0s autopkgtest [02:39:51]: starting date and time: 2025-01-15 02:39:51+0000 0s autopkgtest [02:39:51]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [02:39:51]: host juju-7f2275-prod-proposed-migration-environment-20; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.hqu5k33_/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:sssd,src:adequate,src:apbs,src:binutils,src:boost1.83,src:createrepo-c,src:dotnet8,src:dotnet9,src:dovecot,src:dpdk,src:freeradius,src:gcc-11,src:gcc-14,src:libixion,src:liborcus,src:libreoffice,src:libsbml,src:libzstd,src:link-grammar,src:linux-aws,src:linux-azure,src:linux-gcp,src:linux-lowlatency,src:linux-oracle,src:linux-riscv,src:linux,src:mmdebstrap,src:nftables,src:nodejs,src:open-iscsi,src:postfix,src:pyside2,src:python3-defaults,src:samba,src:squid,src:systemd,src:tdb,src:tifffile,src:tzdata,src:vim --apt-upgrade sssd --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=sssd/2.10.1-2ubuntu1 adequate/0.17.5 apbs/3.4.1-6build2 binutils/2.43.50.20250108-1ubuntu1 boost1.83/1.83.0-4ubuntu2 createrepo-c/0.17.3-6build1 dotnet8/8.0.112-8.0.12-0ubuntu1 dotnet9/9.0.102-9.0.1-0ubuntu1 dovecot/1:2.3.21.1+dfsg1-1ubuntu2 dpdk/24.11.1-1 freeradius/3.2.6+dfsg-3 gcc-11/11.5.0-2ubuntu1 gcc-14/14.2.0-13ubuntu1 libixion/0.19.0-6build1 liborcus/0.19.2-6build1 libreoffice/4:24.8.4~rc2-0ubuntu4 libsbml/5.20.4+dfsg-0.1 libzstd/1.5.6+dfsg-2 link-grammar/5.12.5~dfsg-1build1 linux-aws/6.11.0-1005.5 linux-azure/6.11.0-1005.5 linux-gcp/6.11.0-1004.4 linux-lowlatency/6.11.0-1005.5 linux-oracle/6.11.0-1007.7 linux-riscv/6.11.0-8.8.1build1 linux/6.11.0-9.9build1 mmdebstrap/1.5.6-2 nftables/1.1.1-1build1 nodejs/20.18.1+dfsg-1ubuntu2 open-iscsi/2.1.10-3ubuntu1 postfix/3.9.1-10 pyside2/5.15.16-2 python3-defaults/3.13.1-1~exp2 samba/2:4.20.4+dfsg-1ubuntu5 squid/6.10-1ubuntu2 systemd/257.1-7ubuntu1 tdb/1.4.12-1build1 tifffile/20250110-1 tzdata/2024b-6ubuntu1 vim/2:9.1.0967-1ubuntu1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@bos03-s390x-20.secgroup --name adt-plucky-s390x-sssd-20250115-023951-juju-7f2275-prod-proposed-migration-environment-20-97fce4aa-0b94-46fa-806c-c3ad6da4b20a --image adt/ubuntu-plucky-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-20 --net-id=net_prod-proposed-migration-s390x -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 80s autopkgtest [02:41:11]: testbed dpkg architecture: s390x 80s autopkgtest [02:41:11]: testbed apt version: 2.9.18 80s autopkgtest [02:41:11]: @@@@@@@@@@@@@@@@@@@@ test bed setup 81s autopkgtest [02:41:12]: testbed release detected to be: None 81s autopkgtest [02:41:12]: updating testbed package index (apt update) 82s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 82s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 82s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 82s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 82s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [880 kB] 82s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 82s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [12.3 kB] 82s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [149 kB] 82s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [264 kB] 82s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted s390x Packages [756 B] 82s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [936 kB] 83s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [4072 B] 83s Fetched 2329 kB in 1s (1572 kB/s) 83s Reading package lists... 84s Reading package lists... 84s Building dependency tree... 84s Reading state information... 84s Calculating upgrade... 84s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 84s Reading package lists... 85s Building dependency tree... 85s Reading state information... 85s 0 upgraded, 0 newly installed, 0 to remove and 35 not upgraded. 85s autopkgtest [02:41:16]: upgrading testbed (apt dist-upgrade and autopurge) 85s Reading package lists... 85s Building dependency tree... 85s Reading state information... 85s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 85s Starting 2 pkgProblemResolver with broken count: 0 85s Done 85s Entering ResolveByKeep 86s 86s The following packages were automatically installed and are no longer required: 86s python3.12 python3.12-minimal 86s Use 'sudo apt autoremove' to remove them. 86s The following NEW packages will be installed: 86s libpython3.13-minimal libpython3.13-stdlib python3.13 python3.13-minimal 86s The following packages have been kept back: 86s libnftables1 nftables 86s The following packages will be upgraded: 86s binutils binutils-common binutils-s390x-linux-gnu gcc-14-base libatomic1 86s libbinutils libctf-nobfd0 libctf0 libgcc-s1 libnss-systemd libpam-systemd 86s libpython3-stdlib libsframe1 libstdc++6 libsystemd-shared libsystemd0 86s libudev1 libzstd1 linux-libc-dev linux-tools-common python3 python3-minimal 86s systemd systemd-cryptsetup systemd-resolved systemd-sysv systemd-timesyncd 86s tzdata udev vim-common vim-tiny xxd zstd 86s 33 upgraded, 4 newly installed, 0 to remove and 2 not upgraded. 86s Need to get 24.5 MB of archives. 86s After this operation, 22.8 MB of additional disk space will be used. 86s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x libpython3.13-minimal s390x 3.13.1-2 [880 kB] 86s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x python3.13-minimal s390x 3.13.1-2 [2364 kB] 87s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x python3-minimal s390x 3.13.1-1~exp2 [27.6 kB] 87s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x python3 s390x 3.13.1-1~exp2 [23.9 kB] 87s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x tzdata all 2024b-6ubuntu1 [197 kB] 87s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libpython3.13-stdlib s390x 3.13.1-2 [2074 kB] 87s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x python3.13 s390x 3.13.1-2 [729 kB] 87s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libpython3-stdlib s390x 3.13.1-1~exp2 [10.2 kB] 87s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd-timesyncd s390x 257.1-7ubuntu1 [41.3 kB] 87s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd-resolved s390x 257.1-7ubuntu1 [323 kB] 87s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd-cryptsetup s390x 257.1-7ubuntu1 [128 kB] 87s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsystemd-shared s390x 257.1-7ubuntu1 [2322 kB] 88s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsystemd0 s390x 257.1-7ubuntu1 [533 kB] 88s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd-sysv s390x 257.1-7ubuntu1 [11.8 kB] 88s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libnss-systemd s390x 257.1-7ubuntu1 [180 kB] 88s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libpam-systemd s390x 257.1-7ubuntu1 [263 kB] 88s Get:17 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd s390x 257.1-7ubuntu1 [3577 kB] 88s Get:18 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x udev s390x 257.1-7ubuntu1 [2009 kB] 88s Get:19 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libudev1 s390x 257.1-7ubuntu1 [203 kB] 88s Get:20 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x gcc-14-base s390x 14.2.0-13ubuntu1 [53.0 kB] 88s Get:21 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libstdc++6 s390x 14.2.0-13ubuntu1 [896 kB] 88s Get:22 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libatomic1 s390x 14.2.0-13ubuntu1 [9422 B] 88s Get:23 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libgcc-s1 s390x 14.2.0-13ubuntu1 [35.9 kB] 88s Get:24 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libzstd1 s390x 1.5.6+dfsg-2 [340 kB] 89s Get:25 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x vim-tiny s390x 2:9.1.0967-1ubuntu1 [666 kB] 89s Get:26 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x vim-common all 2:9.1.0967-1ubuntu1 [396 kB] 89s Get:27 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x xxd s390x 2:9.1.0967-1ubuntu1 [66.9 kB] 89s Get:28 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libctf0 s390x 2.43.50.20250108-1ubuntu1 [101 kB] 89s Get:29 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libctf-nobfd0 s390x 2.43.50.20250108-1ubuntu1 [101 kB] 89s Get:30 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x binutils-s390x-linux-gnu s390x 2.43.50.20250108-1ubuntu1 [2327 kB] 89s Get:31 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libbinutils s390x 2.43.50.20250108-1ubuntu1 [481 kB] 89s Get:32 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x binutils s390x 2.43.50.20250108-1ubuntu1 [3072 B] 89s Get:33 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x binutils-common s390x 2.43.50.20250108-1ubuntu1 [222 kB] 89s Get:34 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsframe1 s390x 2.43.50.20250108-1ubuntu1 [14.0 kB] 89s Get:35 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x linux-libc-dev s390x 6.11.0-9.9 [1662 kB] 89s Get:36 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x linux-tools-common all 6.11.0-9.9 [484 kB] 89s Get:37 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x zstd s390x 1.5.6+dfsg-2 [711 kB] 89s Preconfiguring packages ... 89s Fetched 24.5 MB in 3s (7186 kB/s) 89s Selecting previously unselected package libpython3.13-minimal:s390x. 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 90s Preparing to unpack .../libpython3.13-minimal_3.13.1-2_s390x.deb ... 90s Unpacking libpython3.13-minimal:s390x (3.13.1-2) ... 90s Selecting previously unselected package python3.13-minimal. 90s Preparing to unpack .../python3.13-minimal_3.13.1-2_s390x.deb ... 90s Unpacking python3.13-minimal (3.13.1-2) ... 90s Setting up libpython3.13-minimal:s390x (3.13.1-2) ... 90s Setting up python3.13-minimal (3.13.1-2) ... 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55978 files and directories currently installed.) 90s Preparing to unpack .../python3-minimal_3.13.1-1~exp2_s390x.deb ... 90s Unpacking python3-minimal (3.13.1-1~exp2) over (3.12.8-1) ... 90s Setting up python3-minimal (3.13.1-1~exp2) ... 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55978 files and directories currently installed.) 90s Preparing to unpack .../0-python3_3.13.1-1~exp2_s390x.deb ... 90s Unpacking python3 (3.13.1-1~exp2) over (3.12.8-1) ... 90s Preparing to unpack .../1-tzdata_2024b-6ubuntu1_all.deb ... 90s Unpacking tzdata (2024b-6ubuntu1) over (2024b-4ubuntu1) ... 91s Selecting previously unselected package libpython3.13-stdlib:s390x. 91s Preparing to unpack .../2-libpython3.13-stdlib_3.13.1-2_s390x.deb ... 91s Unpacking libpython3.13-stdlib:s390x (3.13.1-2) ... 91s Selecting previously unselected package python3.13. 91s Preparing to unpack .../3-python3.13_3.13.1-2_s390x.deb ... 91s Unpacking python3.13 (3.13.1-2) ... 91s Preparing to unpack .../4-libpython3-stdlib_3.13.1-1~exp2_s390x.deb ... 91s Unpacking libpython3-stdlib:s390x (3.13.1-1~exp2) over (3.12.8-1) ... 91s Preparing to unpack .../5-systemd-timesyncd_257.1-7ubuntu1_s390x.deb ... 91s Unpacking systemd-timesyncd (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Preparing to unpack .../6-systemd-resolved_257.1-7ubuntu1_s390x.deb ... 91s Unpacking systemd-resolved (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Preparing to unpack .../7-systemd-cryptsetup_257.1-7ubuntu1_s390x.deb ... 91s Unpacking systemd-cryptsetup (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Preparing to unpack .../8-libsystemd-shared_257.1-7ubuntu1_s390x.deb ... 91s Unpacking libsystemd-shared:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Preparing to unpack .../9-libsystemd0_257.1-7ubuntu1_s390x.deb ... 91s Unpacking libsystemd0:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Setting up libsystemd0:s390x (257.1-7ubuntu1) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56395 files and directories currently installed.) 91s Preparing to unpack .../0-systemd-sysv_257.1-7ubuntu1_s390x.deb ... 91s Unpacking systemd-sysv (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Preparing to unpack .../1-libnss-systemd_257.1-7ubuntu1_s390x.deb ... 91s Unpacking libnss-systemd:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Preparing to unpack .../2-libpam-systemd_257.1-7ubuntu1_s390x.deb ... 91s Unpacking libpam-systemd:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Preparing to unpack .../3-systemd_257.1-7ubuntu1_s390x.deb ... 91s Unpacking systemd (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Preparing to unpack .../4-udev_257.1-7ubuntu1_s390x.deb ... 91s Unpacking udev (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Preparing to unpack .../5-libudev1_257.1-7ubuntu1_s390x.deb ... 91s Unpacking libudev1:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 91s Setting up libudev1:s390x (257.1-7ubuntu1) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 91s Preparing to unpack .../gcc-14-base_14.2.0-13ubuntu1_s390x.deb ... 91s Unpacking gcc-14-base:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 91s Setting up gcc-14-base:s390x (14.2.0-13ubuntu1) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 91s Preparing to unpack .../libstdc++6_14.2.0-13ubuntu1_s390x.deb ... 91s Unpacking libstdc++6:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 91s Setting up libstdc++6:s390x (14.2.0-13ubuntu1) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 91s Preparing to unpack .../libatomic1_14.2.0-13ubuntu1_s390x.deb ... 91s Unpacking libatomic1:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 91s Preparing to unpack .../libgcc-s1_14.2.0-13ubuntu1_s390x.deb ... 91s Unpacking libgcc-s1:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 91s Setting up libgcc-s1:s390x (14.2.0-13ubuntu1) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 91s Preparing to unpack .../libzstd1_1.5.6+dfsg-2_s390x.deb ... 91s Unpacking libzstd1:s390x (1.5.6+dfsg-2) over (1.5.6+dfsg-1) ... 91s Setting up libzstd1:s390x (1.5.6+dfsg-2) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 91s Preparing to unpack .../00-vim-tiny_2%3a9.1.0967-1ubuntu1_s390x.deb ... 91s Unpacking vim-tiny (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 91s Preparing to unpack .../01-vim-common_2%3a9.1.0967-1ubuntu1_all.deb ... 91s Unpacking vim-common (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 91s Preparing to unpack .../02-xxd_2%3a9.1.0967-1ubuntu1_s390x.deb ... 91s Unpacking xxd (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 91s Preparing to unpack .../03-libctf0_2.43.50.20250108-1ubuntu1_s390x.deb ... 91s Unpacking libctf0:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 91s Preparing to unpack .../04-libctf-nobfd0_2.43.50.20250108-1ubuntu1_s390x.deb ... 91s Unpacking libctf-nobfd0:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 91s Preparing to unpack .../05-binutils-s390x-linux-gnu_2.43.50.20250108-1ubuntu1_s390x.deb ... 91s Unpacking binutils-s390x-linux-gnu (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 91s Preparing to unpack .../06-libbinutils_2.43.50.20250108-1ubuntu1_s390x.deb ... 91s Unpacking libbinutils:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 91s Preparing to unpack .../07-binutils_2.43.50.20250108-1ubuntu1_s390x.deb ... 91s Unpacking binutils (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 91s Preparing to unpack .../08-binutils-common_2.43.50.20250108-1ubuntu1_s390x.deb ... 91s Unpacking binutils-common:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 91s Preparing to unpack .../09-libsframe1_2.43.50.20250108-1ubuntu1_s390x.deb ... 91s Unpacking libsframe1:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 91s Preparing to unpack .../10-linux-libc-dev_6.11.0-9.9_s390x.deb ... 91s Unpacking linux-libc-dev:s390x (6.11.0-9.9) over (6.11.0-8.8) ... 92s Preparing to unpack .../11-linux-tools-common_6.11.0-9.9_all.deb ... 92s Unpacking linux-tools-common (6.11.0-9.9) over (6.11.0-8.8) ... 92s Preparing to unpack .../12-zstd_1.5.6+dfsg-2_s390x.deb ... 92s Unpacking zstd (1.5.6+dfsg-2) over (1.5.6+dfsg-1) ... 92s Setting up binutils-common:s390x (2.43.50.20250108-1ubuntu1) ... 92s Setting up linux-libc-dev:s390x (6.11.0-9.9) ... 92s Setting up libctf-nobfd0:s390x (2.43.50.20250108-1ubuntu1) ... 92s Setting up xxd (2:9.1.0967-1ubuntu1) ... 92s Setting up libsframe1:s390x (2.43.50.20250108-1ubuntu1) ... 92s Setting up tzdata (2024b-6ubuntu1) ... 92s 92s Current default time zone: 'Etc/UTC' 92s Local time is now: Wed Jan 15 02:41:23 UTC 2025. 92s Universal Time is now: Wed Jan 15 02:41:23 UTC 2025. 92s Run 'dpkg-reconfigure tzdata' if you wish to change it. 92s 92s Setting up vim-common (2:9.1.0967-1ubuntu1) ... 92s Setting up libatomic1:s390x (14.2.0-13ubuntu1) ... 92s Setting up libsystemd-shared:s390x (257.1-7ubuntu1) ... 92s Setting up libbinutils:s390x (2.43.50.20250108-1ubuntu1) ... 92s Setting up linux-tools-common (6.11.0-9.9) ... 92s Setting up libpython3.13-stdlib:s390x (3.13.1-2) ... 92s Setting up zstd (1.5.6+dfsg-2) ... 92s Setting up libpython3-stdlib:s390x (3.13.1-1~exp2) ... 92s Setting up libctf0:s390x (2.43.50.20250108-1ubuntu1) ... 92s Setting up binutils-s390x-linux-gnu (2.43.50.20250108-1ubuntu1) ... 92s Setting up python3.13 (3.13.1-2) ... 92s Setting up python3 (3.13.1-1~exp2) ... 92s /usr/bin/py3clean:101: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 92s for fn in glob1(directory, "%s.*" % fname): 93s Setting up systemd (257.1-7ubuntu1) ... 93s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 93s Created symlink '/run/systemd/system/tmp.mount' → '/dev/null'. 93s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 93s Setting up binutils (2.43.50.20250108-1ubuntu1) ... 93s Setting up vim-tiny (2:9.1.0967-1ubuntu1) ... 93s Setting up systemd-cryptsetup (257.1-7ubuntu1) ... 93s Setting up systemd-timesyncd (257.1-7ubuntu1) ... 94s systemd-time-wait-sync.service is a disabled or a static unit not running, not starting it. 94s Setting up udev (257.1-7ubuntu1) ... 94s Setting up systemd-resolved (257.1-7ubuntu1) ... 95s Setting up systemd-sysv (257.1-7ubuntu1) ... 95s Setting up libnss-systemd:s390x (257.1-7ubuntu1) ... 95s Setting up libpam-systemd:s390x (257.1-7ubuntu1) ... 95s Processing triggers for libc-bin (2.40-4ubuntu1) ... 95s Processing triggers for man-db (2.13.0-1) ... 96s Processing triggers for dbus (1.14.10-4ubuntu5) ... 96s Processing triggers for shared-mime-info (2.4-5) ... 96s Warning: program compiled against libxml 212 using older 209 96s Processing triggers for initramfs-tools (0.142ubuntu35) ... 96s update-initramfs: Generating /boot/initrd.img-6.11.0-8-generic 96s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 98s Using config file '/etc/zipl.conf' 98s Building bootmap in '/boot' 98s Adding IPL section 'ubuntu' (default) 98s Preparing boot device for LD-IPL: vda (0000). 98s Done. 98s Reading package lists... 98s Building dependency tree... 98s Reading state information... 99s Starting pkgProblemResolver with broken count: 0 99s Starting 2 pkgProblemResolver with broken count: 0 99s Done 99s The following packages will be REMOVED: 99s python3.12* python3.12-minimal* 99s 0 upgraded, 0 newly installed, 2 to remove and 2 not upgraded. 99s After this operation, 9190 kB disk space will be freed. 99s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 99s Removing python3.12 (3.12.8-3) ... 99s Removing python3.12-minimal (3.12.8-3) ... 99s /usr/bin/py3clean:125: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 99s for fn in glob1(directory, "%s.%s.py[co]" % (fname, magic_tag)): 99s Processing triggers for man-db (2.13.0-1) ... 100s Processing triggers for systemd (257.1-7ubuntu1) ... 100s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56368 files and directories currently installed.) 100s Purging configuration files for python3.12-minimal (3.12.8-3) ... 100s autopkgtest [02:41:31]: rebooting testbed after setup commands that affected boot 120s autopkgtest [02:41:51]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP Mon Sep 16 12:49:35 UTC 2024 122s autopkgtest [02:41:53]: @@@@@@@@@@@@@@@@@@@@ apt-source sssd 136s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (dsc) [5330 B] 136s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (tar) [9197 kB] 136s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (asc) [833 B] 136s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main sssd 2.10.1-2ubuntu1 (diff) [49.9 kB] 136s gpgv: Signature made Tue Jan 14 21:45:37 2025 UTC 136s gpgv: using RSA key E92FD0B36B14F1F4D8E0EB2F106DA1C8C3CBBF14 136s gpgv: Can't check signature: No public key 136s dpkg-source: warning: cannot verify inline signature for ./sssd_2.10.1-2ubuntu1.dsc: no acceptable signature found 136s autopkgtest [02:42:07]: testing package sssd version 2.10.1-2ubuntu1 141s autopkgtest [02:42:12]: build not needed 150s autopkgtest [02:42:21]: test ldap-user-group-ldap-auth: preparing testbed 150s Reading package lists... 150s Building dependency tree... 150s Reading state information... 150s Starting pkgProblemResolver with broken count: 0 150s Starting 2 pkgProblemResolver with broken count: 0 150s Done 150s The following NEW packages will be installed: 150s expect ldap-utils libargon2-1 libavahi-client3 libavahi-common-data 150s libavahi-common3 libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 150s libdhash1t64 libevent-2.1-7t64 libini-config5t64 libipa-hbac-dev 150s libipa-hbac0t64 libjose0 libkrad0 libldb2 libltdl7 libnfsidmap1 libnss-sss 150s libnss-sudo libodbc2 libpam-pwquality libpam-sss libpath-utils1t64 150s libpwquality-common libpwquality1 libref-array1t64 libsmbclient0 150s libsss-certmap-dev libsss-certmap0 libsss-idmap-dev libsss-idmap0 150s libsss-nss-idmap-dev libsss-nss-idmap0 libsss-sudo libtalloc2 libtcl8.6 150s libtdb1 libtevent0t64 libverto-libevent1t64 libverto1t64 libwbclient0 150s python3-libipa-hbac python3-libsss-nss-idmap python3-sss samba-libs slapd 150s sssd sssd-ad sssd-ad-common sssd-common sssd-dbus sssd-idp sssd-ipa sssd-kcm 150s sssd-krb5 sssd-krb5-common sssd-ldap sssd-passkey sssd-proxy sssd-tools 150s tcl-expect tcl8.6 151s 0 upgraded, 65 newly installed, 0 to remove and 2 not upgraded. 151s Need to get 13.2 MB of archives. 151s After this operation, 50.7 MB of additional disk space will be used. 151s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x libargon2-1 s390x 0~20190702+dfsg-4build1 [54.1 kB] 151s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x libltdl7 s390x 2.4.7-8 [41.5 kB] 151s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libodbc2 s390x 2.3.12-1ubuntu1 [162 kB] 151s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x slapd s390x 2.6.8+dfsg-1~exp4ubuntu3 [1616 kB] 151s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x libtcl8.6 s390x 8.6.15+dfsg-2 [1034 kB] 151s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x tcl8.6 s390x 8.6.15+dfsg-2 [14.8 kB] 151s Get:7 http://ftpmaster.internal/ubuntu plucky/universe s390x tcl-expect s390x 5.45.4-3 [115 kB] 151s Get:8 http://ftpmaster.internal/ubuntu plucky/universe s390x expect s390x 5.45.4-3 [137 kB] 151s Get:9 http://ftpmaster.internal/ubuntu plucky/main s390x ldap-utils s390x 2.6.8+dfsg-1~exp4ubuntu3 [164 kB] 151s Get:10 http://ftpmaster.internal/ubuntu plucky/main s390x libavahi-common-data s390x 0.8-14ubuntu1 [30.5 kB] 151s Get:11 http://ftpmaster.internal/ubuntu plucky/main s390x libavahi-common3 s390x 0.8-14ubuntu1 [23.6 kB] 151s Get:12 http://ftpmaster.internal/ubuntu plucky/main s390x libavahi-client3 s390x 0.8-14ubuntu1 [26.8 kB] 151s Get:13 http://ftpmaster.internal/ubuntu plucky/main s390x libbasicobjects0t64 s390x 0.6.2-3 [5788 B] 151s Get:14 http://ftpmaster.internal/ubuntu plucky/main s390x libcares2 s390x 1.34.4-2.1 [101 kB] 151s Get:15 http://ftpmaster.internal/ubuntu plucky/main s390x libcollection4t64 s390x 0.6.2-3 [23.7 kB] 151s Get:16 http://ftpmaster.internal/ubuntu plucky/main s390x libcrack2 s390x 2.9.6-5.2 [29.6 kB] 151s Get:17 http://ftpmaster.internal/ubuntu plucky/main s390x libdhash1t64 s390x 0.6.2-3 [8880 B] 151s Get:18 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10 [145 kB] 151s Get:19 http://ftpmaster.internal/ubuntu plucky/main s390x libpath-utils1t64 s390x 0.6.2-3 [9228 B] 151s Get:20 http://ftpmaster.internal/ubuntu plucky/main s390x libref-array1t64 s390x 0.6.2-3 [7190 B] 151s Get:21 http://ftpmaster.internal/ubuntu plucky/main s390x libini-config5t64 s390x 0.6.2-3 [45.9 kB] 151s Get:22 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libipa-hbac0t64 s390x 2.10.1-2ubuntu1 [18.5 kB] 151s Get:23 http://ftpmaster.internal/ubuntu plucky/universe s390x libjose0 s390x 14-1 [45.5 kB] 151s Get:24 http://ftpmaster.internal/ubuntu plucky/main s390x libverto-libevent1t64 s390x 0.3.1-1.2ubuntu3 [6384 B] 151s Get:25 http://ftpmaster.internal/ubuntu plucky/main s390x libverto1t64 s390x 0.3.1-1.2ubuntu3 [11.0 kB] 151s Get:26 http://ftpmaster.internal/ubuntu plucky/main s390x libkrad0 s390x 1.21.3-3 [22.2 kB] 152s Get:27 http://ftpmaster.internal/ubuntu plucky/main s390x libtalloc2 s390x 2.4.2-1build2 [28.4 kB] 152s Get:28 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libtdb1 s390x 1.4.12-1build1 [49.5 kB] 152s Get:29 http://ftpmaster.internal/ubuntu plucky/main s390x libtevent0t64 s390x 0.16.1-3 [42.6 kB] 152s Get:30 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libldb2 s390x 2:2.9.1+samba4.20.4+dfsg-1ubuntu5 [194 kB] 152s Get:31 http://ftpmaster.internal/ubuntu plucky/main s390x libnfsidmap1 s390x 1:2.6.4-4ubuntu1 [49.9 kB] 152s Get:32 http://ftpmaster.internal/ubuntu plucky/universe s390x libnss-sudo all 1.9.15p5-3ubuntu5 [15.2 kB] 152s Get:33 http://ftpmaster.internal/ubuntu plucky/main s390x libpwquality-common all 1.4.5-3build1 [7748 B] 152s Get:34 http://ftpmaster.internal/ubuntu plucky/main s390x libpwquality1 s390x 1.4.5-3build1 [14.8 kB] 152s Get:35 http://ftpmaster.internal/ubuntu plucky/main s390x libpam-pwquality s390x 1.4.5-3build1 [11.5 kB] 152s Get:36 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libwbclient0 s390x 2:4.20.4+dfsg-1ubuntu5 [75.5 kB] 152s Get:37 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x samba-libs s390x 2:4.20.4+dfsg-1ubuntu5 [6354 kB] 152s Get:38 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsmbclient0 s390x 2:4.20.4+dfsg-1ubuntu5 [64.9 kB] 152s Get:39 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libnss-sss s390x 2.10.1-2ubuntu1 [33.6 kB] 152s Get:40 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libpam-sss s390x 2.10.1-2ubuntu1 [53.3 kB] 152s Get:41 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x python3-sss s390x 2.10.1-2ubuntu1 [46.4 kB] 152s Get:42 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsss-certmap0 s390x 2.10.1-2ubuntu1 [48.1 kB] 152s Get:43 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsss-idmap0 s390x 2.10.1-2ubuntu1 [23.3 kB] 152s Get:44 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsss-nss-idmap0 s390x 2.10.1-2ubuntu1 [32.1 kB] 152s Get:45 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-common s390x 2.10.1-2ubuntu1 [1101 kB] 152s Get:46 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x sssd-idp s390x 2.10.1-2ubuntu1 [27.2 kB] 152s Get:47 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x sssd-passkey s390x 2.10.1-2ubuntu1 [31.9 kB] 152s Get:48 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libipa-hbac-dev s390x 2.10.1-2ubuntu1 [6664 B] 152s Get:49 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsss-certmap-dev s390x 2.10.1-2ubuntu1 [5728 B] 152s Get:50 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsss-idmap-dev s390x 2.10.1-2ubuntu1 [8376 B] 152s Get:51 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsss-nss-idmap-dev s390x 2.10.1-2ubuntu1 [6708 B] 152s Get:52 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x libsss-sudo s390x 2.10.1-2ubuntu1 [22.4 kB] 152s Get:53 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x python3-libipa-hbac s390x 2.10.1-2ubuntu1 [16.9 kB] 152s Get:54 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x python3-libsss-nss-idmap s390x 2.10.1-2ubuntu1 [9150 B] 152s Get:55 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-ad-common s390x 2.10.1-2ubuntu1 [71.8 kB] 152s Get:56 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-krb5-common s390x 2.10.1-2ubuntu1 [89.6 kB] 152s Get:57 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-ad s390x 2.10.1-2ubuntu1 [133 kB] 153s Get:58 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-ipa s390x 2.10.1-2ubuntu1 [215 kB] 153s Get:59 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-krb5 s390x 2.10.1-2ubuntu1 [14.4 kB] 153s Get:60 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-ldap s390x 2.10.1-2ubuntu1 [31.4 kB] 153s Get:61 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-proxy s390x 2.10.1-2ubuntu1 [42.9 kB] 153s Get:62 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd s390x 2.10.1-2ubuntu1 [4118 B] 153s Get:63 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-dbus s390x 2.10.1-2ubuntu1 [97.7 kB] 153s Get:64 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x sssd-kcm s390x 2.10.1-2ubuntu1 [133 kB] 153s Get:65 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-tools s390x 2.10.1-2ubuntu1 [97.7 kB] 153s Preconfiguring packages ... 153s Fetched 13.2 MB in 2s (6132 kB/s) 153s Selecting previously unselected package libargon2-1:s390x. 153s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56368 files and directories currently installed.) 153s Preparing to unpack .../00-libargon2-1_0~20190702+dfsg-4build1_s390x.deb ... 153s Unpacking libargon2-1:s390x (0~20190702+dfsg-4build1) ... 153s Selecting previously unselected package libltdl7:s390x. 153s Preparing to unpack .../01-libltdl7_2.4.7-8_s390x.deb ... 153s Unpacking libltdl7:s390x (2.4.7-8) ... 153s Selecting previously unselected package libodbc2:s390x. 153s Preparing to unpack .../02-libodbc2_2.3.12-1ubuntu1_s390x.deb ... 153s Unpacking libodbc2:s390x (2.3.12-1ubuntu1) ... 153s Selecting previously unselected package slapd. 153s Preparing to unpack .../03-slapd_2.6.8+dfsg-1~exp4ubuntu3_s390x.deb ... 153s Unpacking slapd (2.6.8+dfsg-1~exp4ubuntu3) ... 153s Selecting previously unselected package libtcl8.6:s390x. 153s Preparing to unpack .../04-libtcl8.6_8.6.15+dfsg-2_s390x.deb ... 153s Unpacking libtcl8.6:s390x (8.6.15+dfsg-2) ... 153s Selecting previously unselected package tcl8.6. 153s Preparing to unpack .../05-tcl8.6_8.6.15+dfsg-2_s390x.deb ... 153s Unpacking tcl8.6 (8.6.15+dfsg-2) ... 153s Selecting previously unselected package tcl-expect:s390x. 153s Preparing to unpack .../06-tcl-expect_5.45.4-3_s390x.deb ... 153s Unpacking tcl-expect:s390x (5.45.4-3) ... 153s Selecting previously unselected package expect. 153s Preparing to unpack .../07-expect_5.45.4-3_s390x.deb ... 153s Unpacking expect (5.45.4-3) ... 153s Selecting previously unselected package ldap-utils. 153s Preparing to unpack .../08-ldap-utils_2.6.8+dfsg-1~exp4ubuntu3_s390x.deb ... 153s Unpacking ldap-utils (2.6.8+dfsg-1~exp4ubuntu3) ... 153s Selecting previously unselected package libavahi-common-data:s390x. 153s Preparing to unpack .../09-libavahi-common-data_0.8-14ubuntu1_s390x.deb ... 153s Unpacking libavahi-common-data:s390x (0.8-14ubuntu1) ... 153s Selecting previously unselected package libavahi-common3:s390x. 153s Preparing to unpack .../10-libavahi-common3_0.8-14ubuntu1_s390x.deb ... 153s Unpacking libavahi-common3:s390x (0.8-14ubuntu1) ... 153s Selecting previously unselected package libavahi-client3:s390x. 153s Preparing to unpack .../11-libavahi-client3_0.8-14ubuntu1_s390x.deb ... 153s Unpacking libavahi-client3:s390x (0.8-14ubuntu1) ... 153s Selecting previously unselected package libbasicobjects0t64:s390x. 153s Preparing to unpack .../12-libbasicobjects0t64_0.6.2-3_s390x.deb ... 153s Unpacking libbasicobjects0t64:s390x (0.6.2-3) ... 153s Selecting previously unselected package libcares2:s390x. 153s Preparing to unpack .../13-libcares2_1.34.4-2.1_s390x.deb ... 153s Unpacking libcares2:s390x (1.34.4-2.1) ... 153s Selecting previously unselected package libcollection4t64:s390x. 153s Preparing to unpack .../14-libcollection4t64_0.6.2-3_s390x.deb ... 153s Unpacking libcollection4t64:s390x (0.6.2-3) ... 153s Selecting previously unselected package libcrack2:s390x. 153s Preparing to unpack .../15-libcrack2_2.9.6-5.2_s390x.deb ... 153s Unpacking libcrack2:s390x (2.9.6-5.2) ... 153s Selecting previously unselected package libdhash1t64:s390x. 153s Preparing to unpack .../16-libdhash1t64_0.6.2-3_s390x.deb ... 153s Unpacking libdhash1t64:s390x (0.6.2-3) ... 153s Selecting previously unselected package libevent-2.1-7t64:s390x. 153s Preparing to unpack .../17-libevent-2.1-7t64_2.1.12-stable-10_s390x.deb ... 153s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 153s Selecting previously unselected package libpath-utils1t64:s390x. 153s Preparing to unpack .../18-libpath-utils1t64_0.6.2-3_s390x.deb ... 153s Unpacking libpath-utils1t64:s390x (0.6.2-3) ... 153s Selecting previously unselected package libref-array1t64:s390x. 153s Preparing to unpack .../19-libref-array1t64_0.6.2-3_s390x.deb ... 153s Unpacking libref-array1t64:s390x (0.6.2-3) ... 153s Selecting previously unselected package libini-config5t64:s390x. 153s Preparing to unpack .../20-libini-config5t64_0.6.2-3_s390x.deb ... 153s Unpacking libini-config5t64:s390x (0.6.2-3) ... 153s Selecting previously unselected package libipa-hbac0t64. 153s Preparing to unpack .../21-libipa-hbac0t64_2.10.1-2ubuntu1_s390x.deb ... 153s Unpacking libipa-hbac0t64 (2.10.1-2ubuntu1) ... 153s Selecting previously unselected package libjose0:s390x. 153s Preparing to unpack .../22-libjose0_14-1_s390x.deb ... 153s Unpacking libjose0:s390x (14-1) ... 153s Selecting previously unselected package libverto-libevent1t64:s390x. 153s Preparing to unpack .../23-libverto-libevent1t64_0.3.1-1.2ubuntu3_s390x.deb ... 153s Unpacking libverto-libevent1t64:s390x (0.3.1-1.2ubuntu3) ... 153s Selecting previously unselected package libverto1t64:s390x. 153s Preparing to unpack .../24-libverto1t64_0.3.1-1.2ubuntu3_s390x.deb ... 153s Unpacking libverto1t64:s390x (0.3.1-1.2ubuntu3) ... 153s Selecting previously unselected package libkrad0:s390x. 153s Preparing to unpack .../25-libkrad0_1.21.3-3_s390x.deb ... 153s Unpacking libkrad0:s390x (1.21.3-3) ... 153s Selecting previously unselected package libtalloc2:s390x. 153s Preparing to unpack .../26-libtalloc2_2.4.2-1build2_s390x.deb ... 153s Unpacking libtalloc2:s390x (2.4.2-1build2) ... 153s Selecting previously unselected package libtdb1:s390x. 153s Preparing to unpack .../27-libtdb1_1.4.12-1build1_s390x.deb ... 153s Unpacking libtdb1:s390x (1.4.12-1build1) ... 153s Selecting previously unselected package libtevent0t64:s390x. 153s Preparing to unpack .../28-libtevent0t64_0.16.1-3_s390x.deb ... 153s Unpacking libtevent0t64:s390x (0.16.1-3) ... 154s Selecting previously unselected package libldb2:s390x. 154s Preparing to unpack .../29-libldb2_2%3a2.9.1+samba4.20.4+dfsg-1ubuntu5_s390x.deb ... 154s Unpacking libldb2:s390x (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 154s Selecting previously unselected package libnfsidmap1:s390x. 154s Preparing to unpack .../30-libnfsidmap1_1%3a2.6.4-4ubuntu1_s390x.deb ... 154s Unpacking libnfsidmap1:s390x (1:2.6.4-4ubuntu1) ... 154s Selecting previously unselected package libnss-sudo. 154s Preparing to unpack .../31-libnss-sudo_1.9.15p5-3ubuntu5_all.deb ... 154s Unpacking libnss-sudo (1.9.15p5-3ubuntu5) ... 154s Selecting previously unselected package libpwquality-common. 154s Preparing to unpack .../32-libpwquality-common_1.4.5-3build1_all.deb ... 154s Unpacking libpwquality-common (1.4.5-3build1) ... 154s Selecting previously unselected package libpwquality1:s390x. 154s Preparing to unpack .../33-libpwquality1_1.4.5-3build1_s390x.deb ... 154s Unpacking libpwquality1:s390x (1.4.5-3build1) ... 154s Selecting previously unselected package libpam-pwquality:s390x. 154s Preparing to unpack .../34-libpam-pwquality_1.4.5-3build1_s390x.deb ... 154s Unpacking libpam-pwquality:s390x (1.4.5-3build1) ... 154s Selecting previously unselected package libwbclient0:s390x. 154s Preparing to unpack .../35-libwbclient0_2%3a4.20.4+dfsg-1ubuntu5_s390x.deb ... 154s Unpacking libwbclient0:s390x (2:4.20.4+dfsg-1ubuntu5) ... 154s Selecting previously unselected package samba-libs:s390x. 154s Preparing to unpack .../36-samba-libs_2%3a4.20.4+dfsg-1ubuntu5_s390x.deb ... 154s Unpacking samba-libs:s390x (2:4.20.4+dfsg-1ubuntu5) ... 154s Selecting previously unselected package libsmbclient0:s390x. 154s Preparing to unpack .../37-libsmbclient0_2%3a4.20.4+dfsg-1ubuntu5_s390x.deb ... 154s Unpacking libsmbclient0:s390x (2:4.20.4+dfsg-1ubuntu5) ... 154s Selecting previously unselected package libnss-sss:s390x. 154s Preparing to unpack .../38-libnss-sss_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libnss-sss:s390x (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package libpam-sss:s390x. 154s Preparing to unpack .../39-libpam-sss_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libpam-sss:s390x (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package python3-sss. 154s Preparing to unpack .../40-python3-sss_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking python3-sss (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package libsss-certmap0. 154s Preparing to unpack .../41-libsss-certmap0_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libsss-certmap0 (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package libsss-idmap0. 154s Preparing to unpack .../42-libsss-idmap0_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libsss-idmap0 (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package libsss-nss-idmap0. 154s Preparing to unpack .../43-libsss-nss-idmap0_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-common. 154s Preparing to unpack .../44-sssd-common_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-common (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-idp. 154s Preparing to unpack .../45-sssd-idp_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-idp (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-passkey. 154s Preparing to unpack .../46-sssd-passkey_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-passkey (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package libipa-hbac-dev. 154s Preparing to unpack .../47-libipa-hbac-dev_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libipa-hbac-dev (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package libsss-certmap-dev. 154s Preparing to unpack .../48-libsss-certmap-dev_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libsss-certmap-dev (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package libsss-idmap-dev. 154s Preparing to unpack .../49-libsss-idmap-dev_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libsss-idmap-dev (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package libsss-nss-idmap-dev. 154s Preparing to unpack .../50-libsss-nss-idmap-dev_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libsss-nss-idmap-dev (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package libsss-sudo. 154s Preparing to unpack .../51-libsss-sudo_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking libsss-sudo (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package python3-libipa-hbac. 154s Preparing to unpack .../52-python3-libipa-hbac_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking python3-libipa-hbac (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package python3-libsss-nss-idmap. 154s Preparing to unpack .../53-python3-libsss-nss-idmap_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking python3-libsss-nss-idmap (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-ad-common. 154s Preparing to unpack .../54-sssd-ad-common_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-ad-common (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-krb5-common. 