0s autopkgtest [17:30:53]: starting date and time: 2025-09-04 17:30:53+0000 0s autopkgtest [17:30:53]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [17:30:53]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.7w5i5dzg/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:build-essential --apt-upgrade gnutls28 --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=build-essential/12.12ubuntu2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@bos03-s390x-10.secgroup --name adt-questing-s390x-gnutls28-20250904-173053-juju-7f2275-prod-proposed-migration-environment-15-ec970648-8ac2-4f44-be35-b6d151fed160 --image adt/ubuntu-questing-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-proposed-migration-s390x -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 3s Creating nova instance adt-questing-s390x-gnutls28-20250904-173053-juju-7f2275-prod-proposed-migration-environment-15-ec970648-8ac2-4f44-be35-b6d151fed160 from image adt/ubuntu-questing-s390x-server-20250904.img (UUID 7ac7c447-3049-4f71-b62b-46468f662d6e)... 83s autopkgtest [17:32:16]: testbed dpkg architecture: s390x 83s autopkgtest [17:32:16]: testbed apt version: 3.1.5ubuntu1 84s autopkgtest [17:32:17]: @@@@@@@@@@@@@@@@@@@@ test bed setup 84s autopkgtest [17:32:17]: testbed release detected to be: None 84s autopkgtest [17:32:17]: updating testbed package index (apt update) 85s Get:1 http://ftpmaster.internal/ubuntu questing-proposed InRelease [265 kB] 85s Hit:2 http://ftpmaster.internal/ubuntu questing InRelease 85s Hit:3 http://ftpmaster.internal/ubuntu questing-updates InRelease 86s Hit:4 http://ftpmaster.internal/ubuntu questing-security InRelease 86s Get:5 http://ftpmaster.internal/ubuntu questing-proposed/main Sources [59.7 kB] 86s Get:6 http://ftpmaster.internal/ubuntu questing-proposed/restricted Sources [3848 B] 86s Get:7 http://ftpmaster.internal/ubuntu questing-proposed/multiverse Sources [14.1 kB] 86s Get:8 http://ftpmaster.internal/ubuntu questing-proposed/universe Sources [239 kB] 86s Get:9 http://ftpmaster.internal/ubuntu questing-proposed/main s390x Packages [95.8 kB] 86s Get:10 http://ftpmaster.internal/ubuntu questing-proposed/main s390x c-n-f Metadata [3688 B] 86s Get:11 http://ftpmaster.internal/ubuntu questing-proposed/restricted s390x Packages [728 B] 86s Get:12 http://ftpmaster.internal/ubuntu questing-proposed/restricted s390x c-n-f Metadata [120 B] 86s Get:13 http://ftpmaster.internal/ubuntu questing-proposed/universe s390x Packages [238 kB] 86s Get:14 http://ftpmaster.internal/ubuntu questing-proposed/universe s390x c-n-f Metadata [6332 B] 86s Get:15 http://ftpmaster.internal/ubuntu questing-proposed/multiverse s390x Packages [4208 B] 86s Get:16 http://ftpmaster.internal/ubuntu questing-proposed/multiverse s390x c-n-f Metadata [300 B] 87s Fetched 931 kB in 2s (513 kB/s) 88s Reading package lists... 88s autopkgtest [17:32:21]: upgrading testbed (apt dist-upgrade and autopurge) 89s Reading package lists... 89s Building dependency tree... 89s Reading state information... 89s Calculating upgrade... 89s The following packages will be upgraded: 89s bpftrace cron cron-daemon-common cryptsetup-bin dash libbrotli1 89s libcryptsetup12 89s 7 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 89s Need to get 3001 kB of archives. 89s After this operation, 4096 B of additional disk space will be used. 89s Get:1 http://ftpmaster.internal/ubuntu questing/main s390x dash s390x 0.5.12-12ubuntu2 [100 kB] 90s Get:2 http://ftpmaster.internal/ubuntu questing/main s390x cron s390x 3.0pl1-196ubuntu2 [89.5 kB] 90s Get:3 http://ftpmaster.internal/ubuntu questing/main s390x libcryptsetup12 s390x 2:2.8.0-1ubuntu2 [273 kB] 90s Get:4 http://ftpmaster.internal/ubuntu questing/main s390x cron-daemon-common all 3.0pl1-196ubuntu2 [15.3 kB] 90s Get:5 http://ftpmaster.internal/ubuntu questing/main s390x bpftrace s390x 0.23.5-1ubuntu1 [1917 kB] 92s Get:6 http://ftpmaster.internal/ubuntu questing/main s390x cryptsetup-bin s390x 2:2.8.0-1ubuntu2 [227 kB] 92s Get:7 http://ftpmaster.internal/ubuntu questing/main s390x libbrotli1 s390x 1.1.0-2build5 [379 kB] 93s Preconfiguring packages ... 93s Fetched 3001 kB in 4s (815 kB/s) 93s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 85685 files and directories currently installed.) 93s Preparing to unpack .../dash_0.5.12-12ubuntu2_s390x.deb ... 93s Unpacking dash (0.5.12-12ubuntu2) over (0.5.12-12ubuntu1) ... 93s Setting up dash (0.5.12-12ubuntu2) ... 93s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 85685 files and directories currently installed.) 93s Preparing to unpack .../0-cron_3.0pl1-196ubuntu2_s390x.deb ... 93s Unpacking cron (3.0pl1-196ubuntu2) over (3.0pl1-196ubuntu1) ... 93s Preparing to unpack .../1-libcryptsetup12_2%3a2.8.0-1ubuntu2_s390x.deb ... 93s Unpacking libcryptsetup12:s390x (2:2.8.0-1ubuntu2) over (2:2.8.0-1ubuntu1) ... 93s Preparing to unpack .../2-cron-daemon-common_3.0pl1-196ubuntu2_all.deb ... 93s Unpacking cron-daemon-common (3.0pl1-196ubuntu2) over (3.0pl1-196ubuntu1) ... 93s Preparing to unpack .../3-bpftrace_0.23.5-1ubuntu1_s390x.deb ... 93s Unpacking bpftrace (0.23.5-1ubuntu1) over (0.23.2-1ubuntu2) ... 93s Preparing to unpack .../4-cryptsetup-bin_2%3a2.8.0-1ubuntu2_s390x.deb ... 93s Unpacking cryptsetup-bin (2:2.8.0-1ubuntu2) over (2:2.8.0-1ubuntu1) ... 93s Preparing to unpack .../5-libbrotli1_1.1.0-2build5_s390x.deb ... 93s Unpacking libbrotli1:s390x (1.1.0-2build5) over (1.1.0-2build4) ... 93s Setting up bpftrace (0.23.5-1ubuntu1) ... 93s Setting up libbrotli1:s390x (1.1.0-2build5) ... 93s Setting up libcryptsetup12:s390x (2:2.8.0-1ubuntu2) ... 93s Setting up cron-daemon-common (3.0pl1-196ubuntu2) ... 93s Setting up cryptsetup-bin (2:2.8.0-1ubuntu2) ... 93s Setting up cron (3.0pl1-196ubuntu2) ... 94s Processing triggers for debianutils (5.23.2) ... 94s Processing triggers for libc-bin (2.42-0ubuntu1) ... 94s Processing triggers for man-db (2.13.1-1) ... 95s Reading package lists... 95s Building dependency tree... 95s Reading state information... 95s Solving dependencies... 95s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 95s autopkgtest [17:32:28]: rebooting testbed after setup commands that affected boot 114s autopkgtest [17:32:47]: testbed running kernel: Linux 6.16.0-16-generic #16-Ubuntu SMP Sun Aug 17 07:14:38 UTC 2025 116s autopkgtest [17:32:49]: @@@@@@@@@@@@@@@@@@@@ apt-source gnutls28 129s Get:1 http://ftpmaster.internal/ubuntu questing/main gnutls28 3.8.9-3ubuntu1 (dsc) [3343 B] 129s Get:2 http://ftpmaster.internal/ubuntu questing/main gnutls28 3.8.9-3ubuntu1 (tar) [6847 kB] 129s Get:3 http://ftpmaster.internal/ubuntu questing/main gnutls28 3.8.9-3ubuntu1 (asc) [833 B] 129s Get:4 http://ftpmaster.internal/ubuntu questing/main gnutls28 3.8.9-3ubuntu1 (diff) [93.1 kB] 129s gpgv: Signature made Fri Jul 11 16:39:17 2025 UTC 129s gpgv: using RSA key 50C4A0DDCF31E452CEB19B516569D855A744BE93 129s gpgv: Can't check signature: No public key 129s dpkg-source: warning: cannot verify inline signature for ./gnutls28_3.8.9-3ubuntu1.dsc: no acceptable signature found 129s autopkgtest [17:33:02]: testing package gnutls28 version 3.8.9-3ubuntu1 130s autopkgtest [17:33:03]: build not needed 133s autopkgtest [17:33:06]: test run-upstream-testsuite: preparing testbed 133s Reading package lists... 133s Building dependency tree... 133s Reading state information... 133s Solving dependencies... 133s The following packages will be REMOVED: 133s coreutils-from-gnu 133s The following NEW packages will be installed: 133s build-essential coreutils-from-uutils cpp cpp-15 cpp-15-s390x-linux-gnu 133s cpp-s390x-linux-gnu g++ g++-15 g++-15-s390x-linux-gnu g++-s390x-linux-gnu 133s gcc gcc-15 gcc-15-s390x-linux-gnu gcc-s390x-linux-gnu gnutls-bin gnutls-doc 133s libasan8 libcc1-0 libevent-2.1-7t64 libgcc-15-dev libgmp-dev libgmpxx4ldbl 133s libgnutls-dane0t64 libgnutls-openssl27t64 libgnutls28-dev libgomp1 133s libidn2-dev libisl23 libitm1 libmpc3 libp11-kit-dev libsofthsm2 133s libstdc++-15-dev libtasn1-6-dev libubsan1 libunbound8 net-tools nettle-dev 133s rust-coreutils softhsm2 softhsm2-common 134s 0 upgraded, 41 newly installed, 1 to remove and 0 not upgraded. 134s Need to get 250 MB of archives. 134s After this operation, 918 MB of additional disk space will be used. 134s Get:1 http://ftpmaster.internal/ubuntu questing/main s390x rust-coreutils s390x 0.1.0+git20250813.4af2a84-0ubuntu2 [3182 kB] 138s Get:2 http://ftpmaster.internal/ubuntu questing/universe s390x coreutils-from-uutils all 0.0.0~ubuntu20 [6490 B] 138s Get:3 http://ftpmaster.internal/ubuntu questing/main s390x libisl23 s390x 0.27-1 [704 kB] 139s Get:4 http://ftpmaster.internal/ubuntu questing/main s390x libmpc3 s390x 1.3.1-1build3 [57.6 kB] 139s Get:5 http://ftpmaster.internal/ubuntu questing/main s390x cpp-15-s390x-linux-gnu s390x 15.2.0-2ubuntu1 [71.8 MB] 233s Get:6 http://ftpmaster.internal/ubuntu questing/main s390x cpp-15 s390x 15.2.0-2ubuntu1 [1026 B] 233s Get:7 http://ftpmaster.internal/ubuntu questing/main s390x cpp-s390x-linux-gnu s390x 4:15.1.0-1ubuntu1 [5582 B] 233s Get:8 http://ftpmaster.internal/ubuntu questing/main s390x cpp s390x 4:15.1.0-1ubuntu1 [22.4 kB] 233s Get:9 http://ftpmaster.internal/ubuntu questing/main s390x libcc1-0 s390x 15.2.0-2ubuntu1 [49.9 kB] 234s Get:10 http://ftpmaster.internal/ubuntu questing/main s390x libgomp1 s390x 15.2.0-2ubuntu1 [154 kB] 234s Get:11 http://ftpmaster.internal/ubuntu questing/main s390x libitm1 s390x 15.2.0-2ubuntu1 [31.1 kB] 234s Get:12 http://ftpmaster.internal/ubuntu questing/main s390x libasan8 s390x 15.2.0-2ubuntu1 [2971 kB] 237s Get:13 http://ftpmaster.internal/ubuntu questing/main s390x libubsan1 s390x 15.2.0-2ubuntu1 [1211 kB] 239s Get:14 http://ftpmaster.internal/ubuntu questing/main s390x libgcc-15-dev s390x 15.2.0-2ubuntu1 [1046 kB] 240s Get:15 http://ftpmaster.internal/ubuntu questing/main s390x gcc-15-s390x-linux-gnu s390x 15.2.0-2ubuntu1 [79.3 MB] 333s Get:16 http://ftpmaster.internal/ubuntu questing/main s390x gcc-15 s390x 15.2.0-2ubuntu1 [509 kB] 334s Get:17 http://ftpmaster.internal/ubuntu questing/main s390x gcc-s390x-linux-gnu s390x 4:15.1.0-1ubuntu1 [1210 B] 334s Get:18 http://ftpmaster.internal/ubuntu questing/main s390x gcc s390x 4:15.1.0-1ubuntu1 [5012 B] 334s Get:19 http://ftpmaster.internal/ubuntu questing/main s390x libstdc++-15-dev s390x 15.2.0-2ubuntu1 [2634 kB] 336s Get:20 http://ftpmaster.internal/ubuntu questing/main s390x g++-15-s390x-linux-gnu s390x 15.2.0-2ubuntu1 [77.6 MB] 420s Get:21 http://ftpmaster.internal/ubuntu questing/main s390x g++-15 s390x 15.2.0-2ubuntu1 [23.1 kB] 420s Get:22 http://ftpmaster.internal/ubuntu questing/main s390x g++-s390x-linux-gnu s390x 4:15.1.0-1ubuntu1 [960 B] 420s Get:23 http://ftpmaster.internal/ubuntu questing/main s390x g++ s390x 4:15.1.0-1ubuntu1 [1084 B] 420s Get:24 http://ftpmaster.internal/ubuntu questing-proposed/main s390x build-essential s390x 12.12ubuntu2 [5258 B] 420s Get:25 http://ftpmaster.internal/ubuntu questing/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10 [145 kB] 420s Get:26 http://ftpmaster.internal/ubuntu questing/main s390x libunbound8 s390x 1.22.0-2ubuntu1 [462 kB] 420s Get:27 http://ftpmaster.internal/ubuntu questing/main s390x libgnutls-dane0t64 s390x 3.8.9-3ubuntu1 [24.5 kB] 420s Get:28 http://ftpmaster.internal/ubuntu questing/universe s390x gnutls-bin s390x 3.8.9-3ubuntu1 [286 kB] 421s Get:29 http://ftpmaster.internal/ubuntu questing/main s390x gnutls-doc all 3.8.9-3ubuntu1 [4304 kB] 425s Get:30 http://ftpmaster.internal/ubuntu questing/main s390x libgmpxx4ldbl s390x 2:6.3.0+dfsg-3ubuntu2 [10.1 kB] 425s Get:31 http://ftpmaster.internal/ubuntu questing/main s390x libgmp-dev s390x 2:6.3.0+dfsg-3ubuntu2 [424 kB] 425s Get:32 http://ftpmaster.internal/ubuntu questing/main s390x libgnutls-openssl27t64 s390x 3.8.9-3ubuntu1 [24.5 kB] 425s Get:33 http://ftpmaster.internal/ubuntu questing/main s390x libidn2-dev s390x 2.3.8-4 [122 kB] 425s Get:34 http://ftpmaster.internal/ubuntu questing/main s390x libp11-kit-dev s390x 0.25.5-3ubuntu1 [23.5 kB] 425s Get:35 http://ftpmaster.internal/ubuntu questing/main s390x libtasn1-6-dev s390x 4.20.0-2 [94.8 kB] 426s Get:36 http://ftpmaster.internal/ubuntu questing/main s390x nettle-dev s390x 3.10.1-1 [1198 kB] 427s Get:37 http://ftpmaster.internal/ubuntu questing/main s390x libgnutls28-dev s390x 3.8.9-3ubuntu1 [1016 kB] 428s Get:38 http://ftpmaster.internal/ubuntu questing/main s390x net-tools s390x 2.10-1.3ubuntu1 [205 kB] 428s Get:39 http://ftpmaster.internal/ubuntu questing/universe s390x softhsm2-common s390x 2.6.1-2.2ubuntu3 [6196 B] 428s Get:40 http://ftpmaster.internal/ubuntu questing/universe s390x libsofthsm2 s390x 2.6.1-2.2ubuntu3 [267 kB] 428s Get:41 http://ftpmaster.internal/ubuntu questing/universe s390x softhsm2 s390x 2.6.1-2.2ubuntu3 [176 kB] 428s Fetched 250 MB in 4min 55s (848 kB/s) 428s Selecting previously unselected package rust-coreutils. 429s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 85685 files and directories currently installed.) 429s Preparing to unpack .../rust-coreutils_0.1.0+git20250813.4af2a84-0ubuntu2_s390x.deb ... 429s Unpacking rust-coreutils (0.1.0+git20250813.4af2a84-0ubuntu2) ... 429s Setting up rust-coreutils (0.1.0+git20250813.4af2a84-0ubuntu2) ... 429s dpkg: coreutils-from-gnu: dependency problems, but removing anyway as you requested: 429s coreutils depends on coreutils-from-gnu | coreutils-from-uutils; however: 429s Package coreutils-from-gnu is to be removed. 429s Package coreutils-from-uutils is not installed. 429s 429s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 86418 files and directories currently installed.) 429s Removing coreutils-from-gnu (0.0.0~ubuntu20) ... 429s Adding 'diversion of /usr/bin/[ to /usr/bin/[.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/arch to /usr/bin/arch.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/b2sum to /usr/bin/b2sum.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/base32 to /usr/bin/base32.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/base64 to /usr/bin/base64.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/basename to /usr/bin/basename.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/basenc to /usr/bin/basenc.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/cat to /usr/bin/cat.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/chcon to /usr/bin/chcon.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/chgrp to /usr/bin/chgrp.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/chmod to /usr/bin/chmod.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/chown to /usr/bin/chown.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/cksum to /usr/bin/cksum.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/comm to /usr/bin/comm.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/cp to /usr/bin/cp.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/csplit to /usr/bin/csplit.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/cut to /usr/bin/cut.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/date to /usr/bin/date.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/dd to /usr/bin/dd.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/df to /usr/bin/df.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/dir to /usr/bin/dir.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/dircolors to /usr/bin/dircolors.