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 404s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 404s Setting up krb5-kdc (1.21.3-3) ... 404s Created symlink '/etc/systemd/system/multi-user.target.wants/krb5-kdc.service' → '/usr/lib/systemd/system/krb5-kdc.service'. 405s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 405s Setting up krb5-admin-server (1.21.3-3) ... 406s Created symlink '/etc/systemd/system/multi-user.target.wants/krb5-admin-server.service' → '/usr/lib/systemd/system/krb5-admin-server.service'. 406s Processing triggers for man-db (2.13.0-1) ... 407s Processing triggers for libc-bin (2.40-4ubuntu1) ... 477s autopkgtest [02:41:15]: test ldap-user-group-krb5-auth: [----------------------- 479s + . debian/tests/util 479s + . debian/tests/common-tests 479s + trap cleanup EXIT 479s + mydomain=example.com 479s + myhostname=ldap.example.com 479s + mysuffix=dc=example,dc=com 479s + myrealm=EXAMPLE.COM 479s + admin_dn=cn=admin,dc=example,dc=com 479s + admin_pw=secret 479s + ldap_user=testuser1 479s + ldap_user_pw=testuser1secret 479s + kerberos_principal_pw=testuser1kerberos 479s + ldap_group=ldapusers 479s + adjust_hostname ldap.example.com 479s + local myhostname=ldap.example.com 479s + echo ldap.example.com 479s + hostname ldap.example.com 479s + grep -qE ldap.example.com /etc/hosts 479s + reconfigure_slapd 479s + debconf-set-selections 479s + rm -rf /var/backups/slapd-2.6.8+dfsg-1~exp4ubuntu3 /var/backups/unknown-2.6.8+dfsg-1~exp4ubuntu3-20250115-023945.ldapdb 479s + dpkg-reconfigure -fnoninteractive -pcritical slapd 480s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.8+dfsg-1~exp4ubuntu3... done. 480s Moving old database directory to /var/backups: 480s - directory unknown... done. 480s Creating initial configuration... done. 480s Creating LDAP directory... done. 480s apparmor_parser: Unable to replace "/usr/sbin/slapd". apparmor_parser: Access denied. You need policy admin privileges to manage profiles. 480s 481s + generate_certs ldap.example.com 481s + local cn=ldap.example.com 481s + local cert=/etc/ldap/server.pem 481s + local key=/etc/ldap/server.key 481s + local cnf=/etc/ldap/openssl.cnf 481s + cat 481s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 481s .+........+......+.+..+..........+++++++++++++++++++++++++++++++++++++++*...+.+++++++++++++++++++++++++++++++++++++++*.+.......+..............+......+....+.........+.....+.+.........+.....................+......+...........+...+......+...+...+...+....+...+........+......+...+......................+......+..+.......+.........+.....+.+....................+.........+....+........+..........++++++ 481s ..+.....+.......+...+..+....+...........+..........+++++++++++++++++++++++++++++++++++++++*.+.+++++++++++++++++++++++++++++++++++++++*..+....+...+......+.....+....+......+..+...+......+...............+...+.+...........+.............+..+....+.....+..........+.........+..+......+...+....+.....+......+....+............+...........+...+.+......+.....+....+...+...+.....+.......+......+.........+..+....+..+...+.........+.......+.....+................+..+.+.........+..+.+.....+...........................+...............+...+...+....+...+..+.+.....+......+....+...........+....+..+...............+.............+.....+............+....+.....+...+...+.......+...+..+......+.+...+.......................+...+.+...+..+..........+......+........+.......+...+..+.......+......+..+..........+........+....+.....+.......+.....+.+..+......+......+.............+..++++++ 481s ----- 481s + chmod 0640 /etc/ldap/server.key 481s + chgrp openldap /etc/ldap/server.key 481s + [ ! -f /etc/ldap/server.pem ] 481s + [ ! -f /etc/ldap/server.key ] 481s + enable_ldap_ssl 481s + cat 481s + cat 481s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 481s + populate_ldap_rfc2307 481s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 481s + cat 481s modifying entry "cn=config" 481s 481s adding new entry "ou=People,dc=example,dc=com" 481s 481s adding new entry "ou=Group,dc=example,dc=com" 481s 481s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 481s 481s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 481s 481s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 481s 481s + create_realm EXAMPLE.COM ldap.example.com 481s + local realm_name=EXAMPLE.COM 481s + local kerberos_server=ldap.example.com 481s + rm -rf /var/lib/krb5kdc/* 481s + rm -rf /etc/krb5kdc/kdc.conf 481s + rm -f /etc/krb5.keytab 481s + cat 481s + cat 481s + echo # */admin * 481s + kdb5_util create -s -P secretpassword 481s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 481s master key name 'K/M@EXAMPLE.COM' 481s + systemctl restart krb5-kdc.service krb5-admin-server.service 481s + create_krb_principal testuser1 testuser1kerberos 481s + local principal=testuser1 481s + local password=testuser1kerberos 481s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 481s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 481s Authenticating as principal root/admin@EXAMPLE.COM with password. 481s Principal "testuser1@EXAMPLE.COM" created. 481s + configure_sssd_ldap_rfc2307_krb5_auth 481s + cat 481s + chmod 0600 /etc/sssd/sssd.conf 481s + systemctl restart sssd 482s + enable_pam_mkhomedir 482s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 482s Assert local user databases do not have our LDAP test data 482s + run_common_tests 482s + echo Assert local user databases do not have our LDAP test data 482s + check_local_user testuser1 482s + local local_user=testuser1 482s + grep -q ^testuser1 /etc/passwd 482s + check_local_group testuser1 482s + local local_group=testuser1 482s + grep -q ^testuser1 /etc/group 482s + check_local_group ldapusers 482s + local local_group=ldapusers 482s + grep -q ^ldapusers /etc/group 482s The LDAP user is known to the system via getent 482s + echo The LDAP user is known to the system via getent 482s + check_getent_user testuser1 482s + local getent_user=testuser1 482s + local output 482s + getent passwd testuser1 482s The LDAP user's private group is known to the system via getent 482s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 482s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 482s + echo The LDAP user's private group is known to the system via getent 482s + check_getent_group testuser1 482s + local getent_group=testuser1 482s + local output 482s + getent group testuser1 482s The LDAP group ldapusers is known to the system via getent 482s + output=testuser1:*:10001:testuser1 482s + [ -z testuser1:*:10001:testuser1 ] 482s + echo The LDAP group ldapusers is known to the system via getent 482s + check_getent_group ldapusers 482s + local getent_group=ldapusers 482s + local output 482s + getent group ldapusers 482s The id(1) command can resolve the group membership of the LDAP user 482s + output=ldapusers:*:10100:testuser1 482s + [ -z ldapusers:*:10100:testuser1 ] 482s + echo The id(1) command can resolve the group membership of the LDAP user 482s + id -Gn testuser1 482s The Kerberos principal can login via ssh 482s + output=testuser1 ldapusers 482s + [ testuser1 ldapusers != testuser1 ldapusers ] 482s + echo The Kerberos principal can login via ssh 482s + setup_sshd_password_auth 482s + cat 482s + systemctl restart ssh 482s + kdestroy 482s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 482s spawn ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no testuser1@localhost 482s Warning: Permanently added 'localhost' (ED25519) to the list of known hosts. 482s testuser1@localhost's password: 483s Welcome to Ubuntu Plucky Puffin (development branch) (GNU/Linux 6.8.0-49-generic armv7l) 483s 483s * Documentation: https://help.ubuntu.com 483s * Management: https://landscape.canonical.com 483s * Support: https://ubuntu.com/pro 483s 483s Last login: Wed Jan 15 02:39:47 2025 from 127.0.0.1 483s testuser1@ldap:~$ id -un 483s testuser1 483s testuser1@ldap:~$ klist 483s Ticket cache: FILE:/tmp/krb5cc_10001_dgvQaR 483s Default principal: testuser1@EXAMPLE.COM 483s 483s Valid starting Expires Service principal 483s 01/15/25 02:41:20 01/15/25 12:41:20 krbtgt/EXAMPLE.COM@EXAMPLE.COM 483s renew until 01/16/25 02:41:20 483s + cleanup 483s + result=0 483s + set +e 483s + [ 0 -ne 0 ] 483s + echo ## All tests passed, phew 483s + cleanup_sshd_config 483s + rm -f /etc/ssh/sshd_config.d/00-dep8.conf 483s ## All tests passed, phew 483s + systemctl restart ssh 483s autopkgtest [02:41:21]: test ldap-user-group-krb5-auth: -----------------------] 488s ldap-user-group-krb5-auth PASS 488s autopkgtest [02:41:26]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 492s autopkgtest [02:41:30]: test sssd-softhism2-certificates-tests.sh: preparing testbed 517s autopkgtest [02:41:55]: testbed dpkg architecture: armhf 519s autopkgtest [02:41:57]: testbed apt version: 2.9.18 524s autopkgtest [02:42:02]: @@@@@@@@@@@@@@@@@@@@ test bed setup 526s autopkgtest [02:42:04]: testbed release detected to be: plucky 535s autopkgtest [02:42:13]: updating testbed package index (apt update) 537s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 537s Get:2 http://ftpmaster.internal/ubuntu plucky InRelease [213 kB] 538s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 538s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 538s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [149 kB] 538s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 538s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [12.3 kB] 538s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [880 kB] 541s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf Packages [245 kB] 541s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted armhf Packages [756 B] 541s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe armhf Packages [904 kB] 543s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse armhf Packages [3392 B] 543s Get:13 http://ftpmaster.internal/ubuntu plucky/universe Sources [20.9 MB] 554s Get:14 http://ftpmaster.internal/ubuntu plucky/main Sources [1382 kB] 554s Get:15 http://ftpmaster.internal/ubuntu plucky/main armhf Packages [1359 kB] 554s Get:16 http://ftpmaster.internal/ubuntu plucky/universe armhf Packages [14.9 MB] 558s Fetched 41.1 MB in 21s (1969 kB/s) 559s Reading package lists... 566s autopkgtest [02:42:44]: upgrading testbed (apt dist-upgrade and autopurge) 568s Reading package lists... 568s Building dependency tree... 568s Reading state information... 569s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 569s Starting 2 pkgProblemResolver with broken count: 0 569s Done 570s Entering ResolveByKeep 570s 570s The following packages were automatically installed and are no longer required: 570s libnsl2 libpython3.12-minimal libpython3.12-stdlib python3.12 570s python3.12-minimal 570s Use 'apt autoremove' to remove them. 570s The following NEW packages will be installed: 570s libpython3.13-minimal libpython3.13-stdlib python3.13 python3.13-minimal 570s The following packages have been kept back: 570s libnftables1 nftables 570s The following packages will be upgraded: 570s binutils binutils-arm-linux-gnueabihf binutils-common dpkg dpkg-dev 570s gcc-14-base libatomic1 libbinutils libctf-nobfd0 libctf0 libdpkg-perl 570s libgcc-s1 libnss-systemd libpam-systemd libpython3-stdlib libsframe1 570s libstdc++6 libsystemd-shared libsystemd0 libudev1 libzstd1 python3 570s python3-minimal systemd systemd-cryptsetup systemd-resolved systemd-sysv 570s systemd-timesyncd tzdata udev vim-common vim-tiny xxd zstd 571s 34 upgraded, 4 newly installed, 0 to remove and 2 not upgraded. 571s Need to get 24.5 MB of archives. 571s After this operation, 25.6 MB of additional disk space will be used. 571s Get:1 http://ftpmaster.internal/ubuntu plucky/main armhf dpkg armhf 1.22.11ubuntu4 [1242 kB] 571s Get:2 http://ftpmaster.internal/ubuntu plucky/main armhf libpython3.13-minimal armhf 3.13.1-2 [868 kB] 571s Get:3 http://ftpmaster.internal/ubuntu plucky/main armhf python3.13-minimal armhf 3.13.1-2 [2036 kB] 571s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf python3-minimal armhf 3.13.1-1~exp2 [27.6 kB] 571s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf python3 armhf 3.13.1-1~exp2 [23.9 kB] 571s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf tzdata all 2024b-6ubuntu1 [197 kB] 571s Get:7 http://ftpmaster.internal/ubuntu plucky/main armhf libpython3.13-stdlib armhf 3.13.1-2 [1970 kB] 571s Get:8 http://ftpmaster.internal/ubuntu plucky/main armhf python3.13 armhf 3.13.1-2 [729 kB] 571s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libpython3-stdlib armhf 3.13.1-1~exp2 [10.2 kB] 571s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd-timesyncd armhf 257.1-7ubuntu1 [42.0 kB] 571s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd-resolved armhf 257.1-7ubuntu1 [311 kB] 571s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd-cryptsetup armhf 257.1-7ubuntu1 [126 kB] 571s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsystemd-shared armhf 257.1-7ubuntu1 [2201 kB] 572s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsystemd0 armhf 257.1-7ubuntu1 [494 kB] 572s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd-sysv armhf 257.1-7ubuntu1 [11.8 kB] 572s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libnss-systemd armhf 257.1-7ubuntu1 [164 kB] 572s Get:17 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libpam-systemd armhf 257.1-7ubuntu1 [238 kB] 572s Get:18 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf systemd armhf 257.1-7ubuntu1 [3553 kB] 572s Get:19 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf udev armhf 257.1-7ubuntu1 [1979 kB] 572s Get:20 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libudev1 armhf 257.1-7ubuntu1 [192 kB] 572s Get:21 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf gcc-14-base armhf 14.2.0-13ubuntu1 [53.0 kB] 572s Get:22 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libstdc++6 armhf 14.2.0-13ubuntu1 [711 kB] 572s Get:23 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libatomic1 armhf 14.2.0-13ubuntu1 [7890 B] 572s Get:24 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libgcc-s1 armhf 14.2.0-13ubuntu1 [40.6 kB] 572s Get:25 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libzstd1 armhf 1.5.6+dfsg-2 [266 kB] 572s Get:26 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf vim-tiny armhf 2:9.1.0967-1ubuntu1 [696 kB] 572s Get:27 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf vim-common all 2:9.1.0967-1ubuntu1 [396 kB] 572s Get:28 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf xxd armhf 2:9.1.0967-1ubuntu1 [67.3 kB] 572s Get:29 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libctf0 armhf 2.43.50.20250108-1ubuntu1 [74.5 kB] 572s Get:30 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libctf-nobfd0 armhf 2.43.50.20250108-1ubuntu1 [77.4 kB] 572s Get:31 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf binutils-arm-linux-gnueabihf armhf 2.43.50.20250108-1ubuntu1 [2960 kB] 572s Get:32 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libbinutils armhf 2.43.50.20250108-1ubuntu1 [403 kB] 572s Get:33 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf binutils armhf 2.43.50.20250108-1ubuntu1 [3084 B] 572s Get:34 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf binutils-common armhf 2.43.50.20250108-1ubuntu1 [222 kB] 572s Get:35 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsframe1 armhf 2.43.50.20250108-1ubuntu1 [12.2 kB] 572s Get:36 http://ftpmaster.internal/ubuntu plucky/main armhf dpkg-dev all 1.22.11ubuntu4 [1088 kB] 572s Get:37 http://ftpmaster.internal/ubuntu plucky/main armhf libdpkg-perl all 1.22.11ubuntu4 [279 kB] 572s Get:38 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf zstd armhf 1.5.6+dfsg-2 [690 kB] 572s Preconfiguring packages ... 573s Fetched 24.5 MB in 2s (16.0 MB/s) 573s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59676 files and directories currently installed.) 573s Preparing to unpack .../dpkg_1.22.11ubuntu4_armhf.deb ... 573s Unpacking dpkg (1.22.11ubuntu4) over (1.22.11ubuntu3) ... 573s Setting up dpkg (1.22.11ubuntu4) ... 573s Selecting previously unselected package libpython3.13-minimal:armhf. 573s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59676 files and directories currently installed.) 573s Preparing to unpack .../libpython3.13-minimal_3.13.1-2_armhf.deb ... 573s Unpacking libpython3.13-minimal:armhf (3.13.1-2) ... 573s Selecting previously unselected package python3.13-minimal. 573s Preparing to unpack .../python3.13-minimal_3.13.1-2_armhf.deb ... 573s Unpacking python3.13-minimal (3.13.1-2) ... 574s Setting up libpython3.13-minimal:armhf (3.13.1-2) ... 574s Setting up python3.13-minimal (3.13.1-2) ... 575s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59996 files and directories currently installed.) 575s Preparing to unpack .../python3-minimal_3.13.1-1~exp2_armhf.deb ... 575s Unpacking python3-minimal (3.13.1-1~exp2) over (3.12.8-1) ... 575s Setting up python3-minimal (3.13.1-1~exp2) ... 575s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59996 files and directories currently installed.) 575s Preparing to unpack .../0-python3_3.13.1-1~exp2_armhf.deb ... 575s Unpacking python3 (3.13.1-1~exp2) over (3.12.8-1) ... 575s Preparing to unpack .../1-tzdata_2024b-6ubuntu1_all.deb ... 575s Unpacking tzdata (2024b-6ubuntu1) over (2024b-4ubuntu1) ... 575s Selecting previously unselected package libpython3.13-stdlib:armhf. 575s Preparing to unpack .../2-libpython3.13-stdlib_3.13.1-2_armhf.deb ... 575s Unpacking libpython3.13-stdlib:armhf (3.13.1-2) ... 575s Selecting previously unselected package python3.13. 575s Preparing to unpack .../3-python3.13_3.13.1-2_armhf.deb ... 575s Unpacking python3.13 (3.13.1-2) ... 575s Preparing to unpack .../4-libpython3-stdlib_3.13.1-1~exp2_armhf.deb ... 575s Unpacking libpython3-stdlib:armhf (3.13.1-1~exp2) over (3.12.8-1) ... 575s Preparing to unpack .../5-systemd-timesyncd_257.1-7ubuntu1_armhf.deb ... 575s Unpacking systemd-timesyncd (257.1-7ubuntu1) over (257-2ubuntu1) ... 575s Preparing to unpack .../6-systemd-resolved_257.1-7ubuntu1_armhf.deb ... 575s Unpacking systemd-resolved (257.1-7ubuntu1) over (257-2ubuntu1) ... 575s Preparing to unpack .../7-systemd-cryptsetup_257.1-7ubuntu1_armhf.deb ... 575s Unpacking systemd-cryptsetup (257.1-7ubuntu1) over (257-2ubuntu1) ... 575s Preparing to unpack .../8-libsystemd-shared_257.1-7ubuntu1_armhf.deb ... 575s Unpacking libsystemd-shared:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 576s Preparing to unpack .../9-libsystemd0_257.1-7ubuntu1_armhf.deb ... 576s Unpacking libsystemd0:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 576s Setting up libsystemd0:armhf (257.1-7ubuntu1) ... 576s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60413 files and directories currently installed.) 576s Preparing to unpack .../0-systemd-sysv_257.1-7ubuntu1_armhf.deb ... 576s Unpacking systemd-sysv (257.1-7ubuntu1) over (257-2ubuntu1) ... 576s Preparing to unpack .../1-libnss-systemd_257.1-7ubuntu1_armhf.deb ... 576s Unpacking libnss-systemd:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 576s Preparing to unpack .../2-libpam-systemd_257.1-7ubuntu1_armhf.deb ... 576s Unpacking libpam-systemd:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 576s Preparing to unpack .../3-systemd_257.1-7ubuntu1_armhf.deb ... 576s Unpacking systemd (257.1-7ubuntu1) over (257-2ubuntu1) ... 576s Preparing to unpack .../4-udev_257.1-7ubuntu1_armhf.deb ... 576s Unpacking udev (257.1-7ubuntu1) over (257-2ubuntu1) ... 576s Preparing to unpack .../5-libudev1_257.1-7ubuntu1_armhf.deb ... 576s Unpacking libudev1:armhf (257.1-7ubuntu1) over (257-2ubuntu1) ... 576s Setting up libudev1:armhf (257.1-7ubuntu1) ... 576s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 576s Preparing to unpack .../gcc-14-base_14.2.0-13ubuntu1_armhf.deb ... 576s Unpacking gcc-14-base:armhf (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 576s Setting up gcc-14-base:armhf (14.2.0-13ubuntu1) ... 576s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 576s Preparing to unpack .../libstdc++6_14.2.0-13ubuntu1_armhf.deb ... 577s Unpacking libstdc++6:armhf (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 577s Setting up libstdc++6:armhf (14.2.0-13ubuntu1) ... 577s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 577s Preparing to unpack .../libatomic1_14.2.0-13ubuntu1_armhf.deb ... 577s Unpacking libatomic1:armhf (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 577s Preparing to unpack .../libgcc-s1_14.2.0-13ubuntu1_armhf.deb ... 577s Unpacking libgcc-s1:armhf (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 577s Setting up libgcc-s1:armhf (14.2.0-13ubuntu1) ... 577s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 577s Preparing to unpack .../libzstd1_1.5.6+dfsg-2_armhf.deb ... 577s Unpacking libzstd1:armhf (1.5.6+dfsg-2) over (1.5.6+dfsg-1) ... 577s Setting up libzstd1:armhf (1.5.6+dfsg-2) ... 577s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 577s Preparing to unpack .../00-vim-tiny_2%3a9.1.0967-1ubuntu1_armhf.deb ... 577s Unpacking vim-tiny (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 577s Preparing to unpack .../01-vim-common_2%3a9.1.0967-1ubuntu1_all.deb ... 577s Unpacking vim-common (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 577s Preparing to unpack .../02-xxd_2%3a9.1.0967-1ubuntu1_armhf.deb ... 577s Unpacking xxd (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 577s Preparing to unpack .../03-libctf0_2.43.50.20250108-1ubuntu1_armhf.deb ... 577s Unpacking libctf0:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 577s Preparing to unpack .../04-libctf-nobfd0_2.43.50.20250108-1ubuntu1_armhf.deb ... 577s Unpacking libctf-nobfd0:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 577s Preparing to unpack .../05-binutils-arm-linux-gnueabihf_2.43.50.20250108-1ubuntu1_armhf.deb ... 577s Unpacking binutils-arm-linux-gnueabihf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 577s Preparing to unpack .../06-libbinutils_2.43.50.20250108-1ubuntu1_armhf.deb ... 577s Unpacking libbinutils:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 577s Preparing to unpack .../07-binutils_2.43.50.20250108-1ubuntu1_armhf.deb ... 577s Unpacking binutils (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 577s Preparing to unpack .../08-binutils-common_2.43.50.20250108-1ubuntu1_armhf.deb ... 577s Unpacking binutils-common:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 577s Preparing to unpack .../09-libsframe1_2.43.50.20250108-1ubuntu1_armhf.deb ... 577s Unpacking libsframe1:armhf (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 577s Preparing to unpack .../10-dpkg-dev_1.22.11ubuntu4_all.deb ... 577s Unpacking dpkg-dev (1.22.11ubuntu4) over (1.22.11ubuntu3) ... 577s Preparing to unpack .../11-libdpkg-perl_1.22.11ubuntu4_all.deb ... 578s Unpacking libdpkg-perl (1.22.11ubuntu4) over (1.22.11ubuntu3) ... 578s Preparing to unpack .../12-zstd_1.5.6+dfsg-2_armhf.deb ... 578s Unpacking zstd (1.5.6+dfsg-2) over (1.5.6+dfsg-1) ... 578s Setting up binutils-common:armhf (2.43.50.20250108-1ubuntu1) ... 578s Setting up libctf-nobfd0:armhf (2.43.50.20250108-1ubuntu1) ... 578s Setting up xxd (2:9.1.0967-1ubuntu1) ... 578s Setting up libsframe1:armhf (2.43.50.20250108-1ubuntu1) ... 578s Setting up tzdata (2024b-6ubuntu1) ... 578s 578s Current default time zone: 'Etc/UTC' 578s Local time is now: Wed Jan 15 02:42:56 UTC 2025. 578s Universal Time is now: Wed Jan 15 02:42:56 UTC 2025. 578s Run 'dpkg-reconfigure tzdata' if you wish to change it. 578s 578s Setting up vim-common (2:9.1.0967-1ubuntu1) ... 578s Setting up libatomic1:armhf (14.2.0-13ubuntu1) ... 578s Setting up libsystemd-shared:armhf (257.1-7ubuntu1) ... 578s Setting up libdpkg-perl (1.22.11ubuntu4) ... 578s Setting up libbinutils:armhf (2.43.50.20250108-1ubuntu1) ... 578s Setting up libpython3.13-stdlib:armhf (3.13.1-2) ... 578s Setting up zstd (1.5.6+dfsg-2) ... 578s Setting up libpython3-stdlib:armhf (3.13.1-1~exp2) ... 578s Setting up libctf0:armhf (2.43.50.20250108-1ubuntu1) ... 578s Setting up python3.13 (3.13.1-2) ... 579s Setting up python3 (3.13.1-1~exp2) ... 579s /usr/bin/py3clean:101: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 579s for fn in glob1(directory, "%s.*" % fname): 579s Setting up systemd (257.1-7ubuntu1) ... 579s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 579s Created symlink '/run/systemd/system/tmp.mount' → '/dev/null'. 580s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 580s Setting up vim-tiny (2:9.1.0967-1ubuntu1) ... 580s Setting up systemd-cryptsetup (257.1-7ubuntu1) ... 580s Setting up systemd-timesyncd (257.1-7ubuntu1) ... 581s systemd-time-wait-sync.service is a disabled or a static unit not running, not starting it. 581s Setting up udev (257.1-7ubuntu1) ... 582s Setting up binutils-arm-linux-gnueabihf (2.43.50.20250108-1ubuntu1) ... 582s Setting up systemd-resolved (257.1-7ubuntu1) ... 582s Setting up systemd-sysv (257.1-7ubuntu1) ... 582s Setting up libnss-systemd:armhf (257.1-7ubuntu1) ... 582s Setting up binutils (2.43.50.20250108-1ubuntu1) ... 582s Setting up dpkg-dev (1.22.11ubuntu4) ... 582s Setting up libpam-systemd:armhf (257.1-7ubuntu1) ... 582s Processing triggers for libc-bin (2.40-4ubuntu1) ... 583s Processing triggers for man-db (2.13.0-1) ... 584s Processing triggers for dbus (1.14.10-4ubuntu5) ... 584s Processing triggers for shared-mime-info (2.4-5) ... 584s Warning: program compiled against libxml 212 using older 209 585s Processing triggers for initramfs-tools (0.142ubuntu35) ... 587s Reading package lists... 587s Building dependency tree... 587s Reading state information... 588s Starting pkgProblemResolver with broken count: 0 588s Starting 2 pkgProblemResolver with broken count: 0 588s Done 589s The following packages will be REMOVED: 589s libnsl2* libpython3.12-minimal* libpython3.12-stdlib* python3.12* 589s python3.12-minimal* 589s 0 upgraded, 0 newly installed, 5 to remove and 2 not upgraded. 589s After this operation, 19.9 MB disk space will be freed. 589s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60414 files and directories currently installed.) 589s Removing python3.12 (3.12.8-3) ... 589s Removing libpython3.12-stdlib:armhf (3.12.8-3) ... 589s Removing libnsl2:armhf (1.3.0-3build3) ... 589s Removing python3.12-minimal (3.12.8-3) ... 590s /usr/bin/py3clean:125: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 590s for fn in glob1(directory, "%s.%s.py[co]" % (fname, magic_tag)): 590s Removing libpython3.12-minimal:armhf (3.12.8-3) ... 590s Processing triggers for systemd (257.1-7ubuntu1) ... 590s Processing triggers for man-db (2.13.0-1) ... 591s Processing triggers for libc-bin (2.40-4ubuntu1) ... 591s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59699 files and directories currently installed.) 591s Purging configuration files for python3.12-minimal (3.12.8-3) ... 591s Purging configuration files for libpython3.12-minimal:armhf (3.12.8-3) ... 593s autopkgtest [02:43:11]: rebooting testbed after setup commands that affected boot 663s Reading package lists... 663s Building dependency tree... 663s Reading state information... 664s Starting pkgProblemResolver with broken count: 0 664s Starting 2 pkgProblemResolver with broken count: 0 664s Done 665s The following NEW packages will be installed: 665s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 665s libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 libdhash1t64 665s libevent-2.1-7t64 libgnutls-dane0t64 libini-config5t64 libipa-hbac0t64 665s libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 665s libpath-utils1t64 libpwquality-common libpwquality1 libref-array1t64 665s libsmbclient0 libsofthsm2 libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 665s libtalloc2 libtdb1 libtevent0t64 libunbound8 libwbclient0 python3-sss 665s samba-libs softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common sssd-common 665s sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 665s 0 upgraded, 45 newly installed, 0 to remove and 2 not upgraded. 665s Need to get 9798 kB of archives. 665s After this operation, 37.5 MB of additional disk space will be used. 665s Get:1 http://ftpmaster.internal/ubuntu plucky/main armhf libevent-2.1-7t64 armhf 2.1.12-stable-10 [127 kB] 665s Get:2 http://ftpmaster.internal/ubuntu plucky/main armhf libunbound8 armhf 1.20.0-1ubuntu2.1 [416 kB] 665s Get:3 http://ftpmaster.internal/ubuntu plucky/main armhf libgnutls-dane0t64 armhf 3.8.8-2ubuntu1 [34.7 kB] 665s Get:4 http://ftpmaster.internal/ubuntu plucky/universe armhf gnutls-bin armhf 3.8.8-2ubuntu1 [279 kB] 665s Get:5 http://ftpmaster.internal/ubuntu plucky/main armhf libavahi-common-data armhf 0.8-14ubuntu1 [30.5 kB] 665s Get:6 http://ftpmaster.internal/ubuntu plucky/main armhf libavahi-common3 armhf 0.8-14ubuntu1 [19.5 kB] 665s Get:7 http://ftpmaster.internal/ubuntu plucky/main armhf libavahi-client3 armhf 0.8-14ubuntu1 [23.6 kB] 665s Get:8 http://ftpmaster.internal/ubuntu plucky/main armhf libbasicobjects0t64 armhf 0.6.2-3 [5434 B] 665s Get:9 http://ftpmaster.internal/ubuntu plucky/main armhf libcares2 armhf 1.34.4-2.1 [85.0 kB] 665s Get:10 http://ftpmaster.internal/ubuntu plucky/main armhf libcollection4t64 armhf 0.6.2-3 [18.8 kB] 665s Get:11 http://ftpmaster.internal/ubuntu plucky/main armhf libcrack2 armhf 2.9.6-5.2 [27.4 kB] 665s Get:12 http://ftpmaster.internal/ubuntu plucky/main armhf libdhash1t64 armhf 0.6.2-3 [7876 B] 665s Get:13 http://ftpmaster.internal/ubuntu plucky/main armhf libpath-utils1t64 armhf 0.6.2-3 [7776 B] 666s Get:14 http://ftpmaster.internal/ubuntu plucky/main armhf libref-array1t64 armhf 0.6.2-3 [6382 B] 666s Get:15 http://ftpmaster.internal/ubuntu plucky/main armhf libini-config5t64 armhf 0.6.2-3 [37.2 kB] 666s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libipa-hbac0t64 armhf 2.10.1-2ubuntu1 [18.0 kB] 666s Get:17 http://ftpmaster.internal/ubuntu plucky/main armhf libtalloc2 armhf 2.4.2-1build2 [25.9 kB] 666s Get:18 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libtdb1 armhf 1.4.12-1build1 [43.4 kB] 666s Get:19 http://ftpmaster.internal/ubuntu plucky/main armhf libtevent0t64 armhf 0.16.1-3 [38.3 kB] 666s Get:20 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libldb2 armhf 2:2.9.1+samba4.20.4+dfsg-1ubuntu5 [168 kB] 666s Get:21 http://ftpmaster.internal/ubuntu plucky/main armhf libnfsidmap1 armhf 1:2.6.4-4ubuntu1 [54.8 kB] 666s Get:22 http://ftpmaster.internal/ubuntu plucky/main armhf libpwquality-common all 1.4.5-3build1 [7748 B] 666s Get:23 http://ftpmaster.internal/ubuntu plucky/main armhf libpwquality1 armhf 1.4.5-3build1 [12.2 kB] 666s Get:24 http://ftpmaster.internal/ubuntu plucky/main armhf libpam-pwquality armhf 1.4.5-3build1 [11.4 kB] 666s Get:25 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libwbclient0 armhf 2:4.20.4+dfsg-1ubuntu5 [72.3 kB] 666s Get:26 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf samba-libs armhf 2:4.20.4+dfsg-1ubuntu5 [5913 kB] 666s Get:27 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsmbclient0 armhf 2:4.20.4+dfsg-1ubuntu5 [58.4 kB] 666s Get:28 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libnss-sss armhf 2.10.1-2ubuntu1 [30.0 kB] 666s Get:29 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libpam-sss armhf 2.10.1-2ubuntu1 [46.4 kB] 666s Get:30 http://ftpmaster.internal/ubuntu plucky/universe armhf softhsm2-common armhf 2.6.1-2.2ubuntu3 [6194 B] 666s Get:31 http://ftpmaster.internal/ubuntu plucky/universe armhf libsofthsm2 armhf 2.6.1-2.2ubuntu3 [230 kB] 666s Get:32 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsss-certmap0 armhf 2.10.1-2ubuntu1 [44.1 kB] 666s Get:33 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsss-idmap0 armhf 2.10.1-2ubuntu1 [21.1 kB] 666s Get:34 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf libsss-nss-idmap0 armhf 2.10.1-2ubuntu1 [28.4 kB] 666s Get:35 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf python3-sss armhf 2.10.1-2ubuntu1 [45.3 kB] 666s Get:36 http://ftpmaster.internal/ubuntu plucky/universe armhf softhsm2 armhf 2.6.1-2.2ubuntu3 [155 kB] 666s Get:37 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-common armhf 2.10.1-2ubuntu1 [1054 kB] 667s Get:38 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-ad-common armhf 2.10.1-2ubuntu1 [67.7 kB] 667s Get:39 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-krb5-common armhf 2.10.1-2ubuntu1 [82.0 kB] 667s Get:40 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-ad armhf 2.10.1-2ubuntu1 [130 kB] 667s Get:41 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-ipa armhf 2.10.1-2ubuntu1 [214 kB] 667s Get:42 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-krb5 armhf 2.10.1-2ubuntu1 [14.0 kB] 667s Get:43 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-ldap armhf 2.10.1-2ubuntu1 [31.2 kB] 667s Get:44 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd-proxy armhf 2.10.1-2ubuntu1 [43.4 kB] 667s Get:45 http://ftpmaster.internal/ubuntu plucky-proposed/main armhf sssd armhf 2.10.1-2ubuntu1 [4116 B] 667s Fetched 9798 kB in 2s (5662 kB/s) 667s Selecting previously unselected package libevent-2.1-7t64:armhf. 