154s Preparing to unpack .../55-sssd-krb5-common_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-krb5-common (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-ad. 154s Preparing to unpack .../56-sssd-ad_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-ad (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-ipa. 154s Preparing to unpack .../57-sssd-ipa_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-ipa (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-krb5. 154s Preparing to unpack .../58-sssd-krb5_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-krb5 (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-ldap. 154s Preparing to unpack .../59-sssd-ldap_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-ldap (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-proxy. 154s Preparing to unpack .../60-sssd-proxy_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-proxy (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd. 154s Preparing to unpack .../61-sssd_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-dbus. 154s Preparing to unpack .../62-sssd-dbus_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-dbus (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-kcm. 154s Preparing to unpack .../63-sssd-kcm_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-kcm (2.10.1-2ubuntu1) ... 154s Selecting previously unselected package sssd-tools. 154s Preparing to unpack .../64-sssd-tools_2.10.1-2ubuntu1_s390x.deb ... 154s Unpacking sssd-tools (2.10.1-2ubuntu1) ... 154s Setting up libpwquality-common (1.4.5-3build1) ... 154s Setting up libnfsidmap1:s390x (1:2.6.4-4ubuntu1) ... 154s Setting up libsss-idmap0 (2.10.1-2ubuntu1) ... 154s Setting up libbasicobjects0t64:s390x (0.6.2-3) ... 154s Setting up libipa-hbac0t64 (2.10.1-2ubuntu1) ... 154s Setting up libsss-idmap-dev (2.10.1-2ubuntu1) ... 154s Setting up libref-array1t64:s390x (0.6.2-3) ... 154s Setting up libipa-hbac-dev (2.10.1-2ubuntu1) ... 154s Setting up libtdb1:s390x (1.4.12-1build1) ... 154s Setting up libargon2-1:s390x (0~20190702+dfsg-4build1) ... 154s Setting up libcollection4t64:s390x (0.6.2-3) ... 154s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 154s Setting up ldap-utils (2.6.8+dfsg-1~exp4ubuntu3) ... 154s Setting up libjose0:s390x (14-1) ... 154s Setting up libwbclient0:s390x (2:4.20.4+dfsg-1ubuntu5) ... 154s Setting up libtalloc2:s390x (2.4.2-1build2) ... 154s Setting up libpath-utils1t64:s390x (0.6.2-3) ... 154s Setting up libavahi-common-data:s390x (0.8-14ubuntu1) ... 154s Setting up libcares2:s390x (1.34.4-2.1) ... 154s Setting up libdhash1t64:s390x (0.6.2-3) ... 154s Setting up libtcl8.6:s390x (8.6.15+dfsg-2) ... 154s Setting up libltdl7:s390x (2.4.7-8) ... 154s Setting up libcrack2:s390x (2.9.6-5.2) ... 154s Setting up libodbc2:s390x (2.3.12-1ubuntu1) ... 154s Setting up python3-libipa-hbac (2.10.1-2ubuntu1) ... 154s Setting up libnss-sudo (1.9.15p5-3ubuntu5) ... 154s Setting up libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 154s Setting up libini-config5t64:s390x (0.6.2-3) ... 154s Setting up libtevent0t64:s390x (0.16.1-3) ... 154s Setting up libnss-sss:s390x (2.10.1-2ubuntu1) ... 154s Setting up slapd (2.6.8+dfsg-1~exp4ubuntu3) ... 154s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 154s Can't find configuration db, was SSSD configured and run? 154s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 154s Can't find configuration db, was SSSD configured and run? 154s Creating new user openldap... [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 154s Can't find configuration db, was SSSD configured and run? 154s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 154s Can't find configuration db, was SSSD configured and run? 154s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 154s Can't find configuration db, was SSSD configured and run? 154s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 154s Can't find configuration db, was SSSD configured and run? 154s done. 154s Creating initial configuration... done. 154s Creating LDAP directory... done. 155s Setting up tcl8.6 (8.6.15+dfsg-2) ... 155s Setting up libsss-sudo (2.10.1-2ubuntu1) ... 155s Setting up libsss-nss-idmap-dev (2.10.1-2ubuntu1) ... 155s Setting up libavahi-common3:s390x (0.8-14ubuntu1) ... 155s Setting up tcl-expect:s390x (5.45.4-3) ... 155s Setting up libsss-certmap0 (2.10.1-2ubuntu1) ... 155s Setting up libpwquality1:s390x (1.4.5-3build1) ... 155s Setting up python3-libsss-nss-idmap (2.10.1-2ubuntu1) ... 155s Setting up libldb2:s390x (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 155s Setting up libavahi-client3:s390x (0.8-14ubuntu1) ... 155s Setting up expect (5.45.4-3) ... 155s Setting up libpam-pwquality:s390x (1.4.5-3build1) ... 155s Setting up samba-libs:s390x (2:4.20.4+dfsg-1ubuntu5) ... 155s Setting up libsss-certmap-dev (2.10.1-2ubuntu1) ... 155s Setting up python3-sss (2.10.1-2ubuntu1) ... 155s Setting up libsmbclient0:s390x (2:4.20.4+dfsg-1ubuntu5) ... 155s Setting up libpam-sss:s390x (2.10.1-2ubuntu1) ... 155s Setting up sssd-common (2.10.1-2ubuntu1) ... 155s Creating SSSD system user & group... 155s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 155s Can't find configuration db, was SSSD configured and run? 155s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 155s Can't find configuration db, was SSSD configured and run? 155s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 155s Can't find configuration db, was SSSD configured and run? 155s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 155s Can't find configuration db, was SSSD configured and run? 155s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 155s Can't find configuration db, was SSSD configured and run? 155s [sss_cache] [sss_tool_confdb_init] (0x0010): Can't access '/var/lib/sss/db/config.ldb', probably SSSD isn't configured 155s Can't find configuration db, was SSSD configured and run? 155s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 155s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 155s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 155s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 155s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-autofs.socket' → '/usr/lib/systemd/system/sssd-autofs.socket'. 155s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-nss.socket' → '/usr/lib/systemd/system/sssd-nss.socket'. 156s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pam.socket' → '/usr/lib/systemd/system/sssd-pam.socket'. 156s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-ssh.socket' → '/usr/lib/systemd/system/sssd-ssh.socket'. 156s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-sudo.socket' → '/usr/lib/systemd/system/sssd-sudo.socket'. 156s Created symlink '/etc/systemd/system/multi-user.target.wants/sssd.service' → '/usr/lib/systemd/system/sssd.service'. 156s sssd-autofs.service is a disabled or a static unit, not starting it. 156s sssd-nss.service is a disabled or a static unit, not starting it. 156s sssd-pam.service is a disabled or a static unit, not starting it. 156s sssd-ssh.service is a disabled or a static unit, not starting it. 156s sssd-sudo.service is a disabled or a static unit, not starting it. 156s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 156s Setting up sssd-proxy (2.10.1-2ubuntu1) ... 156s Setting up sssd-kcm (2.10.1-2ubuntu1) ... 157s Created symlink '/etc/systemd/system/sockets.target.wants/sssd-kcm.socket' → '/usr/lib/systemd/system/sssd-kcm.socket'. 157s sssd-kcm.service is a disabled or a static unit, not starting it. 157s Setting up sssd-dbus (2.10.1-2ubuntu1) ... 157s sssd-ifp.service is a disabled or a static unit, not starting it. 157s Setting up sssd-ad-common (2.10.1-2ubuntu1) ... 157s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pac.socket' → '/usr/lib/systemd/system/sssd-pac.socket'. 158s sssd-pac.service is a disabled or a static unit, not starting it. 158s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 158s Setting up sssd-krb5-common (2.10.1-2ubuntu1) ... 158s Setting up sssd-krb5 (2.10.1-2ubuntu1) ... 158s Setting up sssd-ldap (2.10.1-2ubuntu1) ... 158s Setting up sssd-ad (2.10.1-2ubuntu1) ... 158s Setting up sssd-tools (2.10.1-2ubuntu1) ... 158s Setting up sssd-ipa (2.10.1-2ubuntu1) ... 158s Setting up sssd (2.10.1-2ubuntu1) ... 158s Setting up libverto1t64:s390x (0.3.1-1.2ubuntu3) ... 158s Setting up libkrad0:s390x (1.21.3-3) ... 158s Setting up libverto-libevent1t64:s390x (0.3.1-1.2ubuntu3) ... 158s Setting up sssd-passkey (2.10.1-2ubuntu1) ... 158s Setting up sssd-idp (2.10.1-2ubuntu1) ... 158s Processing triggers for libc-bin (2.40-4ubuntu1) ... 158s Processing triggers for ufw (0.36.2-8) ... 158s Processing triggers for man-db (2.13.0-1) ... 159s Processing triggers for dbus (1.14.10-4ubuntu5) ... 164s autopkgtest [02:42:35]: test ldap-user-group-ldap-auth: [----------------------- 164s + . debian/tests/util 164s + . debian/tests/common-tests 164s + trap cleanup EXIT 164s + mydomain=example.com 164s + myhostname=ldap.example.com 164s + mysuffix=dc=example,dc=com 164s + admin_dn=cn=admin,dc=example,dc=com 164s + admin_pw=secret 164s + ldap_user=testuser1 164s + ldap_user_pw=testuser1secret 164s + ldap_group=ldapusers 164s + adjust_hostname ldap.example.com 164s + local myhostname=ldap.example.com 164s + echo ldap.example.com 164s + hostname ldap.example.com 164s + grep -qE ldap.example.com /etc/hosts 164s + echo 127.0.1.10 ldap.example.com 164s + reconfigure_slapd 164s + debconf-set-selections 164s + rm -rf /var/backups/*slapd* /var/backups/unknown*ldapdb 164s + dpkg-reconfigure -fnoninteractive -pcritical slapd 164s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.8+dfsg-1~exp4ubuntu3... done. 164s Moving old database directory to /var/backups: 164s - directory unknown... done. 164s Creating initial configuration... done. 164s Creating LDAP directory... done. 165s + generate_certs ldap.example.com 165s + local cn=ldap.example.com 165s + local cert=/etc/ldap/server.pem 165s + local key=/etc/ldap/server.key 165s + local cnf=/etc/ldap/openssl.cnf 165s + cat 165s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 165s ..+...+...+.......+........+....+......+..+.+...........+.+..+......+....+..+..........+...+..+....+..+..........+.........+...+.....+......+..........+++++++++++++++++++++++++++++++++++++++*..+......+....+......+.........+.....+++++++++++++++++++++++++++++++++++++++*.......+.+......+..+.+.....+.........+.+.........+..+......+.........+....+.....+....+...+.........+.........+.....+............+.........+....+.....+..........+..+....+......+.....+...+....+..................+...+..+....+.....+...+......++++++ 165s ...+++++++++++++++++++++++++++++++++++++++*...+...........+.+......+..+...+...+.+...+..+.............+...+...+.........+..+++++++++++++++++++++++++++++++++++++++*........+.......+.....+.+.......................+....+..+.........++++++ 165s ----- 165s + chmod 0640 /etc/ldap/server.key 165s + chgrp openldap /etc/ldap/server.key 165s + [ ! -f /etc/ldap/server.pem ] 165s + [ ! -f /etc/ldap/server.key ] 165s + enable_ldap_ssl 165s + cat 165s + cat 165s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 165s modifying entry "cn=config" 165s 165s + populate_ldap_rfc2307 165s + cat 165s + ldapaddadding new entry "ou=People,dc=example,dc=com" 165s 165s adding new entry "ou=Group,dc=example,dc=com" 165s 165s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 165s 165s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 165s 165s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 165s 165s -x -D cn=admin,dc=example,dc=com -w secret 165s + configure_sssd_ldap_rfc2307 165s + cat 165s + chmod 0600 /etc/sssd/sssd.conf 165s + systemctl restart sssd 165s + enable_pam_mkhomedir 165s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 165s Assert local user databases do not have our LDAP test data 165s + echo session optional pam_mkhomedir.so 165s + run_common_tests 165s + echo Assert local user databases do not have our LDAP test data 165s + check_local_user testuser1 165s + local local_user=testuser1 165s + grep -q ^testuser1 /etc/passwd 165s + check_local_group testuser1 165s + local local_group=testuser1 165s + grep -q ^testuser1 /etc/group 165s + check_local_group ldapusers 165s + local local_group=ldapusers 165s + grep -q ^ldapusers /etc/group 165s The LDAP user is known to the system via getent 165s + echo The LDAP user is known to the system via getent 165s + check_getent_user testuser1 165s + local getent_user=testuser1 165s + local output 165s + getent passwd testuser1 165s The LDAP user's private group is known to the system via getent 165s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 165s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 165s + echo The LDAP user's private group is known to the system via getent 165s + check_getent_group testuser1 165s + local getent_group=testuser1 165s + local output 165s + getent group testuser1 165s The LDAP group ldapusers is known to the system via getent 165s + output=testuser1:*:10001:testuser1 165s + [ -z testuser1:*:10001:testuser1 ] 165s + echo The LDAP group ldapusers is known to the system via getent 165s + check_getent_group ldapusers 165s + local getent_group=ldapusers 165s + local output 165s + getent group ldapusers 165s The id(1) command can resolve the group membership of the LDAP user 165s + output=ldapusers:*:10100:testuser1 165s + [ -z ldapusers:*:10100:testuser1 ] 165s + echo The id(1) command can resolve the group membership of the LDAP user 165s + id -Gn testuser1 165s The LDAP user can login via ssh 165s + output=testuser1 ldapusers 165s + [ testuser1 ldapusers != testuser1 ldapusers ] 165s + echo The LDAP user can login via ssh 165s + setup_sshd_password_auth 165s + cat 165s + systemctl restart ssh 165s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1secret 165s spawn ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no testuser1@localhost 165s Warning: Permanently added 'localhost' (ED25519) to the list of known hosts. 165s testuser1@localhost's password: 165s Creating directory '/home/testuser1'. 165s Welcome to Ubuntu Plucky Puffin (development branch) (GNU/Linux 6.11.0-8-generic s390x) 165s 165s * Documentation: https://help.ubuntu.com 165s * Management: https://landscape.canonical.com 165s * Support: https://ubuntu.com/pro 165s 165s 165s The programs included with the Ubuntu system are free software; 165s the exact distribution terms for each program are described in the 165s individual files in /usr/share/doc/*/copyright. 165s 165s Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by 165s applicable law. 165s 165s [?2004htestuser1@ldap:~$ id -un 165s [?2004l testuser1 165s [?2004htestuser1@ldap:~$ ## All tests passed, phew 165s + cleanup 165s + result=0 165s + set +e 165s + [ 0 -ne 0 ] 165s + echo ## All tests passed, phew 165s + cleanup_sshd_config 165s + rm -f /etc/ssh/sshd_config.d/00-dep8.conf 165s + systemctl restart ssh 166s autopkgtest [02:42:37]: test ldap-user-group-ldap-auth: -----------------------] 166s ldap-user-group-ldap-auth PASS 166s autopkgtest [02:42:37]: test ldap-user-group-ldap-auth: - - - - - - - - - - results - - - - - - - - - - 167s autopkgtest [02:42:38]: test ldap-user-group-krb5-auth: preparing testbed 167s Reading package lists... 167s Building dependency tree... 167s Reading state information... 167s Starting pkgProblemResolver with broken count: 0 167s Starting 2 pkgProblemResolver with broken count: 0 167s Done 167s The following NEW packages will be installed: 167s krb5-admin-server krb5-config krb5-kdc krb5-user libgssrpc4t64 167s libkadm5clnt-mit12 libkadm5srv-mit12 libkdb5-10t64 168s 0 upgraded, 8 newly installed, 0 to remove and 2 not upgraded. 168s Need to get 621 kB of archives. 168s After this operation, 2121 kB of additional disk space will be used. 168s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x krb5-config all 2.7 [22.0 kB] 168s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x libgssrpc4t64 s390x 1.21.3-3 [59.1 kB] 168s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libkadm5clnt-mit12 s390x 1.21.3-3 [40.3 kB] 168s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x libkdb5-10t64 s390x 1.21.3-3 [41.8 kB] 168s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x libkadm5srv-mit12 s390x 1.21.3-3 [55.4 kB] 168s Get:6 http://ftpmaster.internal/ubuntu plucky/universe s390x krb5-user s390x 1.21.3-3 [110 kB] 168s Get:7 http://ftpmaster.internal/ubuntu plucky/universe s390x krb5-kdc s390x 1.21.3-3 [197 kB] 168s Get:8 http://ftpmaster.internal/ubuntu plucky/universe s390x krb5-admin-server s390x 1.21.3-3 [95.7 kB] 168s Preconfiguring packages ... 169s Fetched 621 kB in 1s (1133 kB/s) 169s Selecting previously unselected package krb5-config. 169s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 57662 files and directories currently installed.) 169s Preparing to unpack .../0-krb5-config_2.7_all.deb ... 169s Unpacking krb5-config (2.7) ... 169s Selecting previously unselected package libgssrpc4t64:s390x. 169s Preparing to unpack .../1-libgssrpc4t64_1.21.3-3_s390x.deb ... 169s Unpacking libgssrpc4t64:s390x (1.21.3-3) ... 169s Selecting previously unselected package libkadm5clnt-mit12:s390x. 169s Preparing to unpack .../2-libkadm5clnt-mit12_1.21.3-3_s390x.deb ... 169s Unpacking libkadm5clnt-mit12:s390x (1.21.3-3) ... 169s Selecting previously unselected package libkdb5-10t64:s390x. 169s Preparing to unpack .../3-libkdb5-10t64_1.21.3-3_s390x.deb ... 169s Unpacking libkdb5-10t64:s390x (1.21.3-3) ... 169s Selecting previously unselected package libkadm5srv-mit12:s390x. 169s Preparing to unpack .../4-libkadm5srv-mit12_1.21.3-3_s390x.deb ... 169s Unpacking libkadm5srv-mit12:s390x (1.21.3-3) ... 169s Selecting previously unselected package krb5-user. 169s Preparing to unpack .../5-krb5-user_1.21.3-3_s390x.deb ... 169s Unpacking krb5-user (1.21.3-3) ... 169s Selecting previously unselected package krb5-kdc. 169s Preparing to unpack .../6-krb5-kdc_1.21.3-3_s390x.deb ... 169s Unpacking krb5-kdc (1.21.3-3) ... 169s Selecting previously unselected package krb5-admin-server. 169s Preparing to unpack .../7-krb5-admin-server_1.21.3-3_s390x.deb ... 169s Unpacking krb5-admin-server (1.21.3-3) ... 169s Setting up libgssrpc4t64:s390x (1.21.3-3) ... 169s Setting up krb5-config (2.7) ... 169s Setting up libkadm5clnt-mit12:s390x (1.21.3-3) ... 169s Setting up libkdb5-10t64:s390x (1.21.3-3) ... 169s Setting up libkadm5srv-mit12:s390x (1.21.3-3) ... 169s Setting up krb5-user (1.21.3-3) ... 169s update-alternatives: using /usr/bin/kinit.mit to provide /usr/bin/kinit (kinit) in auto mode 169s update-alternatives: using /usr/bin/klist.mit to provide /usr/bin/klist (klist) in auto mode 169s update-alternatives: using /usr/bin/kswitch.mit to provide /usr/bin/kswitch (kswitch) in auto mode 169s update-alternatives: using /usr/bin/ksu.mit to provide /usr/bin/ksu (ksu) in auto mode 169s update-alternatives: using /usr/bin/kpasswd.mit to provide /usr/bin/kpasswd (kpasswd) in auto mode 169s update-alternatives: using /usr/bin/kdestroy.mit to provide /usr/bin/kdestroy (kdestroy) in auto mode 169s update-alternatives: using /usr/bin/kadmin.mit to provide /usr/bin/kadmin (kadmin) in auto mode 169s update-alternatives: using /usr/bin/ktutil.mit to provide /usr/bin/ktutil (ktutil) in auto mode 169s Setting up krb5-kdc (1.21.3-3) ... 170s Created symlink '/etc/systemd/system/multi-user.target.wants/krb5-kdc.service' → '/usr/lib/systemd/system/krb5-kdc.service'. 170s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 170s Setting up krb5-admin-server (1.21.3-3) ... 170s Created symlink '/etc/systemd/system/multi-user.target.wants/krb5-admin-server.service' → '/usr/lib/systemd/system/krb5-admin-server.service'. 171s Processing triggers for man-db (2.13.0-1) ... 171s Processing triggers for libc-bin (2.40-4ubuntu1) ... 177s autopkgtest [02:42:48]: test ldap-user-group-krb5-auth: [----------------------- 177s + . debian/tests/util 177s + . debian/tests/common-tests 177s + trap cleanup EXIT 177s + mydomain=example.com 177s + myhostname=ldap.example.com 177s + mysuffix=dc=example,dc=com 177s + myrealm=EXAMPLE.COM 177s + admin_dn=cn=admin,dc=example,dc=com 177s + admin_pw=secret 177s + ldap_user=testuser1 177s + ldap_user_pw=testuser1secret 177s + kerberos_principal_pw=testuser1kerberos 177s + ldap_group=ldapusers 177s + adjust_hostname ldap.example.com 177s + local myhostname=ldap.example.com 177s + echo ldap.example.com 177s + hostname ldap.example.com 177s + grep -qE ldap.example.com /etc/hosts 177s + reconfigure_slapd 177s + debconf-set-selections 177s + rm -rf /var/backups/slapd-2.6.8+dfsg-1~exp4ubuntu3 /var/backups/unknown-2.6.8+dfsg-1~exp4ubuntu3-20250115-024235.ldapdb 177s + dpkg-reconfigure -fnoninteractive -pcritical slapd 177s Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.6.8+dfsg-1~exp4ubuntu3... done. 177s Moving old database directory to /var/backups: 177s - directory unknown... done. 177s Creating initial configuration... done. 177s Creating LDAP directory... done. 177s + generate_certs ldap.example.com 177s + local cn=ldap.example.com 177s + local cert=/etc/ldap/server.pem 177s + local key=/etc/ldap/server.key 177s + local cnf=/etc/ldap/openssl.cnf 177s + cat 177s + openssl req -new -x509 -nodes -out /etc/ldap/server.pem -keyout /etc/ldap/server.key -config /etc/ldap/openssl.cnf 178s .+..........+.....+++++++++++++++++++++++++++++++++++++++*....+......+...+.+......+...+...+.........+...+...+............+...+..+.+.........+++++++++++++++++++++++++++++++++++++++*.....+...............+....+....................+.+......+...+.....+...+.......+......+......+........+.....................+......+.+..................+..+............+.......+........+...+....+.....+...............+.+..+......+....+...+..................+..+...+.......+.....+....+.....+...+..........+...............+......+.....+......+.+..+..........+........+...+..........+...............+..............+.......+........+.+.........+...+..+.......+.....+.+...+.....+.+...........+...+..........+.....+..........+..+.............+..+......................+.....+...............+.+..+...+.+...+..........................+......+...+.+......+.........+.....+.+...+........+.........+....+.....+................+......+..+.......+...+...........+......+......+....+...+............+......+........+.+...+...+........+.......+...+..+.........+.+.....+....+......+.....+.......+............+...+.....++++++ 178s .................+....+++++++++++++++++++++++++++++++++++++++*...+..+.+....................+..........+..+.+.........+..+...+.....................+....+...+.........+.....+....+.....+.+...+..+++++++++++++++++++++++++++++++++++++++*............+.........+......+...+....+...+...............+.........+........+.+..+...+..........+..+.........+...++++++ 178s ----- 178s + chmod 0640 /etc/ldap/server.key 178s + chgrp openldap /etc/ldap/server.key 178s + [ ! -f /etc/ldap/server.pem ] 178s + [ ! -f /etc/ldap/server.key ] 178s + enable_ldap_ssl 178s + cat 178s + cat 178s + ldapmodify -H ldapi:/// -Y EXTERNAL -Q 178s + populate_ldap_rfc2307 178s + cat 178s + ldapadd -x -D cn=admin,dc=example,dc=com -w secret 178s modifying entry "cn=config" 178s 178s adding new entry "ou=People,dc=example,dc=com" 178s 178s adding new entry "ou=Group,dc=example,dc=com" 178s 178s adding new entry "uid=testuser1,ou=People,dc=example,dc=com" 178s 178s adding new entry "cn=testuser1,ou=Group,dc=example,dc=com" 178s 178s adding new entry "cn=ldapusers,ou=Group,dc=example,dc=com" 178s 178s + create_realm EXAMPLE.COM ldap.example.com 178s + local realm_name=EXAMPLE.COM 178s + local kerberos_server=ldap.example.com 178s + rm -rf /var/lib/krb5kdc/* 178s + rm -rf /etc/krb5kdc/kdc.conf 178s + rm -f /etc/krb5.keytab 178s + cat 178s + cat 178s + echo # */admin * 178s + kdb5_util create -s -P secretpassword 178s + systemctl restart krb5-kdc.service krb5-admin-server.service 178s Initializing database '/var/lib/krb5kdc/principal' for realm 'EXAMPLE.COM', 178s master key name 'K/M@EXAMPLE.COM' 178s + create_krb_principal testuser1 testuser1kerberos 178s + local principal=testuser1 178s + local password=testuser1kerberos 178s + kadmin.local -q addprinc -pw testuser1kerberos testuser1 178s No policy specified for testuser1@EXAMPLE.COM; defaulting to no policy 178s Authenticating as principal root/admin@EXAMPLE.COM with password. 178s Principal "testuser1@EXAMPLE.COM" created. 178s + configure_sssd_ldap_rfc2307_krb5_auth 178s + cat 178s + chmod 0600 /etc/sssd/sssd.conf 178s + systemctl restart sssd 178s Assert local user databases do not have our LDAP test data 178s + enable_pam_mkhomedir 178s + grep -qE ^session.*pam_mkhomedir\.so /etc/pam.d/common-session 178s + run_common_tests 178s + echo Assert local user databases do not have our LDAP test data 178s + check_local_user testuser1 178s + local local_user=testuser1 178s + grep -q ^testuser1 /etc/passwd 178s + check_local_group testuser1 178s + local local_group=testuser1 178s + grep -q ^testuser1 /etc/group 178s + check_local_group ldapusers 178s + local local_group=ldapusers 178s + grep -q ^ldapusers /etc/group 178s The LDAP user is known to the system via getent 178s + echo The LDAP user is known to the system via getent 178s + check_getent_user testuser1 178s + local getent_user=testuser1 178s + local output 178s + getent passwd testuser1 178s The LDAP user's private group is known to the system via getent 178s + output=testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash 178s + [ -z testuser1:*:10001:10001:testuser1:/home/testuser1:/bin/bash ] 178s + echo The LDAP user's private group is known to the system via getent 178s + check_getent_group testuser1 178s + local getent_group=testuser1 178s + local output 178s + getent group testuser1 178s + output=testuser1:*:10001:testuser1 178s + [ -z testuser1:*:10001:testuser1 ] 178s + echo The LDAP group ldapusers is known to the system via getent 178s + check_getent_group ldapusers 178s + local getent_group=ldapusers 178s + The LDAP group ldapusers is known to the system via getent 178s local output 178s + getent group ldapusers 178s + output=ldapusers:*:10100:testuser1 178s + [ -z ldapusers:*:10100:testuser1 ] 178s The id(1) command can resolve the group membership of the LDAP user 178s + echo The id(1) command can resolve the group membership of the LDAP user 178s + id -Gn testuser1 178s + output=testuser1 ldapusers 178s + [ testuser1 ldapusers != testuser1 ldapusers ] 178s The Kerberos principal can login via ssh 178s + echo The Kerberos principal can login via ssh 178s + setup_sshd_password_auth 178s + cat 178s + systemctl restart ssh 178s + kdestroy 178s + /usr/bin/expect -f debian/tests/login.exp testuser1 testuser1kerberos testuser1@EXAMPLE.COM 178s spawn ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no testuser1@localhost 178s Warning: Permanently added 'localhost' (ED25519) to the list of known hosts. 178s testuser1@localhost's password: 179s Welcome to Ubuntu Plucky Puffin (development branch) (GNU/Linux 6.11.0-8-generic s390x) 179s 179s * Documentation: https://help.ubuntu.com 179s * Management: https://landscape.canonical.com 179s * Support: https://ubuntu.com/pro 179s 179s Last login: Wed Jan 15 02:42:36 2025 from ::1 179s [?2004htestuser1@ldap:~$ id -un 179s [?2004l testuser1 179s [?2004htestuser1@ldap:~$ klist 179s [?2004l Ticket cache: FILE:/tmp/krb5cc_10001_B7DJ3c 179s Default principal: testuser1@EXAMPLE.COM 179s 179s Valid starting Expires Service principal 179s 01/15/25 02:42:49 01/15/25 12:42:49 krbtgt/EXAMPLE.COM@EXAMPLE.COM 179s renew until 01/16/25 02:42:49 179s ## All tests passed, phew 179s + cleanup 179s + result=0 179s + set +e 179s + [ 0 -ne 0 ] 179s + echo ## All tests passed, phew 179s + cleanup_sshd_config 179s + rm -f /etc/ssh/sshd_config.d/00-dep8.conf 179s + systemctl restart ssh 179s autopkgtest [02:42:50]: test ldap-user-group-krb5-auth: -----------------------] 179s ldap-user-group-krb5-auth PASS 179s autopkgtest [02:42:50]: test ldap-user-group-krb5-auth: - - - - - - - - - - results - - - - - - - - - - 180s autopkgtest [02:42:51]: test sssd-softhism2-certificates-tests.sh: preparing testbed 300s autopkgtest [02:44:51]: testbed dpkg architecture: s390x 300s autopkgtest [02:44:51]: testbed apt version: 2.9.18 301s autopkgtest [02:44:52]: @@@@@@@@@@@@@@@@@@@@ test bed setup 301s autopkgtest [02:44:52]: testbed release detected to be: plucky 302s autopkgtest [02:44:53]: updating testbed package index (apt update) 302s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 302s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 302s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 302s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 302s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [880 kB] 302s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [12.3 kB] 302s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [149 kB] 302s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 302s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [264 kB] 302s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted s390x Packages [756 B] 302s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [936 kB] 303s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [4072 B] 303s Fetched 2329 kB in 1s (2408 kB/s) 303s Reading package lists... 304s Reading package lists... 304s Building dependency tree... 304s Reading state information... 304s Calculating upgrade... 304s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 304s Reading package lists... 304s Building dependency tree... 304s Reading state information... 305s 0 upgraded, 0 newly installed, 0 to remove and 35 not upgraded. 305s autopkgtest [02:44:56]: upgrading testbed (apt dist-upgrade and autopurge) 305s Reading package lists... 305s Building dependency tree... 305s Reading state information... 305s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 305s Starting 2 pkgProblemResolver with broken count: 0 305s Done 305s Entering ResolveByKeep 305s 305s The following packages were automatically installed and are no longer required: 305s python3.12 python3.12-minimal 305s Use 'sudo apt autoremove' to remove them. 305s The following NEW packages will be installed: 305s libpython3.13-minimal libpython3.13-stdlib python3.13 python3.13-minimal 305s The following packages have been kept back: 305s libnftables1 nftables 305s The following packages will be upgraded: 305s binutils binutils-common binutils-s390x-linux-gnu gcc-14-base libatomic1 305s libbinutils libctf-nobfd0 libctf0 libgcc-s1 libnss-systemd libpam-systemd 305s libpython3-stdlib libsframe1 libstdc++6 libsystemd-shared libsystemd0 305s libudev1 libzstd1 linux-libc-dev linux-tools-common python3 python3-minimal 305s systemd systemd-cryptsetup systemd-resolved systemd-sysv systemd-timesyncd 306s tzdata udev vim-common vim-tiny xxd zstd 306s 33 upgraded, 4 newly installed, 0 to remove and 2 not upgraded. 306s Need to get 24.5 MB of archives. 306s After this operation, 22.8 MB of additional disk space will be used. 306s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x libpython3.13-minimal s390x 3.13.1-2 [880 kB] 306s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x python3.13-minimal s390x 3.13.1-2 [2364 kB] 306s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x python3-minimal s390x 3.13.1-1~exp2 [27.6 kB] 306s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x python3 s390x 3.13.1-1~exp2 [23.9 kB] 306s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x tzdata all 2024b-6ubuntu1 [197 kB] 306s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libpython3.13-stdlib s390x 3.13.1-2 [2074 kB] 306s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x python3.13 s390x 3.13.1-2 [729 kB] 306s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libpython3-stdlib s390x 3.13.1-1~exp2 [10.2 kB] 306s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd-timesyncd s390x 257.1-7ubuntu1 [41.3 kB] 306s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd-resolved s390x 257.1-7ubuntu1 [323 kB] 306s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd-cryptsetup s390x 257.1-7ubuntu1 [128 kB] 306s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsystemd-shared s390x 257.1-7ubuntu1 [2322 kB] 306s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsystemd0 s390x 257.1-7ubuntu1 [533 kB] 306s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd-sysv s390x 257.1-7ubuntu1 [11.8 kB] 306s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libnss-systemd s390x 257.1-7ubuntu1 [180 kB] 306s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libpam-systemd s390x 257.1-7ubuntu1 [263 kB] 307s Get:17 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x systemd s390x 257.1-7ubuntu1 [3577 kB] 307s Get:18 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x udev s390x 257.1-7ubuntu1 [2009 kB] 307s Get:19 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libudev1 s390x 257.1-7ubuntu1 [203 kB] 307s Get:20 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x gcc-14-base s390x 14.2.0-13ubuntu1 [53.0 kB] 307s Get:21 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libstdc++6 s390x 14.2.0-13ubuntu1 [896 kB] 307s Get:22 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libatomic1 s390x 14.2.0-13ubuntu1 [9422 B] 307s Get:23 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libgcc-s1 s390x 14.2.0-13ubuntu1 [35.9 kB] 307s Get:24 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libzstd1 s390x 1.5.6+dfsg-2 [340 kB] 307s Get:25 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x vim-tiny s390x 2:9.1.0967-1ubuntu1 [666 kB] 307s Get:26 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x vim-common all 2:9.1.0967-1ubuntu1 [396 kB] 307s Get:27 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x xxd s390x 2:9.1.0967-1ubuntu1 [66.9 kB] 307s Get:28 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libctf0 s390x 2.43.50.20250108-1ubuntu1 [101 kB] 307s Get:29 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libctf-nobfd0 s390x 2.43.50.20250108-1ubuntu1 [101 kB] 307s Get:30 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x binutils-s390x-linux-gnu s390x 2.43.50.20250108-1ubuntu1 [2327 kB] 307s Get:31 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libbinutils s390x 2.43.50.20250108-1ubuntu1 [481 kB] 307s Get:32 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x binutils s390x 2.43.50.20250108-1ubuntu1 [3072 B] 307s Get:33 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x binutils-common s390x 2.43.50.20250108-1ubuntu1 [222 kB] 307s Get:34 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsframe1 s390x 2.43.50.20250108-1ubuntu1 [14.0 kB] 307s Get:35 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x linux-libc-dev s390x 6.11.0-9.9 [1662 kB] 307s Get:36 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x linux-tools-common all 6.11.0-9.9 [484 kB] 307s Get:37 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x zstd s390x 1.5.6+dfsg-2 [711 kB] 307s Preconfiguring packages ... 307s Fetched 24.5 MB in 2s (14.7 MB/s) 307s Selecting previously unselected package libpython3.13-minimal:s390x. 308s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 308s Preparing to unpack .../libpython3.13-minimal_3.13.1-2_s390x.deb ... 308s Unpacking libpython3.13-minimal:s390x (3.13.1-2) ... 308s Selecting previously unselected package python3.13-minimal. 308s Preparing to unpack .../python3.13-minimal_3.13.1-2_s390x.deb ... 308s Unpacking python3.13-minimal (3.13.1-2) ... 308s Setting up libpython3.13-minimal:s390x (3.13.1-2) ... 308s Setting up python3.13-minimal (3.13.1-2) ... 308s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55978 files and directories currently installed.) 308s Preparing to unpack .../python3-minimal_3.13.1-1~exp2_s390x.deb ... 308s Unpacking python3-minimal (3.13.1-1~exp2) over (3.12.8-1) ... 308s Setting up python3-minimal (3.13.1-1~exp2) ... 308s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55978 files and directories currently installed.) 308s Preparing to unpack .../0-python3_3.13.1-1~exp2_s390x.deb ... 308s Unpacking python3 (3.13.1-1~exp2) over (3.12.8-1) ... 308s Preparing to unpack .../1-tzdata_2024b-6ubuntu1_all.deb ... 308s Unpacking tzdata (2024b-6ubuntu1) over (2024b-4ubuntu1) ... 309s Selecting previously unselected package libpython3.13-stdlib:s390x. 309s Preparing to unpack .../2-libpython3.13-stdlib_3.13.1-2_s390x.deb ... 309s Unpacking libpython3.13-stdlib:s390x (3.13.1-2) ... 309s Selecting previously unselected package python3.13. 309s Preparing to unpack .../3-python3.13_3.13.1-2_s390x.deb ... 309s Unpacking python3.13 (3.13.1-2) ... 309s Preparing to unpack .../4-libpython3-stdlib_3.13.1-1~exp2_s390x.deb ... 309s Unpacking libpython3-stdlib:s390x (3.13.1-1~exp2) over (3.12.8-1) ... 309s Preparing to unpack .../5-systemd-timesyncd_257.1-7ubuntu1_s390x.deb ... 309s Unpacking systemd-timesyncd (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Preparing to unpack .../6-systemd-resolved_257.1-7ubuntu1_s390x.deb ... 309s Unpacking systemd-resolved (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Preparing to unpack .../7-systemd-cryptsetup_257.1-7ubuntu1_s390x.deb ... 309s Unpacking systemd-cryptsetup (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Preparing to unpack .../8-libsystemd-shared_257.1-7ubuntu1_s390x.deb ... 309s Unpacking libsystemd-shared:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Preparing to unpack .../9-libsystemd0_257.1-7ubuntu1_s390x.deb ... 309s Unpacking libsystemd0:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Setting up libsystemd0:s390x (257.1-7ubuntu1) ... 309s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56395 files and directories currently installed.) 309s Preparing to unpack .../0-systemd-sysv_257.1-7ubuntu1_s390x.deb ... 309s Unpacking systemd-sysv (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Preparing to unpack .../1-libnss-systemd_257.1-7ubuntu1_s390x.deb ... 309s Unpacking libnss-systemd:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Preparing to unpack .../2-libpam-systemd_257.1-7ubuntu1_s390x.deb ... 309s Unpacking libpam-systemd:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Preparing to unpack .../3-systemd_257.1-7ubuntu1_s390x.deb ... 309s Unpacking systemd (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Preparing to unpack .../4-udev_257.1-7ubuntu1_s390x.deb ... 309s Unpacking udev (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Preparing to unpack .../5-libudev1_257.1-7ubuntu1_s390x.deb ... 309s Unpacking libudev1:s390x (257.1-7ubuntu1) over (257-2ubuntu1) ... 309s Setting up libudev1:s390x (257.1-7ubuntu1) ... 309s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 309s Preparing to unpack .../gcc-14-base_14.2.0-13ubuntu1_s390x.deb ... 309s Unpacking gcc-14-base:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 309s Setting up gcc-14-base:s390x (14.2.0-13ubuntu1) ... 309s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 309s Preparing to unpack .../libstdc++6_14.2.0-13ubuntu1_s390x.deb ... 309s Unpacking libstdc++6:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 309s Setting up libstdc++6:s390x (14.2.0-13ubuntu1) ... 309s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 309s Preparing to unpack .../libatomic1_14.2.0-13ubuntu1_s390x.deb ... 309s Unpacking libatomic1:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 309s Preparing to unpack .../libgcc-s1_14.2.0-13ubuntu1_s390x.deb ... 309s Unpacking libgcc-s1:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 309s Setting up libgcc-s1:s390x (14.2.0-13ubuntu1) ... 