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/dirname to /usr/bin/dirname.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/du to /usr/bin/du.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/echo to /usr/bin/echo.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/env to /usr/bin/env.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/expand to /usr/bin/expand.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/expr to /usr/bin/expr.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/factor to /usr/bin/factor.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/false to /usr/bin/false.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/fmt to /usr/bin/fmt.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/fold to /usr/bin/fold.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/groups to /usr/bin/groups.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/head to /usr/bin/head.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/hostid to /usr/bin/hostid.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/id to /usr/bin/id.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/install to /usr/bin/install.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/join to /usr/bin/join.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/link to /usr/bin/link.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/ln to /usr/bin/ln.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/logname to /usr/bin/logname.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/ls to /usr/bin/ls.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/md5sum to /usr/bin/md5sum.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/mkdir to /usr/bin/mkdir.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/mkfifo to /usr/bin/mkfifo.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/mknod to /usr/bin/mknod.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/mktemp to /usr/bin/mktemp.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/mv to /usr/bin/mv.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/nice to /usr/bin/nice.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/nl to /usr/bin/nl.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/nohup to /usr/bin/nohup.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/nproc to /usr/bin/nproc.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/numfmt to /usr/bin/numfmt.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/od to /usr/bin/od.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/paste to /usr/bin/paste.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/pathchk to /usr/bin/pathchk.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/pinky to /usr/bin/pinky.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/pr to /usr/bin/pr.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/printenv to /usr/bin/printenv.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/printf to /usr/bin/printf.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/ptx to /usr/bin/ptx.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/pwd to /usr/bin/pwd.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/readlink to /usr/bin/readlink.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/realpath to /usr/bin/realpath.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/rm to /usr/bin/rm.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/rmdir to /usr/bin/rmdir.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/runcon to /usr/bin/runcon.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/seq to /usr/bin/seq.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/sha1sum to /usr/bin/sha1sum.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/sha224sum to /usr/bin/sha224sum.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/sha256sum to /usr/bin/sha256sum.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/sha384sum to /usr/bin/sha384sum.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/sha512sum to /usr/bin/sha512sum.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/shred to /usr/bin/shred.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/shuf to /usr/bin/shuf.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/sleep to /usr/bin/sleep.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/sort to /usr/bin/sort.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/split to /usr/bin/split.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/stat to /usr/bin/stat.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/stdbuf to /usr/bin/stdbuf.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/stty to /usr/bin/stty.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/sum to /usr/bin/sum.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/sync to /usr/bin/sync.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/tac to /usr/bin/tac.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/tail to /usr/bin/tail.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/tee to /usr/bin/tee.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/test to /usr/bin/test.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/timeout to /usr/bin/timeout.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/touch to /usr/bin/touch.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/tr to /usr/bin/tr.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/true to /usr/bin/true.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/truncate to /usr/bin/truncate.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/tsort to /usr/bin/tsort.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/tty to /usr/bin/tty.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/uname to /usr/bin/uname.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/unexpand to /usr/bin/unexpand.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/uniq to /usr/bin/uniq.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/unlink to /usr/bin/unlink.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/users to /usr/bin/users.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/vdir to /usr/bin/vdir.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/wc to /usr/bin/wc.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/who to /usr/bin/who.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/whoami to /usr/bin/whoami.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/bin/yes to /usr/bin/yes.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/sbin/chroot to /usr/sbin/chroot.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/arch.1.gz to /usr/share/man/man1/arch.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/b2sum.1.gz to /usr/share/man/man1/b2sum.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/base32.1.gz to /usr/share/man/man1/base32.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/base64.1.gz to /usr/share/man/man1/base64.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/basename.1.gz to /usr/share/man/man1/basename.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/basenc.1.gz to /usr/share/man/man1/basenc.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/cat.1.gz to /usr/share/man/man1/cat.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/chcon.1.gz to /usr/share/man/man1/chcon.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/chgrp.1.gz to /usr/share/man/man1/chgrp.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/chmod.1.gz to /usr/share/man/man1/chmod.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/chown.1.gz to /usr/share/man/man1/chown.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/cksum.1.gz to /usr/share/man/man1/cksum.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/comm.1.gz to /usr/share/man/man1/comm.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/cp.1.gz to /usr/share/man/man1/cp.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/csplit.1.gz to /usr/share/man/man1/csplit.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/cut.1.gz to /usr/share/man/man1/cut.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/date.1.gz to /usr/share/man/man1/date.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/dd.1.gz to /usr/share/man/man1/dd.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/df.1.gz to /usr/share/man/man1/df.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/dir.1.gz to /usr/share/man/man1/dir.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/dircolors.1.gz to /usr/share/man/man1/dircolors.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/dirname.1.gz to /usr/share/man/man1/dirname.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/du.1.gz to /usr/share/man/man1/du.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/echo.1.gz to /usr/share/man/man1/echo.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/env.1.gz to /usr/share/man/man1/env.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/expand.1.gz to /usr/share/man/man1/expand.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/expr.1.gz to /usr/share/man/man1/expr.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/factor.1.gz to /usr/share/man/man1/factor.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/false.1.gz to /usr/share/man/man1/false.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/fmt.1.gz to /usr/share/man/man1/fmt.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/fold.1.gz to /usr/share/man/man1/fold.1.gz.remove-bak by coreutils-switch' 429s Adding 'diversion of /usr/share/man/man1/groups.1.gz to /usr/share/man/man1/groups.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/head.1.gz to /usr/share/man/man1/head.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/hostid.1.gz to /usr/share/man/man1/hostid.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/id.1.gz to /usr/share/man/man1/id.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/install.1.gz to /usr/share/man/man1/install.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/join.1.gz to /usr/share/man/man1/join.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/link.1.gz to /usr/share/man/man1/link.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/ln.1.gz to /usr/share/man/man1/ln.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/logname.1.gz to /usr/share/man/man1/logname.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/ls.1.gz to /usr/share/man/man1/ls.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/md5sum.1.gz to /usr/share/man/man1/md5sum.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/mkdir.1.gz to /usr/share/man/man1/mkdir.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/mkfifo.1.gz to /usr/share/man/man1/mkfifo.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/mknod.1.gz to /usr/share/man/man1/mknod.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/mktemp.1.gz to /usr/share/man/man1/mktemp.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/mv.1.gz to /usr/share/man/man1/mv.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/nice.1.gz to /usr/share/man/man1/nice.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/nl.1.gz to /usr/share/man/man1/nl.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/nohup.1.gz to /usr/share/man/man1/nohup.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/nproc.1.gz to /usr/share/man/man1/nproc.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/numfmt.1.gz to /usr/share/man/man1/numfmt.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/od.1.gz to /usr/share/man/man1/od.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/paste.1.gz to /usr/share/man/man1/paste.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/pathchk.1.gz to /usr/share/man/man1/pathchk.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/pinky.1.gz to /usr/share/man/man1/pinky.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/pr.1.gz to /usr/share/man/man1/pr.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/printenv.1.gz to /usr/share/man/man1/printenv.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/printf.1.gz to /usr/share/man/man1/printf.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/ptx.1.gz to /usr/share/man/man1/ptx.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/pwd.1.gz to /usr/share/man/man1/pwd.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/readlink.1.gz to /usr/share/man/man1/readlink.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/realpath.1.gz to /usr/share/man/man1/realpath.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/rm.1.gz to /usr/share/man/man1/rm.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/rmdir.1.gz to /usr/share/man/man1/rmdir.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/runcon.1.gz to /usr/share/man/man1/runcon.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/seq.1.gz to /usr/share/man/man1/seq.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/sha1sum.1.gz to /usr/share/man/man1/sha1sum.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/sha224sum.1.gz to /usr/share/man/man1/sha224sum.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/sha256sum.1.gz to /usr/share/man/man1/sha256sum.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/sha384sum.1.gz to /usr/share/man/man1/sha384sum.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/sha512sum.1.gz to /usr/share/man/man1/sha512sum.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/shred.1.gz to /usr/share/man/man1/shred.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/shuf.1.gz to /usr/share/man/man1/shuf.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/sleep.1.gz to /usr/share/man/man1/sleep.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/sort.1.gz to /usr/share/man/man1/sort.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/split.1.gz to /usr/share/man/man1/split.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/stat.1.gz to /usr/share/man/man1/stat.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/stdbuf.1.gz to /usr/share/man/man1/stdbuf.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/stty.1.gz to /usr/share/man/man1/stty.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/sum.1.gz to /usr/share/man/man1/sum.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/sync.1.gz to /usr/share/man/man1/sync.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/tac.1.gz to /usr/share/man/man1/tac.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/tail.1.gz to /usr/share/man/man1/tail.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/tee.1.gz to /usr/share/man/man1/tee.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/test.1.gz to /usr/share/man/man1/test.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/timeout.1.gz to /usr/share/man/man1/timeout.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/touch.1.gz to /usr/share/man/man1/touch.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/tr.1.gz to /usr/share/man/man1/tr.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/true.1.gz to /usr/share/man/man1/true.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/truncate.1.gz to /usr/share/man/man1/truncate.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/tsort.1.gz to /usr/share/man/man1/tsort.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/tty.1.gz to /usr/share/man/man1/tty.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/uname.1.gz to /usr/share/man/man1/uname.