667s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 59697 files and directories currently installed.) 667s Preparing to unpack .../00-libevent-2.1-7t64_2.1.12-stable-10_armhf.deb ... 667s Unpacking libevent-2.1-7t64:armhf (2.1.12-stable-10) ... 667s Selecting previously unselected package libunbound8:armhf. 667s Preparing to unpack .../01-libunbound8_1.20.0-1ubuntu2.1_armhf.deb ... 667s Unpacking libunbound8:armhf (1.20.0-1ubuntu2.1) ... 667s Selecting previously unselected package libgnutls-dane0t64:armhf. 667s Preparing to unpack .../02-libgnutls-dane0t64_3.8.8-2ubuntu1_armhf.deb ... 667s Unpacking libgnutls-dane0t64:armhf (3.8.8-2ubuntu1) ... 667s Selecting previously unselected package gnutls-bin. 667s Preparing to unpack .../03-gnutls-bin_3.8.8-2ubuntu1_armhf.deb ... 667s Unpacking gnutls-bin (3.8.8-2ubuntu1) ... 667s Selecting previously unselected package libavahi-common-data:armhf. 667s Preparing to unpack .../04-libavahi-common-data_0.8-14ubuntu1_armhf.deb ... 667s Unpacking libavahi-common-data:armhf (0.8-14ubuntu1) ... 667s Selecting previously unselected package libavahi-common3:armhf. 667s Preparing to unpack .../05-libavahi-common3_0.8-14ubuntu1_armhf.deb ... 667s Unpacking libavahi-common3:armhf (0.8-14ubuntu1) ... 667s Selecting previously unselected package libavahi-client3:armhf. 667s Preparing to unpack .../06-libavahi-client3_0.8-14ubuntu1_armhf.deb ... 667s Unpacking libavahi-client3:armhf (0.8-14ubuntu1) ... 667s Selecting previously unselected package libbasicobjects0t64:armhf. 667s Preparing to unpack .../07-libbasicobjects0t64_0.6.2-3_armhf.deb ... 667s Unpacking libbasicobjects0t64:armhf (0.6.2-3) ... 667s Selecting previously unselected package libcares2:armhf. 667s Preparing to unpack .../08-libcares2_1.34.4-2.1_armhf.deb ... 667s Unpacking libcares2:armhf (1.34.4-2.1) ... 667s Selecting previously unselected package libcollection4t64:armhf. 667s Preparing to unpack .../09-libcollection4t64_0.6.2-3_armhf.deb ... 667s Unpacking libcollection4t64:armhf (0.6.2-3) ... 667s Selecting previously unselected package libcrack2:armhf. 667s Preparing to unpack .../10-libcrack2_2.9.6-5.2_armhf.deb ... 667s Unpacking libcrack2:armhf (2.9.6-5.2) ... 667s Selecting previously unselected package libdhash1t64:armhf. 667s Preparing to unpack .../11-libdhash1t64_0.6.2-3_armhf.deb ... 667s Unpacking libdhash1t64:armhf (0.6.2-3) ... 667s Selecting previously unselected package libpath-utils1t64:armhf. 667s Preparing to unpack .../12-libpath-utils1t64_0.6.2-3_armhf.deb ... 667s Unpacking libpath-utils1t64:armhf (0.6.2-3) ... 667s Selecting previously unselected package libref-array1t64:armhf. 668s Preparing to unpack .../13-libref-array1t64_0.6.2-3_armhf.deb ... 668s Unpacking libref-array1t64:armhf (0.6.2-3) ... 668s Selecting previously unselected package libini-config5t64:armhf. 668s Preparing to unpack .../14-libini-config5t64_0.6.2-3_armhf.deb ... 668s Unpacking libini-config5t64:armhf (0.6.2-3) ... 668s Selecting previously unselected package libipa-hbac0t64. 668s Preparing to unpack .../15-libipa-hbac0t64_2.10.1-2ubuntu1_armhf.deb ... 668s Unpacking libipa-hbac0t64 (2.10.1-2ubuntu1) ... 668s Selecting previously unselected package libtalloc2:armhf. 668s Preparing to unpack .../16-libtalloc2_2.4.2-1build2_armhf.deb ... 668s Unpacking libtalloc2:armhf (2.4.2-1build2) ... 668s Selecting previously unselected package libtdb1:armhf. 668s Preparing to unpack .../17-libtdb1_1.4.12-1build1_armhf.deb ... 668s Unpacking libtdb1:armhf (1.4.12-1build1) ... 668s Selecting previously unselected package libtevent0t64:armhf. 668s Preparing to unpack .../18-libtevent0t64_0.16.1-3_armhf.deb ... 668s Unpacking libtevent0t64:armhf (0.16.1-3) ... 668s Selecting previously unselected package libldb2:armhf. 668s Preparing to unpack .../19-libldb2_2%3a2.9.1+samba4.20.4+dfsg-1ubuntu5_armhf.deb ... 668s Unpacking libldb2:armhf (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 668s Selecting previously unselected package libnfsidmap1:armhf. 668s Preparing to unpack .../20-libnfsidmap1_1%3a2.6.4-4ubuntu1_armhf.deb ... 668s Unpacking libnfsidmap1:armhf (1:2.6.4-4ubuntu1) ... 668s Selecting previously unselected package libpwquality-common. 668s Preparing to unpack .../21-libpwquality-common_1.4.5-3build1_all.deb ... 668s Unpacking libpwquality-common (1.4.5-3build1) ... 668s Selecting previously unselected package libpwquality1:armhf. 668s Preparing to unpack .../22-libpwquality1_1.4.5-3build1_armhf.deb ... 668s Unpacking libpwquality1:armhf (1.4.5-3build1) ... 668s Selecting previously unselected package libpam-pwquality:armhf. 668s Preparing to unpack .../23-libpam-pwquality_1.4.5-3build1_armhf.deb ... 668s Unpacking libpam-pwquality:armhf (1.4.5-3build1) ... 668s Selecting previously unselected package libwbclient0:armhf. 668s Preparing to unpack .../24-libwbclient0_2%3a4.20.4+dfsg-1ubuntu5_armhf.deb ... 668s Unpacking libwbclient0:armhf (2:4.20.4+dfsg-1ubuntu5) ... 668s Selecting previously unselected package samba-libs:armhf. 668s Preparing to unpack .../25-samba-libs_2%3a4.20.4+dfsg-1ubuntu5_armhf.deb ... 668s Unpacking samba-libs:armhf (2:4.20.4+dfsg-1ubuntu5) ... 668s Selecting previously unselected package libsmbclient0:armhf. 668s Preparing to unpack .../26-libsmbclient0_2%3a4.20.4+dfsg-1ubuntu5_armhf.deb ... 668s Unpacking libsmbclient0:armhf (2:4.20.4+dfsg-1ubuntu5) ... 668s Selecting previously unselected package libnss-sss:armhf. 668s Preparing to unpack .../27-libnss-sss_2.10.1-2ubuntu1_armhf.deb ... 668s Unpacking libnss-sss:armhf (2.10.1-2ubuntu1) ... 668s Selecting previously unselected package libpam-sss:armhf. 668s Preparing to unpack .../28-libpam-sss_2.10.1-2ubuntu1_armhf.deb ... 668s Unpacking libpam-sss:armhf (2.10.1-2ubuntu1) ... 668s Selecting previously unselected package softhsm2-common. 668s Preparing to unpack .../29-softhsm2-common_2.6.1-2.2ubuntu3_armhf.deb ... 668s Unpacking softhsm2-common (2.6.1-2.2ubuntu3) ... 668s Selecting previously unselected package libsofthsm2. 668s Preparing to unpack .../30-libsofthsm2_2.6.1-2.2ubuntu3_armhf.deb ... 668s Unpacking libsofthsm2 (2.6.1-2.2ubuntu3) ... 668s Selecting previously unselected package libsss-certmap0. 668s Preparing to unpack .../31-libsss-certmap0_2.10.1-2ubuntu1_armhf.deb ... 668s Unpacking libsss-certmap0 (2.10.1-2ubuntu1) ... 668s Selecting previously unselected package libsss-idmap0. 668s Preparing to unpack .../32-libsss-idmap0_2.10.1-2ubuntu1_armhf.deb ... 668s Unpacking libsss-idmap0 (2.10.1-2ubuntu1) ... 668s Selecting previously unselected package libsss-nss-idmap0. 668s Preparing to unpack .../33-libsss-nss-idmap0_2.10.1-2ubuntu1_armhf.deb ... 668s Unpacking libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 668s Selecting previously unselected package python3-sss. 668s Preparing to unpack .../34-python3-sss_2.10.1-2ubuntu1_armhf.deb ... 668s Unpacking python3-sss (2.10.1-2ubuntu1) ... 668s Selecting previously unselected package softhsm2. 668s Preparing to unpack .../35-softhsm2_2.6.1-2.2ubuntu3_armhf.deb ... 668s Unpacking softhsm2 (2.6.1-2.2ubuntu3) ... 668s Selecting previously unselected package sssd-common. 669s Preparing to unpack .../36-sssd-common_2.10.1-2ubuntu1_armhf.deb ... 669s Unpacking sssd-common (2.10.1-2ubuntu1) ... 669s Selecting previously unselected package sssd-ad-common. 669s Preparing to unpack .../37-sssd-ad-common_2.10.1-2ubuntu1_armhf.deb ... 669s Unpacking sssd-ad-common (2.10.1-2ubuntu1) ... 669s Selecting previously unselected package sssd-krb5-common. 669s Preparing to unpack .../38-sssd-krb5-common_2.10.1-2ubuntu1_armhf.deb ... 669s Unpacking sssd-krb5-common (2.10.1-2ubuntu1) ... 669s Selecting previously unselected package sssd-ad. 669s Preparing to unpack .../39-sssd-ad_2.10.1-2ubuntu1_armhf.deb ... 669s Unpacking sssd-ad (2.10.1-2ubuntu1) ... 669s Selecting previously unselected package sssd-ipa. 669s Preparing to unpack .../40-sssd-ipa_2.10.1-2ubuntu1_armhf.deb ... 669s Unpacking sssd-ipa (2.10.1-2ubuntu1) ... 669s Selecting previously unselected package sssd-krb5. 669s Preparing to unpack .../41-sssd-krb5_2.10.1-2ubuntu1_armhf.deb ... 669s Unpacking sssd-krb5 (2.10.1-2ubuntu1) ... 669s Selecting previously unselected package sssd-ldap. 669s Preparing to unpack .../42-sssd-ldap_2.10.1-2ubuntu1_armhf.deb ... 669s Unpacking sssd-ldap (2.10.1-2ubuntu1) ... 669s Selecting previously unselected package sssd-proxy. 669s Preparing to unpack .../43-sssd-proxy_2.10.1-2ubuntu1_armhf.deb ... 669s Unpacking sssd-proxy (2.10.1-2ubuntu1) ... 669s Selecting previously unselected package sssd. 669s Preparing to unpack .../44-sssd_2.10.1-2ubuntu1_armhf.deb ... 669s Unpacking sssd (2.10.1-2ubuntu1) ... 669s Setting up libpwquality-common (1.4.5-3build1) ... 669s Setting up softhsm2-common (2.6.1-2.2ubuntu3) ... 669s Creating config file /etc/softhsm/softhsm2.conf with new version 669s Setting up libnfsidmap1:armhf (1:2.6.4-4ubuntu1) ... 669s Setting up libsss-idmap0 (2.10.1-2ubuntu1) ... 669s Setting up libbasicobjects0t64:armhf (0.6.2-3) ... 669s Setting up libipa-hbac0t64 (2.10.1-2ubuntu1) ... 669s Setting up libref-array1t64:armhf (0.6.2-3) ... 669s Setting up libtdb1:armhf (1.4.12-1build1) ... 669s Setting up libcollection4t64:armhf (0.6.2-3) ... 669s Setting up libevent-2.1-7t64:armhf (2.1.12-stable-10) ... 669s Setting up libwbclient0:armhf (2:4.20.4+dfsg-1ubuntu5) ... 669s Setting up libtalloc2:armhf (2.4.2-1build2) ... 669s Setting up libpath-utils1t64:armhf (0.6.2-3) ... 669s Setting up libunbound8:armhf (1.20.0-1ubuntu2.1) ... 669s Setting up libgnutls-dane0t64:armhf (3.8.8-2ubuntu1) ... 669s Setting up libavahi-common-data:armhf (0.8-14ubuntu1) ... 669s Setting up libcares2:armhf (1.34.4-2.1) ... 669s Setting up libdhash1t64:armhf (0.6.2-3) ... 669s Setting up libcrack2:armhf (2.9.6-5.2) ... 669s Setting up libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 669s Setting up libini-config5t64:armhf (0.6.2-3) ... 669s Setting up libtevent0t64:armhf (0.16.1-3) ... 669s Setting up libnss-sss:armhf (2.10.1-2ubuntu1) ... 669s Setting up gnutls-bin (3.8.8-2ubuntu1) ... 669s Setting up libsofthsm2 (2.6.1-2.2ubuntu3) ... 669s Setting up softhsm2 (2.6.1-2.2ubuntu3) ... 669s Setting up libavahi-common3:armhf (0.8-14ubuntu1) ... 669s Setting up libsss-certmap0 (2.10.1-2ubuntu1) ... 669s Setting up libpwquality1:armhf (1.4.5-3build1) ... 669s Setting up libldb2:armhf (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 669s Setting up libavahi-client3:armhf (0.8-14ubuntu1) ... 669s Setting up libpam-pwquality:armhf (1.4.5-3build1) ... 669s Setting up samba-libs:armhf (2:4.20.4+dfsg-1ubuntu5) ... 669s Setting up python3-sss (2.10.1-2ubuntu1) ... 670s Setting up libsmbclient0:armhf (2:4.20.4+dfsg-1ubuntu5) ... 670s Setting up libpam-sss:armhf (2.10.1-2ubuntu1) ... 670s Setting up sssd-common (2.10.1-2ubuntu1) ... 670s Creating SSSD system user & group... 670s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 670s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 670s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 670s apparmor_parser: Unable to replace "/usr/sbin/sssd". apparmor_parser: Access denied. You need policy admin privileges to manage profiles. 670s 670s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-autofs.socket' → '/usr/lib/systemd/system/sssd-autofs.socket'. 671s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-nss.socket' → '/usr/lib/systemd/system/sssd-nss.socket'. 671s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pam.socket' → '/usr/lib/systemd/system/sssd-pam.socket'. 671s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-ssh.socket' → '/usr/lib/systemd/system/sssd-ssh.socket'. 671s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-sudo.socket' → '/usr/lib/systemd/system/sssd-sudo.socket'. 672s Created symlink '/etc/systemd/system/multi-user.target.wants/sssd.service' → '/usr/lib/systemd/system/sssd.service'. 672s sssd-autofs.service is a disabled or a static unit, not starting it. 672s sssd-nss.service is a disabled or a static unit, not starting it. 672s sssd-pam.service is a disabled or a static unit, not starting it. 672s sssd-ssh.service is a disabled or a static unit, not starting it. 672s sssd-sudo.service is a disabled or a static unit, not starting it. 672s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 672s Setting up sssd-proxy (2.10.1-2ubuntu1) ... 672s Setting up sssd-ad-common (2.10.1-2ubuntu1) ... 672s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pac.socket' → '/usr/lib/systemd/system/sssd-pac.socket'. 673s sssd-pac.service is a disabled or a static unit, not starting it. 673s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 673s Setting up sssd-krb5-common (2.10.1-2ubuntu1) ... 673s Setting up sssd-krb5 (2.10.1-2ubuntu1) ... 673s Setting up sssd-ldap (2.10.1-2ubuntu1) ... 673s Setting up sssd-ad (2.10.1-2ubuntu1) ... 673s Setting up sssd-ipa (2.10.1-2ubuntu1) ... 673s Setting up sssd (2.10.1-2ubuntu1) ... 673s Processing triggers for man-db (2.13.0-1) ... 673s Processing triggers for libc-bin (2.40-4ubuntu1) ... 692s autopkgtest [02:44:50]: test sssd-softhism2-certificates-tests.sh: [----------------------- 694s + '[' -z ubuntu ']' 694s + required_tools=(p11tool openssl softhsm2-util) 694s + for cmd in "${required_tools[@]}" 694s + command -v p11tool 694s + for cmd in "${required_tools[@]}" 694s + command -v openssl 694s + for cmd in "${required_tools[@]}" 694s + command -v softhsm2-util 694s + PIN=053350 694s +++ find /usr/lib/softhsm/libsofthsm2.so 694s +++ head -n 1 694s ++ realpath /usr/lib/softhsm/libsofthsm2.so 694s + SOFTHSM2_MODULE=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 694s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 694s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 694s + '[' '!' -v NO_SSSD_TESTS ']' 694s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 694s + ca_db_arg=ca_db 694s ++ /usr/libexec/sssd/p11_child --help 694s + p11_child_help='Usage: p11_child [OPTION...] 694s -d, --debug-level=INT Debug level 694s --debug-timestamps=INT Add debug timestamps 694s --debug-microseconds=INT Show timestamps with microseconds 694s --dumpable=INT Allow core dumps 694s --backtrace=INT Enable debug backtrace 694s --debug-fd=INT An open file descriptor for the debug 694s logs 694s --logger=stderr|files|journald Set logger 694s --auth Run in auth mode 694s --pre Run in pre-auth mode 694s --wait_for_card Wait until card is available 694s --verification Run in verification mode 694s --pin Expect PIN on stdin 694s --keypad Expect PIN on keypad 694s --verify=STRING Tune validation 694s --ca_db=STRING CA DB to use 694s --module_name=STRING Module name for authentication 694s --token_name=STRING Token name for authentication 694s --key_id=STRING Key ID for authentication 694s --label=STRING Label for authentication 694s --certificate=STRING certificate to verify, base64 encoded 694s --uri=STRING PKCS#11 URI to restrict selection 694s --chain-id=LONG Tevent chain ID used for logging 694s purposes 694s 694s Help options: 694s -?, --help Show this help message 694s --usage Display brief usage message' 694s + echo 'Usage: p11_child [OPTION...] 694s -d, --debug-level=INT Debug level 694s --debug-timestamps=INT Add debug timestamps 694s --debug-microseconds=INT Show timestamps with microseconds 694s --dumpable=INT Allow core dumps 694s --backtrace=INT Enable debug backtrace 694s --debug-fd=INT An open file descriptor for the debug 694s logs 694s --logger=stderr|files|journald Set logger 694s --auth Run in auth mode 694s --pre Run in pre-auth mode 694s --wait_for_card Wait until card is available 694s --verification Run in verification mode 694s --pin Expect PIN on stdin 694s --keypad Expect PIN on keypad 694s --verify=STRING Tune validation 694s --ca_db=STRING CA DB to use 694s --module_name=STRING Module name for authentication 694s --token_name=STRING Token name for authentication 694s --key_id=STRING Key ID for authentication 694s --label=STRING Label for authentication 694s --certificate=STRING certificate to verify, base64 encoded 694s --uri=STRING PKCS#11 URI to restrict selection 694s --chain-id=LONG Tevent chain ID used for logging 694s purposes 694s 694s Help options: 694s -?, --help Show this help message 694s --usage Display brief usage message' 694s + grep nssdb -qs 694s + echo 'Usage: p11_child [OPTION...] 694s -d, --debug-level=INT Debug level 694s --debug-timestamps=INT Add debug timestamps 694s --debug-microseconds=INT Show timestamps with microseconds 694s --dumpable=INT Allow core dumps 694s --backtrace=INT Enable debug backtrace 694s --debug-fd=INT An open file descriptor for the debug 694s logs 694s --logger=stderr|files|journald Set logger 694s --auth Run in auth mode 694s --pre Run in pre-auth mode 694s --wait_for_card Wait until card is available 694s --verification Run in verification mode 694s --pin Expect PIN on stdin 694s --keypad Expect PIN on keypad 694s --verify=STRING Tune validation 694s --ca_db=STRING CA DB to use 694s --module_name=STRING Module name for authentication 694s --token_name=STRING Token name for authentication 694s --key_id=STRING Key ID for authentication 694s --label=STRING Label for authentication 694s --certificate=STRING certificate to verify, base64 encoded 694s --uri=STRING PKCS#11 URI to restrict selection 694s --chain-id=LONG Tevent chain ID used for logging 694s purposes 694s 694s Help options: 694s -?, --help Show this help message 694s --usage Display brief usage message' 694s + grep -qs -- --ca_db 694s + '[' '!' -e /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so ']' 694s ++ mktemp -d -t sssd-softhsm2-XXXXXX 694s + tmpdir=/tmp/sssd-softhsm2-kTJlBh 694s + keys_size=1024 694s + [[ ! -v KEEP_TEMPORARY_FILES ]] 694s + trap 'rm -rf "$tmpdir"' EXIT 694s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 694s + echo -n 01 694s + touch /tmp/sssd-softhsm2-kTJlBh/index.txt 694s + mkdir -p /tmp/sssd-softhsm2-kTJlBh/new_certs 694s + cat 694s + root_ca_key_pass=pass:random-root-CA-password-19061 694s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-kTJlBh/test-root-CA-key.pem -passout pass:random-root-CA-password-19061 1024 694s + openssl req -passin pass:random-root-CA-password-19061 -batch -config /tmp/sssd-softhsm2-kTJlBh/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-kTJlBh/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 694s + openssl x509 -noout -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 695s + cat 695s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-31980 695s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-31980 1024 695s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-31980 -config /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.config -key /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-19061 -sha256 -out /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-certificate-request.pem 695s + openssl req -text -noout -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-certificate-request.pem 695s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-kTJlBh/test-root-CA.config -passin pass:random-root-CA-password-19061 -keyfile /tmp/sssd-softhsm2-kTJlBh/test-root-CA-key.pem -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 695s Certificate Request: 695s Data: 695s Version: 1 (0x0) 695s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 695s Subject Public Key Info: 695s Public Key Algorithm: rsaEncryption 695s Public-Key: (1024 bit) 695s Modulus: 695s 00:ba:15:c7:12:6d:d1:b7:8d:c1:1e:4e:b4:85:3a: 695s 26:70:fd:ce:23:1a:de:0e:9a:59:51:c6:4a:f9:69: 695s e2:69:82:49:23:85:02:4f:19:8d:4d:3b:1e:a1:ff: 695s f9:e1:6b:f6:b1:3f:7b:15:74:f0:72:88:a1:f7:2e: 695s 48:6a:a9:44:2c:e9:4c:9c:d1:f1:c1:f9:8e:75:6d: 695s c4:dd:cc:71:de:fa:89:59:fc:f4:cb:95:bd:20:72: 695s 8d:10:aa:37:2f:59:63:3d:6f:01:e5:54:da:7b:fb: 695s 78:66:4b:9b:fe:0d:80:96:91:d1:b1:42:79:ad:36: 695s 39:60:29:2c:4e:16:5c:9b:0f 695s Exponent: 65537 (0x10001) 695s Attributes: 695s (none) 695s Requested Extensions: 695s Signature Algorithm: sha256WithRSAEncryption 695s Signature Value: 695s 51:c3:67:8f:27:4e:47:d8:16:54:85:2f:62:66:de:2f:50:76: 695s ce:17:2d:19:ff:c0:d8:8b:0e:34:5f:a0:09:ef:c3:3c:30:21: 695s 58:60:1f:d1:55:62:f7:b5:3f:a6:82:31:dd:7c:b6:65:a3:72: 695s 1f:e9:5d:84:a6:2a:2d:c1:46:f7:bb:0e:01:3f:ab:f6:0b:4e: 695s d2:1e:7e:4d:9f:8d:25:bb:08:23:46:98:f0:4a:27:c9:83:de: 695s 6f:90:99:09:ca:59:cd:5c:18:60:ab:55:00:ac:94:b8:e7:5a: 695s 05:b9:a6:12:5e:ca:50:31:66:b2:68:d0:c5:62:e1:3c:17:0a: 695s 9b:0b 695s Using configuration from /tmp/sssd-softhsm2-kTJlBh/test-root-CA.config 695s Check that the request matches the signature 695s Signature ok 695s Certificate Details: 695s Serial Number: 1 (0x1) 695s Validity 695s Not Before: Jan 15 02:44:53 2025 GMT 695s Not After : Jan 15 02:44:53 2026 GMT 695s Subject: 695s organizationName = Test Organization 695s organizationalUnitName = Test Organization Unit 695s commonName = Test Organization Intermediate CA 695s X509v3 extensions: 695s X509v3 Subject Key Identifier: 695s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 695s X509v3 Authority Key Identifier: 695s keyid:06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 695s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 695s serial:00 695s X509v3 Basic Constraints: 695s CA:TRUE 695s X509v3 Key Usage: critical 695s Digital Signature, Certificate Sign, CRL Sign 695s Certificate is to be certified until Jan 15 02:44:53 2026 GMT (365 days) 695s 695s Write out database with 1 new entries 695s Database updated 695s + openssl x509 -noout -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 695s /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem: OK 695s + cat 695s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-2136 695s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-2136 1024 695s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-2136 -config /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-31980 -sha256 -out /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-certificate-request.pem 695s + openssl req -text -noout -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-certificate-request.pem 695s Certificate Request: 695s Data: 695s Version: 1 (0x0) 695s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 695s Subject Public Key Info: 695s Public Key Algorithm: rsaEncryption 695s Public-Key: (1024 bit) 695s Modulus: 695s 00:c5:96:dc:8c:7a:74:11:9c:f2:ca:bc:ce:c1:39: 695s 66:86:35:fb:63:85:37:82:4b:90:44:e6:f2:5e:89: 695s 43:ac:50:3c:2a:43:b6:ea:90:54:2f:d7:6f:42:f4: 695s 55:4a:a8:9a:a7:b4:c1:8c:74:11:6b:01:8b:cb:b9: 695s b4:dd:e5:aa:4a:1a:55:e6:8a:35:6d:f9:6f:86:e0: 695s 3a:b7:5c:ef:ae:b8:c3:88:97:e7:69:71:28:8f:ae: 695s 62:87:5d:8e:78:9e:40:7c:cb:01:6a:5b:c4:c6:09: 695s a1:aa:3d:9a:a8:75:63:eb:54:7b:84:91:04:be:27: 695s 6a:b5:55:0e:e1:7e:2d:d0:51 695s Exponent: 65537 (0x10001) 695s Attributes: 695s (none) 695s Requested Extensions: 695s Signature Algorithm: sha256WithRSAEncryption 695s Signature Value: 695s 12:c1:d7:52:7b:28:f0:22:24:f4:e2:a6:f0:c1:fa:17:22:7b: 695s 8e:33:0c:83:86:03:af:a7:a0:ef:b6:0f:47:98:f0:c6:22:6a: 695s fc:d9:db:55:b1:00:01:d5:e5:db:c4:e1:b9:97:6c:29:6f:e3: 695s dc:51:d9:91:fd:fc:1e:86:c2:4b:9c:7b:be:f3:f3:20:be:1f: 695s e1:2a:93:f4:fd:dc:d9:22:51:ba:fa:cd:46:ec:e7:d6:51:d2: 695s 1e:08:0f:8d:a5:6c:8a:e3:89:83:d5:67:72:e9:a8:92:19:f3: 695s 6a:0d:51:a0:99:d0:ee:0b:18:1e:74:df:f7:1f:78:e5:c3:c2: 695s a4:44 695s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-31980 -keyfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 695s Using configuration from /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.config 695s Check that the request matches the signature 695s Signature ok 695s Certificate Details: 695s Serial Number: 2 (0x2) 695s Validity 695s Not Before: Jan 15 02:44:53 2025 GMT 695s Not After : Jan 15 02:44:53 2026 GMT 695s Subject: 695s organizationName = Test Organization 695s organizationalUnitName = Test Organization Unit 695s commonName = Test Organization Sub Intermediate CA 695s X509v3 extensions: 695s X509v3 Subject Key Identifier: 695s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 695s X509v3 Authority Key Identifier: 695s keyid:C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 695s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 695s serial:01 695s X509v3 Basic Constraints: 695s CA:TRUE 695s X509v3 Key Usage: critical 695s Digital Signature, Certificate Sign, CRL Sign 695s Certificate is to be certified until Jan 15 02:44:53 2026 GMT (365 days) 695s 695s Write out database with 1 new entries 695s Database updated 695s + openssl x509 -noout -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 695s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 695s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 695s + local cmd=openssl 695s + shift 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 695s /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem: OK 695s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 695s error 20 at 0 depth lookup: unable to get local issuer certificate 695s error /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem: verification failed 695s + cat 695s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-16012 695s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-16012 1024 695s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-16012 -key /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-request.pem 695s + openssl req -text -noout -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-request.pem 695s Certificate Request: 695s Data: 695s Version: 1 (0x0) 695s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 695s Subject Public Key Info: 695s Public Key Algorithm: rsaEncryption 695s Public-Key: (1024 bit) 695s Modulus: 695s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 695s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 695s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 695s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 695s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 695s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 695s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 695s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 695s d8:28:89:ec:86:0b:e6:3e:6d 695s Exponent: 65537 (0x10001) 695s Attributes: 695s Requested Extensions: 695s X509v3 Basic Constraints: 695s CA:FALSE 695s Netscape Cert Type: 695s SSL Client, S/MIME 695s Netscape Comment: 695s Test Organization Root CA trusted Certificate 695s X509v3 Subject Key Identifier: 695s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 695s X509v3 Key Usage: critical 695s Digital Signature, Non Repudiation, Key Encipherment 695s X509v3 Extended Key Usage: 695s TLS Web Client Authentication, E-mail Protection 695s X509v3 Subject Alternative Name: 695s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 695s Signature Algorithm: sha256WithRSAEncryption 695s Signature Value: 695s 7d:85:36:67:79:f7:b5:6d:2e:ac:64:43:d3:7d:d0:71:ac:ce: 695s 36:45:5a:6d:81:0c:6c:70:49:1d:00:3b:d5:b9:a4:89:0c:43: 695s 06:f6:b6:fa:5e:b0:aa:c8:c6:5e:16:af:da:91:16:b0:8f:b3: 695s 57:24:96:7d:26:ab:fa:f6:86:41:e6:1d:9c:5e:f4:68:eb:d4: 695s 5f:82:d2:58:d5:5d:75:1c:97:8b:0c:3b:af:89:76:18:a1:f5: 695s bf:49:d5:85:50:aa:48:20:a7:4d:93:e0:74:44:35:2d:97:dc: 695s 72:7d:96:56:76:87:70:93:07:49:54:37:89:4b:60:2b:75:ca: 695s 32:03 695s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-kTJlBh/test-root-CA.config -passin pass:random-root-CA-password-19061 -keyfile /tmp/sssd-softhsm2-kTJlBh/test-root-CA-key.pem -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s Using configuration from /tmp/sssd-softhsm2-kTJlBh/test-root-CA.config 695s Check that the request matches the signature 695s Signature ok 695s Certificate Details: 695s Serial Number: 3 (0x3) 695s Validity 695s Not Before: Jan 15 02:44:53 2025 GMT 695s Not After : Jan 15 02:44:53 2026 GMT 695s Subject: 695s organizationName = Test Organization 695s organizationalUnitName = Test Organization Unit 695s commonName = Test Organization Root Trusted Certificate 0001 695s X509v3 extensions: 695s X509v3 Authority Key Identifier: 695s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 695s X509v3 Basic Constraints: 695s CA:FALSE 695s Netscape Cert Type: 695s SSL Client, S/MIME 695s Netscape Comment: 695s Test Organization Root CA trusted Certificate 695s X509v3 Subject Key Identifier: 695s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 695s X509v3 Key Usage: critical 695s Digital Signature, Non Repudiation, Key Encipherment 695s X509v3 Extended Key Usage: 695s TLS Web Client Authentication, E-mail Protection 695s X509v3 Subject Alternative Name: 695s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 695s Certificate is to be certified until Jan 15 02:44:53 2026 GMT (365 days) 695s 695s Write out database with 1 new entries 695s Database updated 695s + openssl x509 -noout -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem: OK 695s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s + local cmd=openssl 695s + shift 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 695s error 20 at 0 depth lookup: unable to get local issuer certificate 695s error /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem: verification failed 695s + cat 695s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 695s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-22763 1024 695s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-22763 -key /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-request.pem 695s + openssl req -text -noout -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-request.pem 695s + openssl ca -passin pass:random-intermediate-CA-password-31980 -config /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 695s Certificate Request: 695s Data: 695s Version: 1 (0x0) 695s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 695s Subject Public Key Info: 695s Public Key Algorithm: rsaEncryption 695s Public-Key: (1024 bit) 695s Modulus: 695s 00:ce:46:d1:a3:0f:80:03:47:fb:9a:cc:df:77:d3: 695s 17:ea:0b:9c:e4:56:85:46:5c:d1:ff:f0:6a:54:84: 695s 4d:49:74:31:6b:db:03:be:14:d9:09:90:b6:48:7a: 695s b7:7e:a1:b6:ed:41:9d:66:fc:82:d1:ad:20:3a:89: 695s 55:c5:b3:e1:2e:ef:a4:01:66:1c:52:dd:39:ca:27: 695s 03:20:d3:81:78:87:e9:b4:73:30:ef:4c:ee:f6:4d: 695s 42:d8:90:c3:1e:63:41:92:c1:86:7d:d0:3c:02:de: 695s f5:67:6c:0b:70:bf:ab:55:2c:2e:d3:ba:75:f3:22: 695s 7b:ac:3a:85:d5:92:65:0a:bf 695s Exponent: 65537 (0x10001) 695s Attributes: 695s Requested Extensions: 695s X509v3 Basic Constraints: 695s CA:FALSE 695s Netscape Cert Type: 695s SSL Client, S/MIME 695s Netscape Comment: 695s Test Organization Intermediate CA trusted Certificate 695s X509v3 Subject Key Identifier: 695s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 695s X509v3 Key Usage: critical 695s Digital Signature, Non Repudiation, Key Encipherment 695s X509v3 Extended Key Usage: 695s TLS Web Client Authentication, E-mail Protection 695s X509v3 Subject Alternative Name: 695s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 695s Signature Algorithm: sha256WithRSAEncryption 695s Signature Value: 695s 