309s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 309s Preparing to unpack .../libzstd1_1.5.6+dfsg-2_s390x.deb ... 309s Unpacking libzstd1:s390x (1.5.6+dfsg-2) over (1.5.6+dfsg-1) ... 309s Setting up libzstd1:s390x (1.5.6+dfsg-2) ... 309s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 309s Preparing to unpack .../00-vim-tiny_2%3a9.1.0967-1ubuntu1_s390x.deb ... 309s Unpacking vim-tiny (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 309s Preparing to unpack .../01-vim-common_2%3a9.1.0967-1ubuntu1_all.deb ... 309s Unpacking vim-common (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 309s Preparing to unpack .../02-xxd_2%3a9.1.0967-1ubuntu1_s390x.deb ... 309s Unpacking xxd (2:9.1.0967-1ubuntu1) over (2:9.1.0861-1ubuntu1) ... 309s Preparing to unpack .../03-libctf0_2.43.50.20250108-1ubuntu1_s390x.deb ... 309s Unpacking libctf0:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 309s Preparing to unpack .../04-libctf-nobfd0_2.43.50.20250108-1ubuntu1_s390x.deb ... 309s Unpacking libctf-nobfd0:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 309s Preparing to unpack .../05-binutils-s390x-linux-gnu_2.43.50.20250108-1ubuntu1_s390x.deb ... 309s Unpacking binutils-s390x-linux-gnu (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 309s Preparing to unpack .../06-libbinutils_2.43.50.20250108-1ubuntu1_s390x.deb ... 309s Unpacking libbinutils:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 309s Preparing to unpack .../07-binutils_2.43.50.20250108-1ubuntu1_s390x.deb ... 309s Unpacking binutils (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 309s Preparing to unpack .../08-binutils-common_2.43.50.20250108-1ubuntu1_s390x.deb ... 309s Unpacking binutils-common:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 309s Preparing to unpack .../09-libsframe1_2.43.50.20250108-1ubuntu1_s390x.deb ... 309s Unpacking libsframe1:s390x (2.43.50.20250108-1ubuntu1) over (2.43.50.20241230-1ubuntu1) ... 309s Preparing to unpack .../10-linux-libc-dev_6.11.0-9.9_s390x.deb ... 309s Unpacking linux-libc-dev:s390x (6.11.0-9.9) over (6.11.0-8.8) ... 309s Preparing to unpack .../11-linux-tools-common_6.11.0-9.9_all.deb ... 309s Unpacking linux-tools-common (6.11.0-9.9) over (6.11.0-8.8) ... 310s Preparing to unpack .../12-zstd_1.5.6+dfsg-2_s390x.deb ... 310s Unpacking zstd (1.5.6+dfsg-2) over (1.5.6+dfsg-1) ... 310s Setting up binutils-common:s390x (2.43.50.20250108-1ubuntu1) ... 310s Setting up linux-libc-dev:s390x (6.11.0-9.9) ... 310s Setting up libctf-nobfd0:s390x (2.43.50.20250108-1ubuntu1) ... 310s Setting up xxd (2:9.1.0967-1ubuntu1) ... 310s Setting up libsframe1:s390x (2.43.50.20250108-1ubuntu1) ... 310s Setting up tzdata (2024b-6ubuntu1) ... 310s 310s Current default time zone: 'Etc/UTC' 310s Local time is now: Wed Jan 15 02:45:01 UTC 2025. 310s Universal Time is now: Wed Jan 15 02:45:01 UTC 2025. 310s Run 'dpkg-reconfigure tzdata' if you wish to change it. 310s 310s Setting up vim-common (2:9.1.0967-1ubuntu1) ... 310s Setting up libatomic1:s390x (14.2.0-13ubuntu1) ... 310s Setting up libsystemd-shared:s390x (257.1-7ubuntu1) ... 310s Setting up libbinutils:s390x (2.43.50.20250108-1ubuntu1) ... 310s Setting up linux-tools-common (6.11.0-9.9) ... 310s Setting up libpython3.13-stdlib:s390x (3.13.1-2) ... 310s Setting up zstd (1.5.6+dfsg-2) ... 310s Setting up libpython3-stdlib:s390x (3.13.1-1~exp2) ... 310s Setting up libctf0:s390x (2.43.50.20250108-1ubuntu1) ... 310s Setting up binutils-s390x-linux-gnu (2.43.50.20250108-1ubuntu1) ... 310s Setting up python3.13 (3.13.1-2) ... 310s Setting up python3 (3.13.1-1~exp2) ... 310s /usr/bin/py3clean:101: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 310s for fn in glob1(directory, "%s.*" % fname): 311s Setting up systemd (257.1-7ubuntu1) ... 311s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 311s Created symlink '/run/systemd/system/tmp.mount' → '/dev/null'. 311s /usr/lib/tmpfiles.d/legacy.conf:14: Duplicate line for path "/run/lock", ignoring. 311s Setting up binutils (2.43.50.20250108-1ubuntu1) ... 311s Setting up vim-tiny (2:9.1.0967-1ubuntu1) ... 311s Setting up systemd-cryptsetup (257.1-7ubuntu1) ... 311s Setting up systemd-timesyncd (257.1-7ubuntu1) ... 312s systemd-time-wait-sync.service is a disabled or a static unit not running, not starting it. 312s Setting up udev (257.1-7ubuntu1) ... 312s Setting up systemd-resolved (257.1-7ubuntu1) ... 313s Setting up systemd-sysv (257.1-7ubuntu1) ... 313s Setting up libnss-systemd:s390x (257.1-7ubuntu1) ... 313s Setting up libpam-systemd:s390x (257.1-7ubuntu1) ... 313s Processing triggers for libc-bin (2.40-4ubuntu1) ... 313s Processing triggers for man-db (2.13.0-1) ... 314s Processing triggers for dbus (1.14.10-4ubuntu5) ... 314s Processing triggers for shared-mime-info (2.4-5) ... 314s Warning: program compiled against libxml 212 using older 209 314s Processing triggers for initramfs-tools (0.142ubuntu35) ... 314s update-initramfs: Generating /boot/initrd.img-6.11.0-8-generic 314s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 316s Using config file '/etc/zipl.conf' 316s Building bootmap in '/boot' 316s Adding IPL section 'ubuntu' (default) 316s Preparing boot device for LD-IPL: vda (0000). 316s Done. 316s Reading package lists... 316s Building dependency tree... 316s Reading state information... 316s Starting pkgProblemResolver with broken count: 0 316s Starting 2 pkgProblemResolver with broken count: 0 317s Done 317s The following packages will be REMOVED: 317s python3.12* python3.12-minimal* 317s 0 upgraded, 0 newly installed, 2 to remove and 2 not upgraded. 317s After this operation, 9190 kB disk space will be freed. 317s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56396 files and directories currently installed.) 317s Removing python3.12 (3.12.8-3) ... 317s Removing python3.12-minimal (3.12.8-3) ... 317s /usr/bin/py3clean:125: DeprecationWarning: glob.glob1 is deprecated and will be removed in Python 3.15. Use glob.glob and pass a directory to its root_dir argument instead. 317s for fn in glob1(directory, "%s.%s.py[co]" % (fname, magic_tag)): 317s Processing triggers for man-db (2.13.0-1) ... 317s Processing triggers for systemd (257.1-7ubuntu1) ... 318s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56368 files and directories currently installed.) 318s Purging configuration files for python3.12-minimal (3.12.8-3) ... 318s autopkgtest [02:45:09]: rebooting testbed after setup commands that affected boot 341s Reading package lists... 341s Building dependency tree... 341s Reading state information... 341s Starting pkgProblemResolver with broken count: 0 341s Starting 2 pkgProblemResolver with broken count: 0 341s Done 341s The following NEW packages will be installed: 341s gnutls-bin libavahi-client3 libavahi-common-data libavahi-common3 341s libbasicobjects0t64 libcares2 libcollection4t64 libcrack2 libdhash1t64 341s libevent-2.1-7t64 libgnutls-dane0t64 libini-config5t64 libipa-hbac0t64 341s libldb2 libnfsidmap1 libnss-sss libpam-pwquality libpam-sss 341s libpath-utils1t64 libpwquality-common libpwquality1 libref-array1t64 341s libsmbclient0 libsofthsm2 libsss-certmap0 libsss-idmap0 libsss-nss-idmap0 341s libtalloc2 libtdb1 libtevent0t64 libunbound8 libwbclient0 python3-sss 341s samba-libs softhsm2 softhsm2-common sssd sssd-ad sssd-ad-common sssd-common 341s sssd-ipa sssd-krb5 sssd-krb5-common sssd-ldap sssd-proxy 341s 0 upgraded, 45 newly installed, 0 to remove and 2 not upgraded. 341s Need to get 10.5 MB of archives. 341s After this operation, 41.0 MB of additional disk space will be used. 341s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10 [145 kB] 341s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x libunbound8 s390x 1.20.0-1ubuntu2.1 [455 kB] 342s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x libgnutls-dane0t64 s390x 3.8.8-2ubuntu1 [24.4 kB] 342s Get:4 http://ftpmaster.internal/ubuntu plucky/universe s390x gnutls-bin s390x 3.8.8-2ubuntu1 [288 kB] 342s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x libavahi-common-data s390x 0.8-14ubuntu1 [30.5 kB] 342s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libavahi-common3 s390x 0.8-14ubuntu1 [23.6 kB] 342s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x libavahi-client3 s390x 0.8-14ubuntu1 [26.8 kB] 342s Get:8 http://ftpmaster.internal/ubuntu plucky/main s390x libbasicobjects0t64 s390x 0.6.2-3 [5788 B] 342s Get:9 http://ftpmaster.internal/ubuntu plucky/main s390x libcares2 s390x 1.34.4-2.1 [101 kB] 342s Get:10 http://ftpmaster.internal/ubuntu plucky/main s390x libcollection4t64 s390x 0.6.2-3 [23.7 kB] 342s Get:11 http://ftpmaster.internal/ubuntu plucky/main s390x libcrack2 s390x 2.9.6-5.2 [29.6 kB] 342s Get:12 http://ftpmaster.internal/ubuntu plucky/main s390x libdhash1t64 s390x 0.6.2-3 [8880 B] 342s Get:13 http://ftpmaster.internal/ubuntu plucky/main s390x libpath-utils1t64 s390x 0.6.2-3 [9228 B] 342s Get:14 http://ftpmaster.internal/ubuntu plucky/main s390x libref-array1t64 s390x 0.6.2-3 [7190 B] 342s Get:15 http://ftpmaster.internal/ubuntu plucky/main s390x libini-config5t64 s390x 0.6.2-3 [45.9 kB] 342s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libipa-hbac0t64 s390x 2.10.1-2ubuntu1 [18.5 kB] 342s Get:17 http://ftpmaster.internal/ubuntu plucky/main s390x libtalloc2 s390x 2.4.2-1build2 [28.4 kB] 342s Get:18 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libtdb1 s390x 1.4.12-1build1 [49.5 kB] 342s Get:19 http://ftpmaster.internal/ubuntu plucky/main s390x libtevent0t64 s390x 0.16.1-3 [42.6 kB] 342s Get:20 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libldb2 s390x 2:2.9.1+samba4.20.4+dfsg-1ubuntu5 [194 kB] 342s Get:21 http://ftpmaster.internal/ubuntu plucky/main s390x libnfsidmap1 s390x 1:2.6.4-4ubuntu1 [49.9 kB] 342s Get:22 http://ftpmaster.internal/ubuntu plucky/main s390x libpwquality-common all 1.4.5-3build1 [7748 B] 342s Get:23 http://ftpmaster.internal/ubuntu plucky/main s390x libpwquality1 s390x 1.4.5-3build1 [14.8 kB] 342s Get:24 http://ftpmaster.internal/ubuntu plucky/main s390x libpam-pwquality s390x 1.4.5-3build1 [11.5 kB] 342s Get:25 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libwbclient0 s390x 2:4.20.4+dfsg-1ubuntu5 [75.5 kB] 342s Get:26 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x samba-libs s390x 2:4.20.4+dfsg-1ubuntu5 [6354 kB] 342s Get:27 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsmbclient0 s390x 2:4.20.4+dfsg-1ubuntu5 [64.9 kB] 342s Get:28 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libnss-sss s390x 2.10.1-2ubuntu1 [33.6 kB] 342s Get:29 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libpam-sss s390x 2.10.1-2ubuntu1 [53.3 kB] 342s Get:30 http://ftpmaster.internal/ubuntu plucky/universe s390x softhsm2-common s390x 2.6.1-2.2ubuntu3 [6196 B] 342s Get:31 http://ftpmaster.internal/ubuntu plucky/universe s390x libsofthsm2 s390x 2.6.1-2.2ubuntu3 [267 kB] 342s Get:32 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsss-certmap0 s390x 2.10.1-2ubuntu1 [48.1 kB] 342s Get:33 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsss-idmap0 s390x 2.10.1-2ubuntu1 [23.3 kB] 342s Get:34 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x libsss-nss-idmap0 s390x 2.10.1-2ubuntu1 [32.1 kB] 342s Get:35 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x python3-sss s390x 2.10.1-2ubuntu1 [46.4 kB] 342s Get:36 http://ftpmaster.internal/ubuntu plucky/universe s390x softhsm2 s390x 2.6.1-2.2ubuntu3 [176 kB] 342s Get:37 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-common s390x 2.10.1-2ubuntu1 [1101 kB] 342s Get:38 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-ad-common s390x 2.10.1-2ubuntu1 [71.8 kB] 342s Get:39 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-krb5-common s390x 2.10.1-2ubuntu1 [89.6 kB] 342s Get:40 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-ad s390x 2.10.1-2ubuntu1 [133 kB] 342s Get:41 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-ipa s390x 2.10.1-2ubuntu1 [215 kB] 342s Get:42 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-krb5 s390x 2.10.1-2ubuntu1 [14.4 kB] 342s Get:43 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-ldap s390x 2.10.1-2ubuntu1 [31.4 kB] 342s Get:44 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd-proxy s390x 2.10.1-2ubuntu1 [42.9 kB] 342s Get:45 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x sssd s390x 2.10.1-2ubuntu1 [4118 B] 343s Fetched 10.5 MB in 1s (7864 kB/s) 343s Selecting previously unselected package libevent-2.1-7t64:s390x. 343s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56368 files and directories currently installed.) 343s Preparing to unpack .../00-libevent-2.1-7t64_2.1.12-stable-10_s390x.deb ... 343s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 343s Selecting previously unselected package libunbound8:s390x. 343s Preparing to unpack .../01-libunbound8_1.20.0-1ubuntu2.1_s390x.deb ... 343s Unpacking libunbound8:s390x (1.20.0-1ubuntu2.1) ... 343s Selecting previously unselected package libgnutls-dane0t64:s390x. 343s Preparing to unpack .../02-libgnutls-dane0t64_3.8.8-2ubuntu1_s390x.deb ... 343s Unpacking libgnutls-dane0t64:s390x (3.8.8-2ubuntu1) ... 343s Selecting previously unselected package gnutls-bin. 343s Preparing to unpack .../03-gnutls-bin_3.8.8-2ubuntu1_s390x.deb ... 343s Unpacking gnutls-bin (3.8.8-2ubuntu1) ... 343s Selecting previously unselected package libavahi-common-data:s390x. 343s Preparing to unpack .../04-libavahi-common-data_0.8-14ubuntu1_s390x.deb ... 343s Unpacking libavahi-common-data:s390x (0.8-14ubuntu1) ... 343s Selecting previously unselected package libavahi-common3:s390x. 343s Preparing to unpack .../05-libavahi-common3_0.8-14ubuntu1_s390x.deb ... 343s Unpacking libavahi-common3:s390x (0.8-14ubuntu1) ... 343s Selecting previously unselected package libavahi-client3:s390x. 343s Preparing to unpack .../06-libavahi-client3_0.8-14ubuntu1_s390x.deb ... 343s Unpacking libavahi-client3:s390x (0.8-14ubuntu1) ... 343s Selecting previously unselected package libbasicobjects0t64:s390x. 343s Preparing to unpack .../07-libbasicobjects0t64_0.6.2-3_s390x.deb ... 343s Unpacking libbasicobjects0t64:s390x (0.6.2-3) ... 343s Selecting previously unselected package libcares2:s390x. 343s Preparing to unpack .../08-libcares2_1.34.4-2.1_s390x.deb ... 343s Unpacking libcares2:s390x (1.34.4-2.1) ... 343s Selecting previously unselected package libcollection4t64:s390x. 343s Preparing to unpack .../09-libcollection4t64_0.6.2-3_s390x.deb ... 343s Unpacking libcollection4t64:s390x (0.6.2-3) ... 343s Selecting previously unselected package libcrack2:s390x. 343s Preparing to unpack .../10-libcrack2_2.9.6-5.2_s390x.deb ... 343s Unpacking libcrack2:s390x (2.9.6-5.2) ... 343s Selecting previously unselected package libdhash1t64:s390x. 343s Preparing to unpack .../11-libdhash1t64_0.6.2-3_s390x.deb ... 343s Unpacking libdhash1t64:s390x (0.6.2-3) ... 343s Selecting previously unselected package libpath-utils1t64:s390x. 343s Preparing to unpack .../12-libpath-utils1t64_0.6.2-3_s390x.deb ... 343s Unpacking libpath-utils1t64:s390x (0.6.2-3) ... 343s Selecting previously unselected package libref-array1t64:s390x. 343s Preparing to unpack .../13-libref-array1t64_0.6.2-3_s390x.deb ... 343s Unpacking libref-array1t64:s390x (0.6.2-3) ... 343s Selecting previously unselected package libini-config5t64:s390x. 343s Preparing to unpack .../14-libini-config5t64_0.6.2-3_s390x.deb ... 343s Unpacking libini-config5t64:s390x (0.6.2-3) ... 343s Selecting previously unselected package libipa-hbac0t64. 343s Preparing to unpack .../15-libipa-hbac0t64_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking libipa-hbac0t64 (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package libtalloc2:s390x. 343s Preparing to unpack .../16-libtalloc2_2.4.2-1build2_s390x.deb ... 343s Unpacking libtalloc2:s390x (2.4.2-1build2) ... 343s Selecting previously unselected package libtdb1:s390x. 343s Preparing to unpack .../17-libtdb1_1.4.12-1build1_s390x.deb ... 343s Unpacking libtdb1:s390x (1.4.12-1build1) ... 343s Selecting previously unselected package libtevent0t64:s390x. 343s Preparing to unpack .../18-libtevent0t64_0.16.1-3_s390x.deb ... 343s Unpacking libtevent0t64:s390x (0.16.1-3) ... 343s Selecting previously unselected package libldb2:s390x. 343s Preparing to unpack .../19-libldb2_2%3a2.9.1+samba4.20.4+dfsg-1ubuntu5_s390x.deb ... 343s Unpacking libldb2:s390x (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 343s Selecting previously unselected package libnfsidmap1:s390x. 343s Preparing to unpack .../20-libnfsidmap1_1%3a2.6.4-4ubuntu1_s390x.deb ... 343s Unpacking libnfsidmap1:s390x (1:2.6.4-4ubuntu1) ... 343s Selecting previously unselected package libpwquality-common. 343s Preparing to unpack .../21-libpwquality-common_1.4.5-3build1_all.deb ... 343s Unpacking libpwquality-common (1.4.5-3build1) ... 343s Selecting previously unselected package libpwquality1:s390x. 343s Preparing to unpack .../22-libpwquality1_1.4.5-3build1_s390x.deb ... 343s Unpacking libpwquality1:s390x (1.4.5-3build1) ... 343s Selecting previously unselected package libpam-pwquality:s390x. 343s Preparing to unpack .../23-libpam-pwquality_1.4.5-3build1_s390x.deb ... 343s Unpacking libpam-pwquality:s390x (1.4.5-3build1) ... 343s Selecting previously unselected package libwbclient0:s390x. 343s Preparing to unpack .../24-libwbclient0_2%3a4.20.4+dfsg-1ubuntu5_s390x.deb ... 343s Unpacking libwbclient0:s390x (2:4.20.4+dfsg-1ubuntu5) ... 343s Selecting previously unselected package samba-libs:s390x. 343s Preparing to unpack .../25-samba-libs_2%3a4.20.4+dfsg-1ubuntu5_s390x.deb ... 343s Unpacking samba-libs:s390x (2:4.20.4+dfsg-1ubuntu5) ... 343s Selecting previously unselected package libsmbclient0:s390x. 343s Preparing to unpack .../26-libsmbclient0_2%3a4.20.4+dfsg-1ubuntu5_s390x.deb ... 343s Unpacking libsmbclient0:s390x (2:4.20.4+dfsg-1ubuntu5) ... 343s Selecting previously unselected package libnss-sss:s390x. 343s Preparing to unpack .../27-libnss-sss_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking libnss-sss:s390x (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package libpam-sss:s390x. 343s Preparing to unpack .../28-libpam-sss_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking libpam-sss:s390x (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package softhsm2-common. 343s Preparing to unpack .../29-softhsm2-common_2.6.1-2.2ubuntu3_s390x.deb ... 343s Unpacking softhsm2-common (2.6.1-2.2ubuntu3) ... 343s Selecting previously unselected package libsofthsm2. 343s Preparing to unpack .../30-libsofthsm2_2.6.1-2.2ubuntu3_s390x.deb ... 343s Unpacking libsofthsm2 (2.6.1-2.2ubuntu3) ... 343s Selecting previously unselected package libsss-certmap0. 343s Preparing to unpack .../31-libsss-certmap0_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking libsss-certmap0 (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package libsss-idmap0. 343s Preparing to unpack .../32-libsss-idmap0_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking libsss-idmap0 (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package libsss-nss-idmap0. 343s Preparing to unpack .../33-libsss-nss-idmap0_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package python3-sss. 343s Preparing to unpack .../34-python3-sss_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking python3-sss (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package softhsm2. 343s Preparing to unpack .../35-softhsm2_2.6.1-2.2ubuntu3_s390x.deb ... 343s Unpacking softhsm2 (2.6.1-2.2ubuntu3) ... 343s Selecting previously unselected package sssd-common. 343s Preparing to unpack .../36-sssd-common_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking sssd-common (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package sssd-ad-common. 343s Preparing to unpack .../37-sssd-ad-common_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking sssd-ad-common (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package sssd-krb5-common. 343s Preparing to unpack .../38-sssd-krb5-common_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking sssd-krb5-common (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package sssd-ad. 343s Preparing to unpack .../39-sssd-ad_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking sssd-ad (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package sssd-ipa. 343s Preparing to unpack .../40-sssd-ipa_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking sssd-ipa (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package sssd-krb5. 343s Preparing to unpack .../41-sssd-krb5_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking sssd-krb5 (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package sssd-ldap. 343s Preparing to unpack .../42-sssd-ldap_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking sssd-ldap (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package sssd-proxy. 343s Preparing to unpack .../43-sssd-proxy_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking sssd-proxy (2.10.1-2ubuntu1) ... 343s Selecting previously unselected package sssd. 343s Preparing to unpack .../44-sssd_2.10.1-2ubuntu1_s390x.deb ... 343s Unpacking sssd (2.10.1-2ubuntu1) ... 343s Setting up libpwquality-common (1.4.5-3build1) ... 343s Setting up softhsm2-common (2.6.1-2.2ubuntu3) ... 343s Creating config file /etc/softhsm/softhsm2.conf with new version 343s Setting up libnfsidmap1:s390x (1:2.6.4-4ubuntu1) ... 343s Setting up libsss-idmap0 (2.10.1-2ubuntu1) ... 343s Setting up libbasicobjects0t64:s390x (0.6.2-3) ... 343s Setting up libipa-hbac0t64 (2.10.1-2ubuntu1) ... 343s Setting up libref-array1t64:s390x (0.6.2-3) ... 343s Setting up libtdb1:s390x (1.4.12-1build1) ... 343s Setting up libcollection4t64:s390x (0.6.2-3) ... 343s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 343s Setting up libwbclient0:s390x (2:4.20.4+dfsg-1ubuntu5) ... 343s Setting up libtalloc2:s390x (2.4.2-1build2) ... 343s Setting up libpath-utils1t64:s390x (0.6.2-3) ... 343s Setting up libunbound8:s390x (1.20.0-1ubuntu2.1) ... 343s Setting up libgnutls-dane0t64:s390x (3.8.8-2ubuntu1) ... 343s Setting up libavahi-common-data:s390x (0.8-14ubuntu1) ... 343s Setting up libcares2:s390x (1.34.4-2.1) ... 343s Setting up libdhash1t64:s390x (0.6.2-3) ... 343s Setting up libcrack2:s390x (2.9.6-5.2) ... 343s Setting up libsss-nss-idmap0 (2.10.1-2ubuntu1) ... 343s Setting up libini-config5t64:s390x (0.6.2-3) ... 343s Setting up libtevent0t64:s390x (0.16.1-3) ... 343s Setting up libnss-sss:s390x (2.10.1-2ubuntu1) ... 343s Setting up gnutls-bin (3.8.8-2ubuntu1) ... 343s Setting up libsofthsm2 (2.6.1-2.2ubuntu3) ... 343s Setting up softhsm2 (2.6.1-2.2ubuntu3) ... 343s Setting up libavahi-common3:s390x (0.8-14ubuntu1) ... 343s Setting up libsss-certmap0 (2.10.1-2ubuntu1) ... 343s Setting up libpwquality1:s390x (1.4.5-3build1) ... 343s Setting up libldb2:s390x (2:2.9.1+samba4.20.4+dfsg-1ubuntu5) ... 343s Setting up libavahi-client3:s390x (0.8-14ubuntu1) ... 343s Setting up libpam-pwquality:s390x (1.4.5-3build1) ... 344s Setting up samba-libs:s390x (2:4.20.4+dfsg-1ubuntu5) ... 344s Setting up python3-sss (2.10.1-2ubuntu1) ... 344s Setting up libsmbclient0:s390x (2:4.20.4+dfsg-1ubuntu5) ... 344s Setting up libpam-sss:s390x (2.10.1-2ubuntu1) ... 344s Setting up sssd-common (2.10.1-2ubuntu1) ... 344s Creating SSSD system user & group... 344s warn: The home directory `/var/lib/sss' already exists. Not touching this directory. 344s warn: Warning: The home directory `/var/lib/sss' does not belong to the user you are currently creating. 344s Warning: found usr.sbin.sssd in /etc/apparmor.d/force-complain, forcing complain mode 344s Warning from /etc/apparmor.d/usr.sbin.sssd (/etc/apparmor.d/usr.sbin.sssd line 63): Caching disabled for: 'usr.sbin.sssd' due to force complain 344s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-autofs.socket' → '/usr/lib/systemd/system/sssd-autofs.socket'. 344s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-nss.socket' → '/usr/lib/systemd/system/sssd-nss.socket'. 344s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pam.socket' → '/usr/lib/systemd/system/sssd-pam.socket'. 345s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-ssh.socket' → '/usr/lib/systemd/system/sssd-ssh.socket'. 345s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-sudo.socket' → '/usr/lib/systemd/system/sssd-sudo.socket'. 345s Created symlink '/etc/systemd/system/multi-user.target.wants/sssd.service' → '/usr/lib/systemd/system/sssd.service'. 345s sssd-autofs.service is a disabled or a static unit, not starting it. 345s sssd-nss.service is a disabled or a static unit, not starting it. 345s sssd-pam.service is a disabled or a static unit, not starting it. 345s sssd-ssh.service is a disabled or a static unit, not starting it. 345s sssd-sudo.service is a disabled or a static unit, not starting it. 345s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 345s Setting up sssd-proxy (2.10.1-2ubuntu1) ... 345s Setting up sssd-ad-common (2.10.1-2ubuntu1) ... 345s Created symlink '/etc/systemd/system/sssd.service.wants/sssd-pac.socket' → '/usr/lib/systemd/system/sssd-pac.socket'. 346s sssd-pac.service is a disabled or a static unit, not starting it. 346s Could not execute systemctl: at /usr/bin/deb-systemd-invoke line 148. 346s Setting up sssd-krb5-common (2.10.1-2ubuntu1) ... 346s Setting up sssd-krb5 (2.10.1-2ubuntu1) ... 346s Setting up sssd-ldap (2.10.1-2ubuntu1) ... 346s Setting up sssd-ad (2.10.1-2ubuntu1) ... 346s Setting up sssd-ipa (2.10.1-2ubuntu1) ... 346s Setting up sssd (2.10.1-2ubuntu1) ... 346s Processing triggers for man-db (2.13.0-1) ... 346s Processing triggers for libc-bin (2.40-4ubuntu1) ... 352s autopkgtest [02:45:43]: test sssd-softhism2-certificates-tests.sh: [----------------------- 352s + '[' -z ubuntu ']' 352s + required_tools=(p11tool openssl softhsm2-util) 352s + for cmd in "${required_tools[@]}" 352s + command -v p11tool 352s + for cmd in "${required_tools[@]}" 352s + command -v openssl 352s + for cmd in "${required_tools[@]}" 352s + command -v softhsm2-util 352s + PIN=053350 352s +++ find /usr/lib/softhsm/libsofthsm2.so 352s +++ head -n 1 352s ++ realpath /usr/lib/softhsm/libsofthsm2.so 352s + SOFTHSM2_MODULE=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 352s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 352s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 352s + '[' '!' -v NO_SSSD_TESTS ']' 352s + '[' '!' -x /usr/libexec/sssd/p11_child ']' 352s + ca_db_arg=ca_db 352s ++ /usr/libexec/sssd/p11_child --help 352s + p11_child_help='Usage: p11_child [OPTION...] 352s -d, --debug-level=INT Debug level 352s --debug-timestamps=INT Add debug timestamps 352s --debug-microseconds=INT Show timestamps with microseconds 352s --dumpable=INT Allow core dumps 352s --backtrace=INT Enable debug backtrace 352s --debug-fd=INT An open file descriptor for the debug 352s logs 352s --logger=stderr|files|journald Set logger 352s --auth Run in auth mode 352s --pre Run in pre-auth mode 352s --wait_for_card Wait until card is available 352s --verification Run in verification mode 352s --pin Expect PIN on stdin 352s --keypad Expect PIN on keypad 352s --verify=STRING Tune validation 352s --ca_db=STRING CA DB to use 352s --module_name=STRING Module name for authentication 352s --token_name=STRING Token name for authentication 352s --key_id=STRING Key ID for authentication 352s --label=STRING Label for authentication 352s --certificate=STRING certificate to verify, base64 encoded 352s --uri=STRING PKCS#11 URI to restrict selection 352s --chain-id=LONG Tevent chain ID used for logging 352s purposes 352s 352s Help options: 352s -?, --help Show this help message 352s --usage Display brief usage message' 352s + echo 'Usage: p11_child [OPTION...] 352s -d, --debug-level=INT Debug level 352s --debug-timestamps=INT Add debug timestamps 352s --debug-microseconds=INT Show timestamps with microseconds 352s --dumpable=INT Allow core dumps 352s --backtrace=INT Enable debug backtrace 352s --debug-fd=INT An open file descriptor for the debug 352s logs 352s --logger=stderr|files|journald Set logger 352s --auth Run in auth mode 352s --pre Run in pre-auth mode 352s --wait_for_card Wait until card is available 352s --verification Run in verification mode 352s --pin Expect PIN on stdin 352s --keypad Expect PIN on keypad 352s --verify=STRING Tune validation 352s --ca_db=STRING CA DB to use 352s --module_name=STRING Module name for authentication 352s --token_name=STRING Token name for authentication 352s --key_id=STRING Key ID for authentication 352s --label=STRING Label for authentication 352s --certificate=STRING certificate to verify, base64 encoded 352s --uri=STRING PKCS#11 URI to restrict selection 352s --chain-id=LONG Tevent chain ID used for logging 352s purposes 352s 352s Help options: 352s -?, --help Show this help message 352s --usage Display brief usage message' 352s + grep nssdb -qs 352s + echo 'Usage: p11_child [OPTION...] 352s -d, --debug-level=INT Debug level 352s --debug-timestamps=INT Add debug timestamps 352s --debug-microseconds=INT Show timestamps with microseconds 352s --dumpable=INT Allow core dumps 352s --backtrace=INT Enable debug backtrace 352s --debug-fd=INT An open file descriptor for the debug 352s logs 352s --logger=stderr|files|journald Set logger 352s --auth Run in auth mode 352s --pre Run in pre-auth mode 352s --wait_for_card Wait until card is available 352s --verification Run in verification mode 352s --pin Expect PIN on stdin 352s --keypad Expect PIN on keypad 352s --verify=STRING Tune validation 352s --ca_db=STRING CA DB to use 352s --module_name=STRING Module name for authentication 352s --token_name=STRING Token name for authentication 352s --key_id=STRING Key ID for authentication 352s --label=STRING Label for authentication 352s --certificate=STRING certificate to verify, base64 encoded 352s --uri=STRING PKCS#11 URI to restrict selection 352s --chain-id=LONG Tevent chain ID used for logging 352s purposes 352s 352s Help options: 352s -?, --help Show this help message 352s --usage Display brief usage message' 352s + grep -qs -- --ca_db 352s + '[' '!' -e /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so ']' 352s ++ mktemp -d -t sssd-softhsm2-XXXXXX 352s + tmpdir=/tmp/sssd-softhsm2-yZNZJ8 352s + keys_size=1024 352s + [[ ! -v KEEP_TEMPORARY_FILES ]] 352s + trap 'rm -rf "$tmpdir"' EXIT 352s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 352s + echo -n 01 352s + touch /tmp/sssd-softhsm2-yZNZJ8/index.txt 352s + mkdir -p /tmp/sssd-softhsm2-yZNZJ8/new_certs 352s + cat 352s + root_ca_key_pass=pass:random-root-CA-password-4851 352s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-key.pem -passout pass:random-root-CA-password-4851 1024 352s + openssl req -passin pass:random-root-CA-password-4851 -batch -config /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 352s + openssl x509 -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 352s + cat 352s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-23561 352s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-23561 1024 352s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-23561 -config /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.config -key /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-4851 -sha256 -out /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-certificate-request.pem 352s + openssl req -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-certificate-request.pem 352s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.config -passin pass:random-root-CA-password-4851 -keyfile /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-key.pem -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 352s Certificate Request: 352s Data: 352s Version: 1 (0x0) 352s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 352s Subject Public Key Info: 352s Public Key Algorithm: rsaEncryption 352s Public-Key: (1024 bit) 352s Modulus: 352s 00:f0:bf:f9:24:33:94:01:23:f5:41:ce:33:c1:5d: 352s 1d:29:76:68:fa:59:32:8f:6b:95:24:56:6e:1c:10: 352s c1:cd:38:30:6d:d9:e5:4e:ea:8b:80:72:9c:85:81: 352s 8a:93:9d:ee:62:c0:c0:89:fa:1e:74:ba:1a:3a:4f: 352s ef:41:6a:05:d9:9e:e6:d9:38:09:1b:f4:77:de:5a: 352s f9:82:77:15:3f:98:93:b9:e7:f8:bd:8b:a9:eb:0f: 352s 1f:54:5f:07:07:88:32:f9:6c:d3:5a:d5:c8:f8:1f: 352s cf:78:36:3e:a4:5e:4f:3c:0e:a0:9c:22:70:42:33: 352s 9a:dd:63:84:9a:c2:8a:a6:9d 352s Exponent: 65537 (0x10001) 352s Attributes: 352s (none) 352s Requested Extensions: 352s Signature Algorithm: sha256WithRSAEncryption 352s Signature Value: 352s ae:fc:f5:dd:bd:f5:2a:62:6d:90:7a:ad:c7:61:2c:49:f4:5a: 352s 37:90:ad:bc:1a:7d:8e:49:3f:ad:81:93:2c:2e:94:40:b5:fc: 352s 86:d8:5f:65:4a:08:2a:cd:b6:77:48:f9:82:25:ee:50:d6:45: 352s 57:79:e2:9a:6d:0d:71:bf:3f:ba:28:5c:47:74:63:f7:cf:62: 352s 0f:f1:00:b5:b5:73:f9:70:8a:bb:35:aa:8a:ef:98:eb:24:cf: 352s d6:05:88:1a:7a:b9:ac:57:95:96:d7:f8:58:2f:3e:30:c1:9d: 352s 62:6d:34:b2:34:14:5c:83:60:0b:b2:c8:82:f4:bd:c8:57:fc: 352s 02:bc 352s Using configuration from /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.config 352s Check that the request matches the signature 352s Signature ok 352s Certificate Details: 352s Serial Number: 1 (0x1) 352s Validity 352s Not Before: Jan 15 02:47:09 2025 GMT 352s Not After : Jan 15 02:47:09 2026 GMT 352s Subject: 352s organizationName = Test Organization 352s organizationalUnitName = Test Organization Unit 352s commonName = Test Organization Intermediate CA 352s X509v3 extensions: 352s X509v3 Subject Key Identifier: 352s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 352s X509v3 Authority Key Identifier: 352s keyid:60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 352s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 352s serial:00 352s X509v3 Basic Constraints: 352s CA:TRUE 352s X509v3 Key Usage: critical 352s Digital Signature, Certificate Sign, CRL Sign 352s Certificate is to be certified until Jan 15 02:47:09 2026 GMT (365 days) 352s 352s Write out database with 1 new entries 352s Database updated 352s + openssl x509 -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 352s /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem: OK 352s + cat 352s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-25343 352s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-25343 1024 352s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-25343 -config /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-23561 -sha256 -out /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-certificate-request.pem 352s + openssl req -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-certificate-request.pem 352s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-23561 -keyfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 352s Certificate Request: 352s Data: 352s Version: 1 (0x0) 352s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 352s Subject Public Key Info: 352s Public Key Algorithm: rsaEncryption 352s Public-Key: (1024 bit) 352s Modulus: 352s 00:e0:8e:90:b8:96:96:c4:f6:00:26:b9:62:07:a8: 352s b4:2f:ba:70:24:57:65:84:8b:dd:b5:61:91:8b:03: 352s e0:28:46:9d:1e:0d:6c:4a:e9:d4:77:b2:6c:64:0e: 352s d0:f3:9a:84:ef:2f:2c:8b:c2:84:85:35:a3:51:b1: 352s 03:9f:4f:9e:2f:9a:41:c5:4f:f2:33:e8:b0:41:ee: 352s b6:c7:05:59:ad:89:8c:a6:f6:14:5b:d2:c4:d6:ed: 352s d2:dd:fb:53:f4:e0:83:52:74:bd:15:aa:a4:4c:58: 352s 8b:04:b4:db:61:8e:c0:29:72:03:83:49:2a:dc:fa: 352s bc:53:0f:93:70:51:cb:08:65 352s Exponent: 65537 (0x10001) 352s Attributes: 352s (none) 352s Requested Extensions: 352s Signature Algorithm: sha256WithRSAEncryption 352s Signature Value: 352s 38:ad:72:01:77:4d:c8:69:39:c0:ec:7d:c8:21:15:23:77:33: 352s 5f:4f:ee:fc:a1:8b:c2:20:04:46:66:40:35:dd:b3:3e:5b:6d: 352s 54:f5:43:57:c0:3e:c9:ea:da:52:c1:11:ed:b7:f0:d2:ee:4a: 352s 27:37:0d:ad:f1:a7:a0:fd:76:4a:60:b4:7e:d9:31:02:11:4f: 352s ad:96:71:6f:0b:4b:ad:e9:bc:f9:4d:51:b1:29:f4:1e:b3:98: 352s 8d:9c:c5:bf:a8:c3:32:cc:9c:ed:5f:35:7d:b3:4a:28:67:36: 352s 5b:f3:e4:3d:f5:2c:1b:7f:61:35:12:bb:ea:19:cf:38:b8:60: 352s c1:82 352s Using configuration from /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.config 352s Check that the request matches the signature 352s Signature ok 352s Certificate Details: 352s Serial Number: 2 (0x2) 352s Validity 352s Not Before: Jan 15 02:47:09 2025 GMT 352s Not After : Jan 15 02:47:09 2026 GMT 352s Subject: 352s organizationName = Test Organization 352s organizationalUnitName = Test Organization Unit 352s commonName = Test Organization Sub Intermediate CA 352s X509v3 extensions: 352s X509v3 Subject Key Identifier: 352s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 352s X509v3 Authority Key Identifier: 352s keyid:29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 352s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 352s serial:01 352s X509v3 Basic Constraints: 352s CA:TRUE 352s X509v3 Key Usage: critical 352s Digital Signature, Certificate Sign, CRL Sign 352s Certificate is to be certified until Jan 15 02:47:09 2026 GMT (365 days) 352s 352s Write out database with 1 new entries 352s Database updated 352s + openssl x509 -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 352s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 352s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 352s + local cmd=openssl 352s + shift 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 352s /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem: OK 352s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 352s error 20 at 0 depth lookup: unable to get local issuer certificate 352s error /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem: verification failed 352s + cat 352s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-4625 352s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-4625 1024 352s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-4625 -key /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-request.pem 352s + openssl req -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-request.pem 352s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.config -passin pass:random-root-CA-password-4851 -keyfile /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-key.pem -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s Certificate Request: 352s Data: 352s Version: 1 (0x0) 352s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 352s Subject Public Key Info: 352s Public Key Algorithm: rsaEncryption 352s Public-Key: (1024 bit) 352s Modulus: 352s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 352s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 352s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 352s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 352s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 352s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 352s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 352s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 352s 09:72:c3:54:e9:26:46:00:03 352s Exponent: 65537 (0x10001) 352s Attributes: 352s Requested Extensions: 352s X509v3 Basic Constraints: 352s CA:FALSE 352s Netscape Cert Type: 352s SSL Client, S/MIME 352s Netscape Comment: 352s Test Organization Root CA trusted Certificate 352s X509v3 Subject Key Identifier: 352s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 352s X509v3 Key Usage: critical 352s Digital Signature, Non Repudiation, Key Encipherment 352s X509v3 Extended Key Usage: 352s TLS Web Client Authentication, E-mail Protection 352s X509v3 Subject Alternative Name: 352s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 352s Signature Algorithm: sha256WithRSAEncryption 352s Signature Value: 352s 59:fa:64:f3:10:a4:2f:cb:7b:59:d2:5a:e7:75:c5:9d:1f:81: 352s 52:d4:d9:cd:f1:d8:d3:e6:9f:2e:15:45:ca:31:19:e9:22:27: 352s