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/unexpand.1.gz to /usr/share/man/man1/unexpand.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/uniq.1.gz to /usr/share/man/man1/uniq.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/unlink.1.gz to /usr/share/man/man1/unlink.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/users.1.gz to /usr/share/man/man1/users.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/vdir.1.gz to /usr/share/man/man1/vdir.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/wc.1.gz to /usr/share/man/man1/wc.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/who.1.gz to /usr/share/man/man1/who.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/whoami.1.gz to /usr/share/man/man1/whoami.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/yes.1.gz to /usr/share/man/man1/yes.1.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man8/chroot.8.gz to /usr/share/man/man8/chroot.8.gz.remove-bak by coreutils-switch' 430s Adding 'diversion of /usr/share/man/man1/[.1.gz to /usr/share/man/man1/[.1.gz.remove-bak by coreutils-switch' 430s Selecting previously unselected package coreutils-from-uutils. 430s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 86627 files and directories currently installed.) 430s Preparing to unpack .../coreutils-from-uutils_0.0.0~ubuntu20_all.deb ... 430s Removing 'diversion of /usr/bin/[ to /usr/bin/[.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/arch to /usr/bin/arch.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/b2sum to /usr/bin/b2sum.remove-bak by coreutils-switch' 430s No diversion 'diversion of /usr/bin/b3sum to /usr/bin/b3sum.remove-bak by coreutils-switch', none removed. 430s Removing 'diversion of /usr/bin/base32 to /usr/bin/base32.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/base64 to /usr/bin/base64.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/basename to /usr/bin/basename.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/basenc to /usr/bin/basenc.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/cat to /usr/bin/cat.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/chcon to /usr/bin/chcon.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/chgrp to /usr/bin/chgrp.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/chmod to /usr/bin/chmod.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/chown to /usr/bin/chown.remove-bak by coreutils-switch' 430s No diversion 'diversion of /usr/bin/chroot to /usr/bin/chroot.remove-bak by coreutils-switch', none removed. 430s Removing 'diversion of /usr/bin/cksum to /usr/bin/cksum.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/comm to /usr/bin/comm.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/cp to /usr/bin/cp.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/csplit to /usr/bin/csplit.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/cut to /usr/bin/cut.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/date to /usr/bin/date.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/dd to /usr/bin/dd.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/df to /usr/bin/df.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/dir to /usr/bin/dir.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/dircolors to /usr/bin/dircolors.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/dirname to /usr/bin/dirname.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/du to /usr/bin/du.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/echo to /usr/bin/echo.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/env to /usr/bin/env.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/expand to /usr/bin/expand.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/expr to /usr/bin/expr.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/factor to /usr/bin/factor.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/false to /usr/bin/false.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/fmt to /usr/bin/fmt.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/fold to /usr/bin/fold.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/groups to /usr/bin/groups.remove-bak by coreutils-switch' 430s No diversion 'diversion of /usr/bin/hashsum to /usr/bin/hashsum.remove-bak by coreutils-switch', none removed. 430s Removing 'diversion of /usr/bin/head to /usr/bin/head.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/hostid to /usr/bin/hostid.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/id to /usr/bin/id.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/install to /usr/bin/install.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/join to /usr/bin/join.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/link to /usr/bin/link.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/ln to /usr/bin/ln.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/logname to /usr/bin/logname.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/ls to /usr/bin/ls.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/md5sum to /usr/bin/md5sum.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/mkdir to /usr/bin/mkdir.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/mkfifo to /usr/bin/mkfifo.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/mknod to /usr/bin/mknod.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/mktemp to /usr/bin/mktemp.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/mv to /usr/bin/mv.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/nice to /usr/bin/nice.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/nl to /usr/bin/nl.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/nohup to /usr/bin/nohup.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/nproc to /usr/bin/nproc.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/numfmt to /usr/bin/numfmt.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/od to /usr/bin/od.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/paste to /usr/bin/paste.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/pathchk to /usr/bin/pathchk.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/pinky to /usr/bin/pinky.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/pr to /usr/bin/pr.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/printenv to /usr/bin/printenv.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/printf to /usr/bin/printf.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/ptx to /usr/bin/ptx.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/pwd to /usr/bin/pwd.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/readlink to /usr/bin/readlink.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/realpath to /usr/bin/realpath.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/rm to /usr/bin/rm.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/rmdir to /usr/bin/rmdir.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/runcon to /usr/bin/runcon.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/seq to /usr/bin/seq.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/sha1sum to /usr/bin/sha1sum.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/sha224sum to /usr/bin/sha224sum.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/sha256sum to /usr/bin/sha256sum.remove-bak by coreutils-switch' 430s No diversion 'diversion of /usr/bin/sha3-224sum to /usr/bin/sha3-224sum.remove-bak by coreutils-switch', none removed. 430s No diversion 'diversion of /usr/bin/sha3-256sum to /usr/bin/sha3-256sum.remove-bak by coreutils-switch', none removed. 430s No diversion 'diversion of /usr/bin/sha3-384sum to /usr/bin/sha3-384sum.remove-bak by coreutils-switch', none removed. 430s No diversion 'diversion of /usr/bin/sha3-512sum to /usr/bin/sha3-512sum.remove-bak by coreutils-switch', none removed. 430s Removing 'diversion of /usr/bin/sha384sum to /usr/bin/sha384sum.remove-bak by coreutils-switch' 430s No diversion 'diversion of /usr/bin/sha3sum to /usr/bin/sha3sum.remove-bak by coreutils-switch', none removed. 430s Removing 'diversion of /usr/bin/sha512sum to /usr/bin/sha512sum.remove-bak by coreutils-switch' 430s No diversion 'diversion of /usr/bin/shake128sum to /usr/bin/shake128sum.remove-bak by coreutils-switch', none removed. 430s No diversion 'diversion of /usr/bin/shake256sum to /usr/bin/shake256sum.remove-bak by coreutils-switch', none removed. 430s Removing 'diversion of /usr/bin/shred to /usr/bin/shred.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/shuf to /usr/bin/shuf.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/sleep to /usr/bin/sleep.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/sort to /usr/bin/sort.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/split to /usr/bin/split.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/stat to /usr/bin/stat.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/stty to /usr/bin/stty.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/sum to /usr/bin/sum.remove-bak by coreutils-switch' 430s Removing 'diversion of /usr/bin/sync to /usr/bin/sync.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/tac to /usr/bin/tac.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/tail to /usr/bin/tail.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/tee to /usr/bin/tee.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/test to /usr/bin/test.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/timeout to /usr/bin/timeout.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/touch to /usr/bin/touch.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/tr to /usr/bin/tr.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/true to /usr/bin/true.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/truncate to /usr/bin/truncate.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/tsort to /usr/bin/tsort.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/tty to /usr/bin/tty.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/uname to /usr/bin/uname.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/unexpand to /usr/bin/unexpand.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/uniq to /usr/bin/uniq.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/unlink to /usr/bin/unlink.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/users to /usr/bin/users.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/vdir to /usr/bin/vdir.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/wc to /usr/bin/wc.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/who to /usr/bin/who.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/whoami to /usr/bin/whoami.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/yes to /usr/bin/yes.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/arch.1.gz to /usr/share/man/man1/arch.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/base32.1.gz to /usr/share/man/man1/base32.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/base64.1.gz to /usr/share/man/man1/base64.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/basename.1.gz to /usr/share/man/man1/basename.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/basenc.1.gz to /usr/share/man/man1/basenc.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/cat.1.gz to /usr/share/man/man1/cat.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/chcon.1.gz to /usr/share/man/man1/chcon.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/chgrp.1.gz to /usr/share/man/man1/chgrp.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/chmod.1.gz to /usr/share/man/man1/chmod.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/chown.1.gz to /usr/share/man/man1/chown.1.gz.remove-bak by coreutils-switch' 431s No diversion 'diversion of /usr/share/man/man1/chroot.1.gz to /usr/share/man/man1/chroot.1.gz.remove-bak by coreutils-switch', none removed. 431s Removing 'diversion of /usr/share/man/man1/cksum.1.gz to /usr/share/man/man1/cksum.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/comm.1.gz to /usr/share/man/man1/comm.1.gz.remove-bak by coreutils-switch' 431s No diversion 'diversion of /usr/share/man/man1/coreutils.1.gz to /usr/share/man/man1/coreutils.1.gz.remove-bak by coreutils-switch', none removed. 431s Removing 'diversion of /usr/share/man/man1/cp.1.gz to /usr/share/man/man1/cp.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/csplit.1.gz to /usr/share/man/man1/csplit.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/cut.1.gz to /usr/share/man/man1/cut.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/date.1.gz to /usr/share/man/man1/date.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/dd.1.gz to /usr/share/man/man1/dd.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/df.1.gz to /usr/share/man/man1/df.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/dir.1.gz to /usr/share/man/man1/dir.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/dircolors.1.gz to /usr/share/man/man1/dircolors.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/dirname.1.gz to /usr/share/man/man1/dirname.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/du.1.gz to /usr/share/man/man1/du.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/echo.1.gz to /usr/share/man/man1/echo.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/env.1.gz to /usr/share/man/man1/env.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/expand.1.gz to /usr/share/man/man1/expand.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/expr.1.gz to /usr/share/man/man1/expr.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/factor.1.gz to /usr/share/man/man1/factor.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/false.1.gz to /usr/share/man/man1/false.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/fmt.1.gz to /usr/share/man/man1/fmt.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/fold.1.gz to /usr/share/man/man1/fold.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/groups.1.gz to /usr/share/man/man1/groups.1.gz.remove-bak by coreutils-switch' 431s No diversion 'diversion of /usr/share/man/man1/hashsum.1.gz to /usr/share/man/man1/hashsum.1.gz.remove-bak by coreutils-switch', none removed. 431s Removing 'diversion of /usr/share/man/man1/head.1.gz to /usr/share/man/man1/head.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/hostid.1.gz to /usr/share/man/man1/hostid.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/id.1.gz to /usr/share/man/man1/id.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/install.1.gz to /usr/share/man/man1/install.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/join.1.gz to /usr/share/man/man1/join.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/link.1.gz to /usr/share/man/man1/link.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/ln.1.gz to /usr/share/man/man1/ln.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/logname.1.gz to /usr/share/man/man1/logname.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/ls.1.gz to /usr/share/man/man1/ls.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/mkdir.1.gz to /usr/share/man/man1/mkdir.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/mkfifo.1.gz to /usr/share/man/man1/mkfifo.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/mknod.1.gz to /usr/share/man/man1/mknod.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/mktemp.1.gz to /usr/share/man/man1/mktemp.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/mv.1.gz to /usr/share/man/man1/mv.