4a:65:c0:a3:87:59:be:2c:e9:14:53:75:a9:5c:d7:90:2a:33: 695s 41:52:48:9a:41:45:6c:23:0f:84:47:04:3e:69:37:d5:e4:82: 695s 6c:5f:5c:80:ad:f4:44:21:81:a3:51:f5:bd:dc:c8:45:53:fb: 695s af:e0:39:69:d1:4e:98:c3:19:aa:ff:50:51:26:67:03:6a:22: 695s d7:54:97:43:37:d2:45:e0:b6:9f:b1:d8:3a:4b:24:cd:74:35: 695s a6:ae:38:69:f2:16:b0:bb:8f:c1:4e:21:51:9c:ef:07:7d:d8: 695s 83:29:68:94:99:42:6e:52:f4:29:7b:42:03:98:5f:d8:11:c6: 695s 98:73 695s Using configuration from /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.config 695s Check that the request matches the signature 695s Signature ok 695s Certificate Details: 695s Serial Number: 4 (0x4) 695s Validity 695s Not Before: Jan 15 02:44:53 2025 GMT 695s Not After : Jan 15 02:44:53 2026 GMT 695s Subject: 695s organizationName = Test Organization 695s organizationalUnitName = Test Organization Unit 695s commonName = Test Organization Intermediate Trusted Certificate 0001 695s X509v3 extensions: 695s X509v3 Authority Key Identifier: 695s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 695s X509v3 Basic Constraints: 695s CA:FALSE 695s Netscape Cert Type: 695s SSL Client, S/MIME 695s Netscape Comment: 695s Test Organization Intermediate CA trusted Certificate 695s X509v3 Subject Key Identifier: 695s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 695s X509v3 Key Usage: critical 695s Digital Signature, Non Repudiation, Key Encipherment 695s X509v3 Extended Key Usage: 695s TLS Web Client Authentication, E-mail Protection 695s X509v3 Subject Alternative Name: 695s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 695s Certificate is to be certified until Jan 15 02:44:53 2026 GMT (365 days) 695s 695s Write out database with 1 new entries 695s Database updated 695s + openssl x509 -noout -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 695s This certificate should not be trusted fully 695s + echo 'This certificate should not be trusted fully' 695s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 695s + local cmd=openssl 695s + shift 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 695s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 695s error 2 at 1 depth lookup: unable to get issuer certificate 695s error /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 695s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 695s + cat 695s /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem: OK 695s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 695s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-11196 1024 695s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-11196 -key /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 695s + openssl req -text -noout -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 695s Certificate Request: 695s Data: 695s Version: 1 (0x0) 695s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 695s Subject Public Key Info: 695s Public Key Algorithm: rsaEncryption 695s Public-Key: (1024 bit) 695s Modulus: 695s 00:a1:5a:c8:da:a3:55:85:ce:61:10:c2:e3:e7:10: 695s 4e:cb:ed:ad:dc:45:31:ca:87:99:41:da:f1:67:78: 695s b2:55:5f:4f:4e:d5:99:b5:35:c7:84:ac:bf:42:93: 695s 67:b4:67:d5:0d:7c:62:35:3c:5c:41:1f:78:b1:dc: 695s 13:56:05:03:17:6f:d5:4f:92:b1:fc:c3:56:10:77: 695s bd:0b:29:d5:76:98:57:ee:89:8b:bc:fb:87:42:35: 695s 3f:2e:10:ad:06:f5:c9:ec:5a:4f:b5:36:b1:d7:90: 695s a8:71:cf:60:c3:9f:20:1b:77:63:12:44:ff:d7:91: 695s 7a:d1:75:4f:04:07:47:e1:cf 695s Exponent: 65537 (0x10001) 695s Attributes: 695s Requested Extensions: 695s X509v3 Basic Constraints: 695s CA:FALSE 695s Netscape Cert Type: 695s SSL Client, S/MIME 695s Netscape Comment: 695s Test Organization Sub Intermediate CA trusted Certificate 695s X509v3 Subject Key Identifier: 695s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 695s X509v3 Key Usage: critical 695s Digital Signature, Non Repudiation, Key Encipherment 695s X509v3 Extended Key Usage: 695s TLS Web Client Authentication, E-mail Protection 695s X509v3 Subject Alternative Name: 695s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 695s Signature Algorithm: sha256WithRSAEncryption 695s Signature Value: 695s 0e:2d:a3:5e:6d:a0:18:c0:85:2a:23:95:06:13:71:6b:58:c7: 695s af:ec:1c:7b:46:82:5f:b3:7a:82:5f:09:51:16:c7:ae:d8:8d: 695s c4:05:da:26:e4:f0:89:26:02:73:4b:e0:0c:f1:43:29:35:85: 695s e5:6c:78:ef:c5:be:71:d8:59:83:af:59:25:2e:d5:2b:b8:cd: 695s 4a:8d:22:a7:27:75:43:79:6e:ab:fe:43:3d:10:10:39:48:48: 695s ac:91:ee:b5:d9:5f:4a:65:ee:ae:5b:50:aa:51:10:02:38:a1: 695s 49:41:4f:6d:f8:53:f2:77:44:2f:13:b0:5d:40:c0:8e:80:9f: 695s fc:c0 695s + openssl ca -passin pass:random-sub-intermediate-CA-password-2136 -config /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s Using configuration from /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.config 695s Check that the request matches the signature 695s Signature ok 695s Certificate Details: 695s Serial Number: 5 (0x5) 695s Validity 695s Not Before: Jan 15 02:44:53 2025 GMT 695s Not After : Jan 15 02:44:53 2026 GMT 695s Subject: 695s organizationName = Test Organization 695s organizationalUnitName = Test Organization Unit 695s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 695s X509v3 extensions: 695s X509v3 Authority Key Identifier: 695s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 695s X509v3 Basic Constraints: 695s CA:FALSE 695s Netscape Cert Type: 695s SSL Client, S/MIME 695s Netscape Comment: 695s Test Organization Sub Intermediate CA trusted Certificate 695s X509v3 Subject Key Identifier: 695s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 695s X509v3 Key Usage: critical 695s Digital Signature, Non Repudiation, Key Encipherment 695s X509v3 Extended Key Usage: 695s TLS Web Client Authentication, E-mail Protection 695s X509v3 Subject Alternative Name: 695s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 695s Certificate is to be certified until Jan 15 02:44:53 2026 GMT (365 days) 695s 695s Write out database with 1 new entries 695s Database updated 695s + openssl x509 -noout -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s This certificate should not be trusted fully 695s + echo 'This certificate should not be trusted fully' 695s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s + local cmd=openssl 695s + shift 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 695s error 2 at 1 depth lookup: unable to get issuer certificate 695s error /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 695s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s + local cmd=openssl 695s + shift 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 695s error 20 at 0 depth lookup: unable to get local issuer certificate 695s error /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 695s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 695s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s + local cmd=openssl 695s + shift 695s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s Building a the full-chain CA file... 695s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 695s error 20 at 0 depth lookup: unable to get local issuer certificate 695s error /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 695s + echo 'Building a the full-chain CA file...' 695s + cat /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 695s + cat /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 695s + cat /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 695s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 695s + openssl pkcs7 -print_certs -noout 695s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 695s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 695s 695s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 695s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 695s 695s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 695s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 695s 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 695s /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem: OK 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem: OK 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 695s /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem: OK 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-root-intermediate-chain-CA.pem 695s /tmp/sssd-softhsm2-kTJlBh/test-root-intermediate-chain-CA.pem: OK 695s + openssl verify -CAfile /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 695s /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 695s Certificates generation completed! 695s + echo 'Certificates generation completed!' 695s + [[ -v NO_SSSD_TESTS ]] 695s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /dev/null 695s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /dev/null 695s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 695s + local key_ring=/dev/null 695s + local verify_option= 695s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 695s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 695s + local key_cn 695s + local key_name 695s + local tokens_dir 695s + local output_cert_file 695s + token_name= 695s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem .pem 695s + key_name=test-root-CA-trusted-certificate-0001 695s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s ++ sed -n 's/ *commonName *= //p' 695s + key_cn='Test Organization Root Trusted Certificate 0001' 695s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 695s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 695s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 695s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 695s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 695s + token_name='Test Organization Root Tr Token' 695s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 695s + local key_file 695s + local decrypted_key 695s + mkdir -p /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 695s + key_file=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-key.pem 695s + decrypted_key=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-key-decrypted.pem 695s + cat 695s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 695s + softhsm2-util --show-slots 695s Slot 0 has a free/uninitialized token. 695s The token has been initialized and is reassigned to slot 238543338 695s Available slots: 695s Slot 238543338 695s Slot info: 695s Description: SoftHSM slot ID 0xe37e1ea 695s Manufacturer ID: SoftHSM project 695s Hardware version: 2.6 695s Firmware version: 2.6 695s Token present: yes 695s Token info: 695s Manufacturer ID: SoftHSM project 695s Model: SoftHSM v2 695s Hardware version: 2.6 695s Firmware version: 2.6 695s Serial number: 505dc7570e37e1ea 695s Initialized: yes 695s User PIN init.: yes 695s Label: Test Organization Root Tr Token 695s Slot 1 695s Slot info: 695s Description: SoftHSM slot ID 0x1 695s Manufacturer ID: SoftHSM project 695s Hardware version: 2.6 695s Firmware version: 2.6 695s Token present: yes 695s Token info: 695s Manufacturer ID: SoftHSM project 695s Model: SoftHSM v2 695s Hardware version: 2.6 695s Firmware version: 2.6 695s Serial number: 695s Initialized: no 695s User PIN init.: no 695s Label: 695s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 695s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-16012 -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-key-decrypted.pem 695s writing RSA key 695s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 695s + rm /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001-key-decrypted.pem 695s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --list-all 695s Object 0: 695s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 695s Type: X.509 Certificate (RSA-1024) 695s Expires: Thu Jan 15 02:44:53 2026 695s Label: Test Organization Root Trusted Certificate 0001 695s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 695s 695s + echo 'Test Organization Root Tr Token' 695s + '[' -n '' ']' 695s + local output_base_name=SSSD-child-25329 695s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-25329.output 695s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-25329.pem 695s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/dev/null 695s Test Organization Root Tr Token 695s [p11_child[1619]] [main] (0x0400): p11_child started. 695s [p11_child[1619]] [main] (0x2000): Running in [pre-auth] mode. 695s [p11_child[1619]] [main] (0x2000): Running with effective IDs: [0][0]. 695s [p11_child[1619]] [main] (0x2000): Running with real IDs [0][0]. 695s [p11_child[1619]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 695s [p11_child[1619]] [do_work] (0x0040): init_verification failed. 695s [p11_child[1619]] [main] (0x0020): p11_child failed (5) 695s + return 2 695s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /dev/null no_verification 695s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /dev/null no_verification 695s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 695s + local key_ring=/dev/null 695s + local verify_option=no_verification 695s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 695s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 695s + local key_cn 695s + local key_name 695s + local tokens_dir 695s + local output_cert_file 695s + token_name= 695s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem .pem 695s + key_name=test-root-CA-trusted-certificate-0001 695s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s ++ sed -n 's/ *commonName *= //p' 695s + key_cn='Test Organization Root Trusted Certificate 0001' 695s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 695s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 695s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 695s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 695s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 695s + token_name='Test Organization Root Tr Token' 695s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 695s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 695s + echo 'Test Organization Root Tr Token' 695s Test Organization Root Tr Token 695s + '[' -n no_verification ']' 695s + local verify_arg=--verify=no_verification 695s + local output_base_name=SSSD-child-30425 695s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425.output 695s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425.pem 695s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 695s [p11_child[1625]] [main] (0x0400): p11_child started. 695s [p11_child[1625]] [main] (0x2000): Running in [pre-auth] mode. 695s [p11_child[1625]] [main] (0x2000): Running with effective IDs: [0][0]. 695s [p11_child[1625]] [main] (0x2000): Running with real IDs [0][0]. 695s [p11_child[1625]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 695s [p11_child[1625]] [do_card] (0x4000): Module List: 695s [p11_child[1625]] [do_card] (0x4000): common name: [softhsm2]. 695s [p11_child[1625]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 695s [p11_child[1625]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 695s [p11_child[1625]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 695s [p11_child[1625]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 695s [p11_child[1625]] [do_card] (0x4000): Login NOT required. 695s [p11_child[1625]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 695s [p11_child[1625]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 695s [p11_child[1625]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 695s [p11_child[1625]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 695s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425.output 695s + echo '-----BEGIN CERTIFICATE-----' 695s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425.output 695s + echo '-----END CERTIFICATE-----' 695s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425.pem 695s + local found_md5 expected_md5 695s Certificate: 695s Data: 695s Version: 3 (0x2) 695s Serial Number: 3 (0x3) 695s Signature Algorithm: sha256WithRSAEncryption 695s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 695s Validity 695s Not Before: Jan 15 02:44:53 2025 GMT 695s Not After : Jan 15 02:44:53 2026 GMT 695s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 695s Subject Public Key Info: 695s Public Key Algorithm: rsaEncryption 695s Public-Key: (1024 bit) 695s Modulus: 695s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 695s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 695s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 695s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 695s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 695s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 695s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 695s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 695s d8:28:89:ec:86:0b:e6:3e:6d 695s Exponent: 65537 (0x10001) 695s X509v3 extensions: 695s X509v3 Authority Key Identifier: 695s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 695s X509v3 Basic Constraints: 695s CA:FALSE 695s Netscape Cert Type: 695s SSL Client, S/MIME 695s Netscape Comment: 695s Test Organization Root CA trusted Certificate 695s X509v3 Subject Key Identifier: 695s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 695s X509v3 Key Usage: critical 695s Digital Signature, Non Repudiation, Key Encipherment 695s X509v3 Extended Key Usage: 695s TLS Web Client Authentication, E-mail Protection 695s X509v3 Subject Alternative Name: 695s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 695s Signature Algorithm: sha256WithRSAEncryption 695s Signature Value: 695s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 695s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 695s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 695s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 695s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 695s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 695s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 695s ce:aa 695s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s + expected_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 695s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425.pem 695s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 695s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 695s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425-auth.output 695s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425-auth.output .output 695s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425-auth.pem 695s + echo -n 053350 695s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 695s [p11_child[1633]] [main] (0x0400): p11_child started. 695s [p11_child[1633]] [main] (0x2000): Running in [auth] mode. 695s [p11_child[1633]] [main] (0x2000): Running with effective IDs: [0][0]. 695s [p11_child[1633]] [main] (0x2000): Running with real IDs [0][0]. 695s [p11_child[1633]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 695s [p11_child[1633]] [do_card] (0x4000): Module List: 695s [p11_child[1633]] [do_card] (0x4000): common name: [softhsm2]. 695s [p11_child[1633]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 695s [p11_child[1633]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 695s [p11_child[1633]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 695s [p11_child[1633]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 695s [p11_child[1633]] [do_card] (0x4000): Login required. 695s [p11_child[1633]] [do_card] (0x4000): Token flags [1069]. 695s [p11_child[1633]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 695s [p11_child[1633]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 695s [p11_child[1633]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 695s [p11_child[1633]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 695s [p11_child[1633]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 695s [p11_child[1633]] [do_card] (0x4000): Certificate verified and validated. 695s [p11_child[1633]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 695s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425-auth.output 695s + echo '-----BEGIN CERTIFICATE-----' 695s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425-auth.output 695s + echo '-----END CERTIFICATE-----' 695s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425-auth.pem 695s Certificate: 695s Data: 695s Version: 3 (0x2) 695s Serial Number: 3 (0x3) 695s Signature Algorithm: sha256WithRSAEncryption 695s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 695s Validity 695s Not Before: Jan 15 02:44:53 2025 GMT 695s Not After : Jan 15 02:44:53 2026 GMT 695s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 695s Subject Public Key Info: 695s Public Key Algorithm: rsaEncryption 695s Public-Key: (1024 bit) 695s Modulus: 695s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 695s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 695s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 695s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 695s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 695s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 695s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 695s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 695s d8:28:89:ec:86:0b:e6:3e:6d 695s Exponent: 65537 (0x10001) 695s X509v3 extensions: 695s X509v3 Authority Key Identifier: 695s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 695s X509v3 Basic Constraints: 695s CA:FALSE 695s Netscape Cert Type: 695s SSL Client, S/MIME 695s Netscape Comment: 695s Test Organization Root CA trusted Certificate 695s X509v3 Subject Key Identifier: 695s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 695s X509v3 Key Usage: critical 695s Digital Signature, Non Repudiation, Key Encipherment 695s X509v3 Extended Key Usage: 695s TLS Web Client Authentication, E-mail Protection 695s X509v3 Subject Alternative Name: 695s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 695s Signature Algorithm: sha256WithRSAEncryption 695s Signature Value: 695s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 695s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 695s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 695s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 695s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 695s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 695s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 695s ce:aa 695s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-30425-auth.pem 695s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 695s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 695s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 695s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 695s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 695s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 695s + local verify_option= 695s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 695s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 695s + local key_cn 695s + local key_name 695s + local tokens_dir 695s + local output_cert_file 695s + token_name= 695s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem .pem 695s + key_name=test-root-CA-trusted-certificate-0001 695s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 695s ++ sed -n 's/ *commonName *= //p' 695s + key_cn='Test Organization Root Trusted Certificate 0001' 695s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 695s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 695s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 695s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 695s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 695s + token_name='Test Organization Root Tr Token' 695s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 695s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 695s + echo 'Test Organization Root Tr Token' 695s Test Organization Root Tr Token 695s + '[' -n '' ']' 695s + local output_base_name=SSSD-child-18923 695s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923.output 695s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923.pem 695s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 695s [p11_child[1643]] [main] (0x0400): p11_child started. 695s [p11_child[1643]] [main] (0x2000): Running in [pre-auth] mode. 695s [p11_child[1643]] [main] (0x2000): Running with effective IDs: [0][0]. 695s [p11_child[1643]] [main] (0x2000): Running with real IDs [0][0]. 695s [p11_child[1643]] [do_card] (0x4000): Module List: 695s [p11_child[1643]] [do_card] (0x4000): common name: [softhsm2]. 695s [p11_child[1643]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 695s [p11_child[1643]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 695s [p11_child[1643]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 695s [p11_child[1643]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 695s [p11_child[1643]] [do_card] (0x4000): Login NOT required. 695s [p11_child[1643]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 695s [p11_child[1643]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 695s [p11_child[1643]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 695s [p11_child[1643]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 695s [p11_child[1643]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 695s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923.output 695s + echo '-----BEGIN CERTIFICATE-----' 695s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923.output 695s + echo '-----END CERTIFICATE-----' 695s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 3 (0x3) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 696s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 696s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 696s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 696s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 696s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 696s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 696s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 696s d8:28:89:ec:86:0b:e6:3e:6d 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Root CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 696s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 696s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 696s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 696s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 696s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 696s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 696s ce:aa 696s + local found_md5 expected_md5 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + expected_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923.pem 696s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 696s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923-auth.output 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923-auth.output .output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923-auth.pem 696s + echo -n 053350 696s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 696s [p11_child[1651]] [main] (0x0400): p11_child started. 696s [p11_child[1651]] [main] (0x2000): Running in [auth] mode. 696s [p11_child[1651]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1651]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1651]] [do_card] (0x4000): Module List: 696s [p11_child[1651]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1651]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1651]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1651]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 696s [p11_child[1651]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1651]] [do_card] (0x4000): Login required. 696s [p11_child[1651]] [do_card] (0x4000): Token flags [1069]. 696s [p11_child[1651]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 696s [p11_child[1651]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 696s [p11_child[1651]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1651]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 696s [p11_child[1651]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 696s [p11_child[1651]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 696s [p11_child[1651]] [do_card] (0x4000): Certificate verified and validated. 696s [p11_child[1651]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923-auth.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923-auth.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923-auth.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 3 (0x3) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 696s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 696s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 696s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 696s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 696s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 696s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 696s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 696s d8:28:89:ec:86:0b:e6:3e:6d 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Root CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 696s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 696s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 696s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 696s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 696s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 696s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 696s ce:aa 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18923-auth.pem 696s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 696s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem partial_chain 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem partial_chain 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 696s + local verify_option=partial_chain 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-root-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Root Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 696s + token_name='Test Organization Root Tr Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 696s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 696s + echo 'Test Organization Root Tr Token' 696s + '[' -n partial_chain ']' 696s + local verify_arg=--verify=partial_chain 696s + local output_base_name=SSSD-child-13231 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 696s [p11_child[1661]] [main] (0x0400): p11_child started. 696s [p11_child[1661]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1661]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1661]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1661]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 696s Test Organization Root Tr Token 696s [p11_child[1661]] [do_card] (0x4000): Module List: 696s [p11_child[1661]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1661]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1661]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1661]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 696s [p11_child[1661]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1661]] [do_card] (0x4000): Login NOT required. 696s [p11_child[1661]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 696s [p11_child[1661]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 696s [p11_child[1661]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1661]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1661]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 3 (0x3) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 696s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 696s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 696s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 696s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 696s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 696s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 696s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 696s d8:28:89:ec:86:0b:e6:3e:6d 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Root CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 696s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 696s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 696s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 696s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 696s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 696s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 696s ce:aa 696s + local found_md5 expected_md5 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + expected_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231.pem 696s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 696s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231-auth.output 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231-auth.output .output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231-auth.pem 696s + echo -n 053350 696s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 696s [p11_child[1669]] [main] (0x0400): p11_child started. 