d0:d9:94:b8:0c:4f:35:00:ff:37:4a:29:87:59:ca:d7:2b:b3: 352s 22:fa:8a:4e:0e:91:c6:18:1a:04:ea:9a:be:89:72:11:35:c5: 352s 63:cf:73:d8:0d:c7:df:9a:8f:3c:ab:5d:71:9c:0f:9d:b0:6a: 352s 82:66:45:b5:35:34:d8:8d:71:46:1e:38:71:f7:b1:18:b1:f5: 352s 02:9e:b7:46:5b:60:ee:f3:4d:0e:10:2b:4f:83:45:3b:c3:79: 352s 2d:93 352s Using configuration from /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.config 352s Check that the request matches the signature 352s Signature ok 352s Certificate Details: 352s Serial Number: 3 (0x3) 352s Validity 352s Not Before: Jan 15 02:47:09 2025 GMT 352s Not After : Jan 15 02:47:09 2026 GMT 352s Subject: 352s organizationName = Test Organization 352s organizationalUnitName = Test Organization Unit 352s commonName = Test Organization Root Trusted Certificate 0001 352s X509v3 extensions: 352s X509v3 Authority Key Identifier: 352s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 352s X509v3 Basic Constraints: 352s CA:FALSE 352s Netscape Cert Type: 352s SSL Client, S/MIME 352s Netscape Comment: 352s Test Organization Root CA trusted Certificate 352s X509v3 Subject Key Identifier: 352s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 352s X509v3 Key Usage: critical 352s Digital Signature, Non Repudiation, Key Encipherment 352s X509v3 Extended Key Usage: 352s TLS Web Client Authentication, E-mail Protection 352s X509v3 Subject Alternative Name: 352s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 352s Certificate is to be certified until Jan 15 02:47:09 2026 GMT (365 days) 352s 352s Write out database with 1 new entries 352s Database updated 352s + openssl x509 -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + local cmd=openssl 352s + shift 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem: OK 352s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 352s error 20 at 0 depth lookup: unable to get local issuer certificate 352s error /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem: verification failed 352s + cat 352s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 352s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-27789 1024 352s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-27789 -key /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-request.pem 352s + openssl req -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-request.pem 352s + openssl ca -passin pass:random-intermediate-CA-password-23561 -config /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 352s Using configuration from /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.config 352s Check that the request matches the signature 352s Signature ok 352s Certificate Details: 352s Serial Number: 4 (0x4) 352s Validity 352s Not Before: Jan 15 02:47:09 2025 GMT 352s Not After : Jan 15 02:47:09 2026 GMT 352s Subject: 352s organizationName = Test Organization 352s organizationalUnitName = Test Organization Unit 352s commonName = Test Organization Intermediate Trusted Certificate 0001 352s X509v3 extensions: 352s X509v3 Authority Key Identifier: 352s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 352s X509v3 Basic Constraints: 352s CA:FALSE 352s Netscape Cert Type: 352s SSL Client, S/MIME 352s Netscape Comment: 352s Test Organization Intermediate CA trusted Certificate 352s X509v3 Subject Key Identifier: 352s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 352s X509v3 Key Usage: critical 352s Digital Signature, Non Repudiation, Key Encipherment 352s X509v3 Extended Key Usage: 352s TLS Web Client Authentication, E-mail Protection 352s X509v3 Subject Alternative Name: 352s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 352s Certificate is to be certified until Jan 15 02:47:09 2026 GMT (365 days) 352s 352s Write out database with 1 new entries 352s Database updated 352s + openssl x509 -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 352s Certificate Request: 352s Data: 352s Version: 1 (0x0) 352s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 352s Subject Public Key Info: 352s Public Key Algorithm: rsaEncryption 352s Public-Key: (1024 bit) 352s Modulus: 352s 00:f5:f7:76:ea:29:0c:f3:08:c3:65:6a:41:8a:cd: 352s 62:d3:db:9b:9c:6b:c5:ba:ca:df:0e:1b:fb:e8:aa: 352s 5e:10:0a:9e:19:70:be:f6:7a:7f:d7:70:a4:d7:e8: 352s 1b:ab:42:12:05:62:94:68:67:7c:e3:32:e6:0e:db: 352s e8:bd:f9:02:8e:fc:8d:a7:3b:12:3c:bf:55:97:19: 352s 82:fb:6e:9e:21:de:58:ea:ac:42:08:e7:52:8c:bb: 352s 3d:82:3d:5a:31:02:32:92:b6:15:74:f8:9f:2a:c6: 352s 31:a9:3e:e3:4e:9e:f3:5d:a2:ab:5f:2c:37:d3:73: 352s 13:8d:a8:d9:20:95:9d:db:b1 352s Exponent: 65537 (0x10001) 352s Attributes: 352s Requested Extensions: 352s X509v3 Basic Constraints: 352s CA:FALSE 352s Netscape Cert Type: 352s SSL Client, S/MIME 352s Netscape Comment: 352s Test Organization Intermediate CA trusted Certificate 352s X509v3 Subject Key Identifier: 352s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 352s X509v3 Key Usage: critical 352s Digital Signature, Non Repudiation, Key Encipherment 352s X509v3 Extended Key Usage: 352s TLS Web Client Authentication, E-mail Protection 352s X509v3 Subject Alternative Name: 352s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 352s Signature Algorithm: sha256WithRSAEncryption 352s Signature Value: 352s f0:fb:72:f2:cb:7f:37:60:40:ed:74:69:de:56:52:5c:1f:43: 352s e3:52:0e:46:ba:fb:62:60:69:69:5c:ad:cf:d8:b2:98:5d:0e: 352s 32:4c:41:cb:99:a5:8b:93:2b:af:f3:59:2b:fe:46:a7:64:61: 352s 11:1e:8f:0e:b9:92:8a:39:2d:83:70:a2:99:07:30:d8:b8:d5: 352s 80:29:5b:97:8c:81:37:59:8b:bc:77:dd:66:67:3f:f8:c8:0d: 352s 5d:98:fa:7d:27:6c:6b:b5:50:66:ea:ab:9d:02:0d:6f:97:41: 352s d0:8c:69:32:29:63:5d:db:a3:b2:ea:36:cf:31:07:88:49:92: 352s fa:33 352s + echo 'This certificate should not be trusted fully' 352s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 352s + local cmd=openssl 352s + shift 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 352s This certificate should not be trusted fully 352s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 352s error 2 at 1 depth lookup: unable to get issuer certificate 352s error /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 352s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 352s + cat 352s /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem: OK 352s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 352s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-17618 1024 352s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-17618 -key /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 352s + openssl req -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 352s Certificate Request: 352s Data: 352s Version: 1 (0x0) 352s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 352s Subject Public Key Info: 352s Public Key Algorithm: rsaEncryption 352s Public-Key: (1024 bit) 352s Modulus: 352s 00:da:d0:bb:74:d3:43:f2:f3:b8:a9:72:c7:bf:13: 352s 88:2f:18:0e:56:64:ae:26:46:3e:6e:99:62:02:7e: 352s f4:b5:1b:ba:9e:eb:b7:7a:b0:fd:34:58:9d:e1:72: 352s 37:7e:cc:39:94:ce:87:a4:fb:32:09:17:97:bd:e7: 352s e9:04:f8:1f:4e:09:66:3e:86:f5:49:75:8b:4a:56: 352s 6b:2f:db:44:d2:e5:65:04:f4:22:19:96:86:be:5c: 352s 73:c1:30:c6:0d:6b:8a:01:8c:eb:d2:e2:29:8d:0f: 352s 57:e2:09:12:c8:6f:da:da:38:60:36:6c:fa:b0:6c: 352s de:b3:34:61:ac:71:17:5a:d3 352s Exponent: 65537 (0x10001) 352s Attributes: 352s Requested Extensions: 352s X509v3 Basic Constraints: 352s CA:FALSE 352s Netscape Cert Type: 352s SSL Client, S/MIME 352s Netscape Comment: 352s Test Organization Sub Intermediate CA trusted Certificate 352s X509v3 Subject Key Identifier: 352s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 352s X509v3 Key Usage: critical 352s Digital Signature, Non Repudiation, Key Encipherment 352s X509v3 Extended Key Usage: 352s TLS Web Client Authentication, E-mail Protection 352s X509v3 Subject Alternative Name: 352s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 352s Signature Algorithm: sha256WithRSAEncryption 352s Signature Value: 352s 27:d2:94:64:9b:36:af:e3:34:1a:20:13:d0:a2:5e:2c:cd:9d: 352s 14:88:71:75:2a:1f:1b:09:f1:dc:b1:71:9c:5e:50:49:ac:b5: 352s 34:48:3f:05:31:cc:aa:f9:1b:75:1c:e1:ab:a7:8f:b3:6e:d8: 352s 35:38:00:ac:0e:d6:65:f2:34:e7:44:70:ba:85:08:a9:24:57: 352s 30:23:a1:94:b4:dd:1e:6d:2d:93:9d:2f:c3:dd:df:75:1f:05: 352s e8:d5:48:7c:6e:8d:d8:f5:07:54:3a:ac:10:a7:1a:fb:2b:54: 352s b2:97:98:bc:06:59:0e:e4:87:fa:b0:ad:7c:1e:94:93:99:1c: 352s a4:56 352s + openssl ca -passin pass:random-sub-intermediate-CA-password-25343 -config /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s Using configuration from /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.config 352s Check that the request matches the signature 352s Signature ok 352s Certificate Details: 352s Serial Number: 5 (0x5) 352s Validity 352s Not Before: Jan 15 02:47:09 2025 GMT 352s Not After : Jan 15 02:47:09 2026 GMT 352s Subject: 352s organizationName = Test Organization 352s organizationalUnitName = Test Organization Unit 352s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 352s X509v3 extensions: 352s X509v3 Authority Key Identifier: 352s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 352s X509v3 Basic Constraints: 352s CA:FALSE 352s Netscape Cert Type: 352s SSL Client, S/MIME 352s Netscape Comment: 352s Test Organization Sub Intermediate CA trusted Certificate 352s X509v3 Subject Key Identifier: 352s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 352s X509v3 Key Usage: critical 352s Digital Signature, Non Repudiation, Key Encipherment 352s X509v3 Extended Key Usage: 352s TLS Web Client Authentication, E-mail Protection 352s X509v3 Subject Alternative Name: 352s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 352s Certificate is to be certified until Jan 15 02:47:09 2026 GMT (365 days) 352s 352s Write out database with 1 new entries 352s Database updated 352s + openssl x509 -noout -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s This certificate should not be trusted fully 352s + echo 'This certificate should not be trusted fully' 352s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s + local cmd=openssl 352s + shift 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 352s error 2 at 1 depth lookup: unable to get issuer certificate 352s error /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 352s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s + local cmd=openssl 352s + shift 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 352s error 20 at 0 depth lookup: unable to get local issuer certificate 352s error /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 352s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s + local cmd=openssl 352s + shift 352s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 352s Building a the full-chain CA file... 352s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 352s error 20 at 0 depth lookup: unable to get local issuer certificate 352s error /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 352s + echo 'Building a the full-chain CA file...' 352s + cat /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 352s + cat /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 352s + cat /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 352s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 352s + openssl pkcs7 -print_certs -noout 352s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 352s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 352s 352s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 352s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 352s 352s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 352s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 352s 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 352s /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem: OK 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 352s /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem: OK 352s /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem: OK 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-root-intermediate-chain-CA.pem 352s + openssl verify -CAfile /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 352s /tmp/sssd-softhsm2-yZNZJ8/test-root-intermediate-chain-CA.pem: OK 352s + echo 'Certificates generation completed!' 352s + [[ -v NO_SSSD_TESTS ]] 352s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /dev/null 352s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /dev/null 352s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 352s /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 352s Certificates generation completed! 352s + local key_ring=/dev/null 352s + local verify_option= 352s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 352s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 352s + local key_cn 352s + local key_name 352s + local tokens_dir 352s + local output_cert_file 352s + token_name= 352s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem .pem 352s + key_name=test-root-CA-trusted-certificate-0001 352s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s ++ sed -n 's/ *commonName *= //p' 352s + key_cn='Test Organization Root Trusted Certificate 0001' 352s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 352s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 352s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 352s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 352s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 352s + token_name='Test Organization Root Tr Token' 352s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 352s + local key_file 352s + local decrypted_key 352s + mkdir -p /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 352s + key_file=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-key.pem 352s + decrypted_key=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-key-decrypted.pem 352s + cat 352s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 053350 --so-pin 053350 --free 352s Slot 0 has a free/uninitialized token. 352s The token has been initialized and is reassigned to slot 1803075354 352s + softhsm2-util --show-slots 352s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 352s Available slots: 352s Slot 1803075354 352s Slot info: 352s Description: SoftHSM slot ID 0x6b78bf1a 352s Manufacturer ID: SoftHSM project 352s Hardware version: 2.6 352s Firmware version: 2.6 352s Token present: yes 352s Token info: 352s Manufacturer ID: SoftHSM project 352s Model: SoftHSM v2 352s Hardware version: 2.6 352s Firmware version: 2.6 352s Serial number: 20f0e62feb78bf1a 352s Initialized: yes 352s User PIN init.: yes 352s Label: Test Organization Root Tr Token 352s Slot 1 352s Slot info: 352s Description: SoftHSM slot ID 0x1 352s Manufacturer ID: SoftHSM project 352s Hardware version: 2.6 352s Firmware version: 2.6 352s Token present: yes 352s Token info: 352s Manufacturer ID: SoftHSM project 352s Model: SoftHSM v2 352s Hardware version: 2.6 352s Firmware version: 2.6 352s Serial number: 352s Initialized: no 352s User PIN init.: no 352s Label: 352s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-4625 -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-key-decrypted.pem 352s writing RSA key 352s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 352s + rm /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001-key-decrypted.pem 352s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 352s Object 0: 352s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 352s Type: X.509 Certificate (RSA-1024) 352s Expires: Thu Jan 15 02:47:09 2026 352s Label: Test Organization Root Trusted Certificate 0001 352s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 352s 352s + echo 'Test Organization Root Tr Token' 352s + '[' -n '' ']' 352s + local output_base_name=SSSD-child-32466 352s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-32466.output 352s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-32466.pem 352s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 352s Test Organization Root Tr Token 352s [p11_child[2147]] [main] (0x0400): p11_child started. 352s [p11_child[2147]] [main] (0x2000): Running in [pre-auth] mode. 352s [p11_child[2147]] [main] (0x2000): Running with effective IDs: [0][0]. 352s [p11_child[2147]] [main] (0x2000): Running with real IDs [0][0]. 352s [p11_child[2147]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 352s [p11_child[2147]] [do_work] (0x0040): init_verification failed. 352s [p11_child[2147]] [main] (0x0020): p11_child failed (5) 352s + return 2 352s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /dev/null no_verification 352s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /dev/null no_verification 352s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 352s + local key_ring=/dev/null 352s + local verify_option=no_verification 352s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 352s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 352s + local key_cn 352s + local key_name 352s + local tokens_dir 352s + local output_cert_file 352s + token_name= 352s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem .pem 352s + key_name=test-root-CA-trusted-certificate-0001 352s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s ++ sed -n 's/ *commonName *= //p' 352s + key_cn='Test Organization Root Trusted Certificate 0001' 352s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 352s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 352s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 352s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 352s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 352s + token_name='Test Organization Root Tr Token' 352s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 352s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 ']' 352s + echo 'Test Organization Root Tr Token' 352s + '[' -n no_verification ']' 352s + local verify_arg=--verify=no_verification 352s + local output_base_name=SSSD-child-7404 352s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404.output 352s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404.pem 352s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 352s [p11_child[2153]] [main] (0x0400): p11_child started. 352s [p11_child[2153]] [main] (0x2000): Running in [pre-auth] mode. 352s [p11_child[2153]] [main] (0x2000): Running with effective IDs: [0][0]. 352s [p11_child[2153]] [main] (0x2000): Running with real IDs [0][0]. 352s [p11_child[2153]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 352s Test Organization Root Tr Token 352s [p11_child[2153]] [do_card] (0x4000): Module List: 352s [p11_child[2153]] [do_card] (0x4000): common name: [softhsm2]. 352s [p11_child[2153]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 352s [p11_child[2153]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 352s [p11_child[2153]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 352s [p11_child[2153]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 352s [p11_child[2153]] [do_card] (0x4000): Login NOT required. 352s [p11_child[2153]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 352s [p11_child[2153]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 352s [p11_child[2153]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 352s [p11_child[2153]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 352s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404.output 352s + echo '-----BEGIN CERTIFICATE-----' 352s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404.output 352s + echo '-----END CERTIFICATE-----' 352s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404.pem 352s Certificate: 352s Data: 352s Version: 3 (0x2) 352s Serial Number: 3 (0x3) 352s Signature Algorithm: sha256WithRSAEncryption 352s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 352s Validity 352s Not Before: Jan 15 02:47:09 2025 GMT 352s Not After : Jan 15 02:47:09 2026 GMT 352s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 352s Subject Public Key Info: 352s Public Key Algorithm: rsaEncryption 352s Public-Key: (1024 bit) 352s Modulus: 352s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 352s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 352s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 352s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 352s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 352s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 352s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 352s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 352s 09:72:c3:54:e9:26:46:00:03 352s Exponent: 65537 (0x10001) 352s X509v3 extensions: 352s X509v3 Authority Key Identifier: 352s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 352s X509v3 Basic Constraints: 352s CA:FALSE 352s Netscape Cert Type: 352s SSL Client, S/MIME 352s Netscape Comment: 352s Test Organization Root CA trusted Certificate 352s X509v3 Subject Key Identifier: 352s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 352s X509v3 Key Usage: critical 352s Digital Signature, Non Repudiation, Key Encipherment 352s X509v3 Extended Key Usage: 352s TLS Web Client Authentication, E-mail Protection 352s X509v3 Subject Alternative Name: 352s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 352s Signature Algorithm: sha256WithRSAEncryption 352s Signature Value: 352s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 352s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 352s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 352s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 352s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 352s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 352s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 352s 48:88 352s + local found_md5 expected_md5 352s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + expected_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 352s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404.pem 352s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 352s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 352s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404-auth.output 352s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404-auth.output .output 352s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404-auth.pem 352s + echo -n 053350 352s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 352s [p11_child[2161]] [main] (0x0400): p11_child started. 352s [p11_child[2161]] [main] (0x2000): Running in [auth] mode. 352s [p11_child[2161]] [main] (0x2000): Running with effective IDs: [0][0]. 352s [p11_child[2161]] [main] (0x2000): Running with real IDs [0][0]. 352s [p11_child[2161]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 352s [p11_child[2161]] [do_card] (0x4000): Module List: 352s [p11_child[2161]] [do_card] (0x4000): common name: [softhsm2]. 352s [p11_child[2161]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 352s [p11_child[2161]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 352s [p11_child[2161]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 352s [p11_child[2161]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 352s [p11_child[2161]] [do_card] (0x4000): Login required. 352s [p11_child[2161]] [do_card] (0x4000): Token flags [1069]. 352s [p11_child[2161]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 352s [p11_child[2161]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 352s [p11_child[2161]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 352s [p11_child[2161]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 352s [p11_child[2161]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 352s [p11_child[2161]] [do_card] (0x4000): Certificate verified and validated. 352s [p11_child[2161]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 352s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404-auth.output 352s + echo '-----BEGIN CERTIFICATE-----' 352s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404-auth.output 352s + echo '-----END CERTIFICATE-----' 352s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404-auth.pem 352s Certificate: 352s Data: 352s Version: 3 (0x2) 352s Serial Number: 3 (0x3) 352s Signature Algorithm: sha256WithRSAEncryption 352s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 352s Validity 352s Not Before: Jan 15 02:47:09 2025 GMT 352s Not After : Jan 15 02:47:09 2026 GMT 352s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 352s Subject Public Key Info: 352s Public Key Algorithm: rsaEncryption 352s Public-Key: (1024 bit) 352s Modulus: 352s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 352s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 352s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 352s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 352s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 352s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 352s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 352s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 352s 09:72:c3:54:e9:26:46:00:03 352s Exponent: 65537 (0x10001) 352s X509v3 extensions: 352s X509v3 Authority Key Identifier: 352s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 352s X509v3 Basic Constraints: 352s CA:FALSE 352s Netscape Cert Type: 352s SSL Client, S/MIME 352s Netscape Comment: 352s Test Organization Root CA trusted Certificate 352s X509v3 Subject Key Identifier: 352s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 352s X509v3 Key Usage: critical 352s Digital Signature, Non Repudiation, Key Encipherment 352s X509v3 Extended Key Usage: 352s TLS Web Client Authentication, E-mail Protection 352s X509v3 Subject Alternative Name: 352s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 352s Signature Algorithm: sha256WithRSAEncryption 352s Signature Value: 352s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 352s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 352s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 352s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 352s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 352s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 352s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 352s 48:88 352s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-7404-auth.pem 352s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 352s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 352s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 352s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 352s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 352s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 352s + local verify_option= 352s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 352s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 352s + local key_cn 352s + local key_name 352s + local tokens_dir 352s + local output_cert_file 352s + token_name= 352s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem .pem 352s + key_name=test-root-CA-trusted-certificate-0001 352s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 352s ++ sed -n 's/ *commonName *= //p' 353s Test Organization Root Tr Token 353s + key_cn='Test Organization Root Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 353s + token_name='Test Organization Root Tr Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Root Tr Token' 353s + '[' -n '' ']' 353s + local output_base_name=SSSD-child-2543 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s [p11_child[2171]] [main] (0x0400): p11_child started. 353s [p11_child[2171]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2171]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2171]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2171]] [do_card] (0x4000): Module List: 353s [p11_child[2171]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2171]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2171]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2171]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2171]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2171]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2171]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2171]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2171]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2171]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2171]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 3 (0x3) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 353s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 353s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 353s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 353s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 353s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 353s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 353s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 353s 09:72:c3:54:e9:26:46:00:03 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Root CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 353s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 353s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 353s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 353s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 353s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 353s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 353s 48:88 353s + local found_md5 expected_md5 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + expected_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543.pem 353s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 353s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543-auth.output 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543-auth.output .output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543-auth.pem 353s + echo -n 053350 353s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 353s [p11_child[2179]] [main] (0x0400): p11_child started. 353s [p11_child[2179]] [main] (0x2000): Running in [auth] mode. 353s [p11_child[2179]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2179]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2179]] [do_card] (0x4000): Module List: 353s [p11_child[2179]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2179]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2179]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2179]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2179]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2179]] [do_card] (0x4000): Login required. 353s [p11_child[2179]] [do_card] (0x4000): Token flags [1069]. 353s [p11_child[2179]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2179]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2179]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2179]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 353s [p11_child[2179]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 353s [p11_child[2179]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 353s [p11_child[2179]] [do_card] (0x4000): Certificate verified and validated. 353s [p11_child[2179]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543-auth.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543-auth.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543-auth.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 3 (0x3) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 353s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 353s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 353s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 353s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 353s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 353s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 353s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 353s 09:72:c3:54:e9:26:46:00:03 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Root CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 353s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 353s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 353s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 353s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 353s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 353s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 353s 48:88 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-2543-auth.pem 353s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 353s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem partial_chain 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem partial_chain 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s + local verify_option=partial_chain 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-root-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Root Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 353s + token_name='Test Organization Root Tr Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Root Tr Token' 353s + '[' -n partial_chain ']' 353s + local verify_arg=--verify=partial_chain 353s + local output_base_name=SSSD-child-16896 353s Test Organization Root Tr Token 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s [p11_child[2189]] [main] (0x0400): p11_child started. 353s [p11_child[2189]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2189]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2189]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2189]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2189]] [do_card] (0x4000): Module List: 353s [p11_child[2189]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2189]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2189]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2189]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2189]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2189]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2189]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2189]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2189]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2189]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2189]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 3 (0x3) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 353s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 353s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 353s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 353s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 353s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 353s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 353s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 353s 09:72:c3:54:e9:26:46:00:03 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Root CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 353s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 353s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 353s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 353s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 353s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 353s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 353s 48:88 353s + local found_md5 expected_md5 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + expected_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896.pem 353s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 353s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896-auth.output 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896-auth.output .output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896-auth.pem 353s + echo -n 053350 353s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 353s [p11_child[2197]] [main] (0x0400): p11_child started. 353s [p11_child[2197]] [main] (0x2000): Running in [auth] mode. 353s [p11_child[2197]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2197]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2197]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2197]] [do_card] (0x4000): Module List: 353s [p11_child[2197]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2197]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2197]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2197]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2197]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2197]] [do_card] (0x4000): Login required. 353s [p11_child[2197]] [do_card] (0x4000): Token flags [1069]. 353s [p11_child[2197]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2197]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2197]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2197]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 353s [p11_child[2197]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 353s [p11_child[2197]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 353s [p11_child[2197]] [do_card] (0x4000): Certificate verified and validated. 353s [p11_child[2197]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896-auth.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896-auth.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896-auth.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 3 (0x3) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 353s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 353s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 353s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 353s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 353s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 353s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 353s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 353s 09:72:c3:54:e9:26:46:00:03 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Root CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 353s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 353s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 353s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 353s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 353s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 353s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 353s 48:88 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16896-auth.pem 353s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 353s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + local verify_option= 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-root-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Root Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 353s + token_name='Test Organization Root Tr Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Root Tr Token' 353s + '[' -n '' ']' 353s + local output_base_name=SSSD-child-29846 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s [p11_child[2207]] [main] (0x0400): p11_child started. 