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/nice.1.gz to /usr/share/man/man1/nice.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/nl.1.gz to /usr/share/man/man1/nl.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/nohup.1.gz to /usr/share/man/man1/nohup.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/nproc.1.gz to /usr/share/man/man1/nproc.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/numfmt.1.gz to /usr/share/man/man1/numfmt.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/od.1.gz to /usr/share/man/man1/od.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/paste.1.gz to /usr/share/man/man1/paste.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/pathchk.1.gz to /usr/share/man/man1/pathchk.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/pinky.1.gz to /usr/share/man/man1/pinky.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/pr.1.gz to /usr/share/man/man1/pr.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/printenv.1.gz to /usr/share/man/man1/printenv.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/printf.1.gz to /usr/share/man/man1/printf.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/ptx.1.gz to /usr/share/man/man1/ptx.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/pwd.1.gz to /usr/share/man/man1/pwd.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/readlink.1.gz to /usr/share/man/man1/readlink.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/realpath.1.gz to /usr/share/man/man1/realpath.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/rm.1.gz to /usr/share/man/man1/rm.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/rmdir.1.gz to /usr/share/man/man1/rmdir.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/runcon.1.gz to /usr/share/man/man1/runcon.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/seq.1.gz to /usr/share/man/man1/seq.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/shred.1.gz to /usr/share/man/man1/shred.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/shuf.1.gz to /usr/share/man/man1/shuf.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/sleep.1.gz to /usr/share/man/man1/sleep.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/sort.1.gz to /usr/share/man/man1/sort.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/split.1.gz to /usr/share/man/man1/split.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/stat.1.gz to /usr/share/man/man1/stat.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/stty.1.gz to /usr/share/man/man1/stty.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/sum.1.gz to /usr/share/man/man1/sum.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/sync.1.gz to /usr/share/man/man1/sync.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/tac.1.gz to /usr/share/man/man1/tac.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/tail.1.gz to /usr/share/man/man1/tail.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/tee.1.gz to /usr/share/man/man1/tee.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/test.1.gz to /usr/share/man/man1/test.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/timeout.1.gz to /usr/share/man/man1/timeout.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/touch.1.gz to /usr/share/man/man1/touch.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/tr.1.gz to /usr/share/man/man1/tr.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/true.1.gz to /usr/share/man/man1/true.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/truncate.1.gz to /usr/share/man/man1/truncate.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/tsort.1.gz to /usr/share/man/man1/tsort.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/tty.1.gz to /usr/share/man/man1/tty.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/uname.1.gz to /usr/share/man/man1/uname.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/unexpand.1.gz to /usr/share/man/man1/unexpand.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/uniq.1.gz to /usr/share/man/man1/uniq.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/unlink.1.gz to /usr/share/man/man1/unlink.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/users.1.gz to /usr/share/man/man1/users.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/vdir.1.gz to /usr/share/man/man1/vdir.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/wc.1.gz to /usr/share/man/man1/wc.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/who.1.gz to /usr/share/man/man1/who.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/whoami.1.gz to /usr/share/man/man1/whoami.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/yes.1.gz to /usr/share/man/man1/yes.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/[.1.gz to /usr/share/man/man1/[.1.gz.remove-bak by coreutils-switch' 431s Unpacking coreutils-from-uutils (0.0.0~ubuntu20) ... 431s Setting up coreutils-from-uutils (0.0.0~ubuntu20) ... 431s Removing 'diversion of /usr/share/man/man1/sha512sum.1.gz to /usr/share/man/man1/sha512sum.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/sha1sum.1.gz to /usr/share/man/man1/sha1sum.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/sha384sum.1.gz to /usr/share/man/man1/sha384sum.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/b2sum.1.gz to /usr/share/man/man1/b2sum.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/sha256sum.1.gz to /usr/share/man/man1/sha256sum.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/sbin/chroot to /usr/sbin/chroot.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/bin/stdbuf to /usr/bin/stdbuf.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/stdbuf.1.gz to /usr/share/man/man1/stdbuf.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/sha224sum.1.gz to /usr/share/man/man1/sha224sum.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man1/md5sum.1.gz to /usr/share/man/man1/md5sum.1.gz.remove-bak by coreutils-switch' 431s Removing 'diversion of /usr/share/man/man8/chroot.8.gz to /usr/share/man/man8/chroot.8.gz.remove-bak by coreutils-switch' 431s Selecting previously unselected package libisl23:s390x. 431s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 86422 files and directories currently installed.) 431s Preparing to unpack .../00-libisl23_0.27-1_s390x.deb ... 431s Unpacking libisl23:s390x (0.27-1) ... 431s Selecting previously unselected package libmpc3:s390x. 431s Preparing to unpack .../01-libmpc3_1.3.1-1build3_s390x.deb ... 431s Unpacking libmpc3:s390x (1.3.1-1build3) ... 431s Selecting previously unselected package cpp-15-s390x-linux-gnu. 431s Preparing to unpack .../02-cpp-15-s390x-linux-gnu_15.2.0-2ubuntu1_s390x.deb ... 431s Unpacking cpp-15-s390x-linux-gnu (15.2.0-2ubuntu1) ... 432s Selecting previously unselected package cpp-15. 432s Preparing to unpack .../03-cpp-15_15.2.0-2ubuntu1_s390x.deb ... 432s Unpacking cpp-15 (15.2.0-2ubuntu1) ... 432s Selecting previously unselected package cpp-s390x-linux-gnu. 433s Preparing to unpack .../04-cpp-s390x-linux-gnu_4%3a15.1.0-1ubuntu1_s390x.deb ... 433s Unpacking cpp-s390x-linux-gnu (4:15.1.0-1ubuntu1) ... 433s Selecting previously unselected package cpp. 433s Preparing to unpack .../05-cpp_4%3a15.1.0-1ubuntu1_s390x.deb ... 433s Unpacking cpp (4:15.1.0-1ubuntu1) ... 433s Selecting previously unselected package libcc1-0:s390x. 433s Preparing to unpack .../06-libcc1-0_15.2.0-2ubuntu1_s390x.deb ... 433s Unpacking libcc1-0:s390x (15.2.0-2ubuntu1) ... 433s Selecting previously unselected package libgomp1:s390x. 433s Preparing to unpack .../07-libgomp1_15.2.0-2ubuntu1_s390x.deb ... 433s Unpacking libgomp1:s390x (15.2.0-2ubuntu1) ... 433s Selecting previously unselected package libitm1:s390x. 433s Preparing to unpack .../08-libitm1_15.2.0-2ubuntu1_s390x.deb ... 433s Unpacking libitm1:s390x (15.2.0-2ubuntu1) ... 433s Selecting previously unselected package libasan8:s390x. 433s Preparing to unpack .../09-libasan8_15.2.0-2ubuntu1_s390x.deb ... 433s Unpacking libasan8:s390x (15.2.0-2ubuntu1) ... 433s Selecting previously unselected package libubsan1:s390x. 433s Preparing to unpack .../10-libubsan1_15.2.0-2ubuntu1_s390x.deb ... 433s Unpacking libubsan1:s390x (15.2.0-2ubuntu1) ... 433s Selecting previously unselected package libgcc-15-dev:s390x. 433s Preparing to unpack .../11-libgcc-15-dev_15.2.0-2ubuntu1_s390x.deb ... 433s Unpacking libgcc-15-dev:s390x (15.2.0-2ubuntu1) ... 433s Selecting previously unselected package gcc-15-s390x-linux-gnu. 433s Preparing to unpack .../12-gcc-15-s390x-linux-gnu_15.2.0-2ubuntu1_s390x.deb ... 433s Unpacking gcc-15-s390x-linux-gnu (15.2.0-2ubuntu1) ... 434s Selecting previously unselected package gcc-15. 434s Preparing to unpack .../13-gcc-15_15.2.0-2ubuntu1_s390x.deb ... 434s Unpacking gcc-15 (15.2.0-2ubuntu1) ... 434s Selecting previously unselected package gcc-s390x-linux-gnu. 434s Preparing to unpack .../14-gcc-s390x-linux-gnu_4%3a15.1.0-1ubuntu1_s390x.deb ... 434s Unpacking gcc-s390x-linux-gnu (4:15.1.0-1ubuntu1) ... 434s Selecting previously unselected package gcc. 434s Preparing to unpack .../15-gcc_4%3a15.1.0-1ubuntu1_s390x.deb ... 434s Unpacking gcc (4:15.1.0-1ubuntu1) ... 434s Selecting previously unselected package libstdc++-15-dev:s390x. 434s Preparing to unpack .../16-libstdc++-15-dev_15.2.0-2ubuntu1_s390x.deb ... 434s Unpacking libstdc++-15-dev:s390x (15.2.0-2ubuntu1) ... 434s Selecting previously unselected package g++-15-s390x-linux-gnu. 434s Preparing to unpack .../17-g++-15-s390x-linux-gnu_15.2.0-2ubuntu1_s390x.deb ... 434s Unpacking g++-15-s390x-linux-gnu (15.2.0-2ubuntu1) ... 435s Selecting previously unselected package g++-15. 435s Preparing to unpack .../18-g++-15_15.2.0-2ubuntu1_s390x.deb ... 435s Unpacking g++-15 (15.2.0-2ubuntu1) ... 435s Selecting previously unselected package g++-s390x-linux-gnu. 435s Preparing to unpack .../19-g++-s390x-linux-gnu_4%3a15.1.0-1ubuntu1_s390x.deb ... 435s Unpacking g++-s390x-linux-gnu (4:15.1.0-1ubuntu1) ... 435s Selecting previously unselected package g++. 435s Preparing to unpack .../20-g++_4%3a15.1.0-1ubuntu1_s390x.deb ... 435s Unpacking g++ (4:15.1.0-1ubuntu1) ... 435s Selecting previously unselected package build-essential. 435s Preparing to unpack .../21-build-essential_12.12ubuntu2_s390x.deb ... 435s Unpacking build-essential (12.12ubuntu2) ... 435s Selecting previously unselected package libevent-2.1-7t64:s390x. 435s Preparing to unpack .../22-libevent-2.1-7t64_2.1.12-stable-10_s390x.deb ... 435s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 435s Selecting previously unselected package libunbound8:s390x. 435s Preparing to unpack .../23-libunbound8_1.22.0-2ubuntu1_s390x.deb ... 435s Unpacking libunbound8:s390x (1.22.0-2ubuntu1) ... 435s Selecting previously unselected package libgnutls-dane0t64:s390x. 435s Preparing to unpack .../24-libgnutls-dane0t64_3.8.9-3ubuntu1_s390x.deb ... 435s Unpacking libgnutls-dane0t64:s390x (3.8.9-3ubuntu1) ... 435s Selecting previously unselected package gnutls-bin. 435s Preparing to unpack .../25-gnutls-bin_3.8.9-3ubuntu1_s390x.deb ... 435s Unpacking gnutls-bin (3.8.9-3ubuntu1) ... 435s Selecting previously unselected package gnutls-doc. 435s Preparing to unpack .../26-gnutls-doc_3.8.9-3ubuntu1_all.deb ... 435s Unpacking gnutls-doc (3.8.9-3ubuntu1) ... 435s Selecting previously unselected package libgmpxx4ldbl:s390x. 435s Preparing to unpack .../27-libgmpxx4ldbl_2%3a6.3.0+dfsg-3ubuntu2_s390x.deb ... 435s Unpacking libgmpxx4ldbl:s390x (2:6.3.0+dfsg-3ubuntu2) ... 435s Selecting previously unselected package libgmp-dev:s390x. 435s Preparing to unpack .../28-libgmp-dev_2%3a6.3.0+dfsg-3ubuntu2_s390x.deb ... 435s Unpacking libgmp-dev:s390x (2:6.3.0+dfsg-3ubuntu2) ... 435s Selecting previously unselected package libgnutls-openssl27t64:s390x. 435s Preparing to unpack .../29-libgnutls-openssl27t64_3.8.9-3ubuntu1_s390x.deb ... 435s Unpacking libgnutls-openssl27t64:s390x (3.8.9-3ubuntu1) ... 435s Selecting previously unselected package libidn2-dev:s390x. 435s Preparing to unpack .../30-libidn2-dev_2.3.8-4_s390x.deb ... 435s Unpacking libidn2-dev:s390x (2.3.8-4) ... 435s Selecting previously unselected package libp11-kit-dev:s390x. 435s Preparing to unpack .../31-libp11-kit-dev_0.25.5-3ubuntu1_s390x.deb ... 435s Unpacking libp11-kit-dev:s390x (0.25.5-3ubuntu1) ... 435s Selecting previously unselected package libtasn1-6-dev:s390x. 435s Preparing to unpack .../32-libtasn1-6-dev_4.20.0-2_s390x.deb ... 435s Unpacking libtasn1-6-dev:s390x (4.20.0-2) ... 435s Selecting previously unselected package nettle-dev:s390x. 436s Preparing to unpack .../33-nettle-dev_3.10.1-1_s390x.deb ... 436s Unpacking nettle-dev:s390x (3.10.1-1) ... 436s Selecting previously unselected package libgnutls28-dev:s390x. 436s Preparing to unpack .../34-libgnutls28-dev_3.8.9-3ubuntu1_s390x.deb ... 436s Unpacking libgnutls28-dev:s390x (3.8.9-3ubuntu1) ... 436s Selecting previously unselected package net-tools. 436s Preparing to unpack .../35-net-tools_2.10-1.3ubuntu1_s390x.deb ... 436s Unpacking net-tools (2.10-1.3ubuntu1) ... 436s Selecting previously unselected package softhsm2-common. 436s Preparing to unpack .../36-softhsm2-common_2.6.1-2.2ubuntu3_s390x.deb ... 436s Unpacking softhsm2-common (2.6.1-2.2ubuntu3) ... 436s Selecting previously unselected package libsofthsm2. 436s Preparing to unpack .../37-libsofthsm2_2.6.1-2.2ubuntu3_s390x.deb ... 436s Unpacking libsofthsm2 (2.6.1-2.2ubuntu3) ... 436s Selecting previously unselected package softhsm2. 436s Preparing to unpack .../38-softhsm2_2.6.1-2.2ubuntu3_s390x.deb ... 436s Unpacking softhsm2 (2.6.1-2.2ubuntu3) ... 436s Setting up libgnutls-openssl27t64:s390x (3.8.9-3ubuntu1) ... 436s Setting up net-tools (2.10-1.3ubuntu1) ... 436s Setting up softhsm2-common (2.6.1-2.2ubuntu3) ... 436s Creating config file /etc/softhsm/softhsm2.conf with new version 436s Setting up gnutls-doc (3.8.9-3ubuntu1) ... 436s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10) ... 436s Setting up libgomp1:s390x (15.2.0-2ubuntu1) ... 436s Setting up libunbound8:s390x (1.22.0-2ubuntu1) ... 436s Setting up libgmpxx4ldbl:s390x (2:6.3.0+dfsg-3ubuntu2) ... 436s Setting up libgnutls-dane0t64:s390x (3.8.9-3ubuntu1) ... 436s Setting up libmpc3:s390x (1.3.1-1build3) ... 436s Setting up libidn2-dev:s390x (2.3.8-4) ... 436s Setting up libubsan1:s390x (15.2.0-2ubuntu1) ... 436s Setting up libasan8:s390x (15.2.0-2ubuntu1) ... 436s Setting up libisl23:s390x (0.27-1) ... 436s Setting up libtasn1-6-dev:s390x (4.20.0-2) ... 436s Setting up libcc1-0:s390x (15.2.0-2ubuntu1) ... 436s Setting up libp11-kit-dev:s390x (0.25.5-3ubuntu1) ... 436s Setting up libitm1:s390x (15.2.0-2ubuntu1) ... 436s Setting up gnutls-bin (3.8.9-3ubuntu1) ... 436s Setting up libsofthsm2 (2.6.1-2.2ubuntu3) ... 436s Setting up softhsm2 (2.6.1-2.2ubuntu3) ... 436s Setting up libgcc-15-dev:s390x (15.2.0-2ubuntu1) ... 436s Setting up libgmp-dev:s390x (2:6.3.0+dfsg-3ubuntu2) ... 436s Setting up nettle-dev:s390x (3.10.1-1) ... 436s Setting up libstdc++-15-dev:s390x (15.2.0-2ubuntu1) ... 436s Setting up cpp-15-s390x-linux-gnu (15.2.0-2ubuntu1) ... 436s Setting up gcc-15-s390x-linux-gnu (15.2.0-2ubuntu1) ... 436s Setting up g++-15-s390x-linux-gnu (15.2.0-2ubuntu1) ... 436s Setting up libgnutls28-dev:s390x (3.8.9-3ubuntu1) ... 436s Setting up cpp-s390x-linux-gnu (4:15.1.0-1ubuntu1) ... 436s Setting up gcc-s390x-linux-gnu (4:15.1.0-1ubuntu1) ... 436s Setting up cpp-15 (15.2.0-2ubuntu1) ... 