696s [p11_child[1669]] [main] (0x2000): Running in [auth] mode. 696s [p11_child[1669]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1669]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1669]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 696s [p11_child[1669]] [do_card] (0x4000): Module List: 696s [p11_child[1669]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1669]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1669]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1669]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 696s [p11_child[1669]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1669]] [do_card] (0x4000): Login required. 696s [p11_child[1669]] [do_card] (0x4000): Token flags [1069]. 696s [p11_child[1669]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 696s [p11_child[1669]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 696s [p11_child[1669]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1669]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 696s [p11_child[1669]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 696s [p11_child[1669]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 696s [p11_child[1669]] [do_card] (0x4000): Certificate verified and validated. 696s [p11_child[1669]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231-auth.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231-auth.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231-auth.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 3 (0x3) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 696s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 696s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 696s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 696s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 696s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 696s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 696s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 696s d8:28:89:ec:86:0b:e6:3e:6d 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Root CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 696s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 696s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 696s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 696s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 696s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 696s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 696s ce:aa 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13231-auth.pem 696s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 696s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s + local verify_option= 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-root-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Root Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 696s Test Organization Root Tr Token 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 696s + token_name='Test Organization Root Tr Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 696s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 696s + echo 'Test Organization Root Tr Token' 696s + '[' -n '' ']' 696s + local output_base_name=SSSD-child-27034 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s [p11_child[1679]] [main] (0x0400): p11_child started. 696s [p11_child[1679]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1679]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1679]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1679]] [do_card] (0x4000): Module List: 696s [p11_child[1679]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1679]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1679]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1679]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 696s [p11_child[1679]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1679]] [do_card] (0x4000): Login NOT required. 696s [p11_child[1679]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 696s [p11_child[1679]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 696s [p11_child[1679]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1679]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1679]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034.pem 696s + local found_md5 expected_md5 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 3 (0x3) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 696s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 696s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 696s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 696s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 696s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 696s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 696s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 696s d8:28:89:ec:86:0b:e6:3e:6d 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Root CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 696s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 696s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 696s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 696s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 696s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 696s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 696s ce:aa 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + expected_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034.pem 696s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 696s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034-auth.output 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034-auth.output .output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034-auth.pem 696s + echo -n 053350 696s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 696s [p11_child[1687]] [main] (0x0400): p11_child started. 696s [p11_child[1687]] [main] (0x2000): Running in [auth] mode. 696s [p11_child[1687]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1687]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1687]] [do_card] (0x4000): Module List: 696s [p11_child[1687]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1687]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1687]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1687]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 696s [p11_child[1687]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1687]] [do_card] (0x4000): Login required. 696s [p11_child[1687]] [do_card] (0x4000): Token flags [1069]. 696s [p11_child[1687]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 696s [p11_child[1687]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 696s [p11_child[1687]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1687]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 696s [p11_child[1687]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 696s [p11_child[1687]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 696s [p11_child[1687]] [do_card] (0x4000): Certificate verified and validated. 696s [p11_child[1687]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034-auth.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034-auth.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034-auth.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 3 (0x3) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 696s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 696s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 696s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 696s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 696s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 696s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 696s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 696s d8:28:89:ec:86:0b:e6:3e:6d 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Root CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 696s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 696s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 696s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 696s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 696s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 696s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 696s ce:aa 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27034-auth.pem 696s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 696s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem partial_chain 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem partial_chain 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s + local verify_option=partial_chain 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-root-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Root Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 696s + token_name='Test Organization Root Tr Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 696s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 696s Test Organization Root Tr Token 696s + echo 'Test Organization Root Tr Token' 696s + '[' -n partial_chain ']' 696s + local verify_arg=--verify=partial_chain 696s + local output_base_name=SSSD-child-15029 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s [p11_child[1697]] [main] (0x0400): p11_child started. 696s [p11_child[1697]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1697]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1697]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1697]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 696s [p11_child[1697]] [do_card] (0x4000): Module List: 696s [p11_child[1697]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1697]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1697]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1697]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 696s [p11_child[1697]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1697]] [do_card] (0x4000): Login NOT required. 696s [p11_child[1697]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 696s [p11_child[1697]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 696s [p11_child[1697]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1697]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1697]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029.pem 696s + local found_md5 expected_md5 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 3 (0x3) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 696s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 696s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 696s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 696s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 696s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 696s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 696s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 696s d8:28:89:ec:86:0b:e6:3e:6d 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Root CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 696s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 696s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 696s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 696s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 696s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 696s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 696s ce:aa 696s + expected_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029.pem 696s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 696s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029-auth.output 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029-auth.output .output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029-auth.pem 696s + echo -n 053350 696s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 696s [p11_child[1705]] [main] (0x0400): p11_child started. 696s [p11_child[1705]] [main] (0x2000): Running in [auth] mode. 696s [p11_child[1705]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1705]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1705]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 696s [p11_child[1705]] [do_card] (0x4000): Module List: 696s [p11_child[1705]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1705]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1705]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1705]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 696s [p11_child[1705]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1705]] [do_card] (0x4000): Login required. 696s [p11_child[1705]] [do_card] (0x4000): Token flags [1069]. 696s [p11_child[1705]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 696s [p11_child[1705]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 696s [p11_child[1705]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1705]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200xe37e1ea;slot-manufacturer=SoftHSM%20project;slot-id=238543338;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=505dc7570e37e1ea;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 696s [p11_child[1705]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 696s [p11_child[1705]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 696s [p11_child[1705]] [do_card] (0x4000): Certificate verified and validated. 696s [p11_child[1705]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029-auth.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029-auth.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029-auth.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 3 (0x3) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ba:d3:8c:20:96:15:0d:a2:90:90:ff:6b:d1:33: 696s 49:15:61:3b:ea:4d:fa:cf:2c:a1:22:03:f3:54:a6: 696s f7:f2:1e:65:8d:00:43:89:68:f9:b2:0c:a4:d6:68: 696s d9:c9:ed:f9:d9:7d:74:6e:52:e5:87:69:ed:dc:5f: 696s 8e:9e:2c:c9:06:31:da:1e:85:c4:14:6b:4f:a7:ac: 696s 01:6c:e1:87:cd:e1:ba:9d:8d:76:77:36:8a:cb:c7: 696s 49:69:bc:cb:73:b1:71:1d:34:af:59:c6:32:c7:6f: 696s 9f:2e:88:2c:1c:57:b3:a1:3e:2c:3b:9e:cd:13:8f: 696s d8:28:89:ec:86:0b:e6:3e:6d 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s 06:B0:A3:C4:1C:2F:90:37:EF:65:B5:41:5F:54:AB:2C:D3:6A:5E:25 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Root CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s D7:BF:EC:58:5F:3F:31:9E:FD:79:B9:67:24:AC:34:71:4B:E0:CE:45 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 5e:00:57:41:5a:a4:5c:11:5c:b1:37:41:64:dd:35:95:fa:74: 696s 62:31:aa:89:c3:f4:d1:30:54:ab:b3:0b:bb:d7:69:40:44:9b: 696s 9c:de:60:cb:2e:b5:0f:a7:7f:a6:fa:26:7e:3f:18:64:38:63: 696s 22:4b:a2:1e:84:29:d9:b8:b5:83:d7:0d:f5:48:57:1b:37:0c: 696s c1:19:07:fd:7f:d3:bb:75:36:04:5c:67:8b:30:54:34:94:eb: 696s 3c:94:fa:3b:ed:9a:3a:0d:2d:af:d5:30:84:1f:74:37:62:ec: 696s d6:a1:b0:29:bc:1a:76:ce:ef:1e:a1:97:4b:19:c8:15:3d:87: 696s ce:aa 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-15029-auth.pem 696s + found_md5=Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D 696s + '[' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D '!=' Modulus=BAD38C2096150DA29090FF6BD1334915613BEA4DFACF2CA12203F354A6F7F21E658D00438968F9B20CA4D668D9C9EDF9D97D746E52E58769EDDC5F8E9E2CC90631DA1E85C4146B4FA7AC016CE187CDE1BA9D8D7677368ACBC74969BCCB73B1711D34AF59C632C76F9F2E882C1C57B3A13E2C3B9ECD138FD82889EC860BE63E6D ']' 696s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 696s + local verify_option= 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-root-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Root Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 696s Test Organization Root Tr Token 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 696s + token_name='Test Organization Root Tr Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 696s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 696s + echo 'Test Organization Root Tr Token' 696s + '[' -n '' ']' 696s + local output_base_name=SSSD-child-32601 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-32601.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-32601.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 696s [p11_child[1715]] [main] (0x0400): p11_child started. 696s [p11_child[1715]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1715]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1715]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1715]] [do_card] (0x4000): Module List: 696s [p11_child[1715]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1715]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1715]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1715]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 696s [p11_child[1715]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1715]] [do_card] (0x4000): Login NOT required. 696s [p11_child[1715]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 696s [p11_child[1715]] [do_verification] (0x0040): X509_verify_cert failed [0]. 696s [p11_child[1715]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 696s [p11_child[1715]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 696s [p11_child[1715]] [do_card] (0x4000): No certificate found. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32601.output 696s + return 2 696s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem partial_chain 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem partial_chain 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 696s + local verify_option=partial_chain 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-16012 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-root-ca-trusted-cert-0001-16012 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-root-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-root-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Root Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 696s + token_name='Test Organization Root Tr Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 696s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-root-CA-trusted-certificate-0001 ']' 696s + echo 'Test Organization Root Tr Token' 696s + '[' -n partial_chain ']' 696s + local verify_arg=--verify=partial_chain 696s + local output_base_name=SSSD-child-23824 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-23824.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-23824.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 696s Test Organization Root Tr Token 696s [p11_child[1722]] [main] (0x0400): p11_child started. 696s [p11_child[1722]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1722]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1722]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1722]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 696s [p11_child[1722]] [do_card] (0x4000): Module List: 696s [p11_child[1722]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1722]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1722]] [do_card] (0x4000): Description [SoftHSM slot ID 0xe37e1ea] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1722]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 696s [p11_child[1722]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0xe37e1ea][238543338] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1722]] [do_card] (0x4000): Login NOT required. 696s [p11_child[1722]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 696s [p11_child[1722]] [do_verification] (0x0040): X509_verify_cert failed [0]. 696s [p11_child[1722]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 696s [p11_child[1722]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 696s [p11_child[1722]] [do_card] (0x4000): No certificate found. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-23824.output 696s + return 2 696s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /dev/null 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /dev/null 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_ring=/dev/null 696s + local verify_option= 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-intermediate-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 696s + token_name='Test Organization Interme Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 696s + local key_file 696s + local decrypted_key 696s + mkdir -p /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 696s + key_file=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-key.pem 696s + decrypted_key=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 696s + cat 696s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 696s Slot 0 has a free/uninitialized token. 696s The token has been initialized and is reassigned to slot 463851969 696s + softhsm2-util --show-slots 696s Available slots: 696s Slot 463851969 696s Slot info: 696s Description: SoftHSM slot ID 0x1ba5d1c1 696s Manufacturer ID: SoftHSM project 696s Hardware version: 2.6 696s Firmware version: 2.6 696s Token present: yes 696s Token info: 696s Manufacturer ID: SoftHSM project 696s Model: SoftHSM v2 696s Hardware version: 2.6 696s Firmware version: 2.6 696s Serial number: 7ab3f6d59ba5d1c1 696s Initialized: yes 696s User PIN init.: yes 696s Label: Test Organization Interme Token 696s Slot 1 696s Slot info: 696s Description: SoftHSM slot ID 0x1 696s Manufacturer ID: SoftHSM project 696s Hardware version: 2.6 696s Firmware version: 2.6 696s Token present: yes 696s Token info: 696s Manufacturer ID: SoftHSM project 696s Model: SoftHSM v2 696s Hardware version: 2.6 696s Firmware version: 2.6 696s Serial number: 696s Initialized: no 696s User PIN init.: no 696s Label: 696s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 696s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-22763 -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 696s writing RSA key 696s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 696s + rm /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 696s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --list-all 696s Object 0: 696s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7ab3f6d59ba5d1c1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 696s Type: X.509 Certificate (RSA-1024) 696s Expires: Thu Jan 15 02:44:53 2026 696s Label: Test Organization Intermediate Trusted Certificate 0001 696s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 696s 696s + echo 'Test Organization Interme Token' 696s + '[' -n '' ']' 696s + local output_base_name=SSSD-child-2724 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-2724.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-2724.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/dev/null 696s [p11_child[1738]] [main] (0x0400): p11_child started. 696s [p11_child[1738]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1738]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1738]] [main] (0x2000): Running with real IDs [0][0]. 696s Test Organization Interme Token 696s [p11_child[1738]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 696s [p11_child[1738]] [do_work] (0x0040): init_verification failed. 696s [p11_child[1738]] [main] (0x0020): p11_child failed (5) 696s + return 2 696s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /dev/null no_verification 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /dev/null no_verification 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_ring=/dev/null 696s + local verify_option=no_verification 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-intermediate-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 696s Test Organization Interme Token 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 696s + token_name='Test Organization Interme Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 696s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 696s + echo 'Test Organization Interme Token' 696s + '[' -n no_verification ']' 696s + local verify_arg=--verify=no_verification 696s + local output_base_name=SSSD-child-32321 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 696s [p11_child[1744]] [main] (0x0400): p11_child started. 696s [p11_child[1744]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1744]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1744]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1744]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 696s [p11_child[1744]] [do_card] (0x4000): Module List: 696s [p11_child[1744]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1744]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1744]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1744]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 696s [p11_child[1744]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1744]] [do_card] (0x4000): Login NOT required. 696s [p11_child[1744]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 696s [p11_child[1744]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1744]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1ba5d1c1;slot-manufacturer=SoftHSM%20project;slot-id=463851969;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7ab3f6d59ba5d1c1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1744]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321.pem 696s + local found_md5 expected_md5 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 4 (0x4) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ce:46:d1:a3:0f:80:03:47:fb:9a:cc:df:77:d3: 696s 17:ea:0b:9c:e4:56:85:46:5c:d1:ff:f0:6a:54:84: 696s 4d:49:74:31:6b:db:03:be:14:d9:09:90:b6:48:7a: 696s b7:7e:a1:b6:ed:41:9d:66:fc:82:d1:ad:20:3a:89: 696s 55:c5:b3:e1:2e:ef:a4:01:66:1c:52:dd:39:ca:27: 696s 03:20:d3:81:78:87:e9:b4:73:30:ef:4c:ee:f6:4d: 696s 42:d8:90:c3:1e:63:41:92:c1:86:7d:d0:3c:02:de: 696s f5:67:6c:0b:70:bf:ab:55:2c:2e:d3:ba:75:f3:22: 696s 7b:ac:3a:85:d5:92:65:0a:bf 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Intermediate CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 56:38:6b:a2:2f:b0:f2:47:29:4b:34:9e:75:f1:bb:bb:79:49: 696s dd:55:c2:b3:b0:4c:d7:d0:32:3a:2f:c4:db:4c:ac:96:d3:4b: 696s 1f:67:67:0d:1d:8e:05:34:eb:7f:70:f2:29:29:9a:07:14:a5: 696s cf:bd:ce:c6:bb:bc:f1:e2:33:ee:cf:67:28:81:89:5b:2a:69: 696s 39:94:6d:06:d7:d6:b9:f6:13:52:80:06:98:67:4b:2a:31:38: 696s 10:d0:05:78:22:23:a3:b8:d2:79:5d:a8:df:23:47:8b:95:a5: 696s d8:55:9e:bb:ed:e9:35:c8:42:7e:22:6a:a8:bf:68:67:06:8a: 696s c0:11 696s + expected_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321.pem 696s + found_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 696s + '[' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF '!=' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF ']' 696s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321-auth.output 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321-auth.output .output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321-auth.pem 696s + echo -n 053350 696s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 696s [p11_child[1752]] [main] (0x0400): p11_child started. 696s [p11_child[1752]] [main] (0x2000): Running in [auth] mode. 696s [p11_child[1752]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1752]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1752]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 696s [p11_child[1752]] [do_card] (0x4000): Module List: 696s [p11_child[1752]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1752]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1752]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1752]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 696s [p11_child[1752]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1752]] [do_card] (0x4000): Login required. 696s [p11_child[1752]] [do_card] (0x4000): Token flags [1069]. 696s [p11_child[1752]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 696s [p11_child[1752]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1752]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1ba5d1c1;slot-manufacturer=SoftHSM%20project;slot-id=463851969;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7ab3f6d59ba5d1c1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 696s [p11_child[1752]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 696s [p11_child[1752]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 696s [p11_child[1752]] [do_card] (0x4000): Certificate verified and validated. 696s [p11_child[1752]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321-auth.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321-auth.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321-auth.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 4 (0x4) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ce:46:d1:a3:0f:80:03:47:fb:9a:cc:df:77:d3: 696s 17:ea:0b:9c:e4:56:85:46:5c:d1:ff:f0:6a:54:84: 696s 4d:49:74:31:6b:db:03:be:14:d9:09:90:b6:48:7a: 696s b7:7e:a1:b6:ed:41:9d:66:fc:82:d1:ad:20:3a:89: 696s 55:c5:b3:e1:2e:ef:a4:01:66:1c:52:dd:39:ca:27: 696s 03:20:d3:81:78:87:e9:b4:73:30:ef:4c:ee:f6:4d: 696s 42:d8:90:c3:1e:63:41:92:c1:86:7d:d0:3c:02:de: 696s f5:67:6c:0b:70:bf:ab:55:2c:2e:d3:ba:75:f3:22: 696s 7b:ac:3a:85:d5:92:65:0a:bf 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Intermediate CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 56:38:6b:a2:2f:b0:f2:47:29:4b:34:9e:75:f1:bb:bb:79:49: 696s dd:55:c2:b3:b0:4c:d7:d0:32:3a:2f:c4:db:4c:ac:96:d3:4b: 696s 1f:67:67:0d:1d:8e:05:34:eb:7f:70:f2:29:29:9a:07:14:a5: 696s cf:bd:ce:c6:bb:bc:f1:e2:33:ee:cf:67:28:81:89:5b:2a:69: 696s 39:94:6d:06:d7:d6:b9:f6:13:52:80:06:98:67:4b:2a:31:38: 696s 10:d0:05:78:22:23:a3:b8:d2:79:5d:a8:df:23:47:8b:95:a5: 696s d8:55:9e:bb:ed:e9:35:c8:42:7e:22:6a:a8:bf:68:67:06:8a: 696s c0:11 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-32321-auth.pem 696s + found_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 696s + '[' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF '!=' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF ']' 696s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 696s + local verify_option= 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-intermediate-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 696s + token_name='Test Organization Interme Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 696s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 696s + echo 'Test Organization Interme Token' 696s + '[' -n '' ']' 696s + local output_base_name=SSSD-child-508 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-508.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-508.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 696s Test Organization Interme Token 696s [p11_child[1762]] [main] (0x0400): p11_child started. 696s [p11_child[1762]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1762]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1762]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1762]] [do_card] (0x4000): Module List: 696s [p11_child[1762]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1762]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1762]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1762]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 696s [p11_child[1762]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1762]] [do_card] (0x4000): Login NOT required. 