353s [p11_child[2207]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2207]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2207]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2207]] [do_card] (0x4000): Module List: 353s [p11_child[2207]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2207]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2207]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2207]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2207]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2207]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2207]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2207]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2207]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2207]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2207]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s Test Organization Root Tr Token 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846.pem 353s + local found_md5 expected_md5 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 3 (0x3) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 353s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 353s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 353s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 353s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 353s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 353s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 353s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 353s 09:72:c3:54:e9:26:46:00:03 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Root CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 353s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 353s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 353s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 353s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 353s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 353s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 353s 48:88 353s + expected_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846.pem 353s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 353s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846-auth.output 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846-auth.output .output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846-auth.pem 353s + echo -n 053350 353s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 353s [p11_child[2215]] [main] (0x0400): p11_child started. 353s [p11_child[2215]] [main] (0x2000): Running in [auth] mode. 353s [p11_child[2215]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2215]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2215]] [do_card] (0x4000): Module List: 353s [p11_child[2215]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2215]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2215]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2215]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2215]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2215]] [do_card] (0x4000): Login required. 353s [p11_child[2215]] [do_card] (0x4000): Token flags [1069]. 353s [p11_child[2215]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2215]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2215]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2215]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 353s [p11_child[2215]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 353s [p11_child[2215]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 353s [p11_child[2215]] [do_card] (0x4000): Certificate verified and validated. 353s [p11_child[2215]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846-auth.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846-auth.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846-auth.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 3 (0x3) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 353s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 353s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 353s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 353s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 353s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 353s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 353s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 353s 09:72:c3:54:e9:26:46:00:03 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Root CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 353s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 353s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 353s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 353s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 353s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 353s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 353s 48:88 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29846-auth.pem 353s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 353s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem partial_chain 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem partial_chain 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + local verify_option=partial_chain 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-root-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Root Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 353s + token_name='Test Organization Root Tr Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Root Tr Token' 353s + '[' -n partial_chain ']' 353s + local verify_arg=--verify=partial_chain 353s + local output_base_name=SSSD-child-3267 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s Test Organization Root Tr Token 353s [p11_child[2225]] [main] (0x0400): p11_child started. 353s [p11_child[2225]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2225]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2225]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2225]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2225]] [do_card] (0x4000): Module List: 353s [p11_child[2225]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2225]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2225]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2225]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2225]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2225]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2225]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2225]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2225]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Root Tr Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2225]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2225]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 3 (0x3) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 353s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 353s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 353s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 353s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 353s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 353s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 353s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 353s 09:72:c3:54:e9:26:46:00:03 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Root CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 353s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 353s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 353s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 353s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 353s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 353s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 353s 48:88 353s + local found_md5 expected_md5 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + expected_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267.pem 353s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 353s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267-auth.output 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267-auth.output .output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267-auth.pem 353s + echo -n 053350 353s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Root Tr Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 353s [p11_child[2233]] [main] (0x0400): p11_child started. 353s [p11_child[2233]] [main] (0x2000): Running in [auth] mode. 353s [p11_child[2233]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2233]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2233]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2233]] [do_card] (0x4000): Module List: 353s [p11_child[2233]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2233]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2233]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2233]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2233]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2233]] [do_card] (0x4000): Login required. 353s [p11_child[2233]] [do_card] (0x4000): Token flags [1069]. 353s [p11_child[2233]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2233]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2233]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Root Tr Token Test Organization Root Tr Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2233]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x6b78bf1a;slot-manufacturer=SoftHSM%20project;slot-id=1803075354;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=20f0e62feb78bf1a;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 353s [p11_child[2233]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 353s [p11_child[2233]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 353s [p11_child[2233]] [do_card] (0x4000): Certificate verified and validated. 353s [p11_child[2233]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267-auth.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267-auth.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267-auth.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 3 (0x3) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:ac:c7:59:8d:89:e9:1e:e4:a7:d7:17:2e:ea:01: 353s 6d:c0:cd:ab:62:26:ee:09:52:15:1c:47:c1:eb:03: 353s 71:a5:a1:0a:6b:43:e0:75:9a:d9:78:6e:18:f8:f6: 353s e1:4d:ae:f4:c0:c9:42:11:21:40:07:65:bb:45:7c: 353s a0:ba:75:4e:f4:d9:6a:9a:f3:e6:9c:d3:07:51:0e: 353s be:48:d3:92:51:bf:f7:68:34:df:72:1c:9a:80:60: 353s ac:dd:02:49:19:db:d2:34:43:a4:6b:0c:d3:10:78: 353s cd:bc:49:44:32:ec:ec:76:1e:03:77:d7:27:6d:61: 353s 09:72:c3:54:e9:26:46:00:03 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 60:15:B7:E1:96:58:06:91:83:AF:1F:38:FB:9B:A2:E8:E6:11:45:C9 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Root CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s 70:A8:1C:C0:54:AA:E5:44:BF:C6:93:BA:01:E7:A6:AE:B0:15:D8:E0 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s 00:d6:f6:38:f5:59:20:7f:63:14:83:04:3e:b2:43:4c:5e:1a: 353s 20:68:2e:f2:7f:43:52:29:3e:f5:56:c0:ce:c0:7e:52:61:97: 353s b0:eb:8d:ec:b9:68:f6:1c:c9:99:74:ee:b1:73:a9:19:de:2b: 353s fd:48:5c:84:ed:63:78:46:a8:6c:fb:40:5f:dd:aa:7c:18:c8: 353s b7:d1:69:2f:10:a4:29:80:d4:7d:5e:21:99:92:49:c6:c9:3b: 353s 32:94:38:85:d5:9a:b4:5d:e4:c5:cf:bd:ac:c2:58:69:e7:36: 353s bb:86:29:c9:c3:9d:aa:63:66:ac:c8:92:d3:ac:fd:00:67:db: 353s 48:88 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-3267-auth.pem 353s + found_md5=Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 353s + '[' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 '!=' Modulus=ACC7598D89E91EE4A7D7172EEA016DC0CDAB6226EE0952151C47C1EB0371A5A10A6B43E0759AD9786E18F8F6E14DAEF4C0C9421121400765BB457CA0BA754EF4D96A9AF3E69CD307510EBE48D39251BFF76834DF721C9A8060ACDD024919DBD23443A46B0CD31078CDBC494432ECEC761E0377D7276D610972C354E926460003 ']' 353s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s + local verify_option= 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-root-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Root Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 353s + token_name='Test Organization Root Tr Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Root Tr Token' 353s Test Organization Root Tr Token 353s + '[' -n '' ']' 353s + local output_base_name=SSSD-child-17143 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-17143.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-17143.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s [p11_child[2243]] [main] (0x0400): p11_child started. 353s [p11_child[2243]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2243]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2243]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2243]] [do_card] (0x4000): Module List: 353s [p11_child[2243]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2243]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2243]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2243]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2243]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2243]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2243]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2243]] [do_verification] (0x0040): X509_verify_cert failed [0]. 353s [p11_child[2243]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 353s [p11_child[2243]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 353s [p11_child[2243]] [do_card] (0x4000): No certificate found. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-17143.output 353s + return 2 353s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem partial_chain 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem partial_chain 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s + local verify_option=partial_chain 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-4625 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-root-ca-trusted-cert-0001-4625 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-root-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-root-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Root Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 353s + token_name='Test Organization Root Tr Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 353s Test Organization Root Tr Token 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-root-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Root Tr Token' 353s + '[' -n partial_chain ']' 353s + local verify_arg=--verify=partial_chain 353s + local output_base_name=SSSD-child-22306 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-22306.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-22306.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s [p11_child[2250]] [main] (0x0400): p11_child started. 353s [p11_child[2250]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2250]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2250]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2250]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2250]] [do_card] (0x4000): Module List: 353s [p11_child[2250]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2250]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2250]] [do_card] (0x4000): Description [SoftHSM slot ID 0x6b78bf1a] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2250]] [do_card] (0x4000): Token label [Test Organization Root Tr Token]. 353s [p11_child[2250]] [do_card] (0x4000): Found [Test Organization Root Tr Token] in slot [SoftHSM slot ID 0x6b78bf1a][1803075354] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2250]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2250]] [read_certs] (0x4000): found cert[Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] 353s [p11_child[2250]] [do_verification] (0x0040): X509_verify_cert failed [0]. 353s [p11_child[2250]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 353s [p11_child[2250]] [read_certs] (0x0040): Certificate [Test Organization Root Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root Trusted Certificate 0001] not valid, skipping. 353s [p11_child[2250]] [do_card] (0x4000): No certificate found. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-22306.output 353s + return 2 353s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /dev/null 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /dev/null 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_ring=/dev/null 353s + local verify_option= 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Interme Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 353s + local key_file 353s + local decrypted_key 353s + mkdir -p /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 353s + key_file=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-key.pem 353s + decrypted_key=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 353s + cat 353s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 053350 --so-pin 053350 --free 353s Slot 0 has a free/uninitialized token. 353s The token has been initialized and is reassigned to slot 942897888 353s + softhsm2-util --show-slots 353s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 353s Available slots: 353s Slot 942897888 353s Slot info: 353s Description: SoftHSM slot ID 0x38337ae0 353s Manufacturer ID: SoftHSM project 353s Hardware version: 2.6 353s Firmware version: 2.6 353s Token present: yes 353s Token info: 353s Manufacturer ID: SoftHSM project 353s Model: SoftHSM v2 353s Hardware version: 2.6 353s Firmware version: 2.6 353s Serial number: 0510fdfe38337ae0 353s Initialized: yes 353s User PIN init.: yes 353s Label: Test Organization Interme Token 353s Slot 1 353s Slot info: 353s Description: SoftHSM slot ID 0x1 353s Manufacturer ID: SoftHSM project 353s Hardware version: 2.6 353s Firmware version: 2.6 353s Token present: yes 353s Token info: 353s Manufacturer ID: SoftHSM project 353s Model: SoftHSM v2 353s Hardware version: 2.6 353s Firmware version: 2.6 353s Serial number: 353s Initialized: no 353s User PIN init.: no 353s Label: 353s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-27789 -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 353s writing RSA key 353s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 353s + rm /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 353s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 353s Object 0: 353s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0510fdfe38337ae0;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 353s Type: X.509 Certificate (RSA-1024) 353s Expires: Thu Jan 15 02:47:09 2026 353s Label: Test Organization Intermediate Trusted Certificate 0001 353s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 353s 353s Test Organization Interme Token 353s + echo 'Test Organization Interme Token' 353s + '[' -n '' ']' 353s + local output_base_name=SSSD-child-24592 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-24592.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-24592.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/dev/null 353s [p11_child[2266]] [main] (0x0400): p11_child started. 353s [p11_child[2266]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2266]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2266]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2266]] [init_verification] (0x0040): X509_LOOKUP_load_file [/dev/null] failed [92274824][error:05800088:x509 certificate routines::no certificate or crl found]. 353s [p11_child[2266]] [do_work] (0x0040): init_verification failed. 353s [p11_child[2266]] [main] (0x0020): p11_child failed (5) 353s + return 2 353s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /dev/null no_verification 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /dev/null no_verification 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_ring=/dev/null 353s + local verify_option=no_verification 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Interme Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Interme Token' 353s + '[' -n no_verification ']' 353s + local verify_arg=--verify=no_verification 353s + local output_base_name=SSSD-child-4692 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=no_verification --ca_db=/dev/null 353s Test Organization Interme Token 353s [p11_child[2272]] [main] (0x0400): p11_child started. 353s [p11_child[2272]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2272]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2272]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2272]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 353s [p11_child[2272]] [do_card] (0x4000): Module List: 353s [p11_child[2272]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2272]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2272]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2272]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2272]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2272]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2272]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2272]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2272]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x38337ae0;slot-manufacturer=SoftHSM%20project;slot-id=942897888;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0510fdfe38337ae0;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2272]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 4 (0x4) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:f5:f7:76:ea:29:0c:f3:08:c3:65:6a:41:8a:cd: 353s 62:d3:db:9b:9c:6b:c5:ba:ca:df:0e:1b:fb:e8:aa: 353s 5e:10:0a:9e:19:70:be:f6:7a:7f:d7:70:a4:d7:e8: 353s 1b:ab:42:12:05:62:94:68:67:7c:e3:32:e6:0e:db: 353s e8:bd:f9:02:8e:fc:8d:a7:3b:12:3c:bf:55:97:19: 353s 82:fb:6e:9e:21:de:58:ea:ac:42:08:e7:52:8c:bb: 353s 3d:82:3d:5a:31:02:32:92:b6:15:74:f8:9f:2a:c6: 353s 31:a9:3e:e3:4e:9e:f3:5d:a2:ab:5f:2c:37:d3:73: 353s 13:8d:a8:d9:20:95:9d:db:b1 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Intermediate CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s cc:75:2c:09:fe:42:94:40:7d:0c:e8:8c:e6:06:cf:0a:42:d7: 353s 00:f8:b0:6a:a7:50:84:e9:e3:68:b4:0a:79:d7:b9:d3:be:e7: 353s a7:2b:bb:ed:c7:6a:c9:74:2d:b6:88:2c:71:df:70:c2:8d:ec: 353s f4:b9:17:d7:c2:25:c3:73:6a:bc:cf:b5:d3:a8:16:ba:db:bf: 353s a1:b1:2b:56:83:44:84:b8:dd:b5:68:7d:dc:bc:c4:43:c2:c4: 353s d4:b3:d8:c1:28:5e:95:77:0f:52:d7:81:7b:9b:d5:66:11:f2: 353s f6:e9:b4:d8:ab:a7:90:5e:20:8b:e3:22:33:20:64:be:a6:39: 353s 3f:5c 353s + local found_md5 expected_md5 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + expected_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692.pem 353s + found_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s + '[' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 '!=' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 ']' 353s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692-auth.output 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692-auth.output .output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692-auth.pem 353s + echo -n 053350 353s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/dev/null --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=no_verification --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 353s [p11_child[2280]] [main] (0x0400): p11_child started. 353s [p11_child[2280]] [main] (0x2000): Running in [auth] mode. 353s [p11_child[2280]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2280]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2280]] [parse_cert_verify_opts] (0x0020): Found 'no_verification' option, disabling verification completely. This should not be used in production. 353s [p11_child[2280]] [do_card] (0x4000): Module List: 353s [p11_child[2280]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2280]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2280]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2280]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2280]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2280]] [do_card] (0x4000): Login required. 353s [p11_child[2280]] [do_card] (0x4000): Token flags [1069]. 353s [p11_child[2280]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2280]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2280]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x38337ae0;slot-manufacturer=SoftHSM%20project;slot-id=942897888;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0510fdfe38337ae0;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 353s [p11_child[2280]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 353s [p11_child[2280]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 353s [p11_child[2280]] [do_card] (0x4000): Certificate verified and validated. 353s [p11_child[2280]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692-auth.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692-auth.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692-auth.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 4 (0x4) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:f5:f7:76:ea:29:0c:f3:08:c3:65:6a:41:8a:cd: 353s 62:d3:db:9b:9c:6b:c5:ba:ca:df:0e:1b:fb:e8:aa: 353s 5e:10:0a:9e:19:70:be:f6:7a:7f:d7:70:a4:d7:e8: 353s 1b:ab:42:12:05:62:94:68:67:7c:e3:32:e6:0e:db: 353s e8:bd:f9:02:8e:fc:8d:a7:3b:12:3c:bf:55:97:19: 353s 82:fb:6e:9e:21:de:58:ea:ac:42:08:e7:52:8c:bb: 353s 3d:82:3d:5a:31:02:32:92:b6:15:74:f8:9f:2a:c6: 353s 31:a9:3e:e3:4e:9e:f3:5d:a2:ab:5f:2c:37:d3:73: 353s 13:8d:a8:d9:20:95:9d:db:b1 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Intermediate CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s cc:75:2c:09:fe:42:94:40:7d:0c:e8:8c:e6:06:cf:0a:42:d7: 353s 00:f8:b0:6a:a7:50:84:e9:e3:68:b4:0a:79:d7:b9:d3:be:e7: 353s a7:2b:bb:ed:c7:6a:c9:74:2d:b6:88:2c:71:df:70:c2:8d:ec: 353s f4:b9:17:d7:c2:25:c3:73:6a:bc:cf:b5:d3:a8:16:ba:db:bf: 353s a1:b1:2b:56:83:44:84:b8:dd:b5:68:7d:dc:bc:c4:43:c2:c4: 353s d4:b3:d8:c1:28:5e:95:77:0f:52:d7:81:7b:9b:d5:66:11:f2: 353s f6:e9:b4:d8:ab:a7:90:5e:20:8b:e3:22:33:20:64:be:a6:39: 353s 3f:5c 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4692-auth.pem 353s + found_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s + '[' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 '!=' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 ']' 353s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s + local verify_option= 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Interme Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Interme Token' 353s + '[' -n '' ']' 353s Test Organization Interme Token 353s + local output_base_name=SSSD-child-18502 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-18502.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-18502.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s [p11_child[2290]] [main] (0x0400): p11_child started. 353s [p11_child[2290]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2290]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2290]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2290]] [do_card] (0x4000): Module List: 353s [p11_child[2290]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2290]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2290]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2290]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2290]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2290]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2290]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2290]] [do_verification] (0x0040): X509_verify_cert failed [0]. 353s [p11_child[2290]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 353s [p11_child[2290]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 353s [p11_child[2290]] [do_card] (0x4000): No certificate found. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-18502.output 353s + return 2 353s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem partial_chain 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem partial_chain 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s + local verify_option=partial_chain 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Interme Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Interme Token' 353s Test Organization Interme Token 353s + '[' -n partial_chain ']' 353s + local verify_arg=--verify=partial_chain 353s + local output_base_name=SSSD-child-25765 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25765.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25765.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s [p11_child[2297]] [main] (0x0400): p11_child started. 353s [p11_child[2297]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2297]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2297]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2297]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2297]] [do_card] (0x4000): Module List: 353s [p11_child[2297]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2297]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2297]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2297]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2297]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2297]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2297]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2297]] [do_verification] (0x0040): X509_verify_cert failed [0]. 353s [p11_child[2297]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 353s [p11_child[2297]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 353s [p11_child[2297]] [do_card] (0x4000): No certificate found. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25765.output 353s + return 2 353s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + local verify_option= 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Interme Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Interme Token' 353s + '[' -n '' ']' 353s + local output_base_name=SSSD-child-14724 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s Test Organization Interme Token 353s [p11_child[2304]] [main] (0x0400): p11_child started. 353s [p11_child[2304]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2304]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2304]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2304]] [do_card] (0x4000): Module List: 353s [p11_child[2304]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2304]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2304]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2304]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2304]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2304]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2304]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2304]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2304]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2304]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x38337ae0;slot-manufacturer=SoftHSM%20project;slot-id=942897888;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0510fdfe38337ae0;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2304]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 4 (0x4) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:f5:f7:76:ea:29:0c:f3:08:c3:65:6a:41:8a:cd: 353s 62:d3:db:9b:9c:6b:c5:ba:ca:df:0e:1b:fb:e8:aa: 353s 5e:10:0a:9e:19:70:be:f6:7a:7f:d7:70:a4:d7:e8: 353s 1b:ab:42:12:05:62:94:68:67:7c:e3:32:e6:0e:db: 353s e8:bd:f9:02:8e:fc:8d:a7:3b:12:3c:bf:55:97:19: 353s 82:fb:6e:9e:21:de:58:ea:ac:42:08:e7:52:8c:bb: 353s 3d:82:3d:5a:31:02:32:92:b6:15:74:f8:9f:2a:c6: 353s 31:a9:3e:e3:4e:9e:f3:5d:a2:ab:5f:2c:37:d3:73: 353s 13:8d:a8:d9:20:95:9d:db:b1 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Intermediate CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s cc:75:2c:09:fe:42:94:40:7d:0c:e8:8c:e6:06:cf:0a:42:d7: 353s 00:f8:b0:6a:a7:50:84:e9:e3:68:b4:0a:79:d7:b9:d3:be:e7: 353s a7:2b:bb:ed:c7:6a:c9:74:2d:b6:88:2c:71:df:70:c2:8d:ec: 353s f4:b9:17:d7:c2:25:c3:73:6a:bc:cf:b5:d3:a8:16:ba:db:bf: 353s a1:b1:2b:56:83:44:84:b8:dd:b5:68:7d:dc:bc:c4:43:c2:c4: 353s d4:b3:d8:c1:28:5e:95:77:0f:52:d7:81:7b:9b:d5:66:11:f2: 353s f6:e9:b4:d8:ab:a7:90:5e:20:8b:e3:22:33:20:64:be:a6:39: 353s 3f:5c 353s + local found_md5 expected_md5 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + expected_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724.pem 353s + found_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s + '[' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 '!=' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 ']' 353s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724-auth.output 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724-auth.output .output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724-auth.pem 353s + echo -n 053350 353s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 353s [p11_child[2312]] [main] (0x0400): p11_child started. 353s [p11_child[2312]] [main] (0x2000): Running in [auth] mode. 353s [p11_child[2312]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2312]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2312]] [do_card] (0x4000): Module List: 353s [p11_child[2312]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2312]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2312]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2312]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2312]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2312]] [do_card] (0x4000): Login required. 353s [p11_child[2312]] [do_card] (0x4000): Token flags [1069]. 353s [p11_child[2312]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2312]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2312]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2312]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x38337ae0;slot-manufacturer=SoftHSM%20project;slot-id=942897888;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0510fdfe38337ae0;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 353s [p11_child[2312]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 353s [p11_child[2312]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 353s [p11_child[2312]] [do_card] (0x4000): Certificate verified and validated. 353s [p11_child[2312]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724-auth.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724-auth.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724-auth.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 4 (0x4) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:f5:f7:76:ea:29:0c:f3:08:c3:65:6a:41:8a:cd: 353s 62:d3:db:9b:9c:6b:c5:ba:ca:df:0e:1b:fb:e8:aa: 353s 5e:10:0a:9e:19:70:be:f6:7a:7f:d7:70:a4:d7:e8: 353s 1b:ab:42:12:05:62:94:68:67:7c:e3:32:e6:0e:db: 353s e8:bd:f9:02:8e:fc:8d:a7:3b:12:3c:bf:55:97:19: 353s 82:fb:6e:9e:21:de:58:ea:ac:42:08:e7:52:8c:bb: 353s 3d:82:3d:5a:31:02:32:92:b6:15:74:f8:9f:2a:c6: 353s 31:a9:3e:e3:4e:9e:f3:5d:a2:ab:5f:2c:37:d3:73: 353s 13:8d:a8:d9:20:95:9d:db:b1 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Intermediate CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s cc:75:2c:09:fe:42:94:40:7d:0c:e8:8c:e6:06:cf:0a:42:d7: 353s 00:f8:b0:6a:a7:50:84:e9:e3:68:b4:0a:79:d7:b9:d3:be:e7: 353s a7:2b:bb:ed:c7:6a:c9:74:2d:b6:88:2c:71:df:70:c2:8d:ec: 353s f4:b9:17:d7:c2:25:c3:73:6a:bc:cf:b5:d3:a8:16:ba:db:bf: 353s a1:b1:2b:56:83:44:84:b8:dd:b5:68:7d:dc:bc:c4:43:c2:c4: 353s d4:b3:d8:c1:28:5e:95:77:0f:52:d7:81:7b:9b:d5:66:11:f2: 353s f6:e9:b4:d8:ab:a7:90:5e:20:8b:e3:22:33:20:64:be:a6:39: 353s 3f:5c 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-14724-auth.pem 353s + found_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s + '[' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 '!=' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 ']' 353s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem partial_chain 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem partial_chain 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + local verify_option=partial_chain 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Interme Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Interme Token' 353s + '[' -n partial_chain ']' 353s + local verify_arg=--verify=partial_chain 353s + local output_base_name=SSSD-child-25630 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s Test Organization Interme Token 353s [p11_child[2322]] [main] (0x0400): p11_child started. 353s [p11_child[2322]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2322]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2322]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2322]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2322]] [do_card] (0x4000): Module List: 353s [p11_child[2322]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2322]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2322]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2322]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2322]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2322]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2322]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2322]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2322]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2322]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x38337ae0;slot-manufacturer=SoftHSM%20project;slot-id=942897888;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0510fdfe38337ae0;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2322]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 4 (0x4) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:f5:f7:76:ea:29:0c:f3:08:c3:65:6a:41:8a:cd: 353s 62:d3:db:9b:9c:6b:c5:ba:ca:df:0e:1b:fb:e8:aa: 353s 5e:10:0a:9e:19:70:be:f6:7a:7f:d7:70:a4:d7:e8: 353s 1b:ab:42:12:05:62:94:68:67:7c:e3:32:e6:0e:db: 353s e8:bd:f9:02:8e:fc:8d:a7:3b:12:3c:bf:55:97:19: 353s 82:fb:6e:9e:21:de:58:ea:ac:42:08:e7:52:8c:bb: 353s 3d:82:3d:5a:31:02:32:92:b6:15:74:f8:9f:2a:c6: 353s 31:a9:3e:e3:4e:9e:f3:5d:a2:ab:5f:2c:37:d3:73: 353s 13:8d:a8:d9:20:95:9d:db:b1 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Intermediate CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s cc:75:2c:09:fe:42:94:40:7d:0c:e8:8c:e6:06:cf:0a:42:d7: 353s 00:f8:b0:6a:a7:50:84:e9:e3:68:b4:0a:79:d7:b9:d3:be:e7: 353s a7:2b:bb:ed:c7:6a:c9:74:2d:b6:88:2c:71:df:70:c2:8d:ec: 353s f4:b9:17:d7:c2:25:c3:73:6a:bc:cf:b5:d3:a8:16:ba:db:bf: 353s a1:b1:2b:56:83:44:84:b8:dd:b5:68:7d:dc:bc:c4:43:c2:c4: 353s d4:b3:d8:c1:28:5e:95:77:0f:52:d7:81:7b:9b:d5:66:11:f2: 353s f6:e9:b4:d8:ab:a7:90:5e:20:8b:e3:22:33:20:64:be:a6:39: 353s 3f:5c 353s + local found_md5 expected_md5 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + expected_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630.pem 353s + found_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s + '[' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 '!=' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 ']' 353s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630-auth.output 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630-auth.output .output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630-auth.pem 353s + echo -n 053350 353s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 353s [p11_child[2330]] [main] (0x0400): p11_child started. 353s [p11_child[2330]] [main] (0x2000): Running in [auth] mode. 353s [p11_child[2330]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2330]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2330]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2330]] [do_card] (0x4000): Module List: 353s [p11_child[2330]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2330]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2330]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2330]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2330]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2330]] [do_card] (0x4000): Login required. 353s [p11_child[2330]] [do_card] (0x4000): Token flags [1069]. 353s [p11_child[2330]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2330]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2330]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2330]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x38337ae0;slot-manufacturer=SoftHSM%20project;slot-id=942897888;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0510fdfe38337ae0;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 353s [p11_child[2330]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 353s [p11_child[2330]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 353s [p11_child[2330]] [do_card] (0x4000): Certificate verified and validated. 353s [p11_child[2330]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630-auth.