436s Setting up cpp (4:15.1.0-1ubuntu1) ... 436s Setting up g++-s390x-linux-gnu (4:15.1.0-1ubuntu1) ... 436s Setting up gcc-15 (15.2.0-2ubuntu1) ... 436s Setting up g++-15 (15.2.0-2ubuntu1) ... 436s Setting up gcc (4:15.1.0-1ubuntu1) ... 436s Setting up g++ (4:15.1.0-1ubuntu1) ... 436s update-alternatives: using /usr/bin/g++ to provide /usr/bin/c++ (c++) in auto mode 436s Setting up build-essential (12.12ubuntu2) ... 436s Processing triggers for libc-bin (2.42-0ubuntu1) ... 436s Processing triggers for man-db (2.13.1-1) ... 437s Processing triggers for install-info (7.1.1-1) ... 439s autopkgtest [17:38:12]: test run-upstream-testsuite: [----------------------- 439s running [1]../../tests/cert-reencoding.sh ... 439s reserved port 17414 439s RTNETLINK answers: Invalid argument 439s reserved port 15596 439s RTNETLINK answers: Invalid argument 439s === Bringing TLS server up === 439s RTNETLINK answers: Invalid argument 439s verify depth is 1, must return a certificate 440s RTNETLINK answers: Invalid argument 440s Processed 1 CA certificate(s). 440s Processed 1 client X.509 certificates... 440s Resolving 'localhost:15596'... 440s Connecting to '::1:15596'... 440s - Successfully sent 1 certificate(s) to server. 440s - Server has requested a certificate. 440s - Certificate type: X.509 440s - Got a certificate list of 2 certificates. 440s - Certificate[0] info: 440s - subject `CN=10.13.129.47', issuer `CN=openshift-signer@1518195148', serial 0x1b, RSA key 2048 bits, signed using RSA-SHA256, activated `2018-02-27 20:30:40 UTC', expires `2020-02-27 20:30:41 UTC', pin-sha256="B3TjGz3S+RKw91MHrajNBvkKOA5ILVmNODRTEy9whVI=" 440s Public Key ID: 440s sha1:2998d4ed3228568f89cfe53155f83822bec2259a 440s sha256:0774e31b3dd2f912b0f75307ada8cd06f90a380e482d598d383453132f708552 440s Public Key PIN: 440s pin-sha256:B3TjGz3S+RKw91MHrajNBvkKOA5ILVmNODRTEy9whVI= 440s 440s - Certificate[1] info: 440s - subject `CN=openshift-signer@1518195148', issuer `CN=openshift-signer@1518195148', serial 0x01, RSA key 2048 bits, signed using RSA-SHA256, activated `2018-02-09 16:52:27 UTC', expires `2023-02-08 16:52:28 UTC', pin-sha256="/rwXpFoFDGYQHRTUipi7kl/XZCTtqaaa052cmrqwh6k=" 440s - Status: The certificate is trusted. 440s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) 440s - Session ID: 7C:AB:08:D5:52:85:C8:4A:42:BA:7B:FF:B8:ED:12:AF:8F:03:4D:0B:8A:FE:04:FE:12:C0:71:3D:D1:B8:67:4C 440s - Options: 440s - Handshake was completed 440s 440s - Simple Client Mode: 440s 440s depth=1 CN=open- Peer has closed the GnuTLS connection 440s SUCCESS [1]../../tests/cert-reencoding.sh 440s running [2]../../tests/cert-tests/aki.sh ... 440s SUCCESS [2]../../tests/cert-tests/aki.sh 440s running [3]../../tests/cert-tests/alt-chain.sh ... 440s 440s shift-signer@1518195148 440s verify return:1 440s depth=0 O=system:cluster-admins + O=system:masters, CN=system:admin 440s verify return:1 440s ../../tests/cert-reencoding.sh: 78: kill: No such process 440s 440s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 440s Use --verify-profile low to apply the default verification of NORMAL priority string. 440s 440s SUCCESS [3]../../tests/cert-tests/alt-chain.sh 440s running [4]../../tests/cert-tests/cert-critical.sh ... 440s Subject: CN=CA-1 440s Issuer: CN=CA-0 440s Checked against: CN=CA-0 440s Signature algorithm: RSA-SHA256 440s Output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 440s 440s Chain verification output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 440s 440s Subject: CN=CA-1 440s Issuer: CN=CA-0 440s Checked against: CN=CA-0 440s Signature algorithm: RSA-SHA256 440s Output: Verified. The certificate is trusted. 440s 440s Subject: CN=server-2 440s Issuer: CN=CA-1 440s Checked against: CN=CA-1 440s Signature algorithm: RSA-SHA256 440s Output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 440s 440s Chain verification output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 440s 440s Subject: CN=CA-1 440s Issuer: CN=CA-0 440s Checked against: CN=CA-0 440s Signature algorithm: RSA-SHA256 440s Output: Verified. The certificate is trusted. 440s 440s Subject: CN=server-2 440s Issuer: CN=CA-1 440s Checked against: CN=CA-1 440s Signature algorithm: RSA-SHA256 440s Output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 440s 440s Chain verification output: Not verified. The certificate is NOT trusted. The certificate contains an unknown critical extension. 440s 440s SUCCESS [4]../../tests/cert-tests/cert-critical.sh 440s running [5]../../tests/cert-tests/cert-non-digits-time.sh ... 440s SUCCESS [5]../../tests/cert-tests/cert-non-digits-time.sh 440s running [6]../../tests/cert-tests/cert-sanity.sh ... 440s SUCCESS [6]../../tests/cert-tests/cert-sanity.sh 440s running [7]../../tests/cert-tests/cert-time.sh ... 440s SUCCESS [7]../../tests/cert-tests/cert-time.sh 440s running [8]../../tests/cert-tests/certtool-crl-decoding.sh ... 440s Loaded CAs (1 available) 440s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 440s Use --verify-profile low to apply the default verification of NORMAL priority string. 440s Loaded CAs (1 available) 440s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 440s Use --verify-profile low to apply the default verification of NORMAL priority string. 440s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 440s Use --verify-profile low to apply the default verification of NORMAL priority string. 440s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 440s Use --verify-profile low to apply the default verification of NORMAL priority string. 440s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 440s Use --verify-profile low to apply the default verification of NORMAL priority string. 440s Loaded CAs (2 available) 440s error parsing CRTs: The DER time encoding is invalid. 440s import error: Error in the certificate. 440s import error: Error in the certificate. 440s import error: Error in the time fields of certificate. 440s import error: ASN1 parser: Error in DER parsing. 440s import error: Error in the time fields of certificate. 440s import error: Error in the time fields of certificate. 440s import error: Error in the time fields of certificate. 440s import error: Error in the time fields of certificate. 440s import error: Error in the time fields of certificate. 440s SUCCESS [8]../../tests/cert-tests/certtool-crl-decoding.sh 440s running [9]../../tests/cert-tests/certtool-ecdsa.sh ... 440s Generating a 256 bit EC/ECDSA private key ... 440s SUCCESS [9]../../tests/cert-tests/certtool-ecdsa.sh 440s running [10]../../tests/cert-tests/certtool-eddsa.sh ... 440s Public Key Info: 440s Public Key Algorithm: EdDSA (Ed25519) 440s Key Security Level: High (256 bits) 440s 440s curve: Ed25519 440s private key: 440s 3c:39:17:40:05:98:4a:bc:54:ac:5e:37:a5:ab:9c:43 440s 84:6d:13:d2:a7:b3:39:97:c0:da:72:b8:dd:41:b7:7c 440s 440s 440s x: 440s 03:0c:8c:b9:80:bf:1b:47:01:37:43:88:71:73:a7:d0 440s 57:fb:87:bf:71:14:8e:e4:54:58:f8:d4:b9:98:40:c4 440s 440s 440s 440s Public Key PIN: 440s pin-sha256:5uRLF4+owo7QneY/hzs9mK0WKRoajO3f04TvBf19qbM= 440s Public Key ID: 440s sha256:e6e44b178fa8c28ed09de63f873b3d98ad16291a1a8ceddfd384ef05fd7da9b3 440s sha1:f899790b8ecceeb17c850a0eede2e5fa91ce1728 440s 440s -----BEGIN PRIVATE KEY----- 440s MC4CAQAwBQYDK2VwBCIEIDw5F0AFmEq8VKxeN6WrnEOEbRPSp7M5l8DacrjdQbd8 440s -----END PRIVATE KEY----- 440s Generating a 256 bit EdDSA (Ed25519) private key ... 440s Generating a self signed certificate... 440s X.509 Certificate Information: 440s Version: 3 440s Serial Number (hex): 07 440s Validity: 440s Not Before: Tue Oct 12 00:00:00 UTC 2038 440s Not After: Tue Nov 14 00:00:00 UTC 2045 440s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 440s Subject Public Key Algorithm: EdDSA (Ed25519) 440s Algorithm Security Level: High (256 bits) 440s Curve: Ed25519 440s X: 440s 03:0c:8c:b9:80:bf:1b:47:01:37:43:88:71:73:a7:d0 440s 57:fb:87:bf:71:14:8e:e4:54:58:f8:d4:b9:98:40:c4 440s Extensions: 440s Basic Constraints (critical): 440s Certificate Authority (CA): TRUE 440s Subject Alternative Name (not critical): 440s DNSname: www.none.org 440s DNSname: www.morethanone.org 440s DNSname: www.evenmorethanone.org 440s IPAddress: 192.168.1.1 440s RFC822Name: none@none.org 440s RFC822Name: where@none.org 440s Key Purpose (not critical): 440s OCSP signing. 440s Key Usage (critical): 440s Digital signature. 440s Certificate signing. 440s Subject Key Identifier (not critical): 440s f899790b8ecceeb17c850a0eede2e5fa91ce1728 440s CRL Distribution points (not critical): 440s URI: http://www.getcrl.crl/getcrl1/ 440s URI: http://www.getcrl.crl/getcrl2/ 440s URI: http://www.getcrl.crl/getcrl3/ 440s Other Information: 440s Public Key ID: 440s sha1:f899790b8ecceeb17c850a0eede2e5fa91ce1728 440s sha256:e6e44b178fa8c28ed09de63f873b3d98ad16291a1a8ceddfd384ef05fd7da9b3 440s Public Key PIN: 440s pin-sha256:5uRLF4+owo7QneY/hzs9mK0WKRoajO3f04TvBf19qbM= 440s 440s 440s 440s Signing certificate... 440s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 440s Use --verify-profile low to apply the default verification of NORMAL priority string. 440s Loaded CAs (1 available) 440s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 440s Issuer: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 440s Checked against: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 440s Signature algorithm: EdDSA-Ed25519 440s Output: Verified. The certificate is trusted. 440s 440s Chain verification output: Verified. The certificate is trusted. 440s 440s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 440s Use --verify-profile low to apply the default verification of NORMAL priority string. 440s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 440s Issuer: CN=GnuTLS Test CA 440s Checked against: CN=GnuTLS Test CA 440s Signature algorithm: RSA-SHA256 440s Output: Verified. The certificate is trusted. 440s 440s Chain verification output: Verified. The certificate is trusted. 440s 440s Loaded CAs (1 available) 440s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 440s Use --verify-profile low to apply the default verification of NORMAL priority string. 440s Subject: CN=server-1 440s Issuer: CN=CA-0 440s Checked against: CN=CA-0 440s Signature algorithm: EdDSA-Ed25519 440s Output: Verified. The certificate is trusted. 440s 440s Chain verification output: Verified. The certificate is trusted. 440s 440s SUCCESS [10]../../tests/cert-tests/certtool-eddsa.sh 440s running [11]../../tests/cert-tests/certtool-long-cn.sh ... 440s SUCCESS [11]../../tests/cert-tests/certtool-long-cn.sh 440s running [12]../../tests/cert-tests/certtool-long-oids.sh ... 440s SUCCESS [12]../../tests/cert-tests/certtool-long-oids.sh 440s running [13]../../tests/cert-tests/certtool-rsa-oaep.sh ... 440s Generating a 3072 bit RSA-OAEP private key... 441s Generating a 3072 bit RSA-OAEP private key... 441s Encrypted structure detected... 442s Generating a signed certificate... 442s X.509 Certificate Information: 442s Version: 3 442s Serial Number (hex): 06da6d0e77d30df45e7656b1472d0b532ad01439 442s Validity: 442s Not Before: Thu Sep 04 17:38:15 UTC 2025 442s Not After: Fri Sep 04 17:38:15 UTC 2026 442s Subject: CN=test.gnutls.org,O=GnuTLS test server 442s Subject Public Key Algorithm: RSA-OAEP 442s Algorithm Security Level: High (3072 bits) 442s Modulus (bits 3072): 442s 00:db:0b:b4:ab:c0:b8:99:bd:25:ba:65:a7:64:92:97 442s 42:bc:4d:a9:dd:c0:ec:90:cf:42:48:27:54:19:f4:c2 442s ad:cb:43:a8:ec:20:f6:44:48:a4:8f:c9:6a:fe:87:3e 442s 75:60:8b:4a:c4:e5:68:a9:f0:c4:88:d3:9b:83:b8:09 442s 2d:a5:d1:72:a6:ac:45:c5:31:95:e5:7e:fe:f5:85:24 442s 7b:ad:5c:23:84:4c:6e:50:85:37:9f:f0:14:f3:3e:0a 442s 8e:15:bd:e5:60:f7:cf:a7:fa:14:fa:4b:28:9b:72:73 442s aa:b6:94:bd:90:1a:79:ad:20:22:8e:be:f2:c0:03:4d 442s 6d:32:0a:e4:26:6f:fb:35:0c:b2:15:d5:4f:ca:01:d3 442s ca:b0:96:df:8f:36:cb:4e:6a:c8:73:b9:fb:92:63:0d 442s bd:05:3a:2d:b1:58:d1:84:4f:12:b2:be:0e:02:44:a2 442s 68:86:90:52:58:26:74:3b:90:3b:14:cb:27:41:79:aa 442s 7a:7d:28:0f:7c:00:82:fc:2b:50:4f:8e:6c:b8:56:9e 442s db:15:37:a9:0e:f8:5f:09:2c:53:6b:1f:7e:3a:dc:78 442s 44:31:3d:2b:a8:38:cd:de:bd:ca:78:45:04:a2:59:33 442s 7b:0b:04:04:83:7f:24:88:00:95:55:18:ce:9a:99:3d 442s 98:4d:fa:ac:8b:83:d1:8e:b8:40:1d:ba:f7:30:14:6c 442s 21:24:d2:19:7e:66:6c:03:a4:00:5b:ec:13:be:18:8d 442s 40:39:b6:5b:15:c6:74:6a:c2:be:dd:94:f1:81:1c:67 442s ee:a1:3c:2e:ca:ec:08:65:fd:37:9f:07:7e:e0:d2:2a 442s 58:72:66:fc:e8:b8:70:4d:48:47:4d:cf:eb:e3:6b:7a 442s 15:e2:51:7c:37:af:10:d4:20:89:1f:22:fd:83:8a:df 442s 3d:c9:48:27:04:a9:b4:e0:58:59:29:40:d9:e0:b5:f1 442s af:1f:97:40:42:17:d4:88:54:1d:b0:73:b8:36:d8:02 442s 73 442s Exponent (bits 24): 442s 01:00:01 442s Extensions: 442s Basic Constraints (critical): 442s Certificate Authority (CA): FALSE 442s Subject Alternative Name (not critical): 442s DNSname: test.gnutls.org 442s Key Usage (critical): 442s Digital signature. 442s Subject Key Identifier (not critical): 442s 012bd0c3fcdf59ddcb9b2f384bcfc5d89859edf6 442s Authority Key Identifier (not critical): 442s 4d56b76a0058f16792f4a675551b8e530103efcf 442s Other Information: 442s Public Key ID: 442s sha1:012bd0c3fcdf59ddcb9b2f384bcfc5d89859edf6 442s sha256:f8b6fd5dbeaece1690f82d7e00a2051344e52db857005b492dc48f0d16d2563c 442s Public Key PIN: 442s pin-sha256:+Lb9Xb6uzhaQ+C1+AKIFE0TlLbhXAFtJLcSPDRbSVjw= 442s 442s 442s 442s Signing certificate... 442s Subject Public Key Algorithm: RSA-OAEP 442s Generating a 3072 bit RSA-OAEP private key... 443s Encrypted structure detected... 443s Generating a signed certificate... 443s X.509 Certificate Information: 443s Version: 3 443s Serial Number (hex): 57f17dffe7a302bc47860cda6596685ab8786103 443s Validity: 443s Not Before: Thu Sep 04 17:38:16 UTC 2025 443s Not After: Fri Sep 04 17:38:16 UTC 2026 443s Subject: CN=test.gnutls.org,O=GnuTLS test server 443s Subject Public Key Algorithm: RSA-OAEP 443s Algorithm Security Level: High (3072 bits) 443s Modulus (bits 3072): 443s 00:f2:12:23:f3:f8:1a:93:73:fa:76:d1:fa:4a:57:7e 443s 89:d7:35:89:2b:4a:c8:1b:dc:79:ad:66:b9:97:4e:1d 443s 23:dc:6f:9a:ad:b9:da:f7:77:65:18:cc:d8:70:46:2a 443s c8:8e:f5:77:6d:b2:63:bd:25:55:70:62:6a:e2:e8:bc 443s ed:aa:91:9a:5a:de:85:63:5d:94:4a:e5:5f:e7:dc:3c 443s 3d:19:60:38:4b:b3:98:48:61:80:ca:4a:30:e3:1f:ee 443s 66:67:e2:ce:6d:42:aa:bb:49:d5:f3:11:12:6c:f1:1e 443s 9f:5b:45:5d:72:d7:45:cf:41:8d:e4:73:1a:56:d5:5d 443s e5:0e:b8:76:d0:9d:65:53:58:c1:0c:4d:18:26:8e:49 443s 6f:31:b9:3c:17:81:c6:7c:72:5c:af:c2:54:a3:81:76 443s 3d:9e:32:34:55:5f:eb:a2:73:66:23:34:18:a6:91:71 443s 51:da:6c:55:a2:50:84:df:a9:4b:d9:38:22:00:e2:3c 443s 5d:ee:31:21:c5:22:43:14:b2:30:5f:93:8c:5c:f3:11 443s 01:2d:ff:6e:09:b2:d5:57:c6:49:00:ef:01:38:e1:c6 443s 48:ab:a0:2b:ac:1c:ff:35:02:d3:55:d6:a4:47:6d:30 443s 89:69:dd:74:d8:c7:d2:0e:d4:f3:3a:bd:f6:a3:a2:24 443s 58:2b:d6:8d:87:a1:09:2d:1c:98:4c:46:1a:73:3e:7a 443s f6:ee:fc:75:0f:49:9a:c3:58:51:c7:05:8b:f2:5b:fd 443s e2:28:f3:78:e4:c9:bf:e4:97:73:a9:d4:92:90:ae:46 443s b3:46:9d:ad:47:3d:2e:34:1a:b3:d9:82:6f:10:b2:ab 443s 8a:58:13:9b:94:37:4a:b2:c7:34:7c:6d:08:62:7c:11 443s ea:04:d0:5b:74:31:12:a5:ce:b4:d8:11:4d:a3:c5:26 443s d8:40:a6:d2:c8:bf:c2:39:55:81:da:14:f3:e3:86:2c 443s 27:2a:f1:5d:b9:4e:37:1c:b2:1c:7d:bb:22:1f:5c:78 443s d5 443s Exponent (bits 24): 443s 01:00:01 443s Extensions: 443s Basic Constraints (critical): 443s Certificate Authority (CA): FALSE 443s Subject Alternative Name (not critical): 443s DNSname: test.gnutls.org 443s Key Usage (critical): 443s Digital signature. 