696s [p11_child[1762]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 696s [p11_child[1762]] [do_verification] (0x0040): X509_verify_cert failed [0]. 696s [p11_child[1762]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 696s [p11_child[1762]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 696s [p11_child[1762]] [do_card] (0x4000): No certificate found. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-508.output 696s + return 2 696s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem partial_chain 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem partial_chain 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 696s + local verify_option=partial_chain 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-intermediate-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 696s Test Organization Interme Token 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 696s + token_name='Test Organization Interme Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 696s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 696s + echo 'Test Organization Interme Token' 696s + '[' -n partial_chain ']' 696s + local verify_arg=--verify=partial_chain 696s + local output_base_name=SSSD-child-25744 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-25744.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-25744.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 696s [p11_child[1769]] [main] (0x0400): p11_child started. 696s [p11_child[1769]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1769]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1769]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1769]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 696s [p11_child[1769]] [do_card] (0x4000): Module List: 696s [p11_child[1769]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1769]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1769]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1769]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 696s [p11_child[1769]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1769]] [do_card] (0x4000): Login NOT required. 696s [p11_child[1769]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 696s [p11_child[1769]] [do_verification] (0x0040): X509_verify_cert failed [0]. 696s [p11_child[1769]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 696s [p11_child[1769]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 696s [p11_child[1769]] [do_card] (0x4000): No certificate found. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-25744.output 696s + return 2 696s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s + local verify_option= 696s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 696s + local key_cn 696s + local key_name 696s + local tokens_dir 696s + local output_cert_file 696s + token_name= 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem .pem 696s + key_name=test-intermediate-CA-trusted-certificate-0001 696s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s ++ sed -n 's/ *commonName *= //p' 696s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 696s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 696s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 696s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 696s + token_name='Test Organization Interme Token' 696s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 696s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 696s + echo 'Test Organization Interme Token' 696s + '[' -n '' ']' 696s + local output_base_name=SSSD-child-10999 696s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999.output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999.pem 696s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 696s Test Organization Interme Token 696s [p11_child[1776]] [main] (0x0400): p11_child started. 696s [p11_child[1776]] [main] (0x2000): Running in [pre-auth] mode. 696s [p11_child[1776]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1776]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1776]] [do_card] (0x4000): Module List: 696s [p11_child[1776]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1776]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1776]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1776]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 696s [p11_child[1776]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1776]] [do_card] (0x4000): Login NOT required. 696s [p11_child[1776]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 696s [p11_child[1776]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 696s [p11_child[1776]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1776]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1ba5d1c1;slot-manufacturer=SoftHSM%20project;slot-id=463851969;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7ab3f6d59ba5d1c1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 696s [p11_child[1776]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 696s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999.output 696s + echo '-----BEGIN CERTIFICATE-----' 696s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999.output 696s + echo '-----END CERTIFICATE-----' 696s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999.pem 696s Certificate: 696s Data: 696s Version: 3 (0x2) 696s Serial Number: 4 (0x4) 696s Signature Algorithm: sha256WithRSAEncryption 696s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 696s Validity 696s Not Before: Jan 15 02:44:53 2025 GMT 696s Not After : Jan 15 02:44:53 2026 GMT 696s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 696s Subject Public Key Info: 696s Public Key Algorithm: rsaEncryption 696s Public-Key: (1024 bit) 696s Modulus: 696s 00:ce:46:d1:a3:0f:80:03:47:fb:9a:cc:df:77:d3: 696s 17:ea:0b:9c:e4:56:85:46:5c:d1:ff:f0:6a:54:84: 696s 4d:49:74:31:6b:db:03:be:14:d9:09:90:b6:48:7a: 696s b7:7e:a1:b6:ed:41:9d:66:fc:82:d1:ad:20:3a:89: 696s 55:c5:b3:e1:2e:ef:a4:01:66:1c:52:dd:39:ca:27: 696s 03:20:d3:81:78:87:e9:b4:73:30:ef:4c:ee:f6:4d: 696s 42:d8:90:c3:1e:63:41:92:c1:86:7d:d0:3c:02:de: 696s f5:67:6c:0b:70:bf:ab:55:2c:2e:d3:ba:75:f3:22: 696s 7b:ac:3a:85:d5:92:65:0a:bf 696s Exponent: 65537 (0x10001) 696s X509v3 extensions: 696s X509v3 Authority Key Identifier: 696s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 696s X509v3 Basic Constraints: 696s CA:FALSE 696s Netscape Cert Type: 696s SSL Client, S/MIME 696s Netscape Comment: 696s Test Organization Intermediate CA trusted Certificate 696s X509v3 Subject Key Identifier: 696s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 696s X509v3 Key Usage: critical 696s Digital Signature, Non Repudiation, Key Encipherment 696s X509v3 Extended Key Usage: 696s TLS Web Client Authentication, E-mail Protection 696s X509v3 Subject Alternative Name: 696s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 696s Signature Algorithm: sha256WithRSAEncryption 696s Signature Value: 696s 56:38:6b:a2:2f:b0:f2:47:29:4b:34:9e:75:f1:bb:bb:79:49: 696s dd:55:c2:b3:b0:4c:d7:d0:32:3a:2f:c4:db:4c:ac:96:d3:4b: 696s 1f:67:67:0d:1d:8e:05:34:eb:7f:70:f2:29:29:9a:07:14:a5: 696s cf:bd:ce:c6:bb:bc:f1:e2:33:ee:cf:67:28:81:89:5b:2a:69: 696s 39:94:6d:06:d7:d6:b9:f6:13:52:80:06:98:67:4b:2a:31:38: 696s 10:d0:05:78:22:23:a3:b8:d2:79:5d:a8:df:23:47:8b:95:a5: 696s d8:55:9e:bb:ed:e9:35:c8:42:7e:22:6a:a8:bf:68:67:06:8a: 696s c0:11 696s + local found_md5 expected_md5 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 696s + expected_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 696s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999.pem 696s + found_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 696s + '[' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF '!=' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF ']' 696s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999-auth.output 696s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999-auth.output .output 696s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999-auth.pem 696s + echo -n 053350 696s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 696s [p11_child[1784]] [main] (0x0400): p11_child started. 696s [p11_child[1784]] [main] (0x2000): Running in [auth] mode. 696s [p11_child[1784]] [main] (0x2000): Running with effective IDs: [0][0]. 696s [p11_child[1784]] [main] (0x2000): Running with real IDs [0][0]. 696s [p11_child[1784]] [do_card] (0x4000): Module List: 696s [p11_child[1784]] [do_card] (0x4000): common name: [softhsm2]. 696s [p11_child[1784]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1784]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 696s [p11_child[1784]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 696s [p11_child[1784]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 696s [p11_child[1784]] [do_card] (0x4000): Login required. 696s [p11_child[1784]] [do_card] (0x4000): Token flags [1069]. 696s [p11_child[1784]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 696s [p11_child[1784]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 696s [p11_child[1784]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 696s [p11_child[1784]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1ba5d1c1;slot-manufacturer=SoftHSM%20project;slot-id=463851969;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7ab3f6d59ba5d1c1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 697s [p11_child[1784]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 697s [p11_child[1784]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 697s [p11_child[1784]] [do_card] (0x4000): Certificate verified and validated. 697s [p11_child[1784]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999-auth.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999-auth.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999-auth.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 4 (0x4) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:ce:46:d1:a3:0f:80:03:47:fb:9a:cc:df:77:d3: 697s 17:ea:0b:9c:e4:56:85:46:5c:d1:ff:f0:6a:54:84: 697s 4d:49:74:31:6b:db:03:be:14:d9:09:90:b6:48:7a: 697s b7:7e:a1:b6:ed:41:9d:66:fc:82:d1:ad:20:3a:89: 697s 55:c5:b3:e1:2e:ef:a4:01:66:1c:52:dd:39:ca:27: 697s 03:20:d3:81:78:87:e9:b4:73:30:ef:4c:ee:f6:4d: 697s 42:d8:90:c3:1e:63:41:92:c1:86:7d:d0:3c:02:de: 697s f5:67:6c:0b:70:bf:ab:55:2c:2e:d3:ba:75:f3:22: 697s 7b:ac:3a:85:d5:92:65:0a:bf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 56:38:6b:a2:2f:b0:f2:47:29:4b:34:9e:75:f1:bb:bb:79:49: 697s dd:55:c2:b3:b0:4c:d7:d0:32:3a:2f:c4:db:4c:ac:96:d3:4b: 697s 1f:67:67:0d:1d:8e:05:34:eb:7f:70:f2:29:29:9a:07:14:a5: 697s cf:bd:ce:c6:bb:bc:f1:e2:33:ee:cf:67:28:81:89:5b:2a:69: 697s 39:94:6d:06:d7:d6:b9:f6:13:52:80:06:98:67:4b:2a:31:38: 697s 10:d0:05:78:22:23:a3:b8:d2:79:5d:a8:df:23:47:8b:95:a5: 697s d8:55:9e:bb:ed:e9:35:c8:42:7e:22:6a:a8:bf:68:67:06:8a: 697s c0:11 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10999-auth.pem 697s + found_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 697s + '[' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF '!=' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF ']' 697s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem partial_chain 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem partial_chain 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 697s + local verify_option=partial_chain 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 697s + token_name='Test Organization Interme Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 697s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 697s + echo 'Test Organization Interme Token' 697s + '[' -n partial_chain ']' 697s + local verify_arg=--verify=partial_chain 697s + local output_base_name=SSSD-child-6514 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 697s Test Organization Interme Token 697s [p11_child[1794]] [main] (0x0400): p11_child started. 697s [p11_child[1794]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1794]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1794]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1794]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1794]] [do_card] (0x4000): Module List: 697s [p11_child[1794]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1794]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1794]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1794]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 697s [p11_child[1794]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1794]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1794]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 697s [p11_child[1794]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1794]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1794]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1ba5d1c1;slot-manufacturer=SoftHSM%20project;slot-id=463851969;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7ab3f6d59ba5d1c1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1794]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514.pem 697s + local found_md5 expected_md5 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 4 (0x4) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:ce:46:d1:a3:0f:80:03:47:fb:9a:cc:df:77:d3: 697s 17:ea:0b:9c:e4:56:85:46:5c:d1:ff:f0:6a:54:84: 697s 4d:49:74:31:6b:db:03:be:14:d9:09:90:b6:48:7a: 697s b7:7e:a1:b6:ed:41:9d:66:fc:82:d1:ad:20:3a:89: 697s 55:c5:b3:e1:2e:ef:a4:01:66:1c:52:dd:39:ca:27: 697s 03:20:d3:81:78:87:e9:b4:73:30:ef:4c:ee:f6:4d: 697s 42:d8:90:c3:1e:63:41:92:c1:86:7d:d0:3c:02:de: 697s f5:67:6c:0b:70:bf:ab:55:2c:2e:d3:ba:75:f3:22: 697s 7b:ac:3a:85:d5:92:65:0a:bf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 56:38:6b:a2:2f:b0:f2:47:29:4b:34:9e:75:f1:bb:bb:79:49: 697s dd:55:c2:b3:b0:4c:d7:d0:32:3a:2f:c4:db:4c:ac:96:d3:4b: 697s 1f:67:67:0d:1d:8e:05:34:eb:7f:70:f2:29:29:9a:07:14:a5: 697s cf:bd:ce:c6:bb:bc:f1:e2:33:ee:cf:67:28:81:89:5b:2a:69: 697s 39:94:6d:06:d7:d6:b9:f6:13:52:80:06:98:67:4b:2a:31:38: 697s 10:d0:05:78:22:23:a3:b8:d2:79:5d:a8:df:23:47:8b:95:a5: 697s d8:55:9e:bb:ed:e9:35:c8:42:7e:22:6a:a8:bf:68:67:06:8a: 697s c0:11 697s + expected_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514.pem 697s + found_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 697s + '[' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF '!=' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF ']' 697s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514-auth.output 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514-auth.output .output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514-auth.pem 697s + echo -n 053350 697s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 697s [p11_child[1802]] [main] (0x0400): p11_child started. 697s [p11_child[1802]] [main] (0x2000): Running in [auth] mode. 697s [p11_child[1802]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1802]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1802]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1802]] [do_card] (0x4000): Module List: 697s [p11_child[1802]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1802]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1802]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1802]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 697s [p11_child[1802]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1802]] [do_card] (0x4000): Login required. 697s [p11_child[1802]] [do_card] (0x4000): Token flags [1069]. 697s [p11_child[1802]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 697s [p11_child[1802]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1802]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1802]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1ba5d1c1;slot-manufacturer=SoftHSM%20project;slot-id=463851969;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7ab3f6d59ba5d1c1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 697s [p11_child[1802]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 697s [p11_child[1802]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 697s [p11_child[1802]] [do_card] (0x4000): Certificate verified and validated. 697s [p11_child[1802]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514-auth.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514-auth.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514-auth.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 4 (0x4) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:ce:46:d1:a3:0f:80:03:47:fb:9a:cc:df:77:d3: 697s 17:ea:0b:9c:e4:56:85:46:5c:d1:ff:f0:6a:54:84: 697s 4d:49:74:31:6b:db:03:be:14:d9:09:90:b6:48:7a: 697s b7:7e:a1:b6:ed:41:9d:66:fc:82:d1:ad:20:3a:89: 697s 55:c5:b3:e1:2e:ef:a4:01:66:1c:52:dd:39:ca:27: 697s 03:20:d3:81:78:87:e9:b4:73:30:ef:4c:ee:f6:4d: 697s 42:d8:90:c3:1e:63:41:92:c1:86:7d:d0:3c:02:de: 697s f5:67:6c:0b:70:bf:ab:55:2c:2e:d3:ba:75:f3:22: 697s 7b:ac:3a:85:d5:92:65:0a:bf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 56:38:6b:a2:2f:b0:f2:47:29:4b:34:9e:75:f1:bb:bb:79:49: 697s dd:55:c2:b3:b0:4c:d7:d0:32:3a:2f:c4:db:4c:ac:96:d3:4b: 697s 1f:67:67:0d:1d:8e:05:34:eb:7f:70:f2:29:29:9a:07:14:a5: 697s cf:bd:ce:c6:bb:bc:f1:e2:33:ee:cf:67:28:81:89:5b:2a:69: 697s 39:94:6d:06:d7:d6:b9:f6:13:52:80:06:98:67:4b:2a:31:38: 697s 10:d0:05:78:22:23:a3:b8:d2:79:5d:a8:df:23:47:8b:95:a5: 697s d8:55:9e:bb:ed:e9:35:c8:42:7e:22:6a:a8:bf:68:67:06:8a: 697s c0:11 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-6514-auth.pem 697s + found_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 697s + '[' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF '!=' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF ']' 697s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 697s + local verify_option= 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 697s + token_name='Test Organization Interme Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 697s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 697s + echo 'Test Organization Interme Token' 697s + '[' -n '' ']' 697s + local output_base_name=SSSD-child-13449 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13449.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13449.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 697s Test Organization Interme Token 697s [p11_child[1812]] [main] (0x0400): p11_child started. 697s [p11_child[1812]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1812]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1812]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1812]] [do_card] (0x4000): Module List: 697s [p11_child[1812]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1812]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1812]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1812]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 697s [p11_child[1812]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1812]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1812]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 697s [p11_child[1812]] [do_verification] (0x0040): X509_verify_cert failed [0]. 697s [p11_child[1812]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 697s [p11_child[1812]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 697s [p11_child[1812]] [do_card] (0x4000): No certificate found. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13449.output 697s + return 2 697s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem partial_chain 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem partial_chain 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 697s + local verify_option=partial_chain 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-22763 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-22763 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 697s + token_name='Test Organization Interme Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 697s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 697s + echo 'Test Organization Interme Token' 697s + '[' -n partial_chain ']' 697s + local verify_arg=--verify=partial_chain 697s + local output_base_name=SSSD-child-13285 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem 697s Test Organization Interme Token 697s [p11_child[1819]] [main] (0x0400): p11_child started. 697s [p11_child[1819]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1819]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1819]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1819]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1819]] [do_card] (0x4000): Module List: 697s [p11_child[1819]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1819]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1819]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1819]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 697s [p11_child[1819]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1819]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1819]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 697s [p11_child[1819]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1819]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1819]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1ba5d1c1;slot-manufacturer=SoftHSM%20project;slot-id=463851969;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7ab3f6d59ba5d1c1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1819]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 4 (0x4) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:ce:46:d1:a3:0f:80:03:47:fb:9a:cc:df:77:d3: 697s 17:ea:0b:9c:e4:56:85:46:5c:d1:ff:f0:6a:54:84: 697s 4d:49:74:31:6b:db:03:be:14:d9:09:90:b6:48:7a: 697s b7:7e:a1:b6:ed:41:9d:66:fc:82:d1:ad:20:3a:89: 697s 55:c5:b3:e1:2e:ef:a4:01:66:1c:52:dd:39:ca:27: 697s 03:20:d3:81:78:87:e9:b4:73:30:ef:4c:ee:f6:4d: 697s 42:d8:90:c3:1e:63:41:92:c1:86:7d:d0:3c:02:de: 697s f5:67:6c:0b:70:bf:ab:55:2c:2e:d3:ba:75:f3:22: 697s 7b:ac:3a:85:d5:92:65:0a:bf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 56:38:6b:a2:2f:b0:f2:47:29:4b:34:9e:75:f1:bb:bb:79:49: 697s dd:55:c2:b3:b0:4c:d7:d0:32:3a:2f:c4:db:4c:ac:96:d3:4b: 697s 1f:67:67:0d:1d:8e:05:34:eb:7f:70:f2:29:29:9a:07:14:a5: 697s cf:bd:ce:c6:bb:bc:f1:e2:33:ee:cf:67:28:81:89:5b:2a:69: 697s 39:94:6d:06:d7:d6:b9:f6:13:52:80:06:98:67:4b:2a:31:38: 697s 10:d0:05:78:22:23:a3:b8:d2:79:5d:a8:df:23:47:8b:95:a5: 697s d8:55:9e:bb:ed:e9:35:c8:42:7e:22:6a:a8:bf:68:67:06:8a: 697s c0:11 697s + local found_md5 expected_md5 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA-trusted-certificate-0001.pem 697s + expected_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285.pem 697s + found_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 697s + '[' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF '!=' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF ']' 697s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285-auth.output 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285-auth.output .output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285-auth.pem 697s + echo -n 053350 697s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 697s [p11_child[1827]] [main] (0x0400): p11_child started. 697s [p11_child[1827]] [main] (0x2000): Running in [auth] mode. 697s [p11_child[1827]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1827]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1827]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1827]] [do_card] (0x4000): Module List: 697s [p11_child[1827]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1827]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1827]] [do_card] (0x4000): Description [SoftHSM slot ID 0x1ba5d1c1] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1827]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 697s [p11_child[1827]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x1ba5d1c1][463851969] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1827]] [do_card] (0x4000): Login required. 697s [p11_child[1827]] [do_card] (0x4000): Token flags [1069]. 697s [p11_child[1827]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 697s [p11_child[1827]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1827]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1827]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x1ba5d1c1;slot-manufacturer=SoftHSM%20project;slot-id=463851969;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7ab3f6d59ba5d1c1;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 697s [p11_child[1827]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 697s [p11_child[1827]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 697s [p11_child[1827]] [do_card] (0x4000): Certificate verified and validated. 697s [p11_child[1827]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285-auth.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285-auth.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285-auth.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 4 (0x4) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:ce:46:d1:a3:0f:80:03:47:fb:9a:cc:df:77:d3: 697s 17:ea:0b:9c:e4:56:85:46:5c:d1:ff:f0:6a:54:84: 697s 4d:49:74:31:6b:db:03:be:14:d9:09:90:b6:48:7a: 697s b7:7e:a1:b6:ed:41:9d:66:fc:82:d1:ad:20:3a:89: 697s 55:c5:b3:e1:2e:ef:a4:01:66:1c:52:dd:39:ca:27: 697s 03:20:d3:81:78:87:e9:b4:73:30:ef:4c:ee:f6:4d: 697s 42:d8:90:c3:1e:63:41:92:c1:86:7d:d0:3c:02:de: 697s f5:67:6c:0b:70:bf:ab:55:2c:2e:d3:ba:75:f3:22: 697s 7b:ac:3a:85:d5:92:65:0a:bf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s C4:CE:22:83:26:E7:78:57:51:98:54:3A:AD:04:BA:F0:96:E2:E1:D0 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s FC:81:98:B8:AA:18:17:03:CC:D9:B6:CE:4F:45:80:38:25:22:47:1A 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 56:38:6b:a2:2f:b0:f2:47:29:4b:34:9e:75:f1:bb:bb:79:49: 697s dd:55:c2:b3:b0:4c:d7:d0:32:3a:2f:c4:db:4c:ac:96:d3:4b: 697s 1f:67:67:0d:1d:8e:05:34:eb:7f:70:f2:29:29:9a:07:14:a5: 697s cf:bd:ce:c6:bb:bc:f1:e2:33:ee:cf:67:28:81:89:5b:2a:69: 697s 39:94:6d:06:d7:d6:b9:f6:13:52:80:06:98:67:4b:2a:31:38: 697s 10:d0:05:78:22:23:a3:b8:d2:79:5d:a8:df:23:47:8b:95:a5: 697s d8:55:9e:bb:ed:e9:35:c8:42:7e:22:6a:a8:bf:68:67:06:8a: 697s c0:11 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13285-auth.pem 697s + found_md5=Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF 697s + '[' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF '!=' Modulus=CE46D1A30F800347FB9ACCDF77D317EA0B9CE45685465CD1FFF06A54844D4974316BDB03BE14D90990B6487AB77EA1B6ED419D66FC82D1AD203A8955C5B3E12EEFA401661C52DD39CA270320D3817887E9B47330EF4CEEF64D42D890C31E634192C1867DD03C02DEF5676C0B70BFAB552C2ED3BA75F3227BAC3A85D592650ABF ']' 697s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 697s + local verify_option= 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 697s + token_name='Test Organization Sub Int Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 697s + local key_file 697s + local decrypted_key 697s + mkdir -p /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 697s + key_file=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 697s + decrypted_key=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 697s + cat 697s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 697s Slot 0 has a free/uninitialized token. 697s The token has been initialized and is reassigned to slot 1806608180 697s + softhsm2-util --show-slots 697s Available slots: 697s Slot 1806608180 697s Slot info: 697s Description: SoftHSM slot ID 0x6baea734 697s Manufacturer ID: SoftHSM project 697s Hardware version: 2.6 697s Firmware version: 2.6 697s Token present: yes 697s Token info: 697s Manufacturer ID: SoftHSM project 697s Model: SoftHSM v2 697s Hardware version: 2.6 697s Firmware version: 2.6 697s Serial number: 4e4756846baea734 697s Initialized: yes 697s User PIN init.: yes 697s Label: Test Organization Sub Int Token 697s Slot 1 697s Slot info: 697s Description: SoftHSM slot ID 0x1 697s Manufacturer ID: SoftHSM project 697s Hardware version: 2.6 697s Firmware version: 2.6 697s Token present: yes 697s Token info: 697s Manufacturer ID: SoftHSM project 697s Model: SoftHSM v2 697s Hardware version: 2.6 697s Firmware version: 2.6 697s Serial number: 697s Initialized: no 697s User PIN init.: no 697s Label: 697s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 697s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-11196 -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 697s writing RSA key 697s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 697s + rm /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 697s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --list-all 697s + echo 'Test Organization Sub Int Token' 697s + '[' -n '' ']' 697s + local output_base_name=SSSD-child-10777 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-10777.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-10777.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 697s Object 0: 697s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4e4756846baea734;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 697s Type: X.509 Certificate (RSA-1024) 697s Expires: Thu Jan 15 02:44:53 2026 697s Label: Test Organization Sub Intermediate Trusted Certificate 0001 697s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 697s 697s Test Organization Sub Int Token 697s [p11_child[1846]] [main] (0x0400): p11_child started. 697s [p11_child[1846]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1846]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1846]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1846]] [do_card] (0x4000): Module List: 697s [p11_child[1846]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1846]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1846]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1846]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1846]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1846]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1846]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1846]] [do_verification] (0x0040): X509_verify_cert failed [0]. 697s [p11_child[1846]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 697s [p11_child[1846]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 697s [p11_child[1846]] [do_card] (0x4000): No certificate found. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10777.output 697s + return 2 697s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem partial_chain 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem partial_chain 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 697s + local verify_option=partial_chain 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 697s Test Organization Sub Int Token 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 697s + token_name='Test Organization Sub Int Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 697s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 697s + echo 'Test Organization Sub Int Token' 697s + '[' -n partial_chain ']' 697s + local verify_arg=--verify=partial_chain 697s + local output_base_name=SSSD-child-27983 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-27983.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-27983.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-root-CA.pem 697s [p11_child[1853]] [main] (0x0400): p11_child started. 697s [p11_child[1853]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1853]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1853]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1853]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1853]] [do_card] (0x4000): Module List: 697s [p11_child[1853]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1853]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1853]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1853]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1853]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1853]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1853]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1853]] [do_verification] (0x0040): X509_verify_cert failed [0]. 697s [p11_child[1853]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 697s [p11_child[1853]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 697s [p11_child[1853]] [do_card] (0x4000): No certificate found. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-27983.output 697s + return 2 697s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 697s + local verify_option= 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 697s + token_name='Test Organization Sub Int Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 697s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 697s + echo 'Test Organization Sub Int Token' 697s + '[' -n '' ']' 697s + local output_base_name=SSSD-child-26251 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 697s Test Organization Sub Int Token 697s [p11_child[1860]] [main] (0x0400): p11_child started. 697s [p11_child[1860]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1860]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1860]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1860]] [do_card] (0x4000): Module List: 697s [p11_child[1860]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1860]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1860]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1860]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1860]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1860]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1860]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1860]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1860]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1860]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6baea734;slot-manufacturer=SoftHSM%20project;slot-id=1806608180;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4e4756846baea734;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1860]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 5 (0x5) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:a1:5a:c8:da:a3:55:85:ce:61:10:c2:e3:e7:10: 697s 4e:cb:ed:ad:dc:45:31:ca:87:99:41:da:f1:67:78: 697s b2:55:5f:4f:4e:d5:99:b5:35:c7:84:ac:bf:42:93: 697s 67:b4:67:d5:0d:7c:62:35:3c:5c:41:1f:78:b1:dc: 697s 13:56:05:03:17:6f:d5:4f:92:b1:fc:c3:56:10:77: 697s bd:0b:29:d5:76:98:57:ee:89:8b:bc:fb:87:42:35: 697s 3f:2e:10:ad:06:f5:c9:ec:5a:4f:b5:36:b1:d7:90: 697s a8:71:cf:60:c3:9f:20:1b:77:63:12:44:ff:d7:91: 697s 7a:d1:75:4f:04:07:47:e1:cf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Sub Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 3f:bd:d5:68:82:c3:e1:8f:d4:81:5f:8f:1b:a3:83:cb:21:bf: 697s 69:82:e4:e2:34:e2:30:82:4f:11:ff:4c:47:76:48:ba:65:bf: 697s 41:00:27:90:96:4b:f8:e9:e1:60:16:c6:44:e0:b6:34:e2:ad: 697s b6:5e:2a:a7:4e:ad:0e:91:24:0a:0e:ce:6a:a0:36:70:e5:0a: 697s 0a:dc:c4:7f:04:2b:a8:ad:4e:9b:00:85:a1:59:9f:db:56:3b: 697s a6:0d:0a:38:3e:15:26:0f:b6:ea:c7:71:e7:56:1a:44:a4:a9: 697s 3d:dd:63:97:98:27:ff:c3:b4:ae:41:b6:e9:bb:75:3d:a1:f8: 697s c1:3b 697s + local found_md5 expected_md5 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + expected_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251.pem 697s + found_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 697s + '[' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF '!=' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF ']' 697s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251-auth.output 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251-auth.output .output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251-auth.pem 697s + echo -n 053350 697s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 697s [p11_child[1868]] [main] (0x0400): p11_child started. 697s [p11_child[1868]] [main] (0x2000): Running in [auth] mode. 697s [p11_child[1868]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1868]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1868]] [do_card] (0x4000): Module List: 697s [p11_child[1868]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1868]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1868]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1868]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1868]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1868]] [do_card] (0x4000): Login required. 697s [p11_child[1868]] [do_card] (0x4000): Token flags [1069]. 697s [p11_child[1868]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1868]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1868]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1868]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6baea734;slot-manufacturer=SoftHSM%20project;slot-id=1806608180;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4e4756846baea734;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 697s [p11_child[1868]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 697s [p11_child[1868]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 697s [p11_child[1868]] [do_card] (0x4000): Certificate verified and validated. 697s [p11_child[1868]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251-auth.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251-auth.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251-auth.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 5 (0x5) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:a1:5a:c8:da:a3:55:85:ce:61:10:c2:e3:e7:10: 697s 4e:cb:ed:ad:dc:45:31:ca:87:99:41:da:f1:67:78: 697s b2:55:5f:4f:4e:d5:99:b5:35:c7:84:ac:bf:42:93: 697s 67:b4:67:d5:0d:7c:62:35:3c:5c:41:1f:78:b1:dc: 697s 13:56:05:03:17:6f:d5:4f:92:b1:fc:c3:56:10:77: 697s bd:0b:29:d5:76:98:57:ee:89:8b:bc:fb:87:42:35: 697s 3f:2e:10:ad:06:f5:c9:ec:5a:4f:b5:36:b1:d7:90: 697s a8:71:cf:60:c3:9f:20:1b:77:63:12:44:ff:d7:91: 697s 7a:d1:75:4f:04:07:47:e1:cf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Sub Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 3f:bd:d5:68:82:c3:e1:8f:d4:81:5f:8f:1b:a3:83:cb:21:bf: 697s 69:82:e4:e2:34:e2:30:82:4f:11:ff:4c:47:76:48:ba:65:bf: 697s 41:00:27:90:96:4b:f8:e9:e1:60:16:c6:44:e0:b6:34:e2:ad: 697s b6:5e:2a:a7:4e:ad:0e:91:24:0a:0e:ce:6a:a0:36:70:e5:0a: 697s 0a:dc:c4:7f:04:2b:a8:ad:4e:9b:00:85:a1:59:9f:db:56:3b: 697s a6:0d:0a:38:3e:15:26:0f:b6:ea:c7:71:e7:56:1a:44:a4:a9: 697s 3d:dd:63:97:98:27:ff:c3:b4:ae:41:b6:e9:bb:75:3d:a1:f8: 697s c1:3b 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-26251-auth.pem 697s + found_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 697s + '[' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF '!=' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF ']' 697s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem partial_chain 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem partial_chain 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 697s + local verify_option=partial_chain 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 697s + token_name='Test Organization Sub Int Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 697s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 697s + echo 'Test Organization Sub Int Token' 697s Test Organization Sub Int Token 697s + '[' -n partial_chain ']' 697s + local verify_arg=--verify=partial_chain 697s + local output_base_name=SSSD-child-18271 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem 697s [p11_child[1878]] [main] (0x0400): p11_child started. 697s [p11_child[1878]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1878]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1878]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1878]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1878]] [do_card] (0x4000): Module List: 697s [p11_child[1878]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1878]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1878]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1878]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1878]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1878]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1878]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1878]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1878]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1878]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6baea734;slot-manufacturer=SoftHSM%20project;slot-id=1806608180;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4e4756846baea734;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1878]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 5 (0x5) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:a1:5a:c8:da:a3:55:85:ce:61:10:c2:e3:e7:10: 697s 4e:cb:ed:ad:dc:45:31:ca:87:99:41:da:f1:67:78: 697s b2:55:5f:4f:4e:d5:99:b5:35:c7:84:ac:bf:42:93: 697s 67:b4:67:d5:0d:7c:62:35:3c:5c:41:1f:78:b1:dc: 697s 13:56:05:03:17:6f:d5:4f:92:b1:fc:c3:56:10:77: 697s bd:0b:29:d5:76:98:57:ee:89:8b:bc:fb:87:42:35: 697s 3f:2e:10:ad:06:f5:c9:ec:5a:4f:b5:36:b1:d7:90: 697s a8:71:cf:60:c3:9f:20:1b:77:63:12:44:ff:d7:91: 697s 7a:d1:75:4f:04:07:47:e1:cf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Sub Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 3f:bd:d5:68:82:c3:e1:8f:d4:81:5f:8f:1b:a3:83:cb:21:bf: 697s 69:82:e4:e2:34:e2:30:82:4f:11:ff:4c:47:76:48:ba:65:bf: 697s 41:00:27:90:96:4b:f8:e9:e1:60:16:c6:44:e0:b6:34:e2:ad: 697s b6:5e:2a:a7:4e:ad:0e:91:24:0a:0e:ce:6a:a0:36:70:e5:0a: 697s 0a:dc:c4:7f:04:2b:a8:ad:4e:9b:00:85:a1:59:9f:db:56:3b: 697s a6:0d:0a:38:3e:15:26:0f:b6:ea:c7:71:e7:56:1a:44:a4:a9: 697s 3d:dd:63:97:98:27:ff:c3:b4:ae:41:b6:e9:bb:75:3d:a1:f8: 697s c1:3b 697s + local found_md5 expected_md5 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + expected_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271.pem 697s + found_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 697s + '[' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF '!=' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF ']' 697s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271-auth.output 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271-auth.output .output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271-auth.pem 697s + echo -n 053350 697s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 697s [p11_child[1886]] [main] (0x0400): p11_child started. 697s [p11_child[1886]] [main] (0x2000): Running in [auth] mode. 697s [p11_child[1886]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1886]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1886]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1886]] [do_card] (0x4000): Module List: 697s [p11_child[1886]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1886]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1886]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1886]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1886]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1886]] [do_card] (0x4000): Login required. 697s [p11_child[1886]] [do_card] (0x4000): Token flags [1069]. 697s [p11_child[1886]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1886]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1886]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1886]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6baea734;slot-manufacturer=SoftHSM%20project;slot-id=1806608180;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4e4756846baea734;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 697s [p11_child[1886]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 697s [p11_child[1886]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 697s [p11_child[1886]] [do_card] (0x4000): Certificate verified and validated. 697s [p11_child[1886]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271-auth.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271-auth.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271-auth.pem 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-18271-auth.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 5 (0x5) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:a1:5a:c8:da:a3:55:85:ce:61:10:c2:e3:e7:10: 697s 4e:cb:ed:ad:dc:45:31:ca:87:99:41:da:f1:67:78: 697s b2:55:5f:4f:4e:d5:99:b5:35:c7:84:ac:bf:42:93: 697s 67:b4:67:d5:0d:7c:62:35:3c:5c:41:1f:78:b1:dc: 697s 13:56:05:03:17:6f:d5:4f:92:b1:fc:c3:56:10:77: 697s bd:0b:29:d5:76:98:57:ee:89:8b:bc:fb:87:42:35: 697s 3f:2e:10:ad:06:f5:c9:ec:5a:4f:b5:36:b1:d7:90: 697s a8:71:cf:60:c3:9f:20:1b:77:63:12:44:ff:d7:91: 697s 7a:d1:75:4f:04:07:47:e1:cf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Sub Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 3f:bd:d5:68:82:c3:e1:8f:d4:81:5f:8f:1b:a3:83:cb:21:bf: 697s 69:82:e4:e2:34:e2:30:82:4f:11:ff:4c:47:76:48:ba:65:bf: 697s 41:00:27:90:96:4b:f8:e9:e1:60:16:c6:44:e0:b6:34:e2:ad: 697s b6:5e:2a:a7:4e:ad:0e:91:24:0a:0e:ce:6a:a0:36:70:e5:0a: 697s 0a:dc:c4:7f:04:2b:a8:ad:4e:9b:00:85:a1:59:9f:db:56:3b: 697s a6:0d:0a:38:3e:15:26:0f:b6:ea:c7:71:e7:56:1a:44:a4:a9: 697s 3d:dd:63:97:98:27:ff:c3:b4:ae:41:b6:e9:bb:75:3d:a1:f8: 697s c1:3b 697s + found_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 697s + '[' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF '!=' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF ']' 697s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 697s + local verify_option= 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 697s + token_name='Test Organization Sub Int Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 697s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 697s + echo 'Test Organization Sub Int Token' 697s Test Organization Sub Int Token 697s + '[' -n '' ']' 697s + local output_base_name=SSSD-child-9786 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-9786.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-9786.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 697s [p11_child[1896]] [main] (0x0400): p11_child started. 697s [p11_child[1896]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1896]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1896]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1896]] [do_card] (0x4000): Module List: 697s [p11_child[1896]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1896]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1896]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1896]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1896]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1896]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1896]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1896]] [do_verification] (0x0040): X509_verify_cert failed [0]. 697s [p11_child[1896]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 697s [p11_child[1896]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 697s [p11_child[1896]] [do_card] (0x4000): No certificate found. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-9786.output 697s + return 2 697s + invalid_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-root-intermediate-chain-CA.pem partial_chain 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-root-intermediate-chain-CA.pem partial_chain 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-root-intermediate-chain-CA.pem 697s + local verify_option=partial_chain 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 697s + token_name='Test Organization Sub Int Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 697s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 697s + echo 'Test Organization Sub Int Token' 697s + '[' -n partial_chain ']' 697s + local verify_arg=--verify=partial_chain 697s + local output_base_name=SSSD-child-10207 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-10207.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-10207.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-root-intermediate-chain-CA.pem 697s Test Organization Sub Int Token 697s [p11_child[1903]] [main] (0x0400): p11_child started. 697s [p11_child[1903]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1903]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1903]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1903]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1903]] [do_card] (0x4000): Module List: 697s [p11_child[1903]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1903]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1903]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1903]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1903]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1903]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1903]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1903]] [do_verification] (0x0040): X509_verify_cert failed [0]. 697s [p11_child[1903]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 697s [p11_child[1903]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 697s [p11_child[1903]] [do_card] (0x4000): No certificate found. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-10207.output 697s + return 2 697s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem partial_chain 697s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem partial_chain 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 697s + local verify_option=partial_chain 697s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 697s + local key_cn 697s + local key_name 697s + local tokens_dir 697s + local output_cert_file 697s + token_name= 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 697s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 697s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s ++ sed -n 's/ *commonName *= //p' 697s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 697s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 697s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 697s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 697s Test Organization Sub Int Token 697s + token_name='Test Organization Sub Int Token' 697s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 697s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 697s + echo 'Test Organization Sub Int Token' 697s + '[' -n partial_chain ']' 697s + local verify_arg=--verify=partial_chain 697s + local output_base_name=SSSD-child-24447 697s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447.output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447.pem 697s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem 697s [p11_child[1910]] [main] (0x0400): p11_child started. 697s [p11_child[1910]] [main] (0x2000): Running in [pre-auth] mode. 697s [p11_child[1910]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1910]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1910]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1910]] [do_card] (0x4000): Module List: 697s [p11_child[1910]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1910]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1910]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1910]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1910]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1910]] [do_card] (0x4000): Login NOT required. 697s [p11_child[1910]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1910]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1910]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1910]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6baea734;slot-manufacturer=SoftHSM%20project;slot-id=1806608180;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4e4756846baea734;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1910]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 5 (0x5) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:a1:5a:c8:da:a3:55:85:ce:61:10:c2:e3:e7:10: 697s 4e:cb:ed:ad:dc:45:31:ca:87:99:41:da:f1:67:78: 697s b2:55:5f:4f:4e:d5:99:b5:35:c7:84:ac:bf:42:93: 697s 67:b4:67:d5:0d:7c:62:35:3c:5c:41:1f:78:b1:dc: 697s 13:56:05:03:17:6f:d5:4f:92:b1:fc:c3:56:10:77: 697s bd:0b:29:d5:76:98:57:ee:89:8b:bc:fb:87:42:35: 697s 3f:2e:10:ad:06:f5:c9:ec:5a:4f:b5:36:b1:d7:90: 697s a8:71:cf:60:c3:9f:20:1b:77:63:12:44:ff:d7:91: 697s 7a:d1:75:4f:04:07:47:e1:cf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Sub Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 3f:bd:d5:68:82:c3:e1:8f:d4:81:5f:8f:1b:a3:83:cb:21:bf: 697s 69:82:e4:e2:34:e2:30:82:4f:11:ff:4c:47:76:48:ba:65:bf: 697s 41:00:27:90:96:4b:f8:e9:e1:60:16:c6:44:e0:b6:34:e2:ad: 697s b6:5e:2a:a7:4e:ad:0e:91:24:0a:0e:ce:6a:a0:36:70:e5:0a: 697s 0a:dc:c4:7f:04:2b:a8:ad:4e:9b:00:85:a1:59:9f:db:56:3b: 697s a6:0d:0a:38:3e:15:26:0f:b6:ea:c7:71:e7:56:1a:44:a4:a9: 697s 3d:dd:63:97:98:27:ff:c3:b4:ae:41:b6:e9:bb:75:3d:a1:f8: 697s c1:3b 697s + local found_md5 expected_md5 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 697s + expected_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447.pem 697s + found_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 697s + '[' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF '!=' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF ']' 697s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447-auth.output 697s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447-auth.output .output 697s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447-auth.pem 697s + echo -n 053350 697s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 697s [p11_child[1918]] [main] (0x0400): p11_child started. 697s [p11_child[1918]] [main] (0x2000): Running in [auth] mode. 697s [p11_child[1918]] [main] (0x2000): Running with effective IDs: [0][0]. 697s [p11_child[1918]] [main] (0x2000): Running with real IDs [0][0]. 697s [p11_child[1918]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 697s [p11_child[1918]] [do_card] (0x4000): Module List: 697s [p11_child[1918]] [do_card] (0x4000): common name: [softhsm2]. 697s [p11_child[1918]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1918]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 697s [p11_child[1918]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 697s [p11_child[1918]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 697s [p11_child[1918]] [do_card] (0x4000): Login required. 697s [p11_child[1918]] [do_card] (0x4000): Token flags [1069]. 697s [p11_child[1918]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 697s [p11_child[1918]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 697s [p11_child[1918]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 697s [p11_child[1918]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6baea734;slot-manufacturer=SoftHSM%20project;slot-id=1806608180;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4e4756846baea734;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 697s [p11_child[1918]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 697s [p11_child[1918]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 697s [p11_child[1918]] [do_card] (0x4000): Certificate verified and validated. 697s [p11_child[1918]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 697s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447-auth.output 697s + echo '-----BEGIN CERTIFICATE-----' 697s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447-auth.output 697s + echo '-----END CERTIFICATE-----' 697s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447-auth.pem 697s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-24447-auth.pem 697s Certificate: 697s Data: 697s Version: 3 (0x2) 697s Serial Number: 5 (0x5) 697s Signature Algorithm: sha256WithRSAEncryption 697s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 697s Validity 697s Not Before: Jan 15 02:44:53 2025 GMT 697s Not After : Jan 15 02:44:53 2026 GMT 697s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 697s Subject Public Key Info: 697s Public Key Algorithm: rsaEncryption 697s Public-Key: (1024 bit) 697s Modulus: 697s 00:a1:5a:c8:da:a3:55:85:ce:61:10:c2:e3:e7:10: 697s 4e:cb:ed:ad:dc:45:31:ca:87:99:41:da:f1:67:78: 697s b2:55:5f:4f:4e:d5:99:b5:35:c7:84:ac:bf:42:93: 697s 67:b4:67:d5:0d:7c:62:35:3c:5c:41:1f:78:b1:dc: 697s 13:56:05:03:17:6f:d5:4f:92:b1:fc:c3:56:10:77: 697s bd:0b:29:d5:76:98:57:ee:89:8b:bc:fb:87:42:35: 697s 3f:2e:10:ad:06:f5:c9:ec:5a:4f:b5:36:b1:d7:90: 697s a8:71:cf:60:c3:9f:20:1b:77:63:12:44:ff:d7:91: 697s 7a:d1:75:4f:04:07:47:e1:cf 697s Exponent: 65537 (0x10001) 697s X509v3 extensions: 697s X509v3 Authority Key Identifier: 697s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 697s X509v3 Basic Constraints: 697s CA:FALSE 697s Netscape Cert Type: 697s SSL Client, S/MIME 697s Netscape Comment: 697s Test Organization Sub Intermediate CA trusted Certificate 697s X509v3 Subject Key Identifier: 697s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 697s X509v3 Key Usage: critical 697s Digital Signature, Non Repudiation, Key Encipherment 697s X509v3 Extended Key Usage: 697s TLS Web Client Authentication, E-mail Protection 697s X509v3 Subject Alternative Name: 697s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 697s Signature Algorithm: sha256WithRSAEncryption 697s Signature Value: 697s 3f:bd:d5:68:82:c3:e1:8f:d4:81:5f:8f:1b:a3:83:cb:21:bf: 697s 69:82:e4:e2:34:e2:30:82:4f:11:ff:4c:47:76:48:ba:65:bf: 697s 41:00:27:90:96:4b:f8:e9:e1:60:16:c6:44:e0:b6:34:e2:ad: 697s b6:5e:2a:a7:4e:ad:0e:91:24:0a:0e:ce:6a:a0:36:70:e5:0a: 697s 0a:dc:c4:7f:04:2b:a8:ad:4e:9b:00:85:a1:59:9f:db:56:3b: 697s a6:0d:0a:38:3e:15:26:0f:b6:ea:c7:71:e7:56:1a:44:a4:a9: 697s 3d:dd:63:97:98:27:ff:c3:b4:ae:41:b6:e9:bb:75:3d:a1:f8: 697s c1:3b 698s + found_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 698s + '[' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF '!=' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF ']' 698s + valid_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-sub-chain-CA.pem partial_chain 698s + check_certificate /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 /tmp/sssd-softhsm2-kTJlBh/test-intermediate-sub-chain-CA.pem partial_chain 698s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 698s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 698s + local key_ring=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-sub-chain-CA.pem 698s + local verify_option=partial_chain 698s + prepare_softhsm2_card /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-11196 698s + local certificate=/tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 698s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-11196 698s + local key_cn 698s + local key_name 698s + local tokens_dir 698s + local output_cert_file 698s + token_name= 698s ++ basename /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 698s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 698s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 698s ++ sed -n 's/ *commonName *= //p' 698s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 698s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 698s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 698s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 698s ++ basename /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 698s + tokens_dir=/tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 698s + token_name='Test Organization Sub Int Token' 698s + '[' '!' -e /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 698s + '[' '!' -d /tmp/sssd-softhsm2-kTJlBh/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 698s + echo 'Test Organization Sub Int Token' 698s + '[' -n partial_chain ']' 698s + local verify_arg=--verify=partial_chain 698s + local output_base_name=SSSD-child-13974 698s + local output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974.output 698s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974.pem 698s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-sub-chain-CA.pem 698s [p11_child[1928]] [main] (0x0400): p11_child started. 698s [p11_child[1928]] [main] (0x2000): Running in [pre-auth] mode. 698s [p11_child[1928]] [main] (0x2000): Running with effective IDs: [0][0]. 698s [p11_child[1928]] [main] (0x2000): Running with real IDs [0][0]. 698s [p11_child[1928]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 698s Test Organization Sub Int Token 698s [p11_child[1928]] [do_card] (0x4000): Module List: 698s [p11_child[1928]] [do_card] (0x4000): common name: [softhsm2]. 698s [p11_child[1928]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 698s [p11_child[1928]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 698s [p11_child[1928]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 698s [p11_child[1928]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 698s [p11_child[1928]] [do_card] (0x4000): Login NOT required. 698s [p11_child[1928]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 698s [p11_child[1928]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 698s [p11_child[1928]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 698s [p11_child[1928]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6baea734;slot-manufacturer=SoftHSM%20project;slot-id=1806608180;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4e4756846baea734;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 698s [p11_child[1928]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 698s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974.output 698s + echo '-----BEGIN CERTIFICATE-----' 698s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974.output 698s + echo '-----END CERTIFICATE-----' 698s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974.pem 698s + local found_md5 expected_md5 698s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/test-sub-intermediate-CA-trusted-certificate-0001.pem 698s Certificate: 698s Data: 698s Version: 3 (0x2) 698s Serial Number: 5 (0x5) 698s Signature Algorithm: sha256WithRSAEncryption 698s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 698s Validity 698s Not Before: Jan 15 02:44:53 2025 GMT 698s Not After : Jan 15 02:44:53 2026 GMT 698s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 698s Subject Public Key Info: 698s Public Key Algorithm: rsaEncryption 698s Public-Key: (1024 bit) 698s Modulus: 698s 00:a1:5a:c8:da:a3:55:85:ce:61:10:c2:e3:e7:10: 698s 4e:cb:ed:ad:dc:45:31:ca:87:99:41:da:f1:67:78: 698s b2:55:5f:4f:4e:d5:99:b5:35:c7:84:ac:bf:42:93: 698s 67:b4:67:d5:0d:7c:62:35:3c:5c:41:1f:78:b1:dc: 698s 13:56:05:03:17:6f:d5:4f:92:b1:fc:c3:56:10:77: 698s bd:0b:29:d5:76:98:57:ee:89:8b:bc:fb:87:42:35: 698s 3f:2e:10:ad:06:f5:c9:ec:5a:4f:b5:36:b1:d7:90: 698s a8:71:cf:60:c3:9f:20:1b:77:63:12:44:ff:d7:91: 698s 7a:d1:75:4f:04:07:47:e1:cf 698s Exponent: 65537 (0x10001) 698s X509v3 extensions: 698s X509v3 Authority Key Identifier: 698s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 698s X509v3 Basic Constraints: 698s CA:FALSE 698s Netscape Cert Type: 698s SSL Client, S/MIME 698s Netscape Comment: 698s Test Organization Sub Intermediate CA trusted Certificate 698s X509v3 Subject Key Identifier: 698s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 698s X509v3 Key Usage: critical 698s Digital Signature, Non Repudiation, Key Encipherment 698s X509v3 Extended Key Usage: 698s TLS Web Client Authentication, E-mail Protection 698s X509v3 Subject Alternative Name: 698s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 698s Signature Algorithm: sha256WithRSAEncryption 698s Signature Value: 698s 3f:bd:d5:68:82:c3:e1:8f:d4:81:5f:8f:1b:a3:83:cb:21:bf: 698s 69:82:e4:e2:34:e2:30:82:4f:11:ff:4c:47:76:48:ba:65:bf: 698s 41:00:27:90:96:4b:f8:e9:e1:60:16:c6:44:e0:b6:34:e2:ad: 698s b6:5e:2a:a7:4e:ad:0e:91:24:0a:0e:ce:6a:a0:36:70:e5:0a: 698s 0a:dc:c4:7f:04:2b:a8:ad:4e:9b:00:85:a1:59:9f:db:56:3b: 698s a6:0d:0a:38:3e:15:26:0f:b6:ea:c7:71:e7:56:1a:44:a4:a9: 698s 3d:dd:63:97:98:27:ff:c3:b4:ae:41:b6:e9:bb:75:3d:a1:f8: 698s c1:3b 698s + expected_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 698s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974.pem 698s + found_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 698s + '[' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF '!=' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF ']' 698s + output_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974-auth.output 698s ++ basename /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974-auth.output .output 698s + output_cert_file=/tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974-auth.pem 698s + echo -n 053350 698s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-kTJlBh/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 698s [p11_child[1936]] [main] (0x0400): p11_child started. 