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630-auth.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630-auth.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 4 (0x4) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:f5:f7:76:ea:29:0c:f3:08:c3:65:6a:41:8a:cd: 353s 62:d3:db:9b:9c:6b:c5:ba:ca:df:0e:1b:fb:e8:aa: 353s 5e:10:0a:9e:19:70:be:f6:7a:7f:d7:70:a4:d7:e8: 353s 1b:ab:42:12:05:62:94:68:67:7c:e3:32:e6:0e:db: 353s e8:bd:f9:02:8e:fc:8d:a7:3b:12:3c:bf:55:97:19: 353s 82:fb:6e:9e:21:de:58:ea:ac:42:08:e7:52:8c:bb: 353s 3d:82:3d:5a:31:02:32:92:b6:15:74:f8:9f:2a:c6: 353s 31:a9:3e:e3:4e:9e:f3:5d:a2:ab:5f:2c:37:d3:73: 353s 13:8d:a8:d9:20:95:9d:db:b1 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Intermediate CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s cc:75:2c:09:fe:42:94:40:7d:0c:e8:8c:e6:06:cf:0a:42:d7: 353s 00:f8:b0:6a:a7:50:84:e9:e3:68:b4:0a:79:d7:b9:d3:be:e7: 353s a7:2b:bb:ed:c7:6a:c9:74:2d:b6:88:2c:71:df:70:c2:8d:ec: 353s f4:b9:17:d7:c2:25:c3:73:6a:bc:cf:b5:d3:a8:16:ba:db:bf: 353s a1:b1:2b:56:83:44:84:b8:dd:b5:68:7d:dc:bc:c4:43:c2:c4: 353s d4:b3:d8:c1:28:5e:95:77:0f:52:d7:81:7b:9b:d5:66:11:f2: 353s f6:e9:b4:d8:ab:a7:90:5e:20:8b:e3:22:33:20:64:be:a6:39: 353s 3f:5c 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-25630-auth.pem 353s + found_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s + '[' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 '!=' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 ']' 353s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s + local verify_option= 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Interme Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 353s Test Organization Interme Token 353s + echo 'Test Organization Interme Token' 353s + '[' -n '' ']' 353s + local output_base_name=SSSD-child-13899 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-13899.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-13899.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s [p11_child[2340]] [main] (0x0400): p11_child started. 353s [p11_child[2340]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2340]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2340]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2340]] [do_card] (0x4000): Module List: 353s [p11_child[2340]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2340]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2340]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2340]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2340]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2340]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2340]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2340]] [do_verification] (0x0040): X509_verify_cert failed [0]. 353s [p11_child[2340]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 353s [p11_child[2340]] [read_certs] (0x0040): Certificate [Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] not valid, skipping. 353s [p11_child[2340]] [do_card] (0x4000): No certificate found. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-13899.output 353s + return 2 353s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem partial_chain 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem partial_chain 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s + local verify_option=partial_chain 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-27789 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Interme Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-intermediate-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Interme Token' 353s + '[' -n partial_chain ']' 353s + local verify_arg=--verify=partial_chain 353s + local output_base_name=SSSD-child-30407 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem 353s Test Organization Interme Token 353s [p11_child[2347]] [main] (0x0400): p11_child started. 353s [p11_child[2347]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2347]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2347]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2347]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2347]] [do_card] (0x4000): Module List: 353s [p11_child[2347]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2347]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2347]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2347]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2347]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2347]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2347]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2347]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2347]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Interme Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2347]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x38337ae0;slot-manufacturer=SoftHSM%20project;slot-id=942897888;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0510fdfe38337ae0;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2347]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407.pem 353s + local found_md5 expected_md5 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA-trusted-certificate-0001.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 4 (0x4) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:f5:f7:76:ea:29:0c:f3:08:c3:65:6a:41:8a:cd: 353s 62:d3:db:9b:9c:6b:c5:ba:ca:df:0e:1b:fb:e8:aa: 353s 5e:10:0a:9e:19:70:be:f6:7a:7f:d7:70:a4:d7:e8: 353s 1b:ab:42:12:05:62:94:68:67:7c:e3:32:e6:0e:db: 353s e8:bd:f9:02:8e:fc:8d:a7:3b:12:3c:bf:55:97:19: 353s 82:fb:6e:9e:21:de:58:ea:ac:42:08:e7:52:8c:bb: 353s 3d:82:3d:5a:31:02:32:92:b6:15:74:f8:9f:2a:c6: 353s 31:a9:3e:e3:4e:9e:f3:5d:a2:ab:5f:2c:37:d3:73: 353s 13:8d:a8:d9:20:95:9d:db:b1 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Intermediate CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s cc:75:2c:09:fe:42:94:40:7d:0c:e8:8c:e6:06:cf:0a:42:d7: 353s 00:f8:b0:6a:a7:50:84:e9:e3:68:b4:0a:79:d7:b9:d3:be:e7: 353s a7:2b:bb:ed:c7:6a:c9:74:2d:b6:88:2c:71:df:70:c2:8d:ec: 353s f4:b9:17:d7:c2:25:c3:73:6a:bc:cf:b5:d3:a8:16:ba:db:bf: 353s a1:b1:2b:56:83:44:84:b8:dd:b5:68:7d:dc:bc:c4:43:c2:c4: 353s d4:b3:d8:c1:28:5e:95:77:0f:52:d7:81:7b:9b:d5:66:11:f2: 353s f6:e9:b4:d8:ab:a7:90:5e:20:8b:e3:22:33:20:64:be:a6:39: 353s 3f:5c 353s + expected_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407.pem 353s + found_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s + '[' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 '!=' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 ']' 353s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407-auth.output 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407-auth.output .output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407-auth.pem 353s + echo -n 053350 353s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Interme Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 353s [p11_child[2355]] [main] (0x0400): p11_child started. 353s [p11_child[2355]] [main] (0x2000): Running in [auth] mode. 353s [p11_child[2355]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2355]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2355]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2355]] [do_card] (0x4000): Module List: 353s [p11_child[2355]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2355]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2355]] [do_card] (0x4000): Description [SoftHSM slot ID 0x38337ae0] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2355]] [do_card] (0x4000): Token label [Test Organization Interme Token]. 353s [p11_child[2355]] [do_card] (0x4000): Found [Test Organization Interme Token] in slot [SoftHSM slot ID 0x38337ae0][942897888] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2355]] [do_card] (0x4000): Login required. 353s [p11_child[2355]] [do_card] (0x4000): Token flags [1069]. 353s [p11_child[2355]] [read_certs] (0x4000): found cert[Test Organization Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Intermediate Trusted Certificate 0001] 353s [p11_child[2355]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2355]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Interme Token Test Organization Interme Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2355]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x38337ae0;slot-manufacturer=SoftHSM%20project;slot-id=942897888;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0510fdfe38337ae0;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 353s [p11_child[2355]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 353s [p11_child[2355]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 353s [p11_child[2355]] [do_card] (0x4000): Certificate verified and validated. 353s [p11_child[2355]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407-auth.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407-auth.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407-auth.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 4 (0x4) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:f5:f7:76:ea:29:0c:f3:08:c3:65:6a:41:8a:cd: 353s 62:d3:db:9b:9c:6b:c5:ba:ca:df:0e:1b:fb:e8:aa: 353s 5e:10:0a:9e:19:70:be:f6:7a:7f:d7:70:a4:d7:e8: 353s 1b:ab:42:12:05:62:94:68:67:7c:e3:32:e6:0e:db: 353s e8:bd:f9:02:8e:fc:8d:a7:3b:12:3c:bf:55:97:19: 353s 82:fb:6e:9e:21:de:58:ea:ac:42:08:e7:52:8c:bb: 353s 3d:82:3d:5a:31:02:32:92:b6:15:74:f8:9f:2a:c6: 353s 31:a9:3e:e3:4e:9e:f3:5d:a2:ab:5f:2c:37:d3:73: 353s 13:8d:a8:d9:20:95:9d:db:b1 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 29:9C:F9:BB:11:CC:72:2C:B6:DB:22:68:E8:E5:4B:B9:C3:EA:03:C2 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Intermediate CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s EA:58:EC:53:DC:BF:94:B8:07:ED:6C:4E:D4:10:82:DF:59:50:80:E4 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s cc:75:2c:09:fe:42:94:40:7d:0c:e8:8c:e6:06:cf:0a:42:d7: 353s 00:f8:b0:6a:a7:50:84:e9:e3:68:b4:0a:79:d7:b9:d3:be:e7: 353s a7:2b:bb:ed:c7:6a:c9:74:2d:b6:88:2c:71:df:70:c2:8d:ec: 353s f4:b9:17:d7:c2:25:c3:73:6a:bc:cf:b5:d3:a8:16:ba:db:bf: 353s a1:b1:2b:56:83:44:84:b8:dd:b5:68:7d:dc:bc:c4:43:c2:c4: 353s d4:b3:d8:c1:28:5e:95:77:0f:52:d7:81:7b:9b:d5:66:11:f2: 353s f6:e9:b4:d8:ab:a7:90:5e:20:8b:e3:22:33:20:64:be:a6:39: 353s 3f:5c 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-30407-auth.pem 353s + found_md5=Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 353s + '[' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 '!=' Modulus=F5F776EA290CF308C3656A418ACD62D3DB9B9C6BC5BACADF0E1BFBE8AA5E100A9E1970BEF67A7FD770A4D7E81BAB421205629468677CE332E60EDBE8BDF9028EFC8DA73B123CBF55971982FB6E9E21DE58EAAC4208E7528CBB3D823D5A31023292B61574F89F2AC631A93EE34E9EF35DA2AB5F2C37D373138DA8D920959DDBB1 ']' 353s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s + local verify_option= 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Sub Int Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 353s + local key_file 353s + local decrypted_key 353s + mkdir -p /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 353s + key_file=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 353s + decrypted_key=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 353s + cat 353s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 053350 --so-pin 053350 --free 353s Slot 0 has a free/uninitialized token. 353s The token has been initialized and is reassigned to slot 1948516805 353s + softhsm2-util --show-slots 353s Available slots: 353s Slot 1948516805 353s Slot info: 353s Description: SoftHSM slot ID 0x742401c5 353s Manufacturer ID: SoftHSM project 353s Hardware version: 2.6 353s Firmware version: 2.6 353s Token present: yes 353s Token info: 353s Manufacturer ID: SoftHSM project 353s Model: SoftHSM v2 353s Hardware version: 2.6 353s Firmware version: 2.6 353s Serial number: 5c792353742401c5 353s Initialized: yes 353s User PIN init.: yes 353s Label: Test Organization Sub Int Token 353s Slot 1 353s Slot info: 353s Description: SoftHSM slot ID 0x1 353s Manufacturer ID: SoftHSM project 353s Hardware version: 2.6 353s Firmware version: 2.6 353s Token present: yes 353s Token info: 353s Manufacturer ID: SoftHSM project 353s Model: SoftHSM v2 353s Hardware version: 2.6 353s Firmware version: 2.6 353s Serial number: 353s Initialized: no 353s User PIN init.: no 353s Label: 353s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 353s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-17618 -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 353s writing RSA key 353s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=053350 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 353s + rm /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 353s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 353s Object 0: 353s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5c792353742401c5;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 353s Type: X.509 Certificate (RSA-1024) 353s Expires: Thu Jan 15 02:47:09 2026 353s Label: Test Organization Sub Intermediate Trusted Certificate 0001 353s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 353s 353s Test Organization Sub Int Token 353s + echo 'Test Organization Sub Int Token' 353s + '[' -n '' ']' 353s + local output_base_name=SSSD-child-21702 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-21702.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-21702.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s [p11_child[2374]] [main] (0x0400): p11_child started. 353s [p11_child[2374]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2374]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2374]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2374]] [do_card] (0x4000): Module List: 353s [p11_child[2374]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2374]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2374]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2374]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 353s [p11_child[2374]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2374]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2374]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 353s [p11_child[2374]] [do_verification] (0x0040): X509_verify_cert failed [0]. 353s [p11_child[2374]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 353s [p11_child[2374]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 353s [p11_child[2374]] [do_card] (0x4000): No certificate found. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-21702.output 353s + return 2 353s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem partial_chain 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem partial_chain 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s + local verify_option=partial_chain 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 353s Test Organization Sub Int Token 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Sub Int Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Sub Int Token' 353s + '[' -n partial_chain ']' 353s + local verify_arg=--verify=partial_chain 353s + local output_base_name=SSSD-child-21006 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-21006.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-21006.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-root-CA.pem 353s [p11_child[2381]] [main] (0x0400): p11_child started. 353s [p11_child[2381]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2381]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2381]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2381]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 353s [p11_child[2381]] [do_card] (0x4000): Module List: 353s [p11_child[2381]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2381]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2381]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2381]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 353s [p11_child[2381]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2381]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2381]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 353s [p11_child[2381]] [do_verification] (0x0040): X509_verify_cert failed [0]. 353s [p11_child[2381]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 353s [p11_child[2381]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 353s [p11_child[2381]] [do_card] (0x4000): No certificate found. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-21006.output 353s + return 2 353s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 353s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s + local verify_option= 353s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 353s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 353s + local key_cn 353s + local key_name 353s + local tokens_dir 353s + local output_cert_file 353s + token_name= 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 353s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 353s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s ++ sed -n 's/ *commonName *= //p' 353s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 353s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 353s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 353s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 353s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 353s Test Organization Sub Int Token 353s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 353s + token_name='Test Organization Sub Int Token' 353s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 353s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 353s + echo 'Test Organization Sub Int Token' 353s + '[' -n '' ']' 353s + local output_base_name=SSSD-child-167 353s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167.output 353s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167.pem 353s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 353s [p11_child[2388]] [main] (0x0400): p11_child started. 353s [p11_child[2388]] [main] (0x2000): Running in [pre-auth] mode. 353s [p11_child[2388]] [main] (0x2000): Running with effective IDs: [0][0]. 353s [p11_child[2388]] [main] (0x2000): Running with real IDs [0][0]. 353s [p11_child[2388]] [do_card] (0x4000): Module List: 353s [p11_child[2388]] [do_card] (0x4000): common name: [softhsm2]. 353s [p11_child[2388]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2388]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 353s [p11_child[2388]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 353s [p11_child[2388]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 353s [p11_child[2388]] [do_card] (0x4000): Login NOT required. 353s [p11_child[2388]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 353s [p11_child[2388]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 353s [p11_child[2388]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 353s [p11_child[2388]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x742401c5;slot-manufacturer=SoftHSM%20project;slot-id=1948516805;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5c792353742401c5;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 353s [p11_child[2388]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 353s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167.output 353s + echo '-----BEGIN CERTIFICATE-----' 353s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167.output 353s + echo '-----END CERTIFICATE-----' 353s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167.pem 353s Certificate: 353s Data: 353s Version: 3 (0x2) 353s Serial Number: 5 (0x5) 353s Signature Algorithm: sha256WithRSAEncryption 353s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 353s Validity 353s Not Before: Jan 15 02:47:09 2025 GMT 353s Not After : Jan 15 02:47:09 2026 GMT 353s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 353s Subject Public Key Info: 353s Public Key Algorithm: rsaEncryption 353s Public-Key: (1024 bit) 353s Modulus: 353s 00:da:d0:bb:74:d3:43:f2:f3:b8:a9:72:c7:bf:13: 353s 88:2f:18:0e:56:64:ae:26:46:3e:6e:99:62:02:7e: 353s f4:b5:1b:ba:9e:eb:b7:7a:b0:fd:34:58:9d:e1:72: 353s 37:7e:cc:39:94:ce:87:a4:fb:32:09:17:97:bd:e7: 353s e9:04:f8:1f:4e:09:66:3e:86:f5:49:75:8b:4a:56: 353s 6b:2f:db:44:d2:e5:65:04:f4:22:19:96:86:be:5c: 353s 73:c1:30:c6:0d:6b:8a:01:8c:eb:d2:e2:29:8d:0f: 353s 57:e2:09:12:c8:6f:da:da:38:60:36:6c:fa:b0:6c: 353s de:b3:34:61:ac:71:17:5a:d3 353s Exponent: 65537 (0x10001) 353s X509v3 extensions: 353s X509v3 Authority Key Identifier: 353s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 353s X509v3 Basic Constraints: 353s CA:FALSE 353s Netscape Cert Type: 353s SSL Client, S/MIME 353s Netscape Comment: 353s Test Organization Sub Intermediate CA trusted Certificate 353s X509v3 Subject Key Identifier: 353s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 353s X509v3 Key Usage: critical 353s Digital Signature, Non Repudiation, Key Encipherment 353s X509v3 Extended Key Usage: 353s TLS Web Client Authentication, E-mail Protection 353s X509v3 Subject Alternative Name: 353s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 353s Signature Algorithm: sha256WithRSAEncryption 353s Signature Value: 353s 86:20:23:8b:00:cc:e0:57:97:47:3b:8c:07:8c:ff:02:3e:13: 353s 3b:1f:dc:70:5d:8e:68:77:2d:ff:4c:f5:c7:36:08:80:e1:42: 353s bc:05:14:6a:2b:49:3d:e6:d7:c5:12:39:e4:b8:ee:14:fb:1c: 353s ff:71:2b:e1:5e:e5:46:50:f0:d5:c9:ae:dc:84:bd:0a:0b:14: 353s a9:16:04:cb:a5:55:a7:4a:8a:eb:18:37:f3:84:ff:23:39:20: 353s 81:c6:be:c2:25:a3:82:f3:8a:c4:32:ae:ef:07:cb:ef:75:ff: 353s ff:1b:f3:97:7a:db:3c:37:2a:c8:40:ff:31:d8:fb:33:9e:74: 353s 19:84 353s + local found_md5 expected_md5 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 353s + expected_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 353s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167.pem 354s + found_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s + '[' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 '!=' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 ']' 354s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167-auth.output 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167-auth.output .output 354s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167-auth.pem 354s + echo -n 053350 354s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 '' --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 354s [p11_child[2396]] [main] (0x0400): p11_child started. 354s [p11_child[2396]] [main] (0x2000): Running in [auth] mode. 354s [p11_child[2396]] [main] (0x2000): Running with effective IDs: [0][0]. 354s [p11_child[2396]] [main] (0x2000): Running with real IDs [0][0]. 354s [p11_child[2396]] [do_card] (0x4000): Module List: 354s [p11_child[2396]] [do_card] (0x4000): common name: [softhsm2]. 354s [p11_child[2396]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2396]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 354s [p11_child[2396]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 354s [p11_child[2396]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2396]] [do_card] (0x4000): Login required. 354s [p11_child[2396]] [do_card] (0x4000): Token flags [1069]. 354s [p11_child[2396]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 354s [p11_child[2396]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 354s [p11_child[2396]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 354s [p11_child[2396]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x742401c5;slot-manufacturer=SoftHSM%20project;slot-id=1948516805;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5c792353742401c5;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 354s [p11_child[2396]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 354s [p11_child[2396]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 354s [p11_child[2396]] [do_card] (0x4000): Certificate verified and validated. 354s [p11_child[2396]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 354s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167-auth.output 354s + echo '-----BEGIN CERTIFICATE-----' 354s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167-auth.output 354s + echo '-----END CERTIFICATE-----' 354s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167-auth.pem 354s Certificate: 354s Data: 354s Version: 3 (0x2) 354s Serial Number: 5 (0x5) 354s Signature Algorithm: sha256WithRSAEncryption 354s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 354s Validity 354s Not Before: Jan 15 02:47:09 2025 GMT 354s Not After : Jan 15 02:47:09 2026 GMT 354s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 354s Subject Public Key Info: 354s Public Key Algorithm: rsaEncryption 354s Public-Key: (1024 bit) 354s Modulus: 354s 00:da:d0:bb:74:d3:43:f2:f3:b8:a9:72:c7:bf:13: 354s 88:2f:18:0e:56:64:ae:26:46:3e:6e:99:62:02:7e: 354s f4:b5:1b:ba:9e:eb:b7:7a:b0:fd:34:58:9d:e1:72: 354s 37:7e:cc:39:94:ce:87:a4:fb:32:09:17:97:bd:e7: 354s e9:04:f8:1f:4e:09:66:3e:86:f5:49:75:8b:4a:56: 354s 6b:2f:db:44:d2:e5:65:04:f4:22:19:96:86:be:5c: 354s 73:c1:30:c6:0d:6b:8a:01:8c:eb:d2:e2:29:8d:0f: 354s 57:e2:09:12:c8:6f:da:da:38:60:36:6c:fa:b0:6c: 354s de:b3:34:61:ac:71:17:5a:d3 354s Exponent: 65537 (0x10001) 354s X509v3 extensions: 354s X509v3 Authority Key Identifier: 354s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 354s X509v3 Basic Constraints: 354s CA:FALSE 354s Netscape Cert Type: 354s SSL Client, S/MIME 354s Netscape Comment: 354s Test Organization Sub Intermediate CA trusted Certificate 354s X509v3 Subject Key Identifier: 354s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 354s X509v3 Key Usage: critical 354s Digital Signature, Non Repudiation, Key Encipherment 354s X509v3 Extended Key Usage: 354s TLS Web Client Authentication, E-mail Protection 354s X509v3 Subject Alternative Name: 354s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 354s Signature Algorithm: sha256WithRSAEncryption 354s Signature Value: 354s 86:20:23:8b:00:cc:e0:57:97:47:3b:8c:07:8c:ff:02:3e:13: 354s 3b:1f:dc:70:5d:8e:68:77:2d:ff:4c:f5:c7:36:08:80:e1:42: 354s bc:05:14:6a:2b:49:3d:e6:d7:c5:12:39:e4:b8:ee:14:fb:1c: 354s ff:71:2b:e1:5e:e5:46:50:f0:d5:c9:ae:dc:84:bd:0a:0b:14: 354s a9:16:04:cb:a5:55:a7:4a:8a:eb:18:37:f3:84:ff:23:39:20: 354s 81:c6:be:c2:25:a3:82:f3:8a:c4:32:ae:ef:07:cb:ef:75:ff: 354s ff:1b:f3:97:7a:db:3c:37:2a:c8:40:ff:31:d8:fb:33:9e:74: 354s 19:84 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-167-auth.pem 354s + found_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s + '[' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 '!=' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 ']' 354s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem partial_chain 354s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem partial_chain 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 354s + local verify_option=partial_chain 354s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_cn 354s + local key_name 354s + local tokens_dir 354s + local output_cert_file 354s + token_name= 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 354s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 354s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s ++ sed -n 's/ *commonName *= //p' 354s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 354s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 354s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 354s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 354s + token_name='Test Organization Sub Int Token' 354s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 354s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 354s Test Organization Sub Int Token 354s + echo 'Test Organization Sub Int Token' 354s + '[' -n partial_chain ']' 354s + local verify_arg=--verify=partial_chain 354s + local output_base_name=SSSD-child-4979 354s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979.output 354s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979.pem 354s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem 354s [p11_child[2406]] [main] (0x0400): p11_child started. 354s [p11_child[2406]] [main] (0x2000): Running in [pre-auth] mode. 354s [p11_child[2406]] [main] (0x2000): Running with effective IDs: [0][0]. 354s [p11_child[2406]] [main] (0x2000): Running with real IDs [0][0]. 354s [p11_child[2406]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 354s [p11_child[2406]] [do_card] (0x4000): Module List: 354s [p11_child[2406]] [do_card] (0x4000): common name: [softhsm2]. 354s [p11_child[2406]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2406]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 354s [p11_child[2406]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 354s [p11_child[2406]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2406]] [do_card] (0x4000): Login NOT required. 354s [p11_child[2406]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 354s [p11_child[2406]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 354s [p11_child[2406]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 354s [p11_child[2406]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x742401c5;slot-manufacturer=SoftHSM%20project;slot-id=1948516805;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5c792353742401c5;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 354s [p11_child[2406]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 354s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979.output 354s + echo '-----BEGIN CERTIFICATE-----' 354s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979.output 354s + echo '-----END CERTIFICATE-----' 354s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979.pem 354s Certificate: 354s Data: 354s Version: 3 (0x2) 354s Serial Number: 5 (0x5) 354s Signature Algorithm: sha256WithRSAEncryption 354s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 354s Validity 354s Not Before: Jan 15 02:47:09 2025 GMT 354s Not After : Jan 15 02:47:09 2026 GMT 354s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 354s Subject Public Key Info: 354s Public Key Algorithm: rsaEncryption 354s Public-Key: (1024 bit) 354s Modulus: 354s 00:da:d0:bb:74:d3:43:f2:f3:b8:a9:72:c7:bf:13: 354s 88:2f:18:0e:56:64:ae:26:46:3e:6e:99:62:02:7e: 354s f4:b5:1b:ba:9e:eb:b7:7a:b0:fd:34:58:9d:e1:72: 354s 37:7e:cc:39:94:ce:87:a4:fb:32:09:17:97:bd:e7: 354s e9:04:f8:1f:4e:09:66:3e:86:f5:49:75:8b:4a:56: 354s 6b:2f:db:44:d2:e5:65:04:f4:22:19:96:86:be:5c: 354s 73:c1:30:c6:0d:6b:8a:01:8c:eb:d2:e2:29:8d:0f: 354s 57:e2:09:12:c8:6f:da:da:38:60:36:6c:fa:b0:6c: 354s de:b3:34:61:ac:71:17:5a:d3 354s Exponent: 65537 (0x10001) 354s X509v3 extensions: 354s X509v3 Authority Key Identifier: 354s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 354s X509v3 Basic Constraints: 354s CA:FALSE 354s Netscape Cert Type: 354s SSL Client, S/MIME 354s Netscape Comment: 354s Test Organization Sub Intermediate CA trusted Certificate 354s X509v3 Subject Key Identifier: 354s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 354s X509v3 Key Usage: critical 354s Digital Signature, Non Repudiation, Key Encipherment 354s X509v3 Extended Key Usage: 354s TLS Web Client Authentication, E-mail Protection 354s X509v3 Subject Alternative Name: 354s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 354s Signature Algorithm: sha256WithRSAEncryption 354s Signature Value: 354s 86:20:23:8b:00:cc:e0:57:97:47:3b:8c:07:8c:ff:02:3e:13: 354s 3b:1f:dc:70:5d:8e:68:77:2d:ff:4c:f5:c7:36:08:80:e1:42: 354s bc:05:14:6a:2b:49:3d:e6:d7:c5:12:39:e4:b8:ee:14:fb:1c: 354s ff:71:2b:e1:5e:e5:46:50:f0:d5:c9:ae:dc:84:bd:0a:0b:14: 354s a9:16:04:cb:a5:55:a7:4a:8a:eb:18:37:f3:84:ff:23:39:20: 354s 81:c6:be:c2:25:a3:82:f3:8a:c4:32:ae:ef:07:cb:ef:75:ff: 354s ff:1b:f3:97:7a:db:3c:37:2a:c8:40:ff:31:d8:fb:33:9e:74: 354s 19:84 354s + local found_md5 expected_md5 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + expected_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979.pem 354s + found_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s + '[' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 '!=' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 ']' 354s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979-auth.output 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979-auth.output .output 354s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979-auth.pem 354s + echo -n 053350 354s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-full-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 354s [p11_child[2414]] [main] (0x0400): p11_child started. 354s [p11_child[2414]] [main] (0x2000): Running in [auth] mode. 354s [p11_child[2414]] [main] (0x2000): Running with effective IDs: [0][0]. 354s [p11_child[2414]] [main] (0x2000): Running with real IDs [0][0]. 354s [p11_child[2414]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 354s [p11_child[2414]] [do_card] (0x4000): Module List: 354s [p11_child[2414]] [do_card] (0x4000): common name: [softhsm2]. 354s [p11_child[2414]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2414]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 354s [p11_child[2414]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 354s [p11_child[2414]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2414]] [do_card] (0x4000): Login required. 354s [p11_child[2414]] [do_card] (0x4000): Token flags [1069]. 354s [p11_child[2414]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 354s [p11_child[2414]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 354s [p11_child[2414]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 354s [p11_child[2414]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x742401c5;slot-manufacturer=SoftHSM%20project;slot-id=1948516805;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5c792353742401c5;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 354s [p11_child[2414]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 354s [p11_child[2414]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 354s [p11_child[2414]] [do_card] (0x4000): Certificate verified and validated. 354s [p11_child[2414]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 354s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979-auth.output 354s + echo '-----BEGIN CERTIFICATE-----' 354s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979-auth.output 354s + echo '-----END CERTIFICATE-----' 354s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979-auth.pem 354s Certificate: 354s Data: 354s Version: 3 (0x2) 354s Serial Number: 5 (0x5) 354s Signature Algorithm: sha256WithRSAEncryption 354s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 354s Validity 354s Not Before: Jan 15 02:47:09 2025 GMT 354s Not After : Jan 15 02:47:09 2026 GMT 354s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 354s Subject Public Key Info: 354s Public Key Algorithm: rsaEncryption 354s Public-Key: (1024 bit) 354s Modulus: 354s 00:da:d0:bb:74:d3:43:f2:f3:b8:a9:72:c7:bf:13: 354s 88:2f:18:0e:56:64:ae:26:46:3e:6e:99:62:02:7e: 354s f4:b5:1b:ba:9e:eb:b7:7a:b0:fd:34:58:9d:e1:72: 354s 37:7e:cc:39:94:ce:87:a4:fb:32:09:17:97:bd:e7: 354s e9:04:f8:1f:4e:09:66:3e:86:f5:49:75:8b:4a:56: 354s 6b:2f:db:44:d2:e5:65:04:f4:22:19:96:86:be:5c: 354s 73:c1:30:c6:0d:6b:8a:01:8c:eb:d2:e2:29:8d:0f: 354s 57:e2:09:12:c8:6f:da:da:38:60:36:6c:fa:b0:6c: 354s de:b3:34:61:ac:71:17:5a:d3 354s Exponent: 65537 (0x10001) 354s X509v3 extensions: 354s X509v3 Authority Key Identifier: 354s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 354s X509v3 Basic Constraints: 354s CA:FALSE 354s Netscape Cert Type: 354s SSL Client, S/MIME 354s Netscape Comment: 354s Test Organization Sub Intermediate CA trusted Certificate 354s X509v3 Subject Key Identifier: 354s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 354s X509v3 Key Usage: critical 354s Digital Signature, Non Repudiation, Key Encipherment 354s X509v3 Extended Key Usage: 354s TLS Web Client Authentication, E-mail Protection 354s X509v3 Subject Alternative Name: 354s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 354s Signature Algorithm: sha256WithRSAEncryption 354s Signature Value: 354s 86:20:23:8b:00:cc:e0:57:97:47:3b:8c:07:8c:ff:02:3e:13: 354s 3b:1f:dc:70:5d:8e:68:77:2d:ff:4c:f5:c7:36:08:80:e1:42: 354s bc:05:14:6a:2b:49:3d:e6:d7:c5:12:39:e4:b8:ee:14:fb:1c: 354s ff:71:2b:e1:5e:e5:46:50:f0:d5:c9:ae:dc:84:bd:0a:0b:14: 354s a9:16:04:cb:a5:55:a7:4a:8a:eb:18:37:f3:84:ff:23:39:20: 354s 81:c6:be:c2:25:a3:82:f3:8a:c4:32:ae:ef:07:cb:ef:75:ff: 354s ff:1b:f3:97:7a:db:3c:37:2a:c8:40:ff:31:d8:fb:33:9e:74: 354s 19:84 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-4979-auth.pem 354s + found_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s + '[' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 '!=' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 ']' 354s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 354s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 354s + local verify_option= 354s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_cn 354s + local key_name 354s + local tokens_dir 354s + local output_cert_file 354s + token_name= 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 354s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 354s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s ++ sed -n 's/ *commonName *= //p' 354s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 354s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 354s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 354s Test Organization Sub Int Token 354s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 354s + token_name='Test Organization Sub Int Token' 354s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 354s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 354s + echo 'Test Organization Sub Int Token' 354s + '[' -n '' ']' 354s + local output_base_name=SSSD-child-16165 354s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16165.output 354s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16165.pem 354s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so '' --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 354s [p11_child[2424]] [main] (0x0400): p11_child started. 354s [p11_child[2424]] [main] (0x2000): Running in [pre-auth] mode. 354s [p11_child[2424]] [main] (0x2000): Running with effective IDs: [0][0]. 354s [p11_child[2424]] [main] (0x2000): Running with real IDs [0][0]. 354s [p11_child[2424]] [do_card] (0x4000): Module List: 354s [p11_child[2424]] [do_card] (0x4000): common name: [softhsm2]. 354s [p11_child[2424]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2424]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 354s [p11_child[2424]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 354s [p11_child[2424]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2424]] [do_card] (0x4000): Login NOT required. 354s [p11_child[2424]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 354s [p11_child[2424]] [do_verification] (0x0040): X509_verify_cert failed [0]. 354s [p11_child[2424]] [do_verification] (0x0040): X509_verify_cert failed [2][unable to get issuer certificate]. 354s [p11_child[2424]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 354s [p11_child[2424]] [do_card] (0x4000): No certificate found. 