443s Subject Key Identifier (not critical): 443s 8e095cfcaa69492734c972e411b6a3779161bbfb 443s Authority Key Identifier (not critical): 443s 4d56b76a0058f16792f4a675551b8e530103efcf 443s Other Information: 443s Public Key ID: 443s sha1:8e095cfcaa69492734c972e411b6a3779161bbfb 443s sha256:1d29c2f1ac53eb2ee63bd639b14f37ef4d4263132238b5eb185df3e9249fb857 443s Public Key PIN: 443s pin-sha256:HSnC8axT6y7mO9Y5sU83701CYxMiOLXrGF3z6SSfuFc= 443s 443s 443s 443s Signing certificate... 443s Subject Public Key Algorithm: RSA-OAEP 443s Generating a 3072 bit RSA-OAEP private key... 444s Encrypted structure detected... 444s Generating a signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 22a54f23f2ed57e46c635e125fcf0b471a9a6e3a 446s Validity: 446s Not Befor Subject Public Key Algorithm: RSA-OAEP 446s e: Thu Sep 04 17:38:17 UTC 2025 446s Not After: Fri Sep 04 17:38:17 UTC 2026 446s Subject: CN=test.gnutls.org,O=GnuTLS test server 446s Subject Public Key Algorithm: RSA-OAEP 446s Algorithm Security Level: High (3072 bits) 446s Modulus (bits 3072): 446s 00:f0:59:43:82:cb:4f:b0:9d:ce:7e:c5:c8:26:17:ee 446s aa:be:10:7b:05:cd:37:b5:ac:85:06:66:a1:96:a5:79 446s 26:42:93:f0:e3:e8:cb:18:12:5c:33:4f:d4:36:10:20 446s 60:3d:44:af:46:7e:95:d3:27:13:67:39:9a:b6:98:39 446s dc:f6:33:54:49:f9:5d:65:5b:23:8c:56:cb:09:93:27 446s 48:bd:8e:54:fa:e2:cb:5a:de:18:2f:3e:4e:ff:66:53 446s 3a:c6:3d:52:bf:ba:4f:fd:ad:a7:04:2f:bb:0b:4e:fe 446s bd:21:26:03:05:71:7f:58:fa:1b:e0:00:29:53:3b:91 446s 01:a7:52:a3:f5:15:82:85:33:81:3c:52:86:f5:2b:3a 446s e8:88:47:9a:ab:e9:b6:51:5f:10:a4:23:d7:39:a1:a6 446s 63:2f:c8:ff:bb:1c:27:77:f2:ca:f7:61:96:c4:d0:7e 446s 7c:cc:b1:88:a3:87:1a:29:75:99:75:94:a4:32:1f:c4 446s 09:d9:4d:fd:5a:32:37:21:82:b7:7b:33:7e:1b:39:40 446s 49:18:8b:f3:b6:5a:e1:0e:b9:d7:11:a2:a5:db:fd:07 446s 15:8e:1a:0c:d1:27:cf:00:0a:78:2b:1b:b3:44:75:41 446s 8c:ed:ce:d7:a1:70:47:d3:c2:a5:cc:36:9d:a3:54:7b 446s 51:9d:14:5c:4f:5d:31:9e:fe:1b:9a:42:9d:e9:89:0d 446s ef:be:2c:5c:7d:7a:2e:a6:1a:11:48:82:bf:3f:56:ba 446s ae:c8:b3:c0:3a:63:16:1c:37:bd:f9:01:88:f4:a6:cb 446s 47:74:32:1c:c9:32:8f:c9:52:0a:a7:b8:b0:bb:e0:ed 446s f8:5c:f5:f8:0f:7d:af:a6:af:1e:52:57:68:05:ff:ae 446s 64:ea:24:9a:5f:6e:f3:e9:5f:78:49:96:1e:f7:44:6b 446s ec:e8:c7:44:3f:be:3a:98:6f:a0:03:42:de:ab:37:bf 446s f6:e8:cf:b6:9b:e7:47:03:61:41:c2:8a:fc:c3:51:33 446s 69 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): FALSE 446s Subject Alternative Name (not critical): 446s DNSname: test.gnutls.org 446s Key Usage (critical): 446s Digital signature. 446s Subject Key Identifier (not critical): 446s af9857d4e8f7feecaf7d37c4183d63b8e9eae532 446s Authority Key Identifier (not critical): 446s 4d56b76a0058f16792f4a675551b8e530103efcf 446s Other Information: 446s Public Key ID: 446s sha1:af9857d4e8f7feecaf7d37c4183d63b8e9eae532 446s sha256:3ebc364720cd7cab83f296380cf200062bf45e86dda01e516c2a37cd857d3202 446s Public Key PIN: 446s pin-sha256:Prw2RyDNfKuD8pY4DPIABiv0XobdoB5RbCo3zYV9MgI= 446s 446s 446s 446s Signing certificate... 446s Generating a 3072 bit RSA-PSS private key... 446s Generating a 3072 bit RSA-PSS private key... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA256 446s Salt Length: 32 446s Modulus (bits 3072): 446s 00:c7:7a:1f:89:80:97:cf:12:46:22:46:b3:52:c8:8b 446s d4:ba:f2:c9:a0:85:85:0f:f2:9c:59:9b:cd:6a:99:66 446s 8f:e5:25:2a:c3:f1:98:ac:24:e9:30:a4:28:08:a9:08 446s b6:ed:fa:5c:ad:9f:3c:13:0a:f4:f6:a7:45:c7:92:f4 446s 79:7f:fd:77:5a:11:ba:e7:1a:fc:28:eb:db:eb:f1:8b 446s 12:a9:25:c2:26:fc:42:e3:1c:5f:3a:d0:47:84:67:c6 446s 93:a2:6a:9a:2b:66:0e:46:73:c1:31:a8:8f:e5:02:80 446s 55:ae:c5:a9:96:06:63:c8:ec:d9:ea:21:80:31:24:75 446s 57:bf:36:30:e3:d7:40:b1:d1:68:1b:17:0d:ff:e6:21 446s 60:41:63:aa:e3:0e:15:6d:c9:73:e6:13:f8:6e:eb:61 446s 93:35:c7:47:8c:16:bf:32:b6:3f:63:4a:05:07:97:b4 446s f6:14:89:06:31:dc:75:91:99:a6:03:a0:8a:47:43:06 446s 15:05:74:f0:1a:35:24:20:42:7c:a3:88:2c:4e:6a:24 446s d7:45:a3:6c:0a:ea:f5:7e:bf:5a:00:e1:98:08:83:80 446s 87:ad:9f:68:da:72:43:eb:fc:20:87:0a:36:3e:4e:f5 446s ad:d5:74:b9:3d:7a:d8:28:b6:2a:de:30:3d:9a:e1:fe 446s 38:f5:b2:7b:98:ad:20:4f:0f:c1:e9:a4:2e:30:6d:5c 446s 46:8a:3c:d0:e0:8e:43:e6:a8:69:48:66:5f:a1:f5:fc 446s 34:25:50:a7:cb:3d:54:9d:80:6c:68:57:9d:7e:36:09 446s 6b:8b:73:22:fd:4e:b8:42:0a:96:d8:07:34:a4:31:ed 446s 14:a6:b8:45:23:c1:0d:34:88:be:24:fb:86:e0:93:8f 446s f1:a6:16:0e:31:c0:39:64:42:8f:e7:9e:64:3b:6c:c4 446s ec:fa:41:bf:97:09:e4:36:af:9e:d8:4b:06:ad:6a:01 446s 0b:e8:fd:77:b3:08:56:06:20:ae:cb:65:cc:c1:a2:22 446s 8b 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 8c08725631eb4d5f3e35a62c5df704feabec91d7 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:8c08725631eb4d5f3e35a62c5df704feabec91d7 446s sha256:83d25e165fbcbe042efc6425727b7b1fb47a3d94bd395d7b668fcee4f42312d9 446s Public Key PIN: 446s pin-sha256:g9JeFl+8vgQu/GQlcnt7H7R6PZS9OV17Zo/O5PQjEtk= 446s 446s 446s 446s Signing certificate... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA256 446s Salt Length: 32 446s Modulus (bits 3072): 446s 00:c7:7a:1f:89:80:97:cf:12:46:22:46:b3:52:c8:8b 446s d4:ba:f2:c9:a0:85:85:0f:f2:9c:59:9b:cd:6a:99:66 446s 8f:e5:25:2a:c3:f1:98:ac:24:e9:30:a4:28:08:a9:08 446s b6:ed:fa:5c:ad:9f:3c:13:0a:f4:f6:a7:45:c7:92:f4 446s 79:7f:fd:77:5a:11:ba:e7:1a:fc:28:eb:db:eb:f1:8b 446s 12:a9:25:c2:26:fc:42:e3:1c:5f:3a:d0:47:84:67:c6 446s 93:a2:6a:9a:2b:66:0e:46:73:c1:31:a8:8f:e5:02:80 446s 55:ae:c5:a9:96:06:63:c8:ec:d9:ea:21:80:31:24:75 446s 57:bf:36:30:e3:d7:40:b1:d1:68:1b:17:0d:ff:e6:21 446s 60:41:63:aa:e3:0e:15:6d:c9:73:e6:13:f8:6e:eb:61 446s 93:35:c7:47:8c:16:bf:32:b6:3f:63:4a:05:07:97:b4 446s f6:14:89:06:31:dc:75:91:99:a6:03:a0:8a:47:43:06 446s 15:05:74:f0:1a:35:24:20:42:7c:a3:88:2c:4e:6a:24 446s d7:45:a3:6c:0a:ea:f5:7e:bf:5a:00:e1:98:08:83:80 446s 87:ad:9f:68:da:72:43:eb:fc:20:87:0a:36:3e:4e:f5 446s ad:d5:74:b9:3d:7a:d8:28:b6:2a:de:30:3d:9a:e1:fe 446s 38:f5:b2:7b:98:ad:20:4f:0f:c1:e9:a4:2e:30:6d:5c 446s 46:8a:3c:d0:e0:8e:43:e6:a8:69:48:66:5f:a1:f5:fc 446s 34:25:50:a7:cb:3d:54:9d:80:6c:68:57:9d:7e:36:09 446s 6b:8b:73:22:fd:4e:b8:42:0a:96:d8:07:34:a4:31:ed 446s 14:a6:b8:45:23:c1:0d:34:88:be:24:fb:86:e0:93:8f 446s f1:a6:16:0e:31:c0:39:64:42:8f:e7:9e:64:3b:6c:c4 446s ec:fa:41:bf:97:09:e4:36:af:9e:d8:4b:06:ad:6a:01 446s 0b:e8:fd:77:b3:08:56:06:20:ae:cb:65:cc:c1:a2:22 446s 8b 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 8c08725631eb4d5f3e35a62c5df704feabec91d7 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:8c08725631eb4d5f3e35a62c5df704feabec91d7 446s sha256:83d25e165fbcbe042efc6425727b7b1fb47a3d94bd395d7b668fcee4f42312d9 446s Public Key PIN: 446s pin-sha256:g9JeFl+8vgQu/GQlcnt7H7R6PZS9OV17Zo/O5PQjEtk= 446s 446s 446s 446s Signing certificate... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA256 446s Salt Length: 32 446s Modulus (bits 3072): 446s 00:c7:7a:1f:89:80:97:cf:12:46:22:46:b3:52:c8:8b 446s d4:ba:f2:c9:a0:85:85:0f:f2:9c:59:9b:cd:6a:99:66 446s 8f:e5:25:2a:c3:f1:98:ac:24:e9:30:a4:28:08:a9:08 446s b6:ed:fa:5c:ad:9f:3c:13:0a:f4:f6:a7:45:c7:92:f4 446s 79:7f:fd:77:5a:11:ba:e7:1a:fc:28:eb:db:eb:f1:8b 446s 12:a9:25:c2:26:fc:42:e3:1c:5f:3a:d0:47:84:67:c6 446s 93:a2:6a:9a:2b:66:0e:46:73:c1:31:a8:8f:e5:02:80 446s 55:ae:c5:a9:96:06:63:c8:ec:d9:ea:21:80:31:24:75 446s 57:bf:36:30:e3:d7:40:b1:d1:68:1b:17:0d:ff:e6:21 446s 60:41:63:aa:e3:0e:15:6d:c9:73:e6:13:f8:6e:eb:61 446s 93:35:c7:47:8c:16:bf:32:b6:3f:63:4a:05:07:97:b4 446s f6:14:89:06:31:dc:75:91:99:a6:03:a0:8a:47:43:06 446s 15:05:74:f0:1a:35:24:20:42:7c:a3:88:2c:4e:6a:24 446s d7:45:a3:6c:0a:ea:f5:7e:bf:5a:00:e1:98:08:83:80 446s 87:ad:9f:68:da:72:43:eb:fc:20:87:0a:36:3e:4e:f5 446s ad:d5:74:b9:3d:7a:d8:28:b6:2a:de:30:3d:9a:e1:fe 446s 38:f5:b2:7b:98:ad:20:4f:0f:c1:e9:a4:2e:30:6d:5c 446s 46:8a:3c:d0:e0:8e:43:e6:a8:69:48:66:5f:a1:f5:fc 446s 34:25:50:a7:cb:3d:54:9d:80:6c:68:57:9d:7e:36:09 446s 6b:8b:73:22:fd:4e:b8:42:0a:96:d8:07:34:a4:31:ed 446s 14:a6:b8:45:23:c1:0d:34:88:be:24:fb:86:e0:93:8f 446s f1:a6:16:0e:31:c0:39:64:42:8f:e7:9e:64:3b:6c:c4 446s ec:fa:41:bf:97:09:e4:36:af:9e:d8:4b:06:ad:6a:01 446s 0b:e8:fd:77:b3:08:56:06:20:ae:cb:65:cc:c1:a2:22 446s 8b 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 8c08725631eb4d5f3e35a62c5df704feabec91d7 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:8c08725631eb4d5f3e35a62c5df704feabec91d7 446s sha256:83d25e165fbcbe042efc6425727b7b1fb47a3d94bd395d7b668fcee4f42312d9 446s Public Key PIN: 446s pin-sha256:g9JeFl+8vgQu/GQlcnt7H7R6PZS9OV17Zo/O5PQjEtk= 446s 446s 446s 446s Signing certificate... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA256 446s Salt Length: 32 446s Modulus (bits 3072): 446s 00:c7:7a:1f:89:80:97:cf:12:46:22:46:b3:52:c8:8b 446s d4:ba:f2:c9:a0:85:85:0f:f2:9c:59:9b:cd:6a:99:66 446s 8f:e5:25:2a:c3:f1:98:ac:24:e9:30:a4:28:08:a9:08 446s b6:ed:fa:5c:ad:9f:3c:13:0a:f4:f6:a7:45:c7:92:f4 446s 79:7f:fd:77:5a:11:ba:e7:1a:fc:28:eb:db:eb:f1:8b 446s 12:a9:25:c2:26:fc:42:e3:1c:5f:3a:d0:47:84:67:c6 446s 93:a2:6a:9a:2b:66:0e:46:73:c1:31:a8:8f:e5:02:80 446s 55:ae:c5:a9:96:06:63:c8:ec:d9:ea:21:80:31:24:75 446s 57:bf:36:30:e3:d7:40:b1:d1:68:1b:17:0d:ff:e6:21 446s 60:41:63:aa:e3:0e:15:6d:c9:73:e6:13:f8:6e:eb:61 446s 93:35:c7:47:8c:16:bf:32:b6:3f:63:4a:05:07:97:b4 446s f6:14:89:06:31:dc:75:91:99:a6:03:a0:8a:47:43:06 446s 15:05:74:f0:1a:35:24:20:42:7c:a3:88:2c:4e:6a:24 446s d7:45:a3:6c:0a:ea:f5:7e:bf:5a:00:e1:98:08:83:80 446s 87:ad:9f:68:da:72:43:eb:fc:20:87:0a:36:3e:4e:f5 446s ad:d5:74:b9:3d:7a:d8:28:b6:2a:de:30:3d:9a:e1:fe 446s 38:f5:b2:7b:98:ad:20:4f:0f:c1:e9:a4:2e:30:6d:5c 446s 46:8a:3c:d0:e0:8e:43:e6:a8:69:48:66:5f:a1:f5:fc 446s 34:25:50:a7:cb:3d:54:9d:80:6c:68:57:9d:7e:36:09 446s 6b:8b:73:22:fd:4e:b8:42:0a:96:d8:07:34:a4:31:ed 446s 14:a6:b8:45:23:c1:0d:34:88:be:24:fb:86:e0:93:8f 446s f1:a6:16:0e:31:c0:39:64:42:8f:e7:9e:64:3b:6c:c4 446s ec:fa:41:bf:97:09:e4:36:af:9e:d8:4b:06:ad:6a:01 446s 0b:e8:fd:77:b3:08:56:06:20:ae:cb:65:cc:c1:a2:22 446s 8b 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 8c08725631eb4d5f3e35a62c5df704feabec91d7 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:8c08725631eb4d5f3e35a62c5df704feabec91d7 446s sha256:83d25e165fbcbe042efc6425727b7b1fb47a3d94bd395d7b668fcee4f42312d9 446s Public Key PIN: 446s pin-sha256:g9JeFl+8vgQu/GQlcnt7H7R6PZS9OV17Zo/O5PQjEtk= 446s 446s 446s 446s Signing certificate... 446s Generating a signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: Medium (2432 bits) 446s Parameters: 446s Hash Algorithm: SHA256 446s Salt Length: 32 446s Modulus (bits 2432): 446s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 446s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 446s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 446s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 446s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 446s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 446s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 446s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 446s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 446s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 446s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 446s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 446s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 446s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 446s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 446s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 446s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 446s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 446s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 446s 75 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 482334530a8931384a5aeacab6d2a6dece1d2b18 446s Authority Key Identifier (not critical): 446s 4d56b76a0058f16792f4a675551b8e530103efcf 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:11ce8c4ddea707d049d8031be6b5725db707c549 446s sha256:075990a687475bb0bab685b1086b2b3dee7a06ce677cae00a76d8598a09b388b 446s Public Key PIN: 446s pin-sha256:B1mQpodHW7C6toWxCGsrPe56Bs5nfK4Ap22FmKCbOIs= 446s 446s 446s 446s Signing certificate... 446s Generating a signed certificate... 446s cannot set certificate type (EC/ECDSA) incompatible with the key (RSA) 446s Generating a signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA 446s Algorithm Security Level: Medium (2432 bits) 446s Modulus (bits 2432): 446s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 446s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 446s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 446s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 446s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 446s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 446s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 446s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 446s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 446s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 446s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 446s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 446s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 446s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 446s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 446s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 446s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 446s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 446s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 446s 75 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 482334530a8931384a5aeacab6d2a6dece1d2b18 446s Authority Key Identifier (not critical): 446s 4d56b76a0058f16792f4a675551b8e530103efcf 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 446s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 446s Public Key PIN: 446s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 446s 446s 446s 446s Signing certificate... 446s Generating a 3072 bit RSA-PSS private key... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA384 446s Salt Length: 48 446s Modulus (bits 3072): 446s 00:c3:50:cb:64:64:7f:5d:8e:0a:f5:12:c7:27:00:7a 446s 75:45:f7:f8:f8:0e:95:9c:8b:62:52:79:75:2b:14:5c 446s f9:43:fd:22:c1:a6:a5:c3:99:d6:52:08:43:79:a2:14 446s d2:b4:13:f3:23:ca:25:d5:73:3e:8c:29:67:25:cc:4c 446s 52:49:9a:28:a9:97:6a:be:85:89:b8:da:6f:30:bd:3c 446s 74:1d:ff:43:63:e8:b0:5a:23:0b:1b:b2:38:4c:80:fe 446s 3b:c2:53:74:fe:28:a1:30:fd:7f:28:6c:09:a1:29:2d 446s a2:b1:ab:41:e2:9e:b3:34:e1:e6:a5:2e:db:fb:d3:8b 446s 7d:ef:6c:11:c5:9e:8b:97:c0:75:35:f4:1d:44:25:58 446s 00:55:7c:66:31:8c:cf:ef:89:ec:db:8e:42:ac:e7:ac 446s e8:96:85:40:6a:68:e5:d4:2b:da:87:d5:49:39:ed:4d 446s 8f:16:d4:be:03:99:24:54:e9:98:a4:58:aa:9f:b7:a1 446s c8:20:44:38:48:26:4c:66:65:76:bf:1e:85:8f:6b:55 446s 10:9f:a2:60:b0:1a:0a:72:fc:4e:a8:e6:42:df:1e:f0 446s ff:2d:1f:49:e2:f7:11:7e:4f:d5:8b:19:3b:11:bb:c7 446s 04:fa:7f:7d:e2:cd:14:47:27:f9:58:ef:4d:f5:fd:6b 446s 29:6f:23:60:42:34:f3:bf:f8:8f:9e:f0:f0:14:4e:55 446s 85:9b:03:d1:05:35:13:34:49:68:73:d4:38:cd:1d:17 446s 76:4e:59:fc:3d:0c:93:de:bd:fc:12:70:5d:dd:b4:39 446s d4:37:39:7d:c6:0b:25:99:4e:e3:10:d5:bc:d5:54:4f 446s c4:eb:e9:57:2d:ad:52:23:30:2e:8e:5a:92:9d:6b:18 446s 60:29:4b:4d:95:af:35:16:67:01:60:9b:3f:cb:e0:86 446s 6a:86:21:2b:47:10:0d:c7:8a:38:ea:5b:7c:ed:73:89 446s a4:fd:37:34:70:cd:c8:f9:13:49:3b:ef:b7:23:e1:0b 446s 43 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s df9a0427d6908b6754722582d6fe719fa509d0a9 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:df9a0427d6908b6754722582d6fe719fa509d0a9 446s sha256:0fe8254dd2d578264c060ec68af1ea3f3ee8600fb8adb2d0890cfd083ae3d547 446s Public Key PIN: 446s pin-sha256:D+glTdLVeCZMBg7GivHqPz7oYA+4rbLQiQz9CDrj1Uc= 446s 446s 446s 446s Signing certificate... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA384 446s Salt Length: 48 446s Modulus (bits 3072): 446s 00:c3:50:cb:64:64:7f:5d:8e:0a:f5:12:c7:27:00:7a 446s 75:45:f7:f8:f8:0e:95:9c:8b:62:52:79:75:2b:14:5c 446s f9:43:fd:22:c1:a6:a5:c3:99:d6:52:08:43:79:a2:14 446s d2:b4:13:f3:23:ca:25:d5:73:3e:8c:29:67:25:cc:4c 446s 52:49:9a:28:a9:97:6a:be:85:89:b8:da:6f:30:bd:3c 446s 74:1d:ff:43:63:e8:b0:5a:23:0b:1b:b2:38:4c:80:fe 446s 3b:c2:53:74:fe:28:a1:30:fd:7f:28:6c:09:a1:29:2d 446s a2:b1:ab:41:e2:9e:b3:34:e1:e6:a5:2e:db:fb:d3:8b 446s 7d:ef:6c:11:c5:9e:8b:97:c0:75:35:f4:1d:44:25:58 446s 00:55:7c:66:31:8c:cf:ef:89:ec:db:8e:42:ac:e7:ac 446s e8:96:85:40:6a:68:e5:d4:2b:da:87:d5:49:39:ed:4d 446s 8f:16:d4:be:03:99:24:54:e9:98:a4:58:aa:9f:b7:a1 446s c8:20:44:38:48:26:4c:66:65:76:bf:1e:85:8f:6b:55 446s 10:9f:a2:60:b0:1a:0a:72:fc:4e:a8:e6:42:df:1e:f0 446s ff:2d:1f:49:e2:f7:11:7e:4f:d5:8b:19:3b:11:bb:c7 446s 04:fa:7f:7d:e2:cd:14:47:27:f9:58:ef:4d:f5:fd:6b 446s 29:6f:23:60:42:34:f3:bf:f8:8f:9e:f0:f0:14:4e:55 446s 85:9b:03:d1:05:35:13:34:49:68:73:d4:38:cd:1d:17 446s 76:4e:59:fc:3d:0c:93:de:bd:fc:12:70:5d:dd:b4:39 446s d4:37:39:7d:c6:0b:25:99:4e:e3:10:d5:bc:d5:54:4f 446s c4:eb:e9:57:2d:ad:52:23:30:2e:8e:5a:92:9d:6b:18 446s 60:29:4b:4d:95:af:35:16:67:01:60:9b:3f:cb:e0:86 446s 6a:86:21:2b:47:10:0d:c7:8a:38:ea:5b:7c:ed:73:89 446s a4:fd:37:34:70:cd:c8:f9:13:49:3b:ef:b7:23:e1:0b 446s 43 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s df9a0427d6908b6754722582d6fe719fa509d0a9 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:df9a0427d6908b6754722582d6fe719fa509d0a9 446s sha256:0fe8254dd2d578264c060ec68af1ea3f3ee8600fb8adb2d0890cfd083ae3d547 446s Public Key PIN: 446s pin-sha256:D+glTdLVeCZMBg7GivHqPz7oYA+4rbLQiQz9CDrj1Uc= 446s 446s 446s 446s Signing certificate... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA384 446s Salt Length: 48 446s Modulus (bits 3072): 446s 00:c3:50:cb:64:64:7f:5d:8e:0a:f5:12:c7:27:00:7a 446s 75:45:f7:f8:f8:0e:95:9c:8b:62:52:79:75:2b:14:5c 446s f9:43:fd:22:c1:a6:a5:c3:99:d6:52:08:43:79:a2:14 446s d2:b4:13:f3:23:ca:25:d5:73:3e:8c:29:67:25:cc:4c 446s 52:49:9a:28:a9:97:6a:be:85:89:b8:da:6f:30:bd:3c 446s 74:1d:ff:43:63:e8:b0:5a:23:0b:1b:b2:38:4c:80:fe 446s 3b:c2:53:74:fe:28:a1:30:fd:7f:28:6c:09:a1:29:2d 446s a2:b1:ab:41:e2:9e:b3:34:e1:e6:a5:2e:db:fb:d3:8b 446s 7d:ef:6c:11:c5:9e:8b:97:c0:75:35:f4:1d:44:25:58 446s 00:55:7c:66:31:8c:cf:ef:89:ec:db:8e:42:ac:e7:ac 446s e8:96:85:40:6a:68:e5:d4:2b:da:87:d5:49:39:ed:4d 446s 8f:16:d4:be:03:99:24:54:e9:98:a4:58:aa:9f:b7:a1 446s c8:20:44:38:48:26:4c:66:65:76:bf:1e:85:8f:6b:55 446s 10:9f:a2:60:b0:1a:0a:72:fc:4e:a8:e6:42:df:1e:f0 446s ff:2d:1f:49:e2:f7:11:7e:4f:d5:8b:19:3b:11:bb:c7 446s 04:fa:7f:7d:e2:cd:14:47:27:f9:58:ef:4d:f5:fd:6b 446s 29:6f:23:60:42:34:f3:bf:f8:8f:9e:f0:f0:14:4e:55 446s 85:9b:03:d1:05:35:13:34:49:68:73:d4:38:cd:1d:17 446s 76:4e:59:fc:3d:0c:93:de:bd:fc:12:70:5d:dd:b4:39 446s d4:37:39:7d:c6:0b:25:99:4e:e3:10:d5:bc:d5:54:4f 446s c4:eb:e9:57:2d:ad:52:23:30:2e:8e:5a:92:9d:6b:18 446s 60:29:4b:4d:95:af:35:16:67:01:60:9b:3f:cb:e0:86 446s 6a:86:21:2b:47:10:0d:c7:8a:38:ea:5b:7c:ed:73:89 446s a4:fd:37:34:70:cd:c8:f9:13:49:3b:ef:b7:23:e1:0b 446s 43 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s df9a0427d6908b6754722582d6fe719fa509d0a9 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:df9a0427d6908b6754722582d6fe719fa509d0a9 446s sha256:0fe8254dd2d578264c060ec68af1ea3f3ee8600fb8adb2d0890cfd083ae3d547 446s Public Key PIN: 446s pin-sha256:D+glTdLVeCZMBg7GivHqPz7oYA+4rbLQiQz9CDrj1Uc= 446s 446s 446s 446s Signing certificate... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA384 446s Salt Length: 48 446s Modulus (bits 3072): 446s 00:c3:50:cb:64:64:7f:5d:8e:0a:f5:12:c7:27:00:7a 446s 75:45:f7:f8:f8:0e:95:9c:8b:62:52:79:75:2b:14:5c 446s f9:43:fd:22:c1:a6:a5:c3:99:d6:52:08:43:79:a2:14 446s d2:b4:13:f3:23:ca:25:d5:73:3e:8c:29:67:25:cc:4c 446s 52:49:9a:28:a9:97:6a:be:85:89:b8:da:6f:30:bd:3c 446s 74:1d:ff:43:63:e8:b0:5a:23:0b:1b:b2:38:4c:80:fe 446s 3b:c2:53:74:fe:28:a1:30:fd:7f:28:6c:09:a1:29:2d 446s a2:b1:ab:41:e2:9e:b3:34:e1:e6:a5:2e:db:fb:d3:8b 446s 7d:ef:6c:11:c5:9e:8b:97:c0:75:35:f4:1d:44:25:58 446s 00:55:7c:66:31:8c:cf:ef:89:ec:db:8e:42:ac:e7:ac 446s e8:96:85:40:6a:68:e5:d4:2b:da:87:d5:49:39:ed:4d 446s 8f:16:d4:be:03:99:24:54:e9:98:a4:58:aa:9f:b7:a1 446s c8:20:44:38:48:26:4c:66:65:76:bf:1e:85:8f:6b:55 446s 10:9f:a2:60:b0:1a:0a:72:fc:4e:a8:e6:42:df:1e:f0 446s ff:2d:1f:49:e2:f7:11:7e:4f:d5:8b:19:3b:11:bb:c7 446s 04:fa:7f:7d:e2:cd:14:47:27:f9:58:ef:4d:f5:fd:6b 446s 29:6f:23:60:42:34:f3:bf:f8:8f:9e:f0:f0:14:4e:55 446s 85:9b:03:d1:05:35:13:34:49:68:73:d4:38:cd:1d:17 446s 76:4e:59:fc:3d:0c:93:de:bd:fc:12:70:5d:dd:b4:39 446s d4:37:39:7d:c6:0b:25:99:4e:e3:10:d5:bc:d5:54:4f 446s c4:eb:e9:57:2d:ad:52:23:30:2e:8e:5a:92:9d:6b:18 446s 60:29:4b:4d:95:af:35:16:67:01:60:9b:3f:cb:e0:86 446s 6a:86:21:2b:47:10:0d:c7:8a:38:ea:5b:7c:ed:73:89 446s a4:fd:37:34:70:cd:c8:f9:13:49:3b:ef:b7:23:e1:0b 446s 43 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s df9a0427d6908b6754722582d6fe719fa509d0a9 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:df9a0427d6908b6754722582d6fe719fa509d0a9 446s sha256:0fe8254dd2d578264c060ec68af1ea3f3ee8600fb8adb2d0890cfd083ae3d547 446s Public Key PIN: 446s pin-sha256:D+glTdLVeCZMBg7GivHqPz7oYA+4rbLQiQz9CDrj1Uc= 446s 446s 446s 446s Signing certificate... 446s Generating a signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: Medium (2432 bits) 446s Parameters: 446s Hash Algorithm: SHA384 446s Salt Length: 48 446s Modulus (bits 2432): 446s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 446s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 446s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 446s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 446s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 446s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 446s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 446s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 446s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 446s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 446s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 446s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 446s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 446s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 446s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 446s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 446s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 446s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 446s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 446s 75 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 482334530a8931384a5aeacab6d2a6dece1d2b18 446s Authority Key Identifier (not critical): 446s 4d56b76a0058f16792f4a675551b8e530103efcf 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:600d8d17fb020c570715592950abf27a74d917e5 446s sha256:a49b81ef8676cef920ab02e512fe74a776b0de9fb02ae0332d20003e19f92e8d 446s Public Key PIN: 446s pin-sha256:pJuB74Z2zvkgqwLlEv50p3aw3p+wKuAzLSAAPhn5Lo0= 446s 446s 446s 446s Signing certificate... 446s Generating a signed certificate... 446s cannot set certificate type (EC/ECDSA) incompatible with the key (RSA) 446s Generating a signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA 446s Algorithm Security Level: Medium (2432 bits) 446s Modulus (bits 2432): 446s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 446s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 446s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 446s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 446s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 446s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 446s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 446s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 446s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 446s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 446s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 446s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 446s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 446s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 446s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 446s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 446s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 446s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 446s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 446s 75 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 482334530a8931384a5aeacab6d2a6dece1d2b18 446s Authority Key Identifier (not critical): 446s 4d56b76a0058f16792f4a675551b8e530103efcf 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 446s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 446s Public Key PIN: 446s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 446s 446s 446s 446s Signing certificate... 446s Generating a 3072 bit RSA-PSS private key... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA512 446s Salt Length: 64 446s Modulus (bits 3072): 446s 00:e1:e4:d2:99:2b:74:51:26:47:e7:e0:b2:07:74:36 446s 1a:e0:67:5c:25:8a:6f:38:fa:a2:06:5f:9d:68:9e:39 446s 0f:a9:30:7b:f6:4c:4c:f3:1d:06:67:88:48:48:f3:d1 446s c9:cf:3d:e3:9f:a1:d3:8f:6a:da:f2:76:df:79:4d:ca 446s 75:95:91:70:31:da:97:eb:7d:d0:84:cd:6a:9b:9a:61 446s a7:e1:98:53:e3:88:45:db:3a:1b:3d:0f:07:6c:f2:55 446s ba:96:01:d7:83:1b:f7:84:90:05:af:6a:18:20:ba:6d 446s a5:eb:99:4f:89:94:fa:00:08:28:68:39:70:97:12:3d 446s b8:ed:5e:83:63:32:57:8e:b2:0e:0d:14:78:43:a9:99 446s 8f:01:e5:bd:9b:0a:1c:1f:3f:20:a2:74:d5:ca:19:93 446s 8f:57:37:e8:81:36:ce:b8:c6:bf:71:4a:f2:80:c0:0a 446s c4:2d:23:2c:a8:8a:64:5c:d0:ef:8e:bc:df:28:5b:82 446s 20:8e:d0:fc:bd:c4:87:02:a6:88:0f:93:21:b4:28:4c 446s ea:eb:9e:d0:73:3f:73:b8:f3:89:29:ca:9c:d2:2a:22 446s 0f:24:66:3a:e3:cd:f9:68:6e:41:6f:82:be:50:9e:10 446s d8:3a:b3:5d:70:4b:1c:cc:30:78:b5:68:a7:fa:ef:1c 446s 41:aa:a0:51:f5:54:9a:83:7b:89:58:de:12:e1:96:91 446s 0d:4c:8a:b4:ae:62:a7:a6:c7:3f:fd:3f:e8:6b:90:eb 446s 3a:8b:0b:48:98:a0:94:8e:fb:79:21:60:bc:a5:d5:cd 446s 11:00:4a:dd:51:36:2d:48:81:76:7b:2e:33:f7:26:14 446s fe:39:1f:90:46:86:69:06:c9:d0:7e:22:2e:b5:2a:3b 446s be:3f:57:6f:4b:40:74:11:c9:21:9d:38:ee:60:9c:64 446s 3e:2f:fb:fd:c1:17:8a:1c:c7:e6:da:42:82:22:fb:bb 446s da:0c:5e:01:92:71:0c:5c:16:46:98:02:f8:3d:72:0e 446s f5 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s b1c4379d1bdf9265187c6ec4cb0dc0bc8d5bdd58 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:b1c4379d1bdf9265187c6ec4cb0dc0bc8d5bdd58 446s sha256:75ef88f7981715df672c186b492fe6c5d71fbccfb8c4222db7432ab29b96c3fb 446s Public Key PIN: 446s pin-sha256:de+I95gXFd9nLBhrSS/mxdcfvM+4xCItt0MqspuWw/s= 446s 446s 446s 446s Signing certificate... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA512 446s Salt Length: 64 446s Modulus (bits 3072): 446s 00:e1:e4:d2:99:2b:74:51:26:47:e7:e0:b2:07:74:36 446s 1a:e0:67:5c:25:8a:6f:38:fa:a2:06:5f:9d:68:9e:39 446s 0f:a9:30:7b:f6:4c:4c:f3:1d:06:67:88:48:48:f3:d1 446s c9:cf:3d:e3:9f:a1:d3:8f:6a:da:f2:76:df:79:4d:ca 446s 75:95:91:70:31:da:97:eb:7d:d0:84:cd:6a:9b:9a:61 446s a7:e1:98:53:e3:88:45:db:3a:1b:3d:0f:07:6c:f2:55 446s ba:96:01:d7:83:1b:f7:84:90:05:af:6a:18:20:ba:6d 446s a5:eb:99:4f:89:94:fa:00:08:28:68:39:70:97:12:3d 446s b8:ed:5e:83:63:32:57:8e:b2:0e:0d:14:78:43:a9:99 446s 8f:01:e5:bd:9b:0a:1c:1f:3f:20:a2:74:d5:ca:19:93 446s 8f:57:37:e8:81:36:ce:b8:c6:bf:71:4a:f2:80:c0:0a 446s c4:2d:23:2c:a8:8a:64:5c:d0:ef:8e:bc:df:28:5b:82 446s 20:8e:d0:fc:bd:c4:87:02:a6:88:0f:93:21:b4:28:4c 446s ea:eb:9e:d0:73:3f:73:b8:f3:89:29:ca:9c:d2:2a:22 446s 0f:24:66:3a:e3:cd:f9:68:6e:41:6f:82:be:50:9e:10 446s d8:3a:b3:5d:70:4b:1c:cc:30:78:b5:68:a7:fa:ef:1c 446s 41:aa:a0:51:f5:54:9a:83:7b:89:58:de:12:e1:96:91 446s 0d:4c:8a:b4:ae:62:a7:a6:c7:3f:fd:3f:e8:6b:90:eb 446s 3a:8b:0b:48:98:a0:94:8e:fb:79:21:60:bc:a5:d5:cd 446s 11:00:4a:dd:51:36:2d:48:81:76:7b:2e:33:f7:26:14 446s fe:39:1f:90:46:86:69:06:c9:d0:7e:22:2e:b5:2a:3b 446s be:3f:57:6f:4b:40:74:11:c9:21:9d:38:ee:60:9c:64 446s 3e:2f:fb:fd:c1:17:8a:1c:c7:e6:da:42:82:22:fb:bb 446s da:0c:5e:01:92:71:0c:5c:16:46:98:02:f8:3d:72:0e 446s f5 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s b1c4379d1bdf9265187c6ec4cb0dc0bc8d5bdd58 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:b1c4379d1bdf9265187c6ec4cb0dc0bc8d5bdd58 446s sha256:75ef88f7981715df672c186b492fe6c5d71fbccfb8c4222db7432ab29b96c3fb 446s Public Key PIN: 446s pin-sha256:de+I95gXFd9nLBhrSS/mxdcfvM+4xCItt0MqspuWw/s= 446s 446s 446s 446s Signing certificate... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA512 446s Salt Length: 64 446s Modulus (bits 3072): 446s 00:e1:e4:d2:99:2b:74:51:26:47:e7:e0:b2:07:74:36 446s 1a:e0:67:5c:25:8a:6f:38:fa:a2:06:5f:9d:68:9e:39 446s 0f:a9:30:7b:f6:4c:4c:f3:1d:06:67:88:48:48:f3:d1 446s c9:cf:3d:e3:9f:a1:d3:8f:6a:da:f2:76:df:79:4d:ca 446s 75:95:91:70:31:da:97:eb:7d:d0:84:cd:6a:9b:9a:61 446s a7:e1:98:53:e3:88:45:db:3a:1b:3d:0f:07:6c:f2:55 446s ba:96:01:d7:83:1b:f7:84:90:05:af:6a:18:20:ba:6d 446s a5:eb:99:4f:89:94:fa:00:08:28:68:39:70:97:12:3d 446s b8:ed:5e:83:63:32:57:8e:b2:0e:0d:14:78:43:a9:99 446s 8f:01:e5:bd:9b:0a:1c:1f:3f:20:a2:74:d5:ca:19:93 446s 8f:57:37:e8:81:36:ce:b8:c6:bf:71:4a:f2:80:c0:0a 446s c4:2d:23:2c:a8:8a:64:5c:d0:ef:8e:bc:df:28:5b:82 446s 20:8e:d0:fc:bd:c4:87:02:a6:88:0f:93:21:b4:28:4c 446s ea:eb:9e:d0:73:3f:73:b8:f3:89:29:ca:9c:d2:2a:22 446s 0f:24:66:3a:e3:cd:f9:68:6e:41:6f:82:be:50:9e:10 446s d8:3a:b3:5d:70:4b:1c:cc:30:78:b5:68:a7:fa:ef:1c 446s 41:aa:a0:51:f5:54:9a:83:7b:89:58:de:12:e1:96:91 446s 0d:4c:8a:b4:ae:62:a7:a6:c7:3f:fd:3f:e8:6b:90:eb 446s 3a:8b:0b:48:98:a0:94:8e:fb:79:21:60:bc:a5:d5:cd 446s 11:00:4a:dd:51:36:2d:48:81:76:7b:2e:33:f7:26:14 446s fe:39:1f:90:46:86:69:06:c9:d0:7e:22:2e:b5:2a:3b 446s be:3f:57:6f:4b:40:74:11:c9:21:9d:38:ee:60:9c:64 446s 3e:2f:fb:fd:c1:17:8a:1c:c7:e6:da:42:82:22:fb:bb 446s da:0c:5e:01:92:71:0c:5c:16:46:98:02:f8:3d:72:0e 446s f5 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s b1c4379d1bdf9265187c6ec4cb0dc0bc8d5bdd58 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:b1c4379d1bdf9265187c6ec4cb0dc0bc8d5bdd58 446s sha256:75ef88f7981715df672c186b492fe6c5d71fbccfb8c4222db7432ab29b96c3fb 446s Public Key PIN: 446s pin-sha256:de+I95gXFd9nLBhrSS/mxdcfvM+4xCItt0MqspuWw/s= 446s 446s 446s 446s Signing certificate... 