698s [p11_child[1936]] [main] (0x2000): Running in [auth] mode. 698s [p11_child[1936]] [main] (0x2000): Running with effective IDs: [0][0]. 698s [p11_child[1936]] [main] (0x2000): Running with real IDs [0][0]. 698s [p11_child[1936]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 698s [p11_child[1936]] [do_card] (0x4000): Module List: 698s [p11_child[1936]] [do_card] (0x4000): common name: [softhsm2]. 698s [p11_child[1936]] [do_card] (0x4000): dll name: [/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 698s [p11_child[1936]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6baea734] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 698s [p11_child[1936]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 698s [p11_child[1936]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x6baea734][1806608180] of module [0][/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so]. 698s [p11_child[1936]] [do_card] (0x4000): Login required. 698s [p11_child[1936]] [do_card] (0x4000): Token flags [1069]. 698s [p11_child[1936]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 698s [p11_child[1936]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 698s [p11_child[1936]] [do_card] (0x4000): /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 698s [p11_child[1936]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6baea734;slot-manufacturer=SoftHSM%20project;slot-id=1806608180;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=4e4756846baea734;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 698s [p11_child[1936]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 698s [p11_child[1936]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 698s [p11_child[1936]] [do_card] (0x4000): Certificate verified and validated. 698s [p11_child[1936]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 698s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974-auth.output 698s + echo '-----BEGIN CERTIFICATE-----' 698s + tail -n1 /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974-auth.output 698s + echo '-----END CERTIFICATE-----' 698s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974-auth.pem 698s Certificate: 698s Data: 698s Version: 3 (0x2) 698s Serial Number: 5 (0x5) 698s Signature Algorithm: sha256WithRSAEncryption 698s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 698s Validity 698s Not Before: Jan 15 02:44:53 2025 GMT 698s Not After : Jan 15 02:44:53 2026 GMT 698s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 698s Subject Public Key Info: 698s Public Key Algorithm: rsaEncryption 698s Public-Key: (1024 bit) 698s Modulus: 698s 00:a1:5a:c8:da:a3:55:85:ce:61:10:c2:e3:e7:10: 698s 4e:cb:ed:ad:dc:45:31:ca:87:99:41:da:f1:67:78: 698s b2:55:5f:4f:4e:d5:99:b5:35:c7:84:ac:bf:42:93: 698s 67:b4:67:d5:0d:7c:62:35:3c:5c:41:1f:78:b1:dc: 698s 13:56:05:03:17:6f:d5:4f:92:b1:fc:c3:56:10:77: 698s bd:0b:29:d5:76:98:57:ee:89:8b:bc:fb:87:42:35: 698s 3f:2e:10:ad:06:f5:c9:ec:5a:4f:b5:36:b1:d7:90: 698s a8:71:cf:60:c3:9f:20:1b:77:63:12:44:ff:d7:91: 698s 7a:d1:75:4f:04:07:47:e1:cf 698s Exponent: 65537 (0x10001) 698s X509v3 extensions: 698s X509v3 Authority Key Identifier: 698s 88:D9:1F:73:49:F2:E6:BC:6C:CC:E0:01:20:D2:88:1C:89:79:7D:D1 698s X509v3 Basic Constraints: 698s CA:FALSE 698s Netscape Cert Type: 698s SSL Client, S/MIME 698s Netscape Comment: 698s Test Organization Sub Intermediate CA trusted Certificate 698s X509v3 Subject Key Identifier: 698s 96:8D:25:B7:55:D9:A2:18:FC:9F:90:A4:6D:F5:5C:09:A9:E6:8A:E1 698s X509v3 Key Usage: critical 698s Digital Signature, Non Repudiation, Key Encipherment 698s X509v3 Extended Key Usage: 698s TLS Web Client Authentication, E-mail Protection 698s X509v3 Subject Alternative Name: 698s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 698s Signature Algorithm: sha256WithRSAEncryption 698s Signature Value: 698s 3f:bd:d5:68:82:c3:e1:8f:d4:81:5f:8f:1b:a3:83:cb:21:bf: 698s 69:82:e4:e2:34:e2:30:82:4f:11:ff:4c:47:76:48:ba:65:bf: 698s 41:00:27:90:96:4b:f8:e9:e1:60:16:c6:44:e0:b6:34:e2:ad: 698s b6:5e:2a:a7:4e:ad:0e:91:24:0a:0e:ce:6a:a0:36:70:e5:0a: 698s 0a:dc:c4:7f:04:2b:a8:ad:4e:9b:00:85:a1:59:9f:db:56:3b: 698s a6:0d:0a:38:3e:15:26:0f:b6:ea:c7:71:e7:56:1a:44:a4:a9: 698s 3d:dd:63:97:98:27:ff:c3:b4:ae:41:b6:e9:bb:75:3d:a1:f8: 698s c1:3b 698s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-kTJlBh/SSSD-child-13974-auth.pem 698s + found_md5=Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF 698s + '[' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF '!=' Modulus=A15AC8DAA35585CE6110C2E3E7104ECBEDADDC4531CA879941DAF16778B2555F4F4ED599B535C784ACBF429367B467D50D7C62353C5C411F78B1DC13560503176FD54F92B1FCC3561077BD0B29D5769857EE898BBCFB8742353F2E10AD06F5C9EC5A4FB536B1D790A871CF60C39F201B77631244FFD7917AD1754F040747E1CF ']' 698s + set +x 698s 698s Test completed, Root CA and intermediate issued certificates verified! 698s autopkgtest [02:44:56]: test sssd-softhism2-certificates-tests.sh: -----------------------] 702s autopkgtest [02:45:00]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 702s sssd-softhism2-certificates-tests.sh PASS 706s autopkgtest [02:45:04]: test sssd-smart-card-pam-auth-configs: preparing testbed 708s Reading package lists... 709s Building dependency tree... 709s Reading state information... 709s Starting pkgProblemResolver with broken count: 0 709s Starting 2 pkgProblemResolver with broken count: 0 709s Done 710s The following NEW packages will be installed: 710s pamtester 710s 0 upgraded, 1 newly installed, 0 to remove and 2 not upgraded. 710s Need to get 11.4 kB of archives. 710s After this operation, 31.7 kB of additional disk space will be used. 710s Get:1 http://ftpmaster.internal/ubuntu plucky/universe armhf pamtester armhf 0.1.2-4 [11.4 kB] 711s Fetched 11.4 kB in 0s (56.4 kB/s) 711s Selecting previously unselected package pamtester. 711s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 60282 files and directories currently installed.) 711s Preparing to unpack .../pamtester_0.1.2-4_armhf.deb ... 711s Unpacking pamtester (0.1.2-4) ... 711s Setting up pamtester (0.1.2-4) ... 711s Processing triggers for man-db (2.13.0-1) ... 722s autopkgtest [02:45:20]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 722s autopkgtest [02:45:20]: test sssd-smart-card-pam-auth-configs: [----------------------- 724s + '[' -z ubuntu ']' 724s + export DEBIAN_FRONTEND=noninteractive 724s + DEBIAN_FRONTEND=noninteractive 724s + required_tools=(pamtester softhsm2-util sssd) 724s + [[ ! -v OFFLINE_MODE ]] 724s + for cmd in "${required_tools[@]}" 724s + command -v pamtester 724s + for cmd in "${required_tools[@]}" 724s + command -v softhsm2-util 724s + for cmd in "${required_tools[@]}" 724s + command -v sssd 724s + PIN=123456 724s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 724s + tmpdir=/tmp/sssd-softhsm2-certs-zG4BC2 724s + backupsdir= 724s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 724s + declare -a restore_paths 724s + declare -a delete_paths 724s + trap handle_exit EXIT 724s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 724s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 724s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 724s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 724s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-zG4BC2 GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 724s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-zG4BC2 724s + GENERATE_SMART_CARDS=1 724s + KEEP_TEMPORARY_FILES=1 724s + NO_SSSD_TESTS=1 724s + bash debian/tests/sssd-softhism2-certificates-tests.sh 724s + '[' -z ubuntu ']' 724s + required_tools=(p11tool openssl softhsm2-util) 724s + for cmd in "${required_tools[@]}" 724s + command -v p11tool 724s + for cmd in "${required_tools[@]}" 724s + command -v openssl 724s + for cmd in "${required_tools[@]}" 724s + command -v softhsm2-util 724s + PIN=123456 724s +++ find /usr/lib/softhsm/libsofthsm2.so 724s +++ head -n 1 724s ++ realpath /usr/lib/softhsm/libsofthsm2.so 724s + SOFTHSM2_MODULE=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so 724s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 724s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 724s + '[' '!' -v NO_SSSD_TESTS ']' 724s + '[' '!' -e /usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so ']' 724s + tmpdir=/tmp/sssd-softhsm2-certs-zG4BC2 724s + keys_size=1024 724s + [[ ! -v KEEP_TEMPORARY_FILES ]] 724s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 724s + echo -n 01 724s + touch /tmp/sssd-softhsm2-certs-zG4BC2/index.txt 724s + mkdir -p /tmp/sssd-softhsm2-certs-zG4BC2/new_certs 724s + cat 724s + root_ca_key_pass=pass:random-root-CA-password-3826 724s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-key.pem -passout pass:random-root-CA-password-3826 1024 724s + openssl req -passin pass:random-root-CA-password-3826 -batch -config /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.pem 724s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.pem 724s + cat 724s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-25599 724s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-25599 1024 724s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-25599 -config /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-3826 -sha256 -out /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-certificate-request.pem 724s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-certificate-request.pem 724s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.config -passin pass:random-root-CA-password-3826 -keyfile /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem 724s Certificate Request: 724s Data: 724s Version: 1 (0x0) 724s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:b4:3c:80:fd:ca:60:10:0e:5f:2d:88:5c:75:62: 724s a8:44:90:1e:bb:b4:bb:45:a2:c4:71:5f:24:7c:aa: 724s 56:c7:3f:22:06:7d:39:75:07:3c:74:b4:e8:ee:99: 724s a9:bf:3d:59:b2:93:0d:89:e4:68:03:50:28:5b:4b: 724s 1e:9a:93:37:a8:e8:5f:16:07:6f:ae:93:ec:04:75: 724s 0d:e2:5f:47:d8:f1:7e:c7:43:2e:f6:95:fe:0b:bc: 724s 46:99:28:64:ac:8f:42:e0:ea:49:2a:64:20:15:3c: 724s 9a:f2:31:25:8c:ab:90:50:ba:cc:d4:6c:6c:07:9e: 724s 88:65:a0:22:17:64:d3:44:f9 724s Exponent: 65537 (0x10001) 724s Attributes: 724s (none) 724s Requested Extensions: 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s 10:c3:39:cd:87:96:96:43:ee:07:2a:f2:55:ff:73:e7:cc:e8: 724s d1:7c:48:89:d2:88:4b:a8:86:36:69:94:88:34:20:22:c1:67: 724s 1c:6c:c3:46:e5:19:29:06:16:33:65:4d:5c:0c:2e:52:70:a1: 724s 9c:4a:98:74:1e:c5:3e:ef:9f:f4:d8:9a:e8:ce:5f:51:65:78: 724s 77:26:09:5e:23:d3:57:e1:fc:1c:c0:30:67:44:13:00:78:1e: 724s ec:b2:0f:d6:90:cb:19:e2:76:f4:8f:30:d2:78:d8:59:26:69: 724s 51:75:7d:9f:c8:32:00:2b:e0:f8:81:66:44:09:00:1a:7a:26: 724s 9a:97 724s Using configuration from /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.config 724s Check that the request matches the signature 724s Signature ok 724s Certificate Details: 724s Serial Number: 1 (0x1) 724s Validity 724s Not Before: Jan 15 02:45:22 2025 GMT 724s Not After : Jan 15 02:45:22 2026 GMT 724s Subject: 724s organizationName = Test Organization 724s organizationalUnitName = Test Organization Unit 724s commonName = Test Organization Intermediate CA 724s X509v3 extensions: 724s X509v3 Subject Key Identifier: 724s 95:91:81:94:61:F4:9B:F6:BB:8B:3F:F6:FF:E9:97:A2:C0:9E:95:2E 724s X509v3 Authority Key Identifier: 724s keyid:C8:9D:37:47:6E:43:FE:CF:73:D2:A0:6B:45:88:91:FA:A4:89:5E:ED 724s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 724s serial:00 724s X509v3 Basic Constraints: 724s CA:TRUE 724s X509v3 Key Usage: critical 724s Digital Signature, Certificate Sign, CRL Sign 724s Certificate is to be certified until Jan 15 02:45:22 2026 GMT (365 days) 724s 724s Write out database with 1 new entries 724s Database updated 724s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem 724s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem 724s /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem: OK 724s + cat 724s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-27066 724s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-27066 1024 724s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-27066 -config /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-25599 -sha256 -out /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-certificate-request.pem 724s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-certificate-request.pem 724s Certificate Request: 724s Data: 724s Version: 1 (0x0) 724s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:9a:f7:6b:e7:78:e1:d7:0e:14:b3:6f:a8:bc:7f: 724s 0e:b8:94:84:72:0e:dd:8d:02:dd:19:76:32:44:e8: 724s 17:af:8f:f3:d6:15:43:d9:97:35:23:27:3b:74:12: 724s 0c:95:e6:65:69:f1:b8:b6:32:92:0d:14:b7:76:06: 724s 33:62:35:a9:90:77:67:0a:f4:1a:39:41:e4:e6:18: 724s aa:1f:54:f2:f4:b7:0c:b3:0c:3b:36:41:a0:72:82: 724s cd:b3:c1:07:b3:42:3a:55:22:a9:b4:d4:15:9c:9e: 724s e8:f7:fc:7b:3a:c6:fa:77:13:d7:83:d2:17:38:de: 724s ec:a9:58:06:23:4f:8a:68:bb 724s Exponent: 65537 (0x10001) 724s Attributes: 724s (none) 724s Requested Extensions: 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s 57:be:25:19:f8:71:18:00:d4:41:50:fb:04:84:7d:ab:c1:39: 724s c5:45:fe:ab:fe:6a:9f:52:98:5b:03:ce:ea:e7:13:ac:bf:ff: 724s b5:01:6b:e2:d7:b8:7c:4b:df:5e:1b:c8:9f:1a:e0:06:8d:28: 724s b9:7d:48:66:1f:fa:e0:09:7a:29:0a:03:46:80:b5:12:c5:e1: 724s 31:c2:7c:9e:a0:70:85:ab:e4:75:91:13:83:59:93:4f:15:d1: 724s 94:19:d7:70:f9:86:a4:44:18:aa:61:4c:6c:61:ff:59:bb:0d: 724s 3c:0d:2f:1e:51:49:88:2e:d2:ed:5e:11:4e:f4:52:ce:e3:43: 724s f9:de 724s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-25599 -keyfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem 724s Using configuration from /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.config 724s Check that the request matches the signature 724s Signature ok 724s Certificate Details: 724s Serial Number: 2 (0x2) 724s Validity 724s Not Before: Jan 15 02:45:22 2025 GMT 724s Not After : Jan 15 02:45:22 2026 GMT 724s Subject: 724s organizationName = Test Organization 724s organizationalUnitName = Test Organization Unit 724s commonName = Test Organization Sub Intermediate CA 724s X509v3 extensions: 724s X509v3 Subject Key Identifier: 724s E7:56:49:C3:FE:EB:F2:EB:AB:43:C7:87:68:1F:4D:80:5E:CA:0A:52 724s X509v3 Authority Key Identifier: 724s keyid:95:91:81:94:61:F4:9B:F6:BB:8B:3F:F6:FF:E9:97:A2:C0:9E:95:2E 724s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 724s serial:01 724s X509v3 Basic Constraints: 724s CA:TRUE 724s X509v3 Key Usage: critical 724s Digital Signature, Certificate Sign, CRL Sign 724s Certificate is to be certified until Jan 15 02:45:22 2026 GMT (365 days) 724s 724s Write out database with 1 new entries 724s Database updated 724s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem 724s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem 724s /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem: OK 724s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem 724s + local cmd=openssl 724s + shift 724s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem 724s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 724s error 20 at 0 depth lookup: unable to get local issuer certificate 724s error /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem: verification failed 724s + cat 724s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-8603 724s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-8603 1024 724s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-8603 -key /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-request.pem 724s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-request.pem 724s Certificate Request: 724s Data: 724s Version: 1 (0x0) 724s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:c4:62:c5:da:3e:ad:fe:c2:09:7b:c8:7d:2f:05: 724s 67:b5:59:6f:b9:15:a3:d5:ee:04:3e:ac:da:18:84: 724s 2c:75:bc:8e:83:62:14:3a:62:63:1c:04:08:dc:0b: 724s 2e:fa:2e:99:67:66:d6:ef:eb:2a:a9:46:2b:77:45: 724s 9f:2d:c5:ef:0b:09:50:a9:b4:15:42:1a:f7:ff:37: 724s cd:4b:0e:cf:88:81:56:77:48:b8:31:b2:85:ed:4b: 724s 69:fa:45:ed:8c:10:03:0f:70:73:c3:9f:54:c6:33: 724s 8c:98:b9:6d:98:e5:59:eb:05:af:01:d8:f4:53:c4: 724s eb:ac:48:11:93:82:bd:3c:ef 724s Exponent: 65537 (0x10001) 724s Attributes: 724s Requested Extensions: 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Root CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s B7:E7:76:42:1E:78:7A:FE:D2:D6:FC:29:5D:96:FA:06:78:E4:DF:45 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s af:e5:df:78:1d:c6:af:e0:7f:00:e6:bb:18:71:e4:82:c1:8c: 724s 9d:50:bd:40:3a:be:74:ac:dc:3e:7e:82:a6:e9:9c:2c:14:cc: 724s 8b:e7:59:cd:8d:bb:86:01:72:fa:21:c8:ee:a1:7c:9c:6c:31: 724s 19:58:db:99:5f:37:15:d7:51:05:fc:00:e9:d6:d2:b2:78:4e: 724s 78:92:33:41:22:c4:53:f9:b9:f0:3e:f9:8e:78:7f:d5:bd:10: 724s 05:9e:25:aa:b5:1b:eb:e4:9d:eb:5f:9c:6c:80:bd:fc:48:b4: 724s 83:65:fe:b6:fb:72:98:32:20:cb:16:1b:b6:95:ff:1d:8f:37: 724s a4:89 724s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.config -passin pass:random-root-CA-password-3826 -keyfile /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem 724s Using configuration from /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.config 724s Check that the request matches the signature 724s Signature ok 724s Certificate Details: 724s Serial Number: 3 (0x3) 724s Validity 724s Not Before: Jan 15 02:45:22 2025 GMT 724s Not After : Jan 15 02:45:22 2026 GMT 724s Subject: 724s organizationName = Test Organization 724s organizationalUnitName = Test Organization Unit 724s commonName = Test Organization Root Trusted Certificate 0001 724s X509v3 extensions: 724s X509v3 Authority Key Identifier: 724s C8:9D:37:47:6E:43:FE:CF:73:D2:A0:6B:45:88:91:FA:A4:89:5E:ED 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Root CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s B7:E7:76:42:1E:78:7A:FE:D2:D6:FC:29:5D:96:FA:06:78:E4:DF:45 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Certificate is to be certified until Jan 15 02:45:22 2026 GMT (365 days) 724s 724s Write out database with 1 new entries 724s Database updated 724s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem 724s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem 724s /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem: OK 724s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem 724s + local cmd=openssl 724s + shift 724s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem 724s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 724s error 20 at 0 depth lookup: unable to get local issuer certificate 724s error /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem: verification failed 724s + cat 724s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-27979 724s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-27979 1024 724s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-27979 -key /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-request.pem 724s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-request.pem 724s + openssl ca -passin pass:random-intermediate-CA-password-25599 -config /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem 724s Certificate Request: 724s Data: 724s Version: 1 (0x0) 724s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:d8:04:92:0c:b1:aa:f3:09:41:99:9d:4d:6f:0e: 724s d6:75:32:3d:a7:6b:da:36:c4:a6:2d:4e:38:4d:43: 724s c5:02:7d:53:33:d3:75:08:84:72:eb:d5:b1:fa:85: 724s 1e:51:78:5f:e7:6f:1a:4f:f9:c2:ce:fe:7e:8b:ab: 724s 4f:2b:81:5d:a9:7e:38:67:30:d1:69:12:60:3d:e9: 724s 4a:db:7d:16:14:68:68:b8:1d:b6:9a:30:45:38:14: 724s 08:e6:44:a6:78:00:64:da:b8:6b:58:79:a6:6e:fc: 724s ac:a1:39:49:d8:6b:f8:bc:2c:69:d5:33:98:3c:a7: 724s 35:85:2f:db:8a:cf:bf:3b:4f 724s Exponent: 65537 (0x10001) 724s Attributes: 724s Requested Extensions: 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Intermediate CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s D8:8A:99:C6:E8:AC:C9:2A:6E:B7:F3:0C:BA:10:54:42:66:07:84:90 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s c4:9a:b5:2c:9f:be:08:6f:03:dc:fe:d6:16:65:8e:de:7b:12: 724s 71:a8:0b:a4:64:fd:59:47:74:ef:5a:18:8a:94:f7:f2:dd:ed: 724s c7:e3:27:af:bd:d2:69:24:d9:b0:28:20:70:4d:7e:a8:cf:f5: 724s a3:e1:b0:48:20:23:9a:29:9f:5e:8d:6b:b6:53:ae:fa:82:08: 724s da:61:47:70:a5:7a:5d:88:87:ce:22:df:40:51:e3:e6:49:76: 724s 08:51:54:53:52:2b:0e:c1:be:92:25:24:c3:5c:14:aa:c3:35: 724s a3:7e:a3:35:b4:d2:ee:1b:51:ec:e1:59:4c:25:01:da:5c:50: 724s 74:00 724s Using configuration from /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.config 724s Check that the request matches the signature 724s Signature ok 724s Certificate Details: 724s Serial Number: 4 (0x4) 724s Validity 724s Not Before: Jan 15 02:45:22 2025 GMT 724s Not After : Jan 15 02:45:22 2026 GMT 724s Subject: 724s organizationName = Test Organization 724s organizationalUnitName = Test Organization Unit 724s commonName = Test Organization Intermediate Trusted Certificate 0001 724s X509v3 extensions: 724s X509v3 Authority Key Identifier: 724s 95:91:81:94:61:F4:9B:F6:BB:8B:3F:F6:FF:E9:97:A2:C0:9E:95:2E 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Intermediate CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s D8:8A:99:C6:E8:AC:C9:2A:6E:B7:F3:0C:BA:10:54:42:66:07:84:90 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Certificate is to be certified until Jan 15 02:45:22 2026 GMT (365 days) 724s 724s Write out database with 1 new entries 724s Database updated 724s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem 724s + echo 'This certificate should not be trusted fully' 724s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem 724s + local cmd=openssl 724s + shift 724s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem 724s This certificate should not be trusted fully 724s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 724s error 2 at 1 depth lookup: unable to get issuer certificate 724s error /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 724s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem 724s /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem: OK 724s + cat 724s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-25720 724s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-25720 1024 724s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-25720 -key /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 724s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 724s Certificate Request: 724s Data: 724s Version: 1 (0x0) 724s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 724s Subject Public Key Info: 724s Public Key Algorithm: rsaEncryption 724s Public-Key: (1024 bit) 724s Modulus: 724s 00:d6:0e:b5:6f:75:f8:e6:e9:2f:93:d6:fd:77:59: 724s 8f:ae:8c:3b:ce:7c:26:68:54:36:6e:98:0c:3e:b7: 724s 1b:2d:50:26:c5:82:da:e2:3e:59:7d:ee:67:6b:c1: 724s 46:c6:31:23:e4:40:a9:d0:cc:af:28:b0:cf:6e:e4: 724s d8:59:75:3e:15:ec:e3:4e:4d:21:98:a9:65:8f:87: 724s e3:3b:40:c4:cd:92:90:fe:d3:c0:2a:a8:42:50:dc: 724s b1:6a:2a:b8:18:7e:e5:8f:32:25:89:5e:e6:f9:00: 724s 90:e7:45:86:6d:66:8a:90:4b:25:de:1d:24:29:b4: 724s c4:6d:6b:8c:44:f4:96:a8:79 724s Exponent: 65537 (0x10001) 724s Attributes: 724s Requested Extensions: 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Sub Intermediate CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s 90:55:82:4C:C9:33:BD:96:04:16:E3:24:00:BC:9D:4B:0D:57:59:1A 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Signature Algorithm: sha256WithRSAEncryption 724s Signature Value: 724s a4:c0:54:c6:ce:d0:3d:0b:fd:85:22:86:0d:18:da:f6:00:32: 724s 16:57:6a:f6:f0:d0:64:4c:32:cf:cf:8b:7a:65:ed:4e:3d:f3: 724s 4a:0d:52:68:25:38:30:10:3e:99:1e:8f:bf:53:46:26:cc:57: 724s df:ac:a5:6d:bb:86:06:7e:ef:3d:be:36:2b:33:72:d7:ed:ea: 724s 59:d1:d9:96:7a:6b:e4:f3:de:09:20:c3:a7:6c:d2:bf:3c:9b: 724s 6c:ea:26:48:7e:0c:e3:d2:32:94:ff:92:e0:9c:9a:ab:81:cf: 724s 73:f7:88:4a:48:00:af:d2:79:4c:6d:80:21:3b:7d:69:af:60: 724s dd:22 724s + openssl ca -passin pass:random-sub-intermediate-CA-password-27066 -config /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 724s Using configuration from /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.config 724s Check that the request matches the signature 724s Signature ok 724s Certificate Details: 724s Serial Number: 5 (0x5) 724s Validity 724s Not Before: Jan 15 02:45:22 2025 GMT 724s Not After : Jan 15 02:45:22 2026 GMT 724s Subject: 724s organizationName = Test Organization 724s organizationalUnitName = Test Organization Unit 724s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 724s X509v3 extensions: 724s X509v3 Authority Key Identifier: 724s E7:56:49:C3:FE:EB:F2:EB:AB:43:C7:87:68:1F:4D:80:5E:CA:0A:52 724s X509v3 Basic Constraints: 724s CA:FALSE 724s Netscape Cert Type: 724s SSL Client, S/MIME 724s Netscape Comment: 724s Test Organization Sub Intermediate CA trusted Certificate 724s X509v3 Subject Key Identifier: 724s 90:55:82:4C:C9:33:BD:96:04:16:E3:24:00:BC:9D:4B:0D:57:59:1A 724s X509v3 Key Usage: critical 724s Digital Signature, Non Repudiation, Key Encipherment 724s X509v3 Extended Key Usage: 724s TLS Web Client Authentication, E-mail Protection 724s X509v3 Subject Alternative Name: 724s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 724s Certificate is to be certified until Jan 15 02:45:22 2026 GMT (365 days) 724s 724s Write out database with 1 new entries 724s Database updated 724s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s + echo 'This certificate should not be trusted fully' 725s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s + local cmd=openssl 725s + shift 725s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s This certificate should not be trusted fully 725s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 725s error 2 at 1 depth lookup: unable to get issuer certificate 725s error /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 725s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s + local cmd=openssl 725s + shift 725s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 725s error 20 at 0 depth lookup: unable to get local issuer certificate 725s error /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 725s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s + local cmd=openssl 725s + shift 725s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 725s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 725s error 20 at 0 depth lookup: unable to get local issuer certificate 725s error /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 725s + echo 'Building a the full-chain CA file...' 725s + cat /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem 725s Building a the full-chain CA file... 725s + cat /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem 725s + cat /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem 725s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem 725s + openssl pkcs7 -print_certs -noout 725s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem 725s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 725s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 725s 725s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 725s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 725s 725s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 725s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 725s 725s /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA.pem: OK 725s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem 725s /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem: OK 725s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem 725s /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem: OK 725s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-root-intermediate-chain-CA.pem 725s /tmp/sssd-softhsm2-certs-zG4BC2/test-root-intermediate-chain-CA.pem: OK 725s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 725s Certificates generation completed! 725s + echo 'Certificates generation completed!' 725s + [[ -v NO_SSSD_TESTS ]] 725s + [[ -v GENERATE_SMART_CARDS ]] 725s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-8603 725s + local certificate=/tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-root-ca-trusted-cert-0001-8603 725s + local key_cn 725s + local key_name 725s + local tokens_dir 725s + local output_cert_file 725s + token_name= 725s ++ basename /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem .pem 725s + key_name=test-root-CA-trusted-certificate-0001 725s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem 725s ++ sed -n 's/ *commonName *= //p' 725s + key_cn='Test Organization Root Trusted Certificate 0001' 725s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 725s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001.conf 725s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001.conf 725s ++ basename /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 725s + tokens_dir=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001 725s + token_name='Test Organization Root Tr Token' 725s + '[' '!' -e /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 725s + local key_file 725s + local decrypted_key 725s + mkdir -p /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001 725s + key_file=/tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-key.pem 725s + decrypted_key=/tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-key-decrypted.pem 725s + cat 725s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 725s Slot 0 has a free/uninitialized token. 725s The token has been initialized and is reassigned to slot 663547870 725s + softhsm2-util --show-slots 725s Available slots: 725s Slot 663547870 725s Slot info: 725s Description: SoftHSM slot ID 0x278cefde 725s Manufacturer ID: SoftHSM project 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Token present: yes 725s Token info: 725s Manufacturer ID: SoftHSM project 725s Model: SoftHSM v2 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Serial number: 54ca6737278cefde 725s Initialized: yes 725s User PIN init.: yes 725s Label: Test Organization Root Tr Token 725s Slot 1 725s Slot info: 725s Description: SoftHSM slot ID 0x1 725s Manufacturer ID: SoftHSM project 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Token present: yes 725s Token info: 725s Manufacturer ID: SoftHSM project 725s Model: SoftHSM v2 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Serial number: 725s Initialized: no 725s User PIN init.: no 725s Label: 725s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 725s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-8603 -in /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-key-decrypted.pem 725s writing RSA key 725s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 725s + rm /tmp/sssd-softhsm2-certs-zG4BC2/test-root-CA-trusted-certificate-0001-key-decrypted.pem 725s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --list-all 725s Object 0: 725s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=54ca6737278cefde;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 725s Type: X.509 Certificate (RSA-1024) 725s Expires: Thu Jan 15 02:45:22 2026 725s Label: Test Organization Root Trusted Certificate 0001 725s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 725s 725s + echo 'Test Organization Root Tr Token' 725s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27979 725s + local certificate=/tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem 725s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27979 725s + local key_cn 725s + local key_name 725s + local tokens_dir 725s + local output_cert_file 725s + token_name= 725s Test Organization Root Tr Token 725s ++ basename /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem .pem 725s + key_name=test-intermediate-CA-trusted-certificate-0001 725s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem 725s ++ sed -n 's/ *commonName *= //p' 725s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 725s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 725s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 725s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 725s ++ basename /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 725s + tokens_dir=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-intermediate-CA-trusted-certificate-0001 725s + token_name='Test Organization Interme Token' 725s + '[' '!' -e /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 725s + local key_file 725s + local decrypted_key 725s + mkdir -p /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-intermediate-CA-trusted-certificate-0001 725s + key_file=/tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-key.pem 725s + decrypted_key=/tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 725s + cat 725s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 725s Slot 0 has a free/uninitialized token. 