354s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-16165.output 354s + return 2 354s + invalid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-root-intermediate-chain-CA.pem partial_chain 354s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-root-intermediate-chain-CA.pem partial_chain 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-root-intermediate-chain-CA.pem 354s + local verify_option=partial_chain 354s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_cn 354s + local key_name 354s + local tokens_dir 354s + local output_cert_file 354s + token_name= 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 354s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 354s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s ++ sed -n 's/ *commonName *= //p' 354s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 354s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 354s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 354s Test Organization Sub Int Token 354s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 354s + token_name='Test Organization Sub Int Token' 354s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 354s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 354s + echo 'Test Organization Sub Int Token' 354s + '[' -n partial_chain ']' 354s + local verify_arg=--verify=partial_chain 354s + local output_base_name=SSSD-child-5682 354s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-5682.output 354s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-5682.pem 354s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-root-intermediate-chain-CA.pem 354s [p11_child[2431]] [main] (0x0400): p11_child started. 354s [p11_child[2431]] [main] (0x2000): Running in [pre-auth] mode. 354s [p11_child[2431]] [main] (0x2000): Running with effective IDs: [0][0]. 354s [p11_child[2431]] [main] (0x2000): Running with real IDs [0][0]. 354s [p11_child[2431]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 354s [p11_child[2431]] [do_card] (0x4000): Module List: 354s [p11_child[2431]] [do_card] (0x4000): common name: [softhsm2]. 354s [p11_child[2431]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2431]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 354s [p11_child[2431]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 354s [p11_child[2431]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2431]] [do_card] (0x4000): Login NOT required. 354s [p11_child[2431]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 354s [p11_child[2431]] [do_verification] (0x0040): X509_verify_cert failed [0]. 354s [p11_child[2431]] [do_verification] (0x0040): X509_verify_cert failed [20][unable to get local issuer certificate]. 354s [p11_child[2431]] [read_certs] (0x0040): Certificate [Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] not valid, skipping. 354s [p11_child[2431]] [do_card] (0x4000): No certificate found. 354s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-5682.output 354s + return 2 354s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem partial_chain 354s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem partial_chain 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 354s + local verify_option=partial_chain 354s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_cn 354s + local key_name 354s + local tokens_dir 354s + local output_cert_file 354s + token_name= 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 354s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 354s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s ++ sed -n 's/ *commonName *= //p' 354s Test Organization Sub Int Token 354s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 354s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 354s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 354s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 354s + token_name='Test Organization Sub Int Token' 354s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 354s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 354s + echo 'Test Organization Sub Int Token' 354s + '[' -n partial_chain ']' 354s + local verify_arg=--verify=partial_chain 354s + local output_base_name=SSSD-child-29360 354s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360.output 354s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360.pem 354s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem 354s [p11_child[2438]] [main] (0x0400): p11_child started. 354s [p11_child[2438]] [main] (0x2000): Running in [pre-auth] mode. 354s [p11_child[2438]] [main] (0x2000): Running with effective IDs: [0][0]. 354s [p11_child[2438]] [main] (0x2000): Running with real IDs [0][0]. 354s [p11_child[2438]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 354s [p11_child[2438]] [do_card] (0x4000): Module List: 354s [p11_child[2438]] [do_card] (0x4000): common name: [softhsm2]. 354s [p11_child[2438]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2438]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 354s [p11_child[2438]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 354s [p11_child[2438]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2438]] [do_card] (0x4000): Login NOT required. 354s [p11_child[2438]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 354s [p11_child[2438]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 354s [p11_child[2438]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 354s [p11_child[2438]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x742401c5;slot-manufacturer=SoftHSM%20project;slot-id=1948516805;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5c792353742401c5;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 354s [p11_child[2438]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 354s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360.output 354s + echo '-----BEGIN CERTIFICATE-----' 354s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360.output 354s + echo '-----END CERTIFICATE-----' 354s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360.pem 354s Certificate: 354s Data: 354s Version: 3 (0x2) 354s Serial Number: 5 (0x5) 354s Signature Algorithm: sha256WithRSAEncryption 354s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 354s Validity 354s Not Before: Jan 15 02:47:09 2025 GMT 354s Not After : Jan 15 02:47:09 2026 GMT 354s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 354s Subject Public Key Info: 354s Public Key Algorithm: rsaEncryption 354s Public-Key: (1024 bit) 354s Modulus: 354s 00:da:d0:bb:74:d3:43:f2:f3:b8:a9:72:c7:bf:13: 354s 88:2f:18:0e:56:64:ae:26:46:3e:6e:99:62:02:7e: 354s f4:b5:1b:ba:9e:eb:b7:7a:b0:fd:34:58:9d:e1:72: 354s 37:7e:cc:39:94:ce:87:a4:fb:32:09:17:97:bd:e7: 354s e9:04:f8:1f:4e:09:66:3e:86:f5:49:75:8b:4a:56: 354s 6b:2f:db:44:d2:e5:65:04:f4:22:19:96:86:be:5c: 354s 73:c1:30:c6:0d:6b:8a:01:8c:eb:d2:e2:29:8d:0f: 354s 57:e2:09:12:c8:6f:da:da:38:60:36:6c:fa:b0:6c: 354s de:b3:34:61:ac:71:17:5a:d3 354s Exponent: 65537 (0x10001) 354s X509v3 extensions: 354s X509v3 Authority Key Identifier: 354s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 354s X509v3 Basic Constraints: 354s CA:FALSE 354s Netscape Cert Type: 354s SSL Client, S/MIME 354s Netscape Comment: 354s Test Organization Sub Intermediate CA trusted Certificate 354s X509v3 Subject Key Identifier: 354s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 354s X509v3 Key Usage: critical 354s Digital Signature, Non Repudiation, Key Encipherment 354s X509v3 Extended Key Usage: 354s TLS Web Client Authentication, E-mail Protection 354s X509v3 Subject Alternative Name: 354s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 354s Signature Algorithm: sha256WithRSAEncryption 354s Signature Value: 354s 86:20:23:8b:00:cc:e0:57:97:47:3b:8c:07:8c:ff:02:3e:13: 354s 3b:1f:dc:70:5d:8e:68:77:2d:ff:4c:f5:c7:36:08:80:e1:42: 354s bc:05:14:6a:2b:49:3d:e6:d7:c5:12:39:e4:b8:ee:14:fb:1c: 354s ff:71:2b:e1:5e:e5:46:50:f0:d5:c9:ae:dc:84:bd:0a:0b:14: 354s a9:16:04:cb:a5:55:a7:4a:8a:eb:18:37:f3:84:ff:23:39:20: 354s 81:c6:be:c2:25:a3:82:f3:8a:c4:32:ae:ef:07:cb:ef:75:ff: 354s ff:1b:f3:97:7a:db:3c:37:2a:c8:40:ff:31:d8:fb:33:9e:74: 354s 19:84 354s + local found_md5 expected_md5 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + expected_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360.pem 354s + found_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s + '[' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 '!=' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 ']' 354s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360-auth.output 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360-auth.output .output 354s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360-auth.pem 354s + echo -n 053350 354s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 354s [p11_child[2446]] [main] (0x0400): p11_child started. 354s [p11_child[2446]] [main] (0x2000): Running in [auth] mode. 354s [p11_child[2446]] [main] (0x2000): Running with effective IDs: [0][0]. 354s [p11_child[2446]] [main] (0x2000): Running with real IDs [0][0]. 354s [p11_child[2446]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 354s [p11_child[2446]] [do_card] (0x4000): Module List: 354s [p11_child[2446]] [do_card] (0x4000): common name: [softhsm2]. 354s [p11_child[2446]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2446]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 354s [p11_child[2446]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 354s [p11_child[2446]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2446]] [do_card] (0x4000): Login required. 354s [p11_child[2446]] [do_card] (0x4000): Token flags [1069]. 354s [p11_child[2446]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 354s [p11_child[2446]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 354s [p11_child[2446]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 354s [p11_child[2446]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x742401c5;slot-manufacturer=SoftHSM%20project;slot-id=1948516805;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5c792353742401c5;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 354s [p11_child[2446]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 354s [p11_child[2446]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 354s [p11_child[2446]] [do_card] (0x4000): Certificate verified and validated. 354s [p11_child[2446]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 354s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360-auth.output 354s + echo '-----BEGIN CERTIFICATE-----' 354s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360-auth.output 354s + echo '-----END CERTIFICATE-----' 354s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360-auth.pem 354s Certificate: 354s Data: 354s Version: 3 (0x2) 354s Serial Number: 5 (0x5) 354s Signature Algorithm: sha256WithRSAEncryption 354s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 354s Validity 354s Not Before: Jan 15 02:47:09 2025 GMT 354s Not After : Jan 15 02:47:09 2026 GMT 354s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 354s Subject Public Key Info: 354s Public Key Algorithm: rsaEncryption 354s Public-Key: (1024 bit) 354s Modulus: 354s 00:da:d0:bb:74:d3:43:f2:f3:b8:a9:72:c7:bf:13: 354s 88:2f:18:0e:56:64:ae:26:46:3e:6e:99:62:02:7e: 354s f4:b5:1b:ba:9e:eb:b7:7a:b0:fd:34:58:9d:e1:72: 354s 37:7e:cc:39:94:ce:87:a4:fb:32:09:17:97:bd:e7: 354s e9:04:f8:1f:4e:09:66:3e:86:f5:49:75:8b:4a:56: 354s 6b:2f:db:44:d2:e5:65:04:f4:22:19:96:86:be:5c: 354s 73:c1:30:c6:0d:6b:8a:01:8c:eb:d2:e2:29:8d:0f: 354s 57:e2:09:12:c8:6f:da:da:38:60:36:6c:fa:b0:6c: 354s de:b3:34:61:ac:71:17:5a:d3 354s Exponent: 65537 (0x10001) 354s X509v3 extensions: 354s X509v3 Authority Key Identifier: 354s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 354s X509v3 Basic Constraints: 354s CA:FALSE 354s Netscape Cert Type: 354s SSL Client, S/MIME 354s Netscape Comment: 354s Test Organization Sub Intermediate CA trusted Certificate 354s X509v3 Subject Key Identifier: 354s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 354s X509v3 Key Usage: critical 354s Digital Signature, Non Repudiation, Key Encipherment 354s X509v3 Extended Key Usage: 354s TLS Web Client Authentication, E-mail Protection 354s X509v3 Subject Alternative Name: 354s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 354s Signature Algorithm: sha256WithRSAEncryption 354s Signature Value: 354s 86:20:23:8b:00:cc:e0:57:97:47:3b:8c:07:8c:ff:02:3e:13: 354s 3b:1f:dc:70:5d:8e:68:77:2d:ff:4c:f5:c7:36:08:80:e1:42: 354s bc:05:14:6a:2b:49:3d:e6:d7:c5:12:39:e4:b8:ee:14:fb:1c: 354s ff:71:2b:e1:5e:e5:46:50:f0:d5:c9:ae:dc:84:bd:0a:0b:14: 354s a9:16:04:cb:a5:55:a7:4a:8a:eb:18:37:f3:84:ff:23:39:20: 354s 81:c6:be:c2:25:a3:82:f3:8a:c4:32:ae:ef:07:cb:ef:75:ff: 354s ff:1b:f3:97:7a:db:3c:37:2a:c8:40:ff:31:d8:fb:33:9e:74: 354s 19:84 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-29360-auth.pem 354s + found_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s + '[' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 '!=' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 ']' 354s + valid_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-sub-chain-CA.pem partial_chain 354s + check_certificate /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 /tmp/sssd-softhsm2-yZNZJ8/test-intermediate-sub-chain-CA.pem partial_chain 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_ring=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-sub-chain-CA.pem 354s + local verify_option=partial_chain 354s + prepare_softhsm2_card /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local certificate=/tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-17618 354s + local key_cn 354s + local key_name 354s + local tokens_dir 354s + local output_cert_file 354s + token_name= 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 354s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 354s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s ++ sed -n 's/ *commonName *= //p' 354s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 354s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 354s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 354s + tokens_dir=/tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 354s + token_name='Test Organization Sub Int Token' 354s + '[' '!' -e /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 354s + '[' '!' -d /tmp/sssd-softhsm2-yZNZJ8/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 ']' 354s + echo 'Test Organization Sub Int Token' 354s + '[' -n partial_chain ']' 354s + local verify_arg=--verify=partial_chain 354s Test Organization Sub Int Token 354s + local output_base_name=SSSD-child-15653 354s + local output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653.output 354s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653.pem 354s + /usr/libexec/sssd/p11_child --pre -d 10 --logger=stderr --debug-fd=2 --module_name=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --verify=partial_chain --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-sub-chain-CA.pem 354s [p11_child[2456]] [main] (0x0400): p11_child started. 354s [p11_child[2456]] [main] (0x2000): Running in [pre-auth] mode. 354s [p11_child[2456]] [main] (0x2000): Running with effective IDs: [0][0]. 354s [p11_child[2456]] [main] (0x2000): Running with real IDs [0][0]. 354s [p11_child[2456]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 354s [p11_child[2456]] [do_card] (0x4000): Module List: 354s [p11_child[2456]] [do_card] (0x4000): common name: [softhsm2]. 354s [p11_child[2456]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2456]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 354s [p11_child[2456]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 354s [p11_child[2456]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2456]] [do_card] (0x4000): Login NOT required. 354s [p11_child[2456]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 354s [p11_child[2456]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 354s [p11_child[2456]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so (null) Test Organization Sub Int Token (null) - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 354s [p11_child[2456]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x742401c5;slot-manufacturer=SoftHSM%20project;slot-id=1948516805;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5c792353742401c5;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 354s [p11_child[2456]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 354s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653.output 354s + echo '-----BEGIN CERTIFICATE-----' 354s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653.output 354s + echo '-----END CERTIFICATE-----' 354s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653.pem 354s Certificate: 354s Data: 354s Version: 3 (0x2) 354s Serial Number: 5 (0x5) 354s Signature Algorithm: sha256WithRSAEncryption 354s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 354s Validity 354s Not Before: Jan 15 02:47:09 2025 GMT 354s Not After : Jan 15 02:47:09 2026 GMT 354s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 354s Subject Public Key Info: 354s Public Key Algorithm: rsaEncryption 354s Public-Key: (1024 bit) 354s Modulus: 354s 00:da:d0:bb:74:d3:43:f2:f3:b8:a9:72:c7:bf:13: 354s 88:2f:18:0e:56:64:ae:26:46:3e:6e:99:62:02:7e: 354s f4:b5:1b:ba:9e:eb:b7:7a:b0:fd:34:58:9d:e1:72: 354s 37:7e:cc:39:94:ce:87:a4:fb:32:09:17:97:bd:e7: 354s e9:04:f8:1f:4e:09:66:3e:86:f5:49:75:8b:4a:56: 354s 6b:2f:db:44:d2:e5:65:04:f4:22:19:96:86:be:5c: 354s 73:c1:30:c6:0d:6b:8a:01:8c:eb:d2:e2:29:8d:0f: 354s 57:e2:09:12:c8:6f:da:da:38:60:36:6c:fa:b0:6c: 354s de:b3:34:61:ac:71:17:5a:d3 354s Exponent: 65537 (0x10001) 354s X509v3 extensions: 354s X509v3 Authority Key Identifier: 354s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 354s X509v3 Basic Constraints: 354s CA:FALSE 354s Netscape Cert Type: 354s SSL Client, S/MIME 354s Netscape Comment: 354s Test Organization Sub Intermediate CA trusted Certificate 354s X509v3 Subject Key Identifier: 354s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 354s X509v3 Key Usage: critical 354s Digital Signature, Non Repudiation, Key Encipherment 354s X509v3 Extended Key Usage: 354s TLS Web Client Authentication, E-mail Protection 354s X509v3 Subject Alternative Name: 354s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 354s Signature Algorithm: sha256WithRSAEncryption 354s Signature Value: 354s 86:20:23:8b:00:cc:e0:57:97:47:3b:8c:07:8c:ff:02:3e:13: 354s 3b:1f:dc:70:5d:8e:68:77:2d:ff:4c:f5:c7:36:08:80:e1:42: 354s bc:05:14:6a:2b:49:3d:e6:d7:c5:12:39:e4:b8:ee:14:fb:1c: 354s ff:71:2b:e1:5e:e5:46:50:f0:d5:c9:ae:dc:84:bd:0a:0b:14: 354s a9:16:04:cb:a5:55:a7:4a:8a:eb:18:37:f3:84:ff:23:39:20: 354s 81:c6:be:c2:25:a3:82:f3:8a:c4:32:ae:ef:07:cb:ef:75:ff: 354s ff:1b:f3:97:7a:db:3c:37:2a:c8:40:ff:31:d8:fb:33:9e:74: 354s 19:84 354s + local found_md5 expected_md5 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/test-sub-intermediate-CA-trusted-certificate-0001.pem 354s + expected_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653.pem 354s + found_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s + '[' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 '!=' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 ']' 354s + output_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653-auth.output 354s ++ basename /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653-auth.output .output 354s + output_cert_file=/tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653-auth.pem 354s + echo -n 053350 354s + /usr/libexec/sssd/p11_child --auth -d 10 --debug-fd=2 --ca_db=/tmp/sssd-softhsm2-yZNZJ8/test-intermediate-sub-chain-CA.pem --pin --key_id 00112233445566778899FFAABBCCDDEEFF012345 --verify=partial_chain --token_name 'Test Organization Sub Int Token' --module_name /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 354s [p11_child[2464]] [main] (0x0400): p11_child started. 354s [p11_child[2464]] [main] (0x2000): Running in [auth] mode. 354s [p11_child[2464]] [main] (0x2000): Running with effective IDs: [0][0]. 354s [p11_child[2464]] [main] (0x2000): Running with real IDs [0][0]. 354s [p11_child[2464]] [parse_cert_verify_opts] (0x4000): Found 'partial_chain' option, verification will not fail if a complete chain cannot be built to a self-signed trust-anchor, provided it is possible to construct a chain to a trusted certificate that might not be self-signed. 354s [p11_child[2464]] [do_card] (0x4000): Module List: 354s [p11_child[2464]] [do_card] (0x4000): common name: [softhsm2]. 354s [p11_child[2464]] [do_card] (0x4000): dll name: [/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2464]] [do_card] (0x4000): Description [SoftHSM slot ID 0x742401c5] Manufacturer [SoftHSM project] flags [3] removable [true] token present [true]. 354s [p11_child[2464]] [do_card] (0x4000): Token label [Test Organization Sub Int Token]. 354s [p11_child[2464]] [do_card] (0x4000): Found [Test Organization Sub Int Token] in slot [SoftHSM slot ID 0x742401c5][1948516805] of module [0][/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so]. 354s [p11_child[2464]] [do_card] (0x4000): Login required. 354s [p11_child[2464]] [do_card] (0x4000): Token flags [1069]. 354s [p11_child[2464]] [read_certs] (0x4000): found cert[Test Organization Sub Intermediate Trusted Certificate 0001][/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Sub Intermediate Trusted Certificate 0001] 354s [p11_child[2464]] [do_ocsp] (0x0020): No OCSP URL in certificate and no default responder defined, skipping OCSP check. 354s [p11_child[2464]] [do_card] (0x4000): /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so Test Organization Sub Int Token Test Organization Sub Int Token 00112233445566778899FFAABBCCDDEEFF012345 - no label given- 00112233445566778899FFAABBCCDDEEFF012345. 354s [p11_child[2464]] [do_card] (0x4000): uri: pkcs11:library-description=Implementation%20of%20PKCS11;library-manufacturer=SoftHSM;library-version=2.6;slot-description=SoftHSM%20slot%20ID%200x742401c5;slot-manufacturer=SoftHSM%20project;slot-id=1948516805;model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=5c792353742401c5;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4226]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4357]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4229]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4234]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4230]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4225]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4356]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4231]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4224]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8457]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8458]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [304]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [307]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4355]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [310]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [312]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [306]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4354]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [305]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [290]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4353]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [293]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [289]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4352]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [288]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [33]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [32]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8193]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [17]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [16]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [8192]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [18]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [19]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [20]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [21]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [22]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4176]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4161]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4181]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4160]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [4183]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [848]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [528]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [529]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [5]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [1]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [0]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [9]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [13]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [3]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [6]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [14]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [597]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [598]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [70]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [71]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [592]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [593]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [64]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [67]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [608]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [609]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [65]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [68]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [624]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [625]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [66]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [69]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [544]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x4000): Found mechanism [545]. 354s [p11_child[2464]] [get_preferred_rsa_mechanism] (0x0200): Using PKCS#11 mechanism [66][CKM_SHA512_RSA_PKCS] with message digest [sha512]. 354s [p11_child[2464]] [sign_data] (0x4000): Found RSA key using mechanism [66]. 354s [p11_child[2464]] [do_card] (0x4000): Certificate verified and validated. 354s [p11_child[2464]] [do_card] (0x4000): Found certificate has key id [00112233445566778899FFAABBCCDDEEFF012345]. 354s + grep -qs 00112233445566778899FFAABBCCDDEEFF012345 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653-auth.output 354s + echo '-----BEGIN CERTIFICATE-----' 354s + tail -n1 /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653-auth.output 354s + echo '-----END CERTIFICATE-----' 354s + openssl x509 -text -noout -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653-auth.pem 354s Certificate: 354s Data: 354s Version: 3 (0x2) 354s Serial Number: 5 (0x5) 354s Signature Algorithm: sha256WithRSAEncryption 354s Issuer: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 354s Validity 354s Not Before: Jan 15 02:47:09 2025 GMT 354s Not After : Jan 15 02:47:09 2026 GMT 354s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 354s Subject Public Key Info: 354s Public Key Algorithm: rsaEncryption 354s Public-Key: (1024 bit) 354s Modulus: 354s 00:da:d0:bb:74:d3:43:f2:f3:b8:a9:72:c7:bf:13: 354s 88:2f:18:0e:56:64:ae:26:46:3e:6e:99:62:02:7e: 354s f4:b5:1b:ba:9e:eb:b7:7a:b0:fd:34:58:9d:e1:72: 354s 37:7e:cc:39:94:ce:87:a4:fb:32:09:17:97:bd:e7: 354s e9:04:f8:1f:4e:09:66:3e:86:f5:49:75:8b:4a:56: 354s 6b:2f:db:44:d2:e5:65:04:f4:22:19:96:86:be:5c: 354s 73:c1:30:c6:0d:6b:8a:01:8c:eb:d2:e2:29:8d:0f: 354s 57:e2:09:12:c8:6f:da:da:38:60:36:6c:fa:b0:6c: 354s de:b3:34:61:ac:71:17:5a:d3 354s Exponent: 65537 (0x10001) 354s X509v3 extensions: 354s X509v3 Authority Key Identifier: 354s 89:B0:73:64:5B:57:FF:CD:75:9A:F1:19:E0:48:CD:95:D8:FC:CD:D3 354s X509v3 Basic Constraints: 354s CA:FALSE 354s Netscape Cert Type: 354s SSL Client, S/MIME 354s Netscape Comment: 354s Test Organization Sub Intermediate CA trusted Certificate 354s X509v3 Subject Key Identifier: 354s 1C:C9:EB:E2:B3:0C:FC:E2:94:9A:67:6B:C8:90:33:C1:12:BD:BB:44 354s X509v3 Key Usage: critical 354s Digital Signature, Non Repudiation, Key Encipherment 354s X509v3 Extended Key Usage: 354s TLS Web Client Authentication, E-mail Protection 354s X509v3 Subject Alternative Name: 354s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 354s Signature Algorithm: sha256WithRSAEncryption 354s Signature Value: 354s 86:20:23:8b:00:cc:e0:57:97:47:3b:8c:07:8c:ff:02:3e:13: 354s 3b:1f:dc:70:5d:8e:68:77:2d:ff:4c:f5:c7:36:08:80:e1:42: 354s bc:05:14:6a:2b:49:3d:e6:d7:c5:12:39:e4:b8:ee:14:fb:1c: 354s ff:71:2b:e1:5e:e5:46:50:f0:d5:c9:ae:dc:84:bd:0a:0b:14: 354s a9:16:04:cb:a5:55:a7:4a:8a:eb:18:37:f3:84:ff:23:39:20: 354s 81:c6:be:c2:25:a3:82:f3:8a:c4:32:ae:ef:07:cb:ef:75:ff: 354s ff:1b:f3:97:7a:db:3c:37:2a:c8:40:ff:31:d8:fb:33:9e:74: 354s 19:84 354s ++ openssl x509 -noout -modulus -in /tmp/sssd-softhsm2-yZNZJ8/SSSD-child-15653-auth.pem 354s 354s Test completed, Root CA and intermediate issued certificates verified! 354s + found_md5=Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 354s + '[' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 '!=' Modulus=DAD0BB74D343F2F3B8A972C7BF13882F180E5664AE26463E6E9962027EF4B51BBA9EEBB77AB0FD34589DE172377ECC3994CE87A4FB32091797BDE7E904F81F4E09663E86F549758B4A566B2FDB44D2E56504F422199686BE5C73C130C60D6B8A018CEBD2E2298D0F57E20912C86FDADA3860366CFAB06CDEB33461AC71175AD3 ']' 354s + set +x 354s autopkgtest [02:45:45]: test sssd-softhism2-certificates-tests.sh: -----------------------] 355s autopkgtest [02:45:46]: test sssd-softhism2-certificates-tests.sh: - - - - - - - - - - results - - - - - - - - - - 355s sssd-softhism2-certificates-tests.sh PASS 355s autopkgtest [02:45:46]: test sssd-smart-card-pam-auth-configs: preparing testbed 355s Reading package lists... 355s Building dependency tree... 355s Reading state information... 355s Starting pkgProblemResolver with broken count: 0 355s Starting 2 pkgProblemResolver with broken count: 0 355s Done 356s The following NEW packages will be installed: 356s pamtester 356s 0 upgraded, 1 newly installed, 0 to remove and 2 not upgraded. 356s Need to get 12.2 kB of archives. 356s After this operation, 36.9 kB of additional disk space will be used. 356s Get:1 http://ftpmaster.internal/ubuntu plucky/universe s390x pamtester s390x 0.1.2-4 [12.2 kB] 356s Fetched 12.2 kB in 0s (86.9 kB/s) 356s Selecting previously unselected package pamtester. 356s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 56955 files and directories currently installed.) 356s Preparing to unpack .../pamtester_0.1.2-4_s390x.deb ... 356s Unpacking pamtester (0.1.2-4) ... 356s Setting up pamtester (0.1.2-4) ... 356s Processing triggers for man-db (2.13.0-1) ... 357s autopkgtest [02:45:48]: test sssd-smart-card-pam-auth-configs: env OFFLINE_MODE=1 bash debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 357s autopkgtest [02:45:48]: test sssd-smart-card-pam-auth-configs: [----------------------- 357s + '[' -z ubuntu ']' 357s + export DEBIAN_FRONTEND=noninteractive 357s + DEBIAN_FRONTEND=noninteractive 357s + required_tools=(pamtester softhsm2-util sssd) 357s + [[ ! -v OFFLINE_MODE ]] 357s + for cmd in "${required_tools[@]}" 357s + command -v pamtester 357s + for cmd in "${required_tools[@]}" 357s + command -v softhsm2-util 357s + for cmd in "${required_tools[@]}" 357s + command -v sssd 357s + PIN=123456 357s ++ mktemp -d -t sssd-softhsm2-certs-XXXXXX 357s + tmpdir=/tmp/sssd-softhsm2-certs-9F9klf 357s + backupsdir= 357s + alternative_pam_configs=(sss-smart-card-optional sss-smart-card-required) 357s + declare -a restore_paths 357s + declare -a delete_paths 357s + trap handle_exit EXIT 357s ++ dirname debian/tests/sssd-smart-card-pam-auth-configs-tester.sh 357s + tester=debian/tests/sssd-softhism2-certificates-tests.sh 357s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 357s + '[' '!' -e debian/tests/sssd-softhism2-certificates-tests.sh ']' 357s + export PIN TEST_TMPDIR=/tmp/sssd-softhsm2-certs-9F9klf GENERATE_SMART_CARDS=1 KEEP_TEMPORARY_FILES=1 NO_SSSD_TESTS=1 357s + TEST_TMPDIR=/tmp/sssd-softhsm2-certs-9F9klf 357s + GENERATE_SMART_CARDS=1 357s + KEEP_TEMPORARY_FILES=1 357s + NO_SSSD_TESTS=1 357s + bash debian/tests/sssd-softhism2-certificates-tests.sh 357s + '[' -z ubuntu ']' 357s + required_tools=(p11tool openssl softhsm2-util) 357s + for cmd in "${required_tools[@]}" 357s + command -v p11tool 357s + for cmd in "${required_tools[@]}" 357s + command -v openssl 357s + for cmd in "${required_tools[@]}" 357s + command -v softhsm2-util 357s + PIN=123456 357s +++ find /usr/lib/softhsm/libsofthsm2.so 357s +++ head -n 1 357s ++ realpath /usr/lib/softhsm/libsofthsm2.so 357s + SOFTHSM2_MODULE=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so 357s + SSSD_P11_CHILD=/usr/libexec/sssd/p11_child 357s + TOKEN_ID=00112233445566778899FFAABBCCDDEEFF012345 357s + '[' '!' -v NO_SSSD_TESTS ']' 357s + '[' '!' -e /usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so ']' 357s + tmpdir=/tmp/sssd-softhsm2-certs-9F9klf 357s + keys_size=1024 357s + [[ ! -v KEEP_TEMPORARY_FILES ]] 357s + trap 'set +x; echo -e "\nUnexpected failure!!!"' ERR 357s + echo -n 01 357s + touch /tmp/sssd-softhsm2-certs-9F9klf/index.txt 357s + mkdir -p /tmp/sssd-softhsm2-certs-9F9klf/new_certs 357s + cat 357s + root_ca_key_pass=pass:random-root-CA-password-10541 357s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-key.pem -passout pass:random-root-CA-password-10541 1024 358s + openssl req -passin pass:random-root-CA-password-10541 -batch -config /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.config -x509 -new -nodes -key /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-key.pem -sha256 -days 1024 -set_serial 0 -extensions v3_ca -out /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.pem 358s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.pem 358s + cat 358s + intermediate_ca_key_pass=pass:random-intermediate-CA-password-21550 358s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-21550 1024 358s + openssl req -batch -new -nodes -passin pass:random-intermediate-CA-password-21550 -config /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-key.pem -passout pass:random-root-CA-password-10541 -sha256 -out /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-certificate-request.pem 358s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-certificate-request.pem 358s Certificate Request: 358s Data: 358s Version: 1 (0x0) 358s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 358s Subject Public Key Info: 358s Public Key Algorithm: rsaEncryption 358s Public-Key: (1024 bit) 358s Modulus: 358s 00:c2:ee:05:b7:58:32:ae:a9:04:cb:44:ec:43:37: 358s e2:ce:98:88:8a:24:92:37:4b:21:97:93:bc:2f:88: 358s 05:7a:78:14:04:6f:43:f6:d3:3d:eb:84:cd:90:82: 358s 73:0f:89:7a:81:59:79:2e:88:af:47:7e:2d:1a:bb: 358s 07:13:b9:23:47:ef:95:d2:02:14:a8:7b:00:cd:69: 358s 41:e5:8a:f9:dc:fa:e7:b4:0b:54:05:94:9c:01:c4: 358s 07:ec:21:7b:00:c0:73:e2:c3:94:9e:5b:b6:f4:73: 358s ef:96:98:58:05:1e:a1:ae:c7:0a:ef:82:ba:73:67: 358s a7:6c:fb:94:5e:7c:ff:48:75 358s Exponent: 65537 (0x10001) 358s Attributes: 358s (none) 358s Requested Extensions: 358s Signature Algorithm: sha256WithRSAEncryption 358s Signature Value: 358s 04:d2:20:97:3c:64:bd:8c:c7:07:fc:65:60:d7:3f:bd:50:3b: 358s c5:4c:b9:69:c0:64:d9:96:a1:0d:df:4b:07:bc:e3:78:90:4c: 358s d0:dc:81:d5:72:15:88:8e:b5:cd:20:1b:74:5c:ab:ee:cf:3a: 358s af:24:99:14:1e:ab:28:f2:85:e7:48:40:3d:08:68:4b:d6:b5: 358s c8:46:6d:5c:08:ac:05:87:b8:8a:e5:68:3f:65:03:45:0d:cc: 358s ca:f3:91:88:6e:a7:82:d4:1b:9e:30:a4:5c:b1:65:f0:91:9a: 358s e7:a7:33:2e:f8:18:74:c3:dd:6f:50:3c:9c:96:c8:bd:44:23: 358s ed:ca 358s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.config -passin pass:random-root-CA-password-10541 -keyfile /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem 358s Using configuration from /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.config 358s Check that the request matches the signature 358s Signature ok 358s Certificate Details: 358s Serial Number: 1 (0x1) 358s Validity 358s Not Before: Jan 15 02:47:14 2025 GMT 358s Not After : Jan 15 02:47:14 2026 GMT 358s Subject: 358s organizationName = Test Organization 358s organizationalUnitName = Test Organization Unit 358s commonName = Test Organization Intermediate CA 358s X509v3 extensions: 358s X509v3 Subject Key Identifier: 358s 5C:02:64:84:A0:C0:9A:C3:24:DB:2C:33:A5:63:11:23:2D:8D:CD:23 358s X509v3 Authority Key Identifier: 358s keyid:60:23:87:F8:47:0A:80:77:01:B5:FE:B4:B8:D1:59:3C:FA:0B:55:6B 358s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 358s serial:00 358s X509v3 Basic Constraints: 358s CA:TRUE 358s X509v3 Key Usage: critical 358s Digital Signature, Certificate Sign, CRL Sign 358s Certificate is to be certified until Jan 15 02:47:14 2026 GMT (365 days) 358s 358s Write out database with 1 new entries 358s Database updated 358s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem: OK 358s + cat 358s + sub_intermediate_ca_key_pass=pass:random-sub-intermediate-CA-password-2112 358s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-key.pem -passout pass:random-sub-intermediate-CA-password-2112 1024 358s + openssl req -batch -new -nodes -passin pass:random-sub-intermediate-CA-password-2112 -config /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.config -key /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-key.pem -passout pass:random-intermediate-CA-password-21550 -sha256 -out /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-certificate-request.pem 358s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-certificate-request.pem 358s Certificate Request: 358s Data: 358s Version: 1 (0x0) 358s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 358s Subject Public Key Info: 358s Public Key Algorithm: rsaEncryption 358s Public-Key: (1024 bit) 358s Modulus: 358s 00:b3:7d:e5:ea:06:92:ea:6c:6a:c7:b5:a2:12:c9: 358s 65:b6:29:79:7d:e0:68:cd:eb:bf:fd:65:72:6c:53: 358s 54:7c:76:25:35:c4:e9:55:dd:69:05:d0:3c:23:84: 358s b0:1f:7c:7a:06:92:0c:89:cc:f8:17:53:c9:ec:cc: 358s a1:bf:e5:8b:29:69:30:d9:0f:0f:15:cd:3d:af:d8: 358s 15:e0:5a:e0:4a:21:1a:d5:42:2f:40:ef:f0:41:2b: 358s 83:e0:54:0c:b5:be:81:2f:62:90:21:09:e2:aa:0b: 358s 47:9d:ff:46:68:9e:2d:fb:57:14:0b:c4:f0:81:f3: 358s 6e:70:d3:3f:97:72:84:82:09 358s Exponent: 65537 (0x10001) 358s Attributes: 358s (none) 358s Requested Extensions: 358s Signature Algorithm: sha256WithRSAEncryption 358s Signature Value: 358s ae:25:e5:68:7f:9e:36:68:48:68:c0:e9:20:93:b2:3a:88:85: 358s ff:e2:df:1d:8f:13:c4:65:7f:54:6b:6a:b7:fa:ce:7e:f2:db: 358s 5b:35:98:b5:32:d3:d5:68:c4:b5:50:40:eb:16:d8:6f:92:70: 358s 49:52:a1:c2:a1:92:ce:64:bc:44:26:b7:59:54:a9:5b:0f:62: 358s db:e9:77:1e:a7:2d:51:95:1f:48:94:e1:04:b3:c1:9b:48:b3: 358s 58:f5:90:c0:28:89:65:cd:6b:f9:fe:91:5e:5e:ac:bb:8b:59: 358s 70:be:b3:b7:b5:ad:67:59:cf:34:0a:f5:91:c7:f1:23:23:f2: 358s c4:f8 358s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.config -passin pass:random-intermediate-CA-password-21550 -keyfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-certificate-request.pem -days 365 -extensions v3_intermediate_ca -out /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem 358s Using configuration from /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.config 358s Check that the request matches the signature 358s Signature ok 358s Certificate Details: 358s Serial Number: 2 (0x2) 358s Validity 358s Not Before: Jan 15 02:47:14 2025 GMT 358s Not After : Jan 15 02:47:14 2026 GMT 358s Subject: 358s organizationName = Test Organization 358s organizationalUnitName = Test Organization Unit 358s commonName = Test Organization Sub Intermediate CA 358s X509v3 extensions: 358s X509v3 Subject Key Identifier: 358s CF:89:E0:66:8E:0A:18:2A:38:1B:65:EC:4D:94:39:01:D8:F4:C4:DF 358s