446s Generating a self signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: High (3072 bits) 446s Parameters: 446s Hash Algorithm: SHA512 446s Salt Length: 64 446s Modulus (bits 3072): 446s 00:e1:e4:d2:99:2b:74:51:26:47:e7:e0:b2:07:74:36 446s 1a:e0:67:5c:25:8a:6f:38:fa:a2:06:5f:9d:68:9e:39 446s 0f:a9:30:7b:f6:4c:4c:f3:1d:06:67:88:48:48:f3:d1 446s c9:cf:3d:e3:9f:a1:d3:8f:6a:da:f2:76:df:79:4d:ca 446s 75:95:91:70:31:da:97:eb:7d:d0:84:cd:6a:9b:9a:61 446s a7:e1:98:53:e3:88:45:db:3a:1b:3d:0f:07:6c:f2:55 446s ba:96:01:d7:83:1b:f7:84:90:05:af:6a:18:20:ba:6d 446s a5:eb:99:4f:89:94:fa:00:08:28:68:39:70:97:12:3d 446s b8:ed:5e:83:63:32:57:8e:b2:0e:0d:14:78:43:a9:99 446s 8f:01:e5:bd:9b:0a:1c:1f:3f:20:a2:74:d5:ca:19:93 446s 8f:57:37:e8:81:36:ce:b8:c6:bf:71:4a:f2:80:c0:0a 446s c4:2d:23:2c:a8:8a:64:5c:d0:ef:8e:bc:df:28:5b:82 446s 20:8e:d0:fc:bd:c4:87:02:a6:88:0f:93:21:b4:28:4c 446s ea:eb:9e:d0:73:3f:73:b8:f3:89:29:ca:9c:d2:2a:22 446s 0f:24:66:3a:e3:cd:f9:68:6e:41:6f:82:be:50:9e:10 446s d8:3a:b3:5d:70:4b:1c:cc:30:78:b5:68:a7:fa:ef:1c 446s 41:aa:a0:51:f5:54:9a:83:7b:89:58:de:12:e1:96:91 446s 0d:4c:8a:b4:ae:62:a7:a6:c7:3f:fd:3f:e8:6b:90:eb 446s 3a:8b:0b:48:98:a0:94:8e:fb:79:21:60:bc:a5:d5:cd 446s 11:00:4a:dd:51:36:2d:48:81:76:7b:2e:33:f7:26:14 446s fe:39:1f:90:46:86:69:06:c9:d0:7e:22:2e:b5:2a:3b 446s be:3f:57:6f:4b:40:74:11:c9:21:9d:38:ee:60:9c:64 446s 3e:2f:fb:fd:c1:17:8a:1c:c7:e6:da:42:82:22:fb:bb 446s da:0c:5e:01:92:71:0c:5c:16:46:98:02:f8:3d:72:0e 446s f5 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s b1c4379d1bdf9265187c6ec4cb0dc0bc8d5bdd58 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:b1c4379d1bdf9265187c6ec4cb0dc0bc8d5bdd58 446s sha256:75ef88f7981715df672c186b492fe6c5d71fbccfb8c4222db7432ab29b96c3fb 446s Public Key PIN: 446s pin-sha256:de+I95gXFd9nLBhrSS/mxdcfvM+4xCItt0MqspuWw/s= 446s 446s 446s 446s Signing certificate... 446s Generating a signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:18 UTC 2025 446s Not After: Thu Oct 07 17:38:18 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA-PSS 446s Algorithm Security Level: Medium (2432 bits) 446s Parameters: 446s Hash Algorithm: SHA512 446s Salt Length: 64 446s Modulus (bits 2432): 446s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 446s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 446s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 446s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 446s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 446s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 446s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 446s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 446s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 446s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 446s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 446s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 446s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 446s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 446s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 446s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 446s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 446s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 446s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 446s 75 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 482334530a8931384a5aeacab6d2a6dece1d2b18 446s Authority Key Identifier (not critical): 446s 4d56b76a0058f16792f4a675551b8e530103efcf 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:b0d4433ac119ebcab37c481d2fd793fd109d2c47 446s sha256:ba44413a4e54faa010b0065ccfde781125729039568343d5e6bd0cba9be7bc90 446s Public Key PIN: 446s pin-sha256:ukRBOk5U+qAQsAZcz954ESVykDlWg0PV5r0MupvnvJA= 446s 446s 446s 446s Signing certificate... 446s Generating a signed certificate... 446s cannot set certificate type (EC/ECDSA) incompatible with the key (RSA) 446s Generating a signed certificate... 446s X.509 Certificate Information: 446s Version: 3 446s Serial Number (hex): 07 446s Validity: 446s Not Before: Thu Sep 04 17:38:19 UTC 2025 446s Not After: Thu Oct 07 17:38:19 UTC 2032 446s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 446s Subject Public Key Algorithm: RSA 446s Algorithm Security Level: Medium (2432 bits) 446s Modulus (bits 2432): 446s 00:b4:6b:27:98:25:af:c1:ff:1e:ca:b0:7e:f4:d8:bc 446s ed:43:86:67:54:5d:da:b4:1e:c2:90:5f:83:3c:02:11 446s fc:13:72:85:b2:88:a4:65:41:0b:76:5f:23:be:8a:9f 446s fe:79:4b:73:3b:2e:c7:4b:3c:bf:16:c9:97:55:35:17 446s f3:a1:72:4b:30:c2:e0:27:94:12:f3:56:00:e6:ce:82 446s 4b:11:5d:a4:1e:9b:fa:fa:b9:1b:2a:4d:18:b5:ba:a5 446s e6:0c:c7:a8:a8:a1:6d:aa:88:84:dc:96:0e:b2:6c:1c 446s 35:aa:e7:c7:94:3d:f9:d5:c7:c2:a2:0d:4b:b3:6e:7a 446s f7:08:5f:c5:09:cd:15:93:1a:f7:98:df:2a:4c:66:89 446s 24:ed:1f:d0:16:63:81:65:a5:58:3b:a1:cd:25:62:9b 446s 99:81:54:08:17:18:ec:7c:2f:08:a2:3b:28:57:32:9d 446s 17:47:0a:86:fb:62:b1:41:99:e6:fb:de:a8:ea:20:7e 446s f3:1b:ee:ba:ea:9a:21:64:29:92:f2:ad:73:e5:19:05 446s 9d:37:53:e2:11:9f:18:5f:22:ba:e2:8b:0d:00:8c:9e 446s 2f:a7:87:3d:40:be:4a:a2:a5:92:08:0c:2e:61:c0:58 446s 7c:9a:99:e1:d6:ac:83:39:25:cf:3e:1b:ed:eb:a3:6d 446s 9d:cb:c5:38:de:c1:c7:6e:9b:34:14:be:30:3e:82:90 446s 1e:b9:4a:9a:76:e4:ef:33:0c:46:a2:31:72:f6:c3:61 446s 0b:f8:aa:67:89:f4:a5:e5:76:37:a1:29:9f:80:79:aa 446s 75 446s Exponent (bits 24): 446s 01:00:01 446s Extensions: 446s Basic Constraints (critical): 446s Certificate Authority (CA): TRUE 446s Subject Alternative Name (not critical): 446s DNSname: www.none.org 446s DNSname: www.morethanone.org 446s DNSname: www.evenmorethanone.org 446s IPAddress: 192.168.1.1 446s RFC822Name: none@none.org 446s RFC822Name: where@none.org 446s Key Purpose (not critical): 446s OCSP signing. 446s Key Usage (critical): 446s Digital signature. 446s Certificate signing. 446s Subject Key Identifier (not critical): 446s 482334530a8931384a5aeacab6d2a6dece1d2b18 446s Authority Key Identifier (not critical): 446s 4d56b76a0058f16792f4a675551b8e530103efcf 446s CRL Distribution points (not critical): 446s URI: http://www.getcrl.crl/getcrl1/ 446s URI: http://www.getcrl.crl/getcrl2/ 446s URI: http://www.getcrl.crl/getcrl3/ 446s Other Information: 446s Public Key ID: 446s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 446s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 446s Public Key PIN: 446s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 446s 446s 446s 446s Signing certificate... 446s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 446s Use --verify-profile low to apply the default verification of NORMAL priority string. 446s Loaded CAs (1 available) 446s Generating a 256 bit EC/ECDSA private key ... 446s Generating a PKCS #10 certificate request... 446s Generating a 3072 bit RSA private key... 446s SUCCESS [13]../../tests/cert-tests/certtool-rsa-oaep.sh 446s running [14]../../tests/cert-tests/certtool-rsa-pss.sh ... 446s modulus: 446s Subject Public Key Algorithm: RSA-PSS 446s Signature Algorithm: RSA-PSS-SHA256 446s Signature Algorithm: RSA-PSS-SHA256 446s Subject Public Key Algorithm: RSA-PSS 446s Signature Algorithm: RSA-PSS-SHA384 446s Signature Algorithm: RSA-PSS-SHA384 446s Subject Public Key Algorithm: RSA-PSS 446s Signature Algorithm: RSA-PSS-SHA512 446s Signature Algorithm: RSA-PSS-SHA512 446s RSA-PSS to RSA conversion was successful 446s Subject: CN=CSCA_CZ,OU=Ministry of Interior,O=Czech Republic,C=CZ 446s Issuer: CN=CSCA_CZ,OU=Ministry of Interior,O=Czech Republic,C=CZ 446s Checked against: CN=CSCA_CZ,OU=Ministry of Interior,O=Czech Republic,C=CZ 446s Signature algorithm: RSA-PSS-SHA256 446s Output: Verified. The certificate is trusted. 446s 446s Chain verification output: Verified. The certificate is trusted. 446s 446s SUCCESS [14]../../tests/cert-tests/certtool-rsa-pss.sh 446s running [15]../../tests/cert-tests/certtool-subca.sh ... 446s SUCCESS [15]../../tests/cert-tests/certtool-subca.sh 446s running [16]../../tests/cert-tests/certtool-utf8.sh ... 446s SUCCESS [16]../../tests/cert-tests/certtool-utf8.sh 446s running [17]../../tests/cert-tests/certtool-verify-profiles.sh ... 446s Checking chain with insecure leaf 446s Checking chain with insecure subca 446s Checking chain with insecure ca 446s SUCCESS [17]../../tests/cert-tests/certtool-verify-profiles.sh 446s running [18]../../tests/cert-tests/certtool.sh ... 447s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 447s Use --verify-profile low to apply the default verification of NORMAL priority string. 447s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,ST=Attiki,OU=sleeping dept.,O=Koko inc.,C=GR 447s Issuer: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 447s Checked against: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 447s Signature algorithm: ECDSA-SHA256 447s Output: Verified. The certificate is trusted. 447s 447s Chain verification output: Verified. The certificate is trusted. 447s 447s SUCCESS [18]../../tests/cert-tests/certtool.sh 447s running [19]../../tests/cert-tests/crl.sh ... 447s SUCCESS [19]../../tests/cert-tests/crl.sh 447s running [20]../../tests/cert-tests/crq.sh ... 447s Self signature: verified 447s 447s SUCCESS [20]../../tests/cert-tests/crq.sh 447s running [21]../../tests/cert-tests/dane.sh ... 447s SUCCESS [21]../../tests/cert-tests/dane.sh 447s running [22]../../tests/cert-tests/dsa.sh ... 447s Checking various DSA key sizes (port ) 447s Checking DSA-1024 with TLS 1.0 447s reserved port 56272 447s RTNETLINK answers: Invalid argument 447s RTNETLINK answers: Invalid argument 447s HTTP Server listening on IPv4 0.0.0.0 port 56272...done 447s HTTP Server listening on IPv6 :: port 56272...done 448s RTNETLINK answers: Invalid argument 448s Checking server DSA-1024 with client DSA-1024 and TLS 1.0 448s Checking server DSA-1024 with client DSA-2048 and TLS 1.0 448s Checking server DSA-1024 with client DSA-3072 and TLS 1.0 448s Error in handshake: A TLS fatal alert has been received. 448s Error in handshake: A TLS fatal alert has been received. 448s Exiting via signal 15 448s Checking DSA-1024 with TLS 1.2 448s reserved port 34126 448s RTNETLINK answers: Invalid argument 448s RTNETLINK answers: Invalid argument 448s HTTP Server listening on IPv4 0.0.0.0 port 34126...done 448s HTTP Server listening on IPv6 :: port 34126...done 449s RTNETLINK answers: Invalid argument 449s Checking server DSA-1024 with client DSA-1024 and TLS 1.2 449s Checking server DSA-1024 with client DSA-2048 and TLS 1.2 449s |<1>| The hash size used in signature (20) is less than the expected (32) 450s Checking server DSA-1024 with client DSA-3072 and TLS 1.2 450s |<1>| The hash size used in signature (20) is less than the expected (32) 450s Exiting via signal 15 450s RTNETLINK answers: Invalid argument 450s RTNETLINK answers: Invalid argument 450s HTTP Server listening on IPv4 0.0.0.0 port 19519...done 450s HTTP Server listening on IPv6 :: port 19519...done 450s Checking DSA-2048 with TLS 1.2 450s reserved port 19519 450s RTNETLINK answers: Invalid argument 450s |<0x2aa159d3740>| The hash size used in signature (20) is less than the expected (32) 450s |<1>| The hash size used in signature (20) is less than the expected (32) 450s Checking DSA-3072 with TLS 1.2 450s Exiting via signal 15 450s reserved port 25812 450s RTNETLINK answers: Invalid argument 450s RTNETLINK answers: Invalid argument 450s HTTP Server listening on IPv4 0.0.0.0 port 25812...done 450s HTTP Server listening on IPv6 :: port 25812...done 451s RTNETLINK answers: Invalid argument 451s |<0x2aa094051d0>| The hash size used in signature (20) is less than the expected (32) 451s |<1>| The hash size used in signature (20) is less than the expected (32) 451s Exiting via signal 15 451s unreserved port 25812 451s SUCCESS [22]../../tests/cert-tests/dsa.sh 451s running [23]../../tests/cert-tests/ecdsa.sh ... 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s SUCCESS [23]../../tests/cert-tests/ecdsa.sh 451s running [24]../../tests/cert-tests/email.sh ... 451s Subject: CN=invalid@example.com 451s Issuer: CN=CA-0 451s Checked against: CN=CA-0 451s Signature algorithm: RSA-SHA256 451s Output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 451s 451s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 451s 451s Subject: CN=invalid@example.com 451s Issuer: CN=CA-0 451s Checked against: CN=CA-0 451s Signature algorithm: RSA-SHA256 451s Output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 451s 451s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. The name in the certificate does not match the expected. 451s 451s Subject: CN=invalid@example.com 451s Issuer: CN=CA-0 451s Checked against: CN=CA-0 451s Signature algorithm: RSA-SHA256 451s Output: Verified. The certificate is trusted. 451s 451s Chain verification output: Verified. The certificate is trusted. 451s 451s Subject: CN=invalid@example.com 451s Issuer: CN=CA-0 451s Checked against: CN=CA-0 451s Signature algorithm: RSA-SHA256 451s Output: Verified. The certificate is trusted. 451s 451s Chain verification output: Not verified. The certificate is NOT trusted. The name in the certificate does not match the expected. 451s 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Subject: CN=invalid@example.com 451s Issuer: CN=CA-0 451s Checked against: CN=CA-0 451s Signature algorithm: RSA-SHA256 451s Output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 451s 451s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. The name in the certificate does not match the expected. 451s 451s Subject: CN=invalid@example.com 451s Issuer: CN=CA-0 451s Checked against: CN=CA-0 451s Signature algorithm: RSA-SHA256 451s Output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 451s 451s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain violates the signer's constraints. 451s 451s Subject: CN=invalid@example.com 451s Issuer: CN=CA-0 451s Checked against: CN=CA-0 451s Signature algorithm: RSA-SHA256 451s Output: Verified. The certificate is trusted. 451s 451s Chain verification output: Verified. The certificate is trusted. 451s 451s Subject: CN=invalid@example.com 451s Issuer: CN=CA-0 451s Checked against: CN=CA-0 451s Signature algorithm: RSA-SHA256 451s Output: Verified. The certificate is trusted. 451s 451s Chain verification output: Not verified. The certificate is NOT trusted. The name in the certificate does not match the expected. 451s 451s SUCCESS [24]../../tests/cert-tests/email.sh 451s running [25]../../tests/cert-tests/gost.sh ... 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 451s Use --verify-profile low to apply the default verification of NORMAL priority string. 451s Loaded CAs (1 available) 451s SUCCESS [25]../../tests/cert-tests/gost.sh 451s running [26]../../tests/cert-tests/illegal-rsa.sh ... 451s Encrypted structure detected... 451s import error: The private key is invalid. 451s PKCS #8 information: 451s Cipher: 3DES-CBC 451s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 451s Salt: 3c59d7f116fbc5d6 451s Salt size: 8 451s Iteration count: 5216 451s 451s import error: The private key is invalid. 451s import error: The public key parameters are invalid. 451s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 451s Generating a 2048 bit RSA-PSS private key... 452s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 452s Generating a 2048 bit RSA-PSS private key... 452s privkey_generate: The public key parameters are invalid. 452s SUCCESS [26]../../tests/cert-tests/illegal-rsa.sh 452s running [27]../../tests/cert-tests/inhibit-anypolicy.sh ... 452s Generating a signed certificate... 452s Setting log level to 2 452s X.509 Certificate Information: 452s Version: 3 452s Serial Number (hex): 2307394cf45cf64cd3e1928f3a56efeacf3ff876 452s Validity: 452s Not Before: Sun Apr 23 00:00:00 UTC 2017 452s Not After: Mon Apr 23 00:00:00 UTC 2018 452s Subject: CN=sub-CA 452s Subject Public Key Algorithm: RSA 452s Algorithm Security Level: Low (1024 bits) 452s Modulus (bits 1024): 452s 00:ac:d7:4a:cc:04:0a:33:0f:c6