725s The token has been initialized and is reassigned to slot 206183464 725s + softhsm2-util --show-slots 725s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 725s Available slots: 725s Slot 206183464 725s Slot info: 725s Description: SoftHSM slot ID 0xc4a1c28 725s Manufacturer ID: SoftHSM project 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Token present: yes 725s Token info: 725s Manufacturer ID: SoftHSM project 725s Model: SoftHSM v2 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Serial number: ff0a84628c4a1c28 725s Initialized: yes 725s User PIN init.: yes 725s Label: Test Organization Interme Token 725s Slot 1 725s Slot info: 725s Description: SoftHSM slot ID 0x1 725s Manufacturer ID: SoftHSM project 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Token present: yes 725s Token info: 725s Manufacturer ID: SoftHSM project 725s Model: SoftHSM v2 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Serial number: 725s Initialized: no 725s User PIN init.: no 725s Label: 725s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-27979 -in /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 725s writing RSA key 725s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 725s + rm /tmp/sssd-softhsm2-certs-zG4BC2/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 725s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --list-all 725s Object 0: 725s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=ff0a84628c4a1c28;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 725s Type: X.509 Certificate (RSA-1024) 725s Expires: Thu Jan 15 02:45:22 2026 725s Label: Test Organization Intermediate Trusted Certificate 0001 725s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 725s 725s + echo 'Test Organization Interme Token' 725s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-25720 725s + local certificate=/tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s Test Organization Interme Token 725s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-25720 725s + local key_cn 725s + local key_name 725s + local tokens_dir 725s + local output_cert_file 725s + token_name= 725s ++ basename /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 725s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 725s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem 725s ++ sed -n 's/ *commonName *= //p' 725s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 725s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 725s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 725s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 725s ++ basename /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 725s + tokens_dir=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 725s + token_name='Test Organization Sub Int Token' 725s + '[' '!' -e /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 725s + local key_file 725s + local decrypted_key 725s + mkdir -p /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 725s + key_file=/tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 725s + decrypted_key=/tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 725s + cat 725s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 725s + softhsm2-util --show-slots 725s Slot 0 has a free/uninitialized token. 725s The token has been initialized and is reassigned to slot 314988555 725s Available slots: 725s Slot 314988555 725s Slot info: 725s Description: SoftHSM slot ID 0x12c6580b 725s Manufacturer ID: SoftHSM project 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Token present: yes 725s Token info: 725s Manufacturer ID: SoftHSM project 725s Model: SoftHSM v2 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Serial number: 9b685db212c6580b 725s Initialized: yes 725s User PIN init.: yes 725s Label: Test Organization Sub Int Token 725s Slot 1 725s Slot info: 725s Description: SoftHSM slot ID 0x1 725s Manufacturer ID: SoftHSM project 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Token present: yes 725s Token info: 725s Manufacturer ID: SoftHSM project 725s Model: SoftHSM v2 725s Hardware version: 2.6 725s Firmware version: 2.6 725s Serial number: 725s Initialized: no 725s User PIN init.: no 725s Label: 725s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 725s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-25720 -in /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 725s writing RSA key 725s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 725s + rm /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 725s + p11tool --provider=/usr/lib/arm-linux-gnueabihf/softhsm/libsofthsm2.so --list-all 725s Object 0: 725s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=9b685db212c6580b;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 725s Type: X.509 Certificate (RSA-1024) 725s Expires: Thu Jan 15 02:45:22 2026 725s Label: Test Organization Sub Intermediate Trusted Certificate 0001 725s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 725s 725s Test Organization Sub Int Token 725s Certificates generation completed! 725s + echo 'Test Organization Sub Int Token' 725s + echo 'Certificates generation completed!' 725s + exit 0 725s + find /tmp/sssd-softhsm2-certs-zG4BC2 -type d -exec chmod 777 '{}' ';' 725s + find /tmp/sssd-softhsm2-certs-zG4BC2 -type f -exec chmod 666 '{}' ';' 725s + backup_file /etc/sssd/sssd.conf 725s + '[' -z '' ']' 725s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 725s + backupsdir=/tmp/sssd-softhsm2-backups-qH1Eau 725s + '[' -e /etc/sssd/sssd.conf ']' 725s + delete_paths+=("$1") 725s + rm -f /etc/sssd/sssd.conf 725s ++ runuser -u ubuntu -- sh -c 'echo ~' 725s + user_home=/home/ubuntu 725s + mkdir -p /home/ubuntu 725s + chown ubuntu:ubuntu /home/ubuntu 725s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 725s + user_config=/home/ubuntu/.config 725s + system_config=/etc 725s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 725s + for path_pair in "${softhsm2_conf_paths[@]}" 725s + IFS=: 725s + read -r -a path 725s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 725s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 725s + '[' -z /tmp/sssd-softhsm2-backups-qH1Eau ']' 725s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 725s + delete_paths+=("$1") 725s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 725s + for path_pair in "${softhsm2_conf_paths[@]}" 725s + IFS=: 725s + read -r -a path 725s + path=/etc/softhsm/softhsm2.conf 725s + backup_file /etc/softhsm/softhsm2.conf 725s + '[' -z /tmp/sssd-softhsm2-backups-qH1Eau ']' 725s + '[' -e /etc/softhsm/softhsm2.conf ']' 725s ++ dirname /etc/softhsm/softhsm2.conf 725s + local back_dir=/tmp/sssd-softhsm2-backups-qH1Eau//etc/softhsm 725s ++ basename /etc/softhsm/softhsm2.conf 725s + local back_path=/tmp/sssd-softhsm2-backups-qH1Eau//etc/softhsm/softhsm2.conf 725s + '[' '!' -e /tmp/sssd-softhsm2-backups-qH1Eau//etc/softhsm/softhsm2.conf ']' 725s + mkdir -p /tmp/sssd-softhsm2-backups-qH1Eau//etc/softhsm 725s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-qH1Eau//etc/softhsm/softhsm2.conf 725s + restore_paths+=("$back_path") 725s + rm -f /etc/softhsm/softhsm2.conf 725s Using CA DB '/tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem' with verification options: '' 725s + test_authentication login /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem 725s + pam_service=login 725s + certificate_config=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001.conf 725s + ca_db=/tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem 725s + verification_options= 725s + mkdir -p -m 700 /etc/sssd 725s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 725s + cat 725s + chmod 600 /etc/sssd/sssd.conf 725s + for path_pair in "${softhsm2_conf_paths[@]}" 725s + IFS=: 725s + read -r -a path 725s + user=ubuntu 725s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 725s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 725s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 725s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 725s + runuser -u ubuntu -- softhsm2-util --show-slots 725s + grep 'Test Organization' 725s + for path_pair in "${softhsm2_conf_paths[@]}" 725s + IFS=: 725s + read -r -a path 725s + user=root 725s + path=/etc/softhsm/softhsm2.conf 725s Label: Test Organization Root Tr Token 725s ++ dirname /etc/softhsm/softhsm2.conf 725s + runuser -u root -- mkdir -p /etc/softhsm 725s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 725s + runuser -u root -- softhsm2-util --show-slots 725s + grep 'Test Organization' 725s Label: Test Organization Root Tr Token 725s + systemctl restart sssd 725s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 726s + for alternative in "${alternative_pam_configs[@]}" 726s + pam-auth-update --enable sss-smart-card-optional 726s + cat /etc/pam.d/common-auth 726s # 726s # /etc/pam.d/common-auth - authentication settings common to all services 726s # 726s # This file is included from other service-specific PAM config files, 726s # and should contain a list of the authentication modules that define 726s # the central authentication scheme for use on the system 726s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 726s # traditional Unix authentication mechanisms. 726s # 726s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 726s # To take advantage of this, it is recommended that you configure any 726s # local modules either before or after the default block, and use 726s # pam-auth-update to manage selection of other modules. See 726s # pam-auth-update(8) for details. 726s 726s # here are the per-package modules (the "Primary" block) 726s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 726s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 726s auth [success=1 default=ignore] pam_sss.so use_first_pass 726s # here's the fallback if no module succeeds 726s auth requisite pam_deny.so 726s # prime the stack with a positive return value if there isn't one already; 726s # this avoids us returning an error just because nothing sets a success code 726s # since the modules above will each just jump around 726s auth required pam_permit.so 726s # and here are more per-package modules (the "Additional" block) 726s auth optional pam_cap.so 726s # end of pam-auth-update config 726s + echo -n -e 123456 726s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 726s pamtester: invoking pam_start(login, ubuntu, ...) 726s pamtester: performing operation - authenticate 726s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 726s + echo -n -e 123456 726s + runuser -u ubuntu -- pamtester -v login '' authenticate 726s pamtester: invoking pam_start(login, , ...) 726s pamtester: performing operation - authenticate 726s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 726s + echo -n -e wrong123456 726s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 726s pamtester: invoking pam_start(login, ubuntu, ...) 726s pamtester: performing operation - authenticate 729s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 729s + echo -n -e wrong123456 729s + runuser -u ubuntu -- pamtester -v login '' authenticate 729s pamtester: invoking pam_start(login, , ...) 729s pamtester: performing operation - authenticate 732s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 732s + echo -n -e 123456 732s + pamtester -v login root authenticate 732s pamtester: invoking pam_start(login, root, ...) 732s pamtester: performing operation - authenticate 736s Password: pamtester: Authentication failure 736s + for alternative in "${alternative_pam_configs[@]}" 736s + pam-auth-update --enable sss-smart-card-required 736s PAM configuration 736s ----------------- 736s 736s Incompatible PAM profiles selected. 736s 736s The following PAM profiles cannot be used together: 736s 736s SSS required smart card authentication, SSS optional smart card 736s authentication 736s 736s Please select a different set of modules to enable. 736s 736s + cat /etc/pam.d/common-auth 736s # 736s # /etc/pam.d/common-auth - authentication settings common to all services 736s # 736s # This file is included from other service-specific PAM config files, 736s # and should contain a list of the authentication modules that define 736s # the central authentication scheme for use on the system 736s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 736s # traditional Unix authentication mechanisms. 736s # 736s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 736s # To take advantage of this, it is recommended that you configure any 736s # local modules either before or after the default block, and use 736s # pam-auth-update to manage selection of other modules. See 736s # pam-auth-update(8) for details. 736s 736s # here are the per-package modules (the "Primary" block) 736s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 736s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 736s auth [success=1 default=ignore] pam_sss.so use_first_pass 736s # here's the fallback if no module succeeds 736s auth requisite pam_deny.so 736s # prime the stack with a positive return value if there isn't one already; 736s # this avoids us returning an error just because nothing sets a success code 736s # since the modules above will each just jump around 736s auth required pam_permit.so 736s # and here are more per-package modules (the "Additional" block) 736s auth optional pam_cap.so 736s # end of pam-auth-update config 736s pamtester: successfully authenticated 736s + echo -n -e 123456 736s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 736s pamtester: invoking pam_start(login, ubuntu, ...) 736s pamtester: performing operation - authenticate 736s PIN for Test Organization Root Tr Token: + echo -n -e 123456 736s + runuser -u ubuntu -- pamtester -v login '' authenticate 736s pamtester: invoking pam_start(login, , ...) 736s pamtester: performing operation - authenticate 736s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 736s + echo -n -e wrong123456 736s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 736s pamtester: invoking pam_start(login, ubuntu, ...) 736s pamtester: performing operation - authenticate 740s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 740s + echo -n -e wrong123456 740s + runuser -u ubuntu -- pamtester -v login '' authenticate 740s pamtester: invoking pam_start(login, , ...) 740s pamtester: performing operation - authenticate 743s PIN for Test Organization Root Tr Token: pamtester: Authentication failure 743s + echo -n -e 123456 743s + pamtester -v login root authenticate 743s pamtester: invoking pam_start(login, root, ...) 743s pamtester: performing operation - authenticate 746s pamtester: Authentication service cannot retrieve authentication info 746s + test_authentication login /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem 746s + pam_service=login 746s + certificate_config=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 746s + ca_db=/tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem 746s + verification_options= 746s + mkdir -p -m 700 /etc/sssd 746s Using CA DB '/tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem' with verification options: '' 746s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-zG4BC2/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 746s + cat 746s + chmod 600 /etc/sssd/sssd.conf 746s + for path_pair in "${softhsm2_conf_paths[@]}" 746s + IFS=: 746s + read -r -a path 746s + user=ubuntu 746s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 746s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 746s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 746s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 746s Label: Test Organization Sub Int Token 746s + runuser -u ubuntu -- softhsm2-util --show-slots 746s + grep 'Test Organization' 746s + for path_pair in "${softhsm2_conf_paths[@]}" 746s + IFS=: 746s + read -r -a path 746s + user=root 746s + path=/etc/softhsm/softhsm2.conf 746s ++ dirname /etc/softhsm/softhsm2.conf 746s + runuser -u root -- mkdir -p /etc/softhsm 746s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 746s + runuser -u root -- softhsm2-util --show-slots 746s + grep 'Test Organization' 746s Label: Test Organization Sub Int Token 746s + systemctl restart sssd 746s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 746s + for alternative in "${alternative_pam_configs[@]}" 746s + pam-auth-update --enable sss-smart-card-optional 747s + cat /etc/pam.d/common-auth 747s # 747s # /etc/pam.d/common-auth - authentication settings common to all services 747s # 747s # This file is included from other service-specific PAM config files, 747s # and should contain a list of the authentication modules that define 747s # the central authentication scheme for use on the system 747s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 747s # traditional Unix authentication mechanisms. 747s # 747s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 747s # To take advantage of this, it is recommended that you configure any 747s # local modules either before or after the default block, and use 747s # pam-auth-update to manage selection of other modules. See 747s # pam-auth-update(8) for details. 747s 747s # here are the per-package modules (the "Primary" block) 747s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 747s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 747s auth [success=1 default=ignore] pam_sss.so use_first_pass 747s # here's the fallback if no module succeeds 747s auth requisite pam_deny.so 747s # prime the stack with a positive return value if there isn't one already; 747s # this avoids us returning an error just because nothing sets a success code 747s # since the modules above will each just jump around 747s auth required pam_permit.so 747s # and here are more per-package modules (the "Additional" block) 747s auth optional pam_cap.so 747s # end of pam-auth-update config 747s + echo -n -e 123456 747s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 747s pamtester: invoking pam_start(login, ubuntu, ...) 747s pamtester: performing operation - authenticate 747s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 747s + echo -n -e 123456 747s + runuser -u ubuntu -- pamtester -v login '' authenticate 747s pamtester: invoking pam_start(login, , ...) 747s pamtester: performing operation - authenticate 747s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 747s + echo -n -e wrong123456 747s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 747s pamtester: invoking pam_start(login, ubuntu, ...) 747s pamtester: performing operation - authenticate 750s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 750s + echo -n -e wrong123456 750s + runuser -u ubuntu -- pamtester -v login '' authenticate 750s pamtester: invoking pam_start(login, , ...) 750s pamtester: performing operation - authenticate 753s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 753s + echo -n -e 123456 753s + pamtester -v login root authenticate 753s pamtester: invoking pam_start(login, root, ...) 753s pamtester: performing operation - authenticate 757s Password: pamtester: Authentication failure 757s + for alternative in "${alternative_pam_configs[@]}" 757s + pam-auth-update --enable sss-smart-card-required 757s PAM configuration 757s ----------------- 757s 757s Incompatible PAM profiles selected. 757s 757s The following PAM profiles cannot be used together: 757s 757s SSS required smart card authentication, SSS optional smart card 757s authentication 757s 757s Please select a different set of modules to enable. 757s 757s # 757s # /etc/pam.d/common-auth - authentication settings common to all services 757s # 757s # This file is included from other service-specific PAM config files, 757s # and should contain a list of the authentication modules that define 757s # the central authentication scheme for use on the system 757s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 757s # traditional Unix authentication mechanisms. 757s # 757s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 757s # To take advantage of this, it is recommended that you configure any 757s # local modules either before or after the default block, and use 757s # pam-auth-update to manage selection of other modules. See 757s # pam-auth-update(8) for details. 757s 757s # here are the per-package modules (the "Primary" block) 757s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 757s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 757s auth [success=1 default=ignore] pam_sss.so use_first_pass 757s # here's the fallback if no module succeeds 757s auth requisite pam_deny.so 757s # prime the stack with a positive return value if there isn't one already; 757s # this avoids us returning an error just because nothing sets a success code 757s # since the modules above will each just jump around 757s auth required pam_permit.so 757s # and here are more per-package modules (the "Additional" block) 757s auth optional pam_cap.so 757s # end of pam-auth-update config 757s + cat /etc/pam.d/common-auth 757s + echo -n -e 123456 757s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 757s pamtester: invoking pam_start(login, ubuntu, ...) 757s pamtester: performing operation - authenticate 757s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 757s + echo -n -e 123456 757s + runuser -u ubuntu -- pamtester -v login '' authenticate 757s pamtester: invoking pam_start(login, , ...) 757s pamtester: performing operation - authenticate 757s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 757s + echo -n -e wrong123456 757s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 757s pamtester: invoking pam_start(login, ubuntu, ...) 757s pamtester: performing operation - authenticate 760s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 760s + echo -n -e wrong123456 760s + runuser -u ubuntu -- pamtester -v login '' authenticate 760s pamtester: invoking pam_start(login, , ...) 760s pamtester: performing operation - authenticate 764s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 764s + echo -n -e 123456 764s + pamtester -v login root authenticate 764s pamtester: invoking pam_start(login, root, ...) 764s pamtester: performing operation - authenticate 768s pamtester: Authentication service cannot retrieve authentication info 768s + test_authentication login /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem partial_chain 768s + pam_service=login 768s + certificate_config=/tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 768s + ca_db=/tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem 768s + verification_options=partial_chain 768s + mkdir -p -m 700 /etc/sssd 768s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem'\'' with verification options: '\''partial_chain'\''' 768s + cat 768s + chmod 600 /etc/sssd/sssd.conf 768s Using CA DB '/tmp/sssd-softhsm2-certs-zG4BC2/test-sub-intermediate-CA.pem' with verification options: 'partial_chain' 768s + for path_pair in "${softhsm2_conf_paths[@]}" 768s + IFS=: 768s + read -r -a path 768s + user=ubuntu 768s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 768s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 768s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 768s Label: Test Organization Sub Int Token 768s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 768s + runuser -u ubuntu -- softhsm2-util --show-slots 768s + grep 'Test Organization' 768s + for path_pair in "${softhsm2_conf_paths[@]}" 768s + IFS=: 768s + read -r -a path 768s + user=root 768s + path=/etc/softhsm/softhsm2.conf 768s ++ dirname /etc/softhsm/softhsm2.conf 768s + runuser -u root -- mkdir -p /etc/softhsm 768s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-zG4BC2/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 768s + runuser -u root -- softhsm2-util --show-slots 768s + grep 'Test Organization' 768s Label: Test Organization Sub Int Token 768s + systemctl restart sssd 768s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 768s + for alternative in "${alternative_pam_configs[@]}" 768s + pam-auth-update --enable sss-smart-card-optional 768s + cat /etc/pam.d/common-auth 768s # 768s # /etc/pam.d/common-auth - authentication settings common to all services 768s # 768s # This file is included from other service-specific PAM config files, 768s # and should contain a list of the authentication modules that define 768s # the central authentication scheme for use on the system 768s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 768s # traditional Unix authentication mechanisms. 768s # 768s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 768s # To take advantage of this, it is recommended that you configure any 768s # local modules either before or after the default block, and use 768s # pam-auth-update to manage selection of other modules. See 768s # pam-auth-update(8) for details. 768s 768s # here are the per-package modules (the "Primary" block) 768s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 768s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 768s auth [success=1 default=ignore] pam_sss.so use_first_pass 768s # here's the fallback if no module succeeds 768s auth requisite pam_deny.so 768s # prime the stack with a positive return value if there isn't one already; 768s # this avoids us returning an error just because nothing sets a success code 768s # since the modules above will each just jump around 768s auth required pam_permit.so 768s # and here are more per-package modules (the "Additional" block) 768s auth optional pam_cap.so 768s # end of pam-auth-update config 768s + echo -n -e 123456 768s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 768s pamtester: invoking pam_start(login, ubuntu, ...) 768s pamtester: performing operation - authenticate 768s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 768s + echo -n -e 123456 768s + runuser -u ubuntu -- pamtester -v login '' authenticate 768s pamtester: invoking pam_start(login, , ...) 768s pamtester: performing operation - authenticate 768s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 768s + echo -n -e wrong123456 768s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 769s pamtester: invoking pam_start(login, ubuntu, ...) 769s pamtester: performing operation - authenticate 772s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 772s + echo -n -e wrong123456 772s + runuser -u ubuntu -- pamtester -v login '' authenticate 772s pamtester: invoking pam_start(login, , ...) 772s pamtester: performing operation - authenticate 775s PIN for Test Organization Sub Int Token: Password: pamtester: Authentication failure 775s + echo -n -e 123456 775s + pamtester -v login root authenticate 775s pamtester: invoking pam_start(login, root, ...) 775s pamtester: performing operation - authenticate 778s Password: pamtester: Authentication failure 778s + for alternative in "${alternative_pam_configs[@]}" 778s + pam-auth-update --enable sss-smart-card-required 778s PAM configuration 778s ----------------- 778s 778s Incompatible PAM profiles selected. 778s 778s The following PAM profiles cannot be used together: 778s 778s SSS required smart card authentication, SSS optional smart card 778s authentication 778s 778s Please select a different set of modules to enable. 778s 778s + cat /etc/pam.d/common-auth 778s + echo -n -e 123456 778s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 778s # 778s # /etc/pam.d/common-auth - authentication settings common to all services 778s # 778s # This file is included from other service-specific PAM config files, 778s # and should contain a list of the authentication modules that define 778s # the central authentication scheme for use on the system 778s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 778s # traditional Unix authentication mechanisms. 778s # 778s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 778s # To take advantage of this, it is recommended that you configure any 778s # local modules either before or after the default block, and use 778s # pam-auth-update to manage selection of other modules. See 778s # pam-auth-update(8) for details. 778s 778s # here are the per-package modules (the "Primary" block) 778s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 778s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 778s auth [success=1 default=ignore] pam_sss.so use_first_pass 778s # here's the fallback if no module succeeds 778s auth requisite pam_deny.so 778s # prime the stack with a positive return value if there isn't one already; 778s # this avoids us returning an error just because nothing sets a success code 778s # since the modules above will each just jump around 778s auth required pam_permit.so 778s # and here are more per-package modules (the "Additional" block) 778s auth optional pam_cap.so 778s # end of pam-auth-update config 779s pamtester: invoking pam_start(login, ubuntu, ...) 779s pamtester: performing operation - authenticate 779s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 779s + echo -n -e 123456 779s + runuser -u ubuntu -- pamtester -v login '' authenticate 779s pamtester: invoking pam_start(login, , ...) 779s pamtester: performing operation - authenticate 779s PIN for Test Organization Sub Int Token: pamtester: successfully authenticated 779s + echo -n -e wrong123456 779s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 779s pamtester: invoking pam_start(login, ubuntu, ...) 779s pamtester: performing operation - authenticate 782s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 782s + echo -n -e wrong123456 782s + runuser -u ubuntu -- pamtester -v login '' authenticate 782s pamtester: invoking pam_start(login, , ...) 782s pamtester: performing operation - authenticate 785s PIN for Test Organization Sub Int Token: pamtester: Authentication failure 785s + echo -n -e 123456 785s + pamtester -v login root authenticate 785s pamtester: invoking pam_start(login, root, ...) 785s pamtester: performing operation - authenticate 787s pamtester: Authentication service cannot retrieve authentication info 787s + handle_exit 787s + exit_code=0 787s + restore_changes 787s + for path in "${restore_paths[@]}" 787s + local original_path 787s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-qH1Eau /tmp/sssd-softhsm2-backups-qH1Eau//etc/softhsm/softhsm2.conf 787s + original_path=/etc/softhsm/softhsm2.conf 787s + rm /etc/softhsm/softhsm2.conf 787s + mv /tmp/sssd-softhsm2-backups-qH1Eau//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 787s + for path in "${delete_paths[@]}" 787s + rm -f /etc/sssd/sssd.conf 787s + for path in "${delete_paths[@]}" 787s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 787s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 787s + '[' -e /etc/sssd/sssd.conf ']' 787s + systemctl stop sssd 787s + '[' -e /etc/softhsm/softhsm2.conf ']' 787s + chmod 600 /etc/softhsm/softhsm2.conf 787s + rm -rf /tmp/sssd-softhsm2-certs-zG4BC2 788s + '[' 0 = 0 ']' 788s + rm -rf /tmp/sssd-softhsm2-backups-qH1Eau 788s Script completed successfully! 788s + set +x 788s autopkgtest [02:46:26]: test sssd-smart-card-pam-auth-configs: -----------------------] 793s autopkgtest [02:46:31]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 793s sssd-smart-card-pam-auth-configs PASS 798s autopkgtest [02:46:36]: @@@@@@@@@@@@@@@@@@@@ summary 798s ldap-user-group-ldap-auth PASS 798s ldap-user-group-krb5-auth PASS 798s sssd-softhism2-certificates-tests.sh PASS 798s sssd-smart-card-pam-auth-configs PASS