X509v3 Authority Key Identifier: 358s keyid:5C:02:64:84:A0:C0:9A:C3:24:DB:2C:33:A5:63:11:23:2D:8D:CD:23 358s DirName:/O=Test Organization/OU=Test Organization Unit/CN=Test Organization Root CA 358s serial:01 358s X509v3 Basic Constraints: 358s CA:TRUE 358s X509v3 Key Usage: critical 358s Digital Signature, Certificate Sign, CRL Sign 358s Certificate is to be certified until Jan 15 02:47:14 2026 GMT (365 days) 358s 358s Write out database with 1 new entries 358s Database updated 358s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem 358s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem: OK 358s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem 358s + local cmd=openssl 358s + shift 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem 358s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 358s error 20 at 0 depth lookup: unable to get local issuer certificate 358s error /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem: verification failed 358s + cat 358s + root_ca_trusted_cert_0001_key_pass=pass:random-root-ca-trusted-cert-0001-11043 358s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-key.pem -passout pass:random-root-ca-trusted-cert-0001-11043 1024 358s + openssl req -new -nodes -reqexts req_exts -passin pass:random-root-ca-trusted-cert-0001-11043 -key /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-request.pem 358s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-request.pem 358s Certificate Request: 358s Data: 358s Version: 1 (0x0) 358s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 358s Subject Public Key Info: 358s Public Key Algorithm: rsaEncryption 358s Public-Key: (1024 bit) 358s Modulus: 358s 00:c5:88:57:e8:b8:db:e5:08:a5:5a:d9:d0:2f:77: 358s f5:9d:ac:60:92:d9:b3:20:81:ca:5d:06:80:01:83: 358s d6:09:e2:cf:e7:be:07:eb:89:36:fd:cf:9c:22:a4: 358s 4d:28:57:ac:66:39:42:78:b8:ce:d5:9b:b5:5b:de: 358s 07:64:26:52:8c:13:56:33:c7:47:f5:9b:de:b1:29: 358s c2:26:b1:3c:ed:98:2a:5e:3c:b2:03:0f:47:3e:1a: 358s 6e:d4:e7:3f:d7:6b:09:53:05:0b:e2:80:56:3a:b3: 358s d5:8a:fb:4b:d6:d3:24:47:d5:ab:7f:d1:6a:3b:70: 358s 88:fb:3c:4f:fd:1d:d9:dd:e7 358s Exponent: 65537 (0x10001) 358s Attributes: 358s Requested Extensions: 358s X509v3 Basic Constraints: 358s CA:FALSE 358s Netscape Cert Type: 358s SSL Client, S/MIME 358s Netscape Comment: 358s Test Organization Root CA trusted Certificate 358s X509v3 Subject Key Identifier: 358s EA:BC:1C:1D:9B:10:30:08:1C:DB:F5:B0:DC:1D:F9:AF:2A:3A:AA:13 358s X509v3 Key Usage: critical 358s Digital Signature, Non Repudiation, Key Encipherment 358s X509v3 Extended Key Usage: 358s TLS Web Client Authentication, E-mail Protection 358s X509v3 Subject Alternative Name: 358s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 358s Signature Algorithm: sha256WithRSAEncryption 358s Signature Value: 358s 1c:04:1c:7e:d2:81:f6:8e:6f:9f:b1:28:6a:84:14:93:d8:50: 358s 0b:5e:ae:39:48:dd:43:3e:f2:37:88:5f:78:d6:e0:1f:6a:ce: 358s be:82:5f:56:af:49:2c:85:6e:8d:2a:55:e4:5b:fd:4c:5b:f9: 358s 25:35:3f:2a:42:ba:c7:9c:57:88:91:12:58:a3:8e:ed:b7:8e: 358s 46:ae:97:91:21:d7:fb:dd:1b:51:8d:ae:49:66:25:fc:9d:b8: 358s 43:f1:40:a6:60:35:23:c4:b7:ac:42:df:c9:5d:a9:e6:a8:13: 358s ed:b9:6a:f5:05:3f:3f:96:ac:f5:d7:20:c4:1f:34:b3:af:08: 358s b7:94 358s + openssl ca -batch -notext -config /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.config -passin pass:random-root-CA-password-10541 -keyfile /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-key.pem -in /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem 358s Using configuration from /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.config 358s Check that the request matches the signature 358s Signature ok 358s Certificate Details: 358s Serial Number: 3 (0x3) 358s Validity 358s Not Before: Jan 15 02:47:15 2025 GMT 358s Not After : Jan 15 02:47:15 2026 GMT 358s Subject: 358s organizationName = Test Organization 358s organizationalUnitName = Test Organization Unit 358s commonName = Test Organization Root Trusted Certificate 0001 358s X509v3 extensions: 358s X509v3 Authority Key Identifier: 358s 60:23:87:F8:47:0A:80:77:01:B5:FE:B4:B8:D1:59:3C:FA:0B:55:6B 358s X509v3 Basic Constraints: 358s CA:FALSE 358s Netscape Cert Type: 358s SSL Client, S/MIME 358s Netscape Comment: 358s Test Organization Root CA trusted Certificate 358s X509v3 Subject Key Identifier: 358s EA:BC:1C:1D:9B:10:30:08:1C:DB:F5:B0:DC:1D:F9:AF:2A:3A:AA:13 358s X509v3 Key Usage: critical 358s Digital Signature, Non Repudiation, Key Encipherment 358s X509v3 Extended Key Usage: 358s TLS Web Client Authentication, E-mail Protection 358s X509v3 Subject Alternative Name: 358s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 358s Certificate is to be certified until Jan 15 02:47:15 2026 GMT (365 days) 358s 358s Write out database with 1 new entries 358s Database updated 358s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem: OK 358s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem 358s + local cmd=openssl 358s + shift 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem 358s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root Trusted Certificate 0001 358s error 20 at 0 depth lookup: unable to get local issuer certificate 358s error /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem: verification failed 358s + cat 358s + intermediate_ca_trusted_cert_0001_key_pass=pass:random-intermediate-ca-trusted-cert-0001-16491 358s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-intermediate-ca-trusted-cert-0001-16491 1024 358s + openssl req -new -nodes -reqexts req_exts -passin pass:random-intermediate-ca-trusted-cert-0001-16491 -key /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-request.pem 358s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-request.pem 358s + openssl ca -passin pass:random-intermediate-CA-password-21550 -config /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem 358s Certificate Request: 358s Data: 358s Version: 1 (0x0) 358s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate Trusted Certificate 0001 358s Subject Public Key Info: 358s Public Key Algorithm: rsaEncryption 358s Public-Key: (1024 bit) 358s Modulus: 358s 00:a3:73:f9:74:b5:e4:3c:af:bb:df:43:77:18:57: 358s 7b:2a:c3:0f:1f:5b:2a:a1:4f:4f:5b:a7:4e:29:77: 358s 7c:e8:a7:a4:ea:45:ac:36:5d:0c:52:86:24:cf:1f: 358s 38:4a:e3:eb:08:f4:7a:07:e9:cc:c8:59:a3:5d:1d: 358s 89:b5:62:de:1f:64:9f:48:4c:49:4d:9e:4d:1b:8f: 358s b4:7c:db:11:3f:fd:39:8d:2a:55:f3:3b:58:84:d2: 358s 28:c0:d0:dc:23:6c:59:d2:b0:e7:25:a8:42:db:cb: 358s 9c:45:91:5d:63:cc:8c:4c:12:e9:78:dd:9b:53:2e: 358s 06:73:23:1e:4a:0a:e2:08:2f 358s Exponent: 65537 (0x10001) 358s Attributes: 358s Requested Extensions: 358s X509v3 Basic Constraints: 358s CA:FALSE 358s Netscape Cert Type: 358s SSL Client, S/MIME 358s Netscape Comment: 358s Test Organization Intermediate CA trusted Certificate 358s X509v3 Subject Key Identifier: 358s 08:16:B8:6F:DD:19:12:25:A3:CC:3F:92:61:E5:C9:8B:66:1F:19:6E 358s X509v3 Key Usage: critical 358s Digital Signature, Non Repudiation, Key Encipherment 358s X509v3 Extended Key Usage: 358s TLS Web Client Authentication, E-mail Protection 358s X509v3 Subject Alternative Name: 358s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 358s Signature Algorithm: sha256WithRSAEncryption 358s Signature Value: 358s 1f:d2:0d:55:47:ef:81:52:00:28:ae:cd:8b:d3:93:ac:8e:13: 358s b5:de:42:87:56:43:c2:53:51:6f:bf:ac:7d:3c:4b:eb:ca:ba: 358s 81:b7:5a:05:08:d1:47:cc:e2:14:e4:1f:d3:08:68:9a:eb:e4: 358s 83:a9:8e:60:d4:72:fb:b2:48:b5:89:f8:19:44:5a:0c:d0:3b: 358s ff:b2:19:ed:e4:6c:f4:6a:47:b0:b1:3b:34:39:2f:3c:e8:40: 358s 10:2d:f3:c4:c2:e1:d9:85:3e:d6:89:1a:f2:a7:46:c1:d9:f7: 358s bf:33:dc:02:52:4d:c5:ef:a4:aa:d3:2b:e1:32:f5:ff:02:50: 358s 90:0e 358s Using configuration from /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.config 358s Check that the request matches the signature 358s Signature ok 358s Certificate Details: 358s Serial Number: 4 (0x4) 358s Validity 358s Not Before: Jan 15 02:47:15 2025 GMT 358s Not After : Jan 15 02:47:15 2026 GMT 358s Subject: 358s organizationName = Test Organization 358s organizationalUnitName = Test Organization Unit 358s commonName = Test Organization Intermediate Trusted Certificate 0001 358s X509v3 extensions: 358s X509v3 Authority Key Identifier: 358s 5C:02:64:84:A0:C0:9A:C3:24:DB:2C:33:A5:63:11:23:2D:8D:CD:23 358s X509v3 Basic Constraints: 358s CA:FALSE 358s Netscape Cert Type: 358s SSL Client, S/MIME 358s Netscape Comment: 358s Test Organization Intermediate CA trusted Certificate 358s X509v3 Subject Key Identifier: 358s 08:16:B8:6F:DD:19:12:25:A3:CC:3F:92:61:E5:C9:8B:66:1F:19:6E 358s X509v3 Key Usage: critical 358s Digital Signature, Non Repudiation, Key Encipherment 358s X509v3 Extended Key Usage: 358s TLS Web Client Authentication, E-mail Protection 358s X509v3 Subject Alternative Name: 358s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 358s Certificate is to be certified until Jan 15 02:47:15 2026 GMT (365 days) 358s 358s Write out database with 1 new entries 358s Database updated 358s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem 358s This certificate should not be trusted fully 358s + echo 'This certificate should not be trusted fully' 358s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem 358s + local cmd=openssl 358s + shift 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem 358s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 358s error 2 at 1 depth lookup: unable to get issuer certificate 358s error /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem: verification failed 358s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem: OK 358s + cat 358s + sub_intermediate_ca_trusted_cert_0001_key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-13137 358s + openssl genrsa -aes256 -out /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -passout pass:random-sub-intermediate-ca-trusted-cert-0001-13137 1024 358s + openssl req -new -nodes -reqexts req_exts -passin pass:random-sub-intermediate-ca-trusted-cert-0001-13137 -key /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -config /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.config -out /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 358s + openssl req -text -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-request.pem 358s Certificate Request: 358s Data: 358s Version: 1 (0x0) 358s Subject: O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 358s Subject Public Key Info: 358s Public Key Algorithm: rsaEncryption 358s Public-Key: (1024 bit) 358s Modulus: 358s 00:c0:64:76:4d:7e:fe:93:94:99:e3:53:bd:f2:0d: 358s 4e:41:c0:04:2e:14:78:7f:0d:59:92:f4:87:f0:f2: 358s a4:8b:89:6b:f5:74:70:b1:1d:93:61:75:76:62:e4: 358s d2:cd:7c:90:f2:d0:a5:70:cb:f5:e4:95:96:52:4c: 358s 6a:9e:b2:bc:3f:28:b2:d4:bf:86:17:fc:21:5d:8f: 358s 88:40:87:6d:85:b9:c7:3a:90:ef:05:2e:da:49:34: 358s 53:2e:af:64:54:61:5f:9a:ef:e7:c3:87:de:ce:21: 358s 5f:03:ca:f0:19:a0:11:65:a6:f4:d1:1e:05:ea:54: 358s 92:6e:69:7a:84:cf:2a:1b:af 358s Exponent: 65537 (0x10001) 358s Attributes: 358s Requested Extensions: 358s X509v3 Basic Constraints: 358s CA:FALSE 358s Netscape Cert Type: 358s SSL Client, S/MIME 358s Netscape Comment: 358s Test Organization Sub Intermediate CA trusted Certificate 358s X509v3 Subject Key Identifier: 358s 2A:41:C5:BB:22:94:2C:0D:A4:BA:F9:D1:98:E0:F7:6E:1A:9E:E2:64 358s X509v3 Key Usage: critical 358s Digital Signature, Non Repudiation, Key Encipherment 358s X509v3 Extended Key Usage: 358s TLS Web Client Authentication, E-mail Protection 358s X509v3 Subject Alternative Name: 358s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 358s Signature Algorithm: sha256WithRSAEncryption 358s Signature Value: 358s 5f:90:68:1f:db:4c:56:6c:a5:34:3f:90:8e:ca:ff:2c:b4:b8: 358s 23:97:ea:78:80:34:fe:65:70:2e:d8:c8:30:fa:55:15:1a:d7: 358s 17:36:17:30:5b:96:56:65:fe:bc:34:f0:48:1a:19:d6:a0:03: 358s 6e:7a:ea:e4:99:de:15:00:d3:da:8a:02:0c:1e:84:62:55:8a: 358s ec:26:13:44:4d:87:b7:5c:37:17:0c:65:a3:88:fb:8a:c3:ff: 358s f5:2f:0e:59:7b:ba:b0:1d:fa:90:4b:5c:9e:f4:f3:93:2e:72: 358s dd:42:c4:56:7c:c6:15:c5:fd:dc:13:72:8d:e2:6f:20:c1:39: 358s 57:c1 358s + openssl ca -passin pass:random-sub-intermediate-CA-password-2112 -config /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.config -batch -notext -keyfile /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-key.pem -in /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-request.pem -days 365 -extensions usr_cert -out /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s Using configuration from /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.config 358s Check that the request matches the signature 358s Signature ok 358s Certificate Details: 358s Serial Number: 5 (0x5) 358s Validity 358s Not Before: Jan 15 02:47:15 2025 GMT 358s Not After : Jan 15 02:47:15 2026 GMT 358s Subject: 358s organizationName = Test Organization 358s organizationalUnitName = Test Organization Unit 358s commonName = Test Organization Sub Intermediate Trusted Certificate 0001 358s X509v3 extensions: 358s X509v3 Authority Key Identifier: 358s CF:89:E0:66:8E:0A:18:2A:38:1B:65:EC:4D:94:39:01:D8:F4:C4:DF 358s X509v3 Basic Constraints: 358s CA:FALSE 358s Netscape Cert Type: 358s SSL Client, S/MIME 358s Netscape Comment: 358s Test Organization Sub Intermediate CA trusted Certificate 358s X509v3 Subject Key Identifier: 358s 2A:41:C5:BB:22:94:2C:0D:A4:BA:F9:D1:98:E0:F7:6E:1A:9E:E2:64 358s X509v3 Key Usage: critical 358s Digital Signature, Non Repudiation, Key Encipherment 358s X509v3 Extended Key Usage: 358s TLS Web Client Authentication, E-mail Protection 358s X509v3 Subject Alternative Name: 358s email:mail@3v1n0.net, URI:https://github.com/3v1n0/ 358s Certificate is to be certified until Jan 15 02:47:15 2026 GMT (365 days) 358s 358s Write out database with 1 new entries 358s Database updated 358s + openssl x509 -noout -in /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s This certificate should not be trusted fully 358s + echo 'This certificate should not be trusted fully' 358s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s + local cmd=openssl 358s + shift 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 358s error 2 at 1 depth lookup: unable to get issuer certificate 358s error /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 358s + expect_fail openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s + local cmd=openssl 358s + shift 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 358s error 20 at 0 depth lookup: unable to get local issuer certificate 358s error /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 358s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 358s + expect_fail openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s + local cmd=openssl 358s + shift 358s + openssl verify -partial_chain -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate Trusted Certificate 0001 358s error 20 at 0 depth lookup: unable to get local issuer certificate 358s error /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem: verification failed 358s Building a the full-chain CA file... 358s + echo 'Building a the full-chain CA file...' 358s + cat /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem 358s + cat /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem 358s + cat /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA.pem 358s + openssl crl2pkcs7 -nocrl -certfile /tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem 358s + openssl pkcs7 -print_certs -noout 358s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 358s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 358s 358s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 358s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Root CA 358s 358s subject=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Sub Intermediate CA 358s issuer=O=Test Organization, OU=Test Organization Unit, CN=Test Organization Intermediate CA 358s 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA.pem: OK 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem: OK 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem: OK 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-root-intermediate-chain-CA.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-root-intermediate-chain-CA.pem: OK 358s + openssl verify -CAfile /tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem: OK 358s Certificates generation completed! 358s + echo 'Certificates generation completed!' 358s + [[ -v NO_SSSD_TESTS ]] 358s + [[ -v GENERATE_SMART_CARDS ]] 358s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem pass:random-root-ca-trusted-cert-0001-11043 358s + local certificate=/tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem 358s + local key_pass=pass:random-root-ca-trusted-cert-0001-11043 358s + local key_cn 358s + local key_name 358s + local tokens_dir 358s + local output_cert_file 358s + token_name= 358s ++ basename /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem .pem 358s + key_name=test-root-CA-trusted-certificate-0001 358s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem 358s ++ sed -n 's/ *commonName *= //p' 358s + key_cn='Test Organization Root Trusted Certificate 0001' 358s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 358s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001.conf 358s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001.conf 358s ++ basename /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001.conf .conf 358s + tokens_dir=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001 358s + token_name='Test Organization Root Tr Token' 358s + '[' '!' -e /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001.conf ']' 358s + local key_file 358s + local decrypted_key 358s + mkdir -p /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001 358s + key_file=/tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-key.pem 358s + decrypted_key=/tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-key-decrypted.pem 358s + cat 358s + softhsm2-util --init-token --label 'Test Organization Root Tr Token' --pin 123456 --so-pin 123456 --free 358s Slot 0 has a free/uninitialized token. 358s The token has been initialized and is reassigned to slot 1855179291 358s + softhsm2-util --show-slots 358s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 358s Available slots: 358s Slot 1855179291 358s Slot info: 358s Description: SoftHSM slot ID 0x6e93ca1b 358s Manufacturer ID: SoftHSM project 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Token present: yes 358s Token info: 358s Manufacturer ID: SoftHSM project 358s Model: SoftHSM v2 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Serial number: 01789b7e6e93ca1b 358s Initialized: yes 358s User PIN init.: yes 358s Label: Test Organization Root Tr Token 358s Slot 1 358s Slot info: 358s Description: SoftHSM slot ID 0x1 358s Manufacturer ID: SoftHSM project 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Token present: yes 358s Token info: 358s Manufacturer ID: SoftHSM project 358s Model: SoftHSM v2 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Serial number: 358s Initialized: no 358s User PIN init.: no 358s Label: 358s + openssl rsa -passin pass:random-root-ca-trusted-cert-0001-11043 -in /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-key-decrypted.pem 358s writing RSA key 358s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Root Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 358s + rm /tmp/sssd-softhsm2-certs-9F9klf/test-root-CA-trusted-certificate-0001-key-decrypted.pem 358s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 358s Object 0: 358s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=01789b7e6e93ca1b;token=Test%20Organization%20Root%20Tr%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Root%20Trusted%20Certificate%200001;type=cert 358s Type: X.509 Certificate (RSA-1024) 358s Expires: Thu Jan 15 02:47:15 2026 358s Label: Test Organization Root Trusted Certificate 0001 358s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 358s 358s Test Organization Root Tr Token 358s + echo 'Test Organization Root Tr Token' 358s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem pass:random-intermediate-ca-trusted-cert-0001-16491 358s + local certificate=/tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem 358s + local key_pass=pass:random-intermediate-ca-trusted-cert-0001-16491 358s + local key_cn 358s + local key_name 358s + local tokens_dir 358s + local output_cert_file 358s + token_name= 358s ++ basename /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem .pem 358s + key_name=test-intermediate-CA-trusted-certificate-0001 358s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem 358s ++ sed -n 's/ *commonName *= //p' 358s + key_cn='Test Organization Intermediate Trusted Certificate 0001' 358s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 358s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 358s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf 358s ++ basename /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf .conf 358s + tokens_dir=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-intermediate-CA-trusted-certificate-0001 358s + token_name='Test Organization Interme Token' 358s + '[' '!' -e /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-intermediate-CA-trusted-certificate-0001.conf ']' 358s + local key_file 358s + local decrypted_key 358s + mkdir -p /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-intermediate-CA-trusted-certificate-0001 358s + key_file=/tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-key.pem 358s + decrypted_key=/tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 358s + cat 358s + softhsm2-util --init-token --label 'Test Organization Interme Token' --pin 123456 --so-pin 123456 --free 358s Slot 0 has a free/uninitialized token. 358s The token has been initialized and is reassigned to slot 1692151298 358s + softhsm2-util --show-slots 358s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 358s Available slots: 358s Slot 1692151298 358s Slot info: 358s Description: SoftHSM slot ID 0x64dc2e02 358s Manufacturer ID: SoftHSM project 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Token present: yes 358s Token info: 358s Manufacturer ID: SoftHSM project 358s Model: SoftHSM v2 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Serial number: aad2a3ffe4dc2e02 358s Initialized: yes 358s User PIN init.: yes 358s Label: Test Organization Interme Token 358s Slot 1 358s Slot info: 358s Description: SoftHSM slot ID 0x1 358s Manufacturer ID: SoftHSM project 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Token present: yes 358s Token info: 358s Manufacturer ID: SoftHSM project 358s Model: SoftHSM v2 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Serial number: 358s Initialized: no 358s User PIN init.: no 358s Label: 358s + openssl rsa -passin pass:random-intermediate-ca-trusted-cert-0001-16491 -in /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 358s writing RSA key 358s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 358s + rm /tmp/sssd-softhsm2-certs-9F9klf/test-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 358s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 358s + echo 'Test Organization Interme Token' 358s + prepare_softhsm2_card /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem pass:random-sub-intermediate-ca-trusted-cert-0001-13137 358s Object 0: 358s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=aad2a3ffe4dc2e02;token=Test%20Organization%20Interme%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Intermediate%20Trusted%20Certificate%200001;type=cert 358s Type: X.509 Certificate (RSA-1024) 358s Expires: Thu Jan 15 02:47:15 2026 358s Label: Test Organization Intermediate Trusted Certificate 0001 358s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 358s 358s Test Organization Interme Token 358s + local certificate=/tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s + local key_pass=pass:random-sub-intermediate-ca-trusted-cert-0001-13137 358s + local key_cn 358s + local key_name 358s + local tokens_dir 358s + local output_cert_file 358s + token_name= 358s ++ basename /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem .pem 358s + key_name=test-sub-intermediate-CA-trusted-certificate-0001 358s ++ openssl x509 -noout -subject -nameopt multiline -in /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem 358s ++ sed -n 's/ *commonName *= //p' 358s + key_cn='Test Organization Sub Intermediate Trusted Certificate 0001' 358s + '[' -v SOFTHSM2_ISOLATED_CONFIGS ']' 358s + export SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 358s + SOFTHSM2_CONF=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf 358s ++ basename /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf .conf 358s + tokens_dir=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 358s + token_name='Test Organization Sub Int Token' 358s + '[' '!' -e /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001.conf ']' 358s + local key_file 358s + local decrypted_key 358s + mkdir -p /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-sub-intermediate-CA-trusted-certificate-0001 358s + key_file=/tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-key.pem 358s + decrypted_key=/tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 358s + cat 358s + softhsm2-util --init-token --label 'Test Organization Sub Int Token' --pin 123456 --so-pin 123456 --free 358s + softhsm2-util --show-slots 358s Slot 0 has a free/uninitialized token. 358s The token has been initialized and is reassigned to slot 1815206927 358s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --no-mark-private --load-certificate=/tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001' --id 00112233445566778899FFAABBCCDDEEFF012345 358s Available slots: 358s Slot 1815206927 358s Slot info: 358s Description: SoftHSM slot ID 0x6c31dc0f 358s Manufacturer ID: SoftHSM project 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Token present: yes 358s Token info: 358s Manufacturer ID: SoftHSM project 358s Model: SoftHSM v2 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Serial number: 8e509c516c31dc0f 358s Initialized: yes 358s User PIN init.: yes 358s Label: Test Organization Sub Int Token 358s Slot 1 358s Slot info: 358s Description: SoftHSM slot ID 0x1 358s Manufacturer ID: SoftHSM project 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Token present: yes 358s Token info: 358s Manufacturer ID: SoftHSM project 358s Model: SoftHSM v2 358s Hardware version: 2.6 358s Firmware version: 2.6 358s Serial number: 358s Initialized: no 358s User PIN init.: no 358s Label: 358s + openssl rsa -passin pass:random-sub-intermediate-ca-trusted-cert-0001-13137 -in /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-key.pem -out /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 358s writing RSA key 358s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --write --load-privkey=/tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem --login --set-pin=123456 --label 'Test Organization Sub Intermediate Trusted Certificate 0001 Key' --id 00112233445566778899FFAABBCCDDEEFF012345 358s + rm /tmp/sssd-softhsm2-certs-9F9klf/test-sub-intermediate-CA-trusted-certificate-0001-key-decrypted.pem 358s + p11tool --provider=/usr/lib/s390x-linux-gnu/softhsm/libsofthsm2.so --list-all 358s Object 0: 358s URL: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=8e509c516c31dc0f;token=Test%20Organization%20Sub%20Int%20Token;id=%00%11%22%33%44%55%66%77%88%99%FF%AA%BB%CC%DD%EE%FF%01%23%45;object=Test%20Organization%20Sub%20Intermediate%20Trusted%20Certificate%200001;type=cert 358s Type: X.509 Certificate (RSA-1024) 358s Expires: Thu Jan 15 02:47:15 2026 358s Label: Test Organization Sub Intermediate Trusted Certificate 0001 358s ID: 00:11:22:33:44:55:66:77:88:99:ff:aa:bb:cc:dd:ee:ff:01:23:45 358s 358s + echo 'Test Organization Sub Int Token' 358s Test Organization Sub Int Token 358s Certificates generation completed! 358s + echo 'Certificates generation completed!' 358s + exit 0 358s + find /tmp/sssd-softhsm2-certs-9F9klf -type d -exec chmod 777 '{}' ';' 358s + find /tmp/sssd-softhsm2-certs-9F9klf -type f -exec chmod 666 '{}' ';' 358s + backup_file /etc/sssd/sssd.conf 358s + '[' -z '' ']' 358s ++ mktemp -d -t sssd-softhsm2-backups-XXXXXX 358s + backupsdir=/tmp/sssd-softhsm2-backups-fznmXw 358s + '[' -e /etc/sssd/sssd.conf ']' 358s + delete_paths+=("$1") 358s + rm -f /etc/sssd/sssd.conf 358s ++ runuser -u ubuntu -- sh -c 'echo ~' 358s + user_home=/home/ubuntu 358s + mkdir -p /home/ubuntu 358s + chown ubuntu:ubuntu /home/ubuntu 358s ++ runuser -u ubuntu -- sh -c 'echo ${XDG_CONFIG_HOME:-~/.config}' 358s + user_config=/home/ubuntu/.config 358s + system_config=/etc 358s + softhsm2_conf_paths=("${AUTOPKGTEST_NORMAL_USER}:$user_config/softhsm2/softhsm2.conf" "root:$system_config/softhsm/softhsm2.conf") 358s + for path_pair in "${softhsm2_conf_paths[@]}" 358s + IFS=: 358s + read -r -a path 358s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 358s + backup_file /home/ubuntu/.config/softhsm2/softhsm2.conf 358s + '[' -z /tmp/sssd-softhsm2-backups-fznmXw ']' 358s + '[' -e /home/ubuntu/.config/softhsm2/softhsm2.conf ']' 358s + delete_paths+=("$1") 358s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 358s + for path_pair in "${softhsm2_conf_paths[@]}" 358s + IFS=: 358s + read -r -a path 358s + path=/etc/softhsm/softhsm2.conf 358s + backup_file /etc/softhsm/softhsm2.conf 358s + '[' -z /tmp/sssd-softhsm2-backups-fznmXw ']' 358s + '[' -e /etc/softhsm/softhsm2.conf ']' 358s ++ dirname /etc/softhsm/softhsm2.conf 358s + local back_dir=/tmp/sssd-softhsm2-backups-fznmXw//etc/softhsm 358s ++ basename /etc/softhsm/softhsm2.conf 358s + local back_path=/tmp/sssd-softhsm2-backups-fznmXw//etc/softhsm/softhsm2.conf 358s + '[' '!' -e /tmp/sssd-softhsm2-backups-fznmXw//etc/softhsm/softhsm2.conf ']' 358s + mkdir -p /tmp/sssd-softhsm2-backups-fznmXw//etc/softhsm 358s + cp -a /etc/softhsm/softhsm2.conf /tmp/sssd-softhsm2-backups-fznmXw//etc/softhsm/softhsm2.conf 358s + restore_paths+=("$back_path") 358s + rm -f /etc/softhsm/softhsm2.conf 358s + test_authentication login /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001.conf /tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem 358s + pam_service=login 358s + certificate_config=/tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001.conf 358s + ca_db=/tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem 358s + verification_options= 358s + mkdir -p -m 700 /etc/sssd 358s + echo 'Using CA DB '\''/tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem'\'' with verification options: '\'''\''' 358s + cat 358s Using CA DB '/tmp/sssd-softhsm2-certs-9F9klf/test-full-chain-CA.pem' with verification options: '' 358s + chmod 600 /etc/sssd/sssd.conf 358s + for path_pair in "${softhsm2_conf_paths[@]}" 358s + IFS=: 358s + read -r -a path 358s + user=ubuntu 358s + path=/home/ubuntu/.config/softhsm2/softhsm2.conf 358s ++ dirname /home/ubuntu/.config/softhsm2/softhsm2.conf 358s + runuser -u ubuntu -- mkdir -p /home/ubuntu/.config/softhsm2 358s + runuser -u ubuntu -- ln -sf /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001.conf /home/ubuntu/.config/softhsm2/softhsm2.conf 358s + runuser -u ubuntu -- softhsm2-util --show-slots 358s + grep 'Test Organization' 358s + for path_pair in "${softhsm2_conf_paths[@]}" 358s + IFS=: 358s + read -r -a path 358s + user=root 358s + path=/etc/softhsm/softhsm2.conf 358s ++ dirname /etc/softhsm/softhsm2.conf 358s + runuser -u root -- mkdir -p /etc/softhsm 358s Label: Test Organization Root Tr Token 358s + runuser -u root -- ln -sf /tmp/sssd-softhsm2-certs-9F9klf/softhsm2-test-root-CA-trusted-certificate-0001.conf /etc/softhsm/softhsm2.conf 358s + runuser -u root -- softhsm2-util --show-slots 358s + grep 'Test Organization' 358s + systemctl restart sssd 358s Label: Test Organization Root Tr Token 358s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 358s + for alternative in "${alternative_pam_configs[@]}" 358s + pam-auth-update --enable sss-smart-card-optional 359s + cat /etc/pam.d/common-auth 359s # 359s # /etc/pam.d/common-auth - authentication settings common to all services 359s # 359s # This file is included from other service-specific PAM config files, 359s # and should contain a list of the authentication modules that define 359s # the central authentication scheme for use on the system 359s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 359s # traditional Unix authentication mechanisms. 359s # 359s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 359s # To take advantage of this, it is recommended that you configure any 359s # local modules either before or after the default block, and use 359s # pam-auth-update to manage selection of other modules. See 359s # pam-auth-update(8) for details. 359s 359s # here are the per-package modules (the "Primary" block) 359s auth [success=3 default=ignore] pam_sss.so allow_missing_name try_cert_auth 359s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 359s auth [success=1 default=ignore] pam_sss.so use_first_pass 359s # here's the fallback if no module succeeds 359s auth requisite pam_deny.so 359s # prime the stack with a positive return value if there isn't one already; 359s # this avoids us returning an error just because nothing sets a success code 359s # since the modules above will each just jump around 359s auth required pam_permit.so 359s # and here are more per-package modules (the "Additional" block) 359s auth optional pam_cap.so 359s # end of pam-auth-update config 359s + echo -n -e 123456 359s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 359s pamtester: invoking pam_start(login, ubuntu, ...) 359s pamtester: performing operation - authenticate 359s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 359s + echo -n -e 123456 359s + runuser -u ubuntu -- pamtester -v login '' authenticate 359s pamtester: invoking pam_start(login, , ...) 359s pamtester: performing operation - authenticate 359s PIN for Test Organization Root Tr Token: pamtester: successfully authenticated 359s + echo -n -e wrong123456 359s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 359s pamtester: invoking pam_start(login, ubuntu, ...) 359s pamtester: performing operation - authenticate 362s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 362s + runuser -u ubuntu -- pamtester -v login '' authenticate 362s + echo -n -e wrong123456 362s pamtester: invoking pam_start(login, , ...) 362s pamtester: performing operation - authenticate 365s PIN for Test Organization Root Tr Token: Password: pamtester: Authentication failure 365s + echo -n -e 123456 365s + pamtester -v login root authenticate 365s pamtester: invoking pam_start(login, root, ...) 365s pamtester: performing operation - authenticate 368s Password: pamtester: Authentication failure 368s + for alternative in "${alternative_pam_configs[@]}" 368s + pam-auth-update --enable sss-smart-card-required 368s PAM configuration 368s ----------------- 368s 368s Incompatible PAM profiles selected. 368s 368s The following PAM profiles cannot be used together: 368s 368s SSS required smart card authentication, SSS optional smart card 368s authentication 368s 368s Please select a different set of modules to enable. 368s 368s + cat /etc/pam.d/common-auth 368s # 368s # /etc/pam.d/common-auth - authentication settings common to all services 368s # 368s # This file is included from other service-specific PAM config files, 368s # and should contain a list of the authentication modules that define 368s # the central authentication scheme for use on the system 368s # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the 368s # traditional Unix authentication mechanisms. 368s # 368s # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 368s # To take advantage of this, it is recommended that you configure any 368s # local modules either before or after the default block, and use 368s # pam-auth-update to manage selection of other modules. See 368s # pam-auth-update(8) for details. 368s 368s # here are the per-package modules (the "Primary" block) 368s auth [success=3 ignore=ignore default=die] pam_sss.so allow_missing_name require_cert_auth 368s auth [success=2 default=ignore] pam_unix.so nullok try_first_pass 368s auth [success=1 default=ignore] pam_sss.so use_first_pass 368s # here's the fallback if no module succeeds 368s auth requisite pam_deny.so 368s # prime the stack with a positive return value if there isn't one already; 368s # this avoids us returning an error just because nothing sets a success code 368s # since the modules above will each just jump around 368s auth required pam_permit.so 368s # and here are more per-package modules (the "Additional" block) 368s auth optional pam_cap.so 368s # end of pam-auth-update config 368s + echo -n -e 123456 368s + runuser -u ubuntu -- pamtester -v login ubuntu authenticate 368s pamtester: invoking pam_start(login, ubuntu, ...) 368s pamtester: performing operation - authenticate 370s Please (re)insert (different) Smartcardpamtester: Authentication service cannot retrieve authentication info 370s Please insert smart card 370s Please (re)insert (different) Smartcard 370s + return 2 370s + handle_exit 370s + exit_code=2 370s + restore_changes 370s + for path in "${restore_paths[@]}" 370s + local original_path 370s ++ realpath --strip --relative-base=/tmp/sssd-softhsm2-backups-fznmXw /tmp/sssd-softhsm2-backups-fznmXw//etc/softhsm/softhsm2.conf 370s + original_path=/etc/softhsm/softhsm2.conf 370s + rm /etc/softhsm/softhsm2.conf 370s + mv /tmp/sssd-softhsm2-backups-fznmXw//etc/softhsm/softhsm2.conf /etc/softhsm/softhsm2.conf 370s + for path in "${delete_paths[@]}" 370s + rm -f /etc/sssd/sssd.conf 370s + for path in "${delete_paths[@]}" 371s + rm -f /home/ubuntu/.config/softhsm2/softhsm2.conf 371s + pam-auth-update --disable sss-smart-card-optional sss-smart-card-required 371s + '[' -e /etc/sssd/sssd.conf ']' 371s + systemctl stop sssd 371s + '[' -e /etc/softhsm/softhsm2.conf ']' 371s + chmod 600 /etc/softhsm/softhsm2.conf 371s + rm -rf /tmp/sssd-softhsm2-certs-9F9klf 371s Script failed, check the log! 371s Backup preserved at /tmp/sssd-softhsm2-backups-fznmXw 371s PAM Log: /var/log/auth.log 371s SSSD PAM Log: /var/log/sssd/sssd_pam.log 371s SSSD p11_child Log: /var/log/sssd/p11_child.log 371s + '[' 2 = 0 ']' 371s + set +x 371s autopkgtest [02:46:02]: test sssd-smart-card-pam-auth-configs: -----------------------] 372s autopkgtest [02:46:03]: test sssd-smart-card-pam-auth-configs: - - - - - - - - - - results - - - - - - - - - - 372s sssd-smart-card-pam-auth-configs FAIL non-zero exit status 2 372s autopkgtest [02:46:03]: @@@@@@@@@@@@@@@@@@@@ summary 372s ldap-user-group-ldap-auth PASS 372s ldap-user-group-krb5-auth PASS 372s sssd-softhism2-certificates-tests.sh PASS 372s sssd-smart-card-pam-auth-configs FAIL non-zero exit status 2 389s nova [W] Using flock in prodstack6-s390x 389s Creating nova instance adt-plucky-s390x-sssd-20250115-023951-juju-7f2275-prod-proposed-migration-environment-20-97fce4aa-0b94-46fa-806c-c3ad6da4b20a from image adt/ubuntu-plucky-s390x-server-20250115.img (UUID 96bbe79d-bf19-474e-8a70-3d5af6b6dc35)... 389s nova [W] Timed out waiting for dcb46b64-83ec-46da-8b1e-bbb10604a465 to get deleted. 389s nova [W] Using flock in prodstack6-s390x 389s Creating nova instance adt-plucky-s390x-sssd-20250115-023951-juju-7f2275-prod-proposed-migration-environment-20-97fce4aa-0b94-46fa-806c-c3ad6da4b20a from image adt/ubuntu-plucky-s390x-server-20250115.img (UUID 96bbe79d-bf19-474e-8a70-3d5af6b6dc35)... 389s nova [W] Timed out waiting for c94ce917-d9ed-4a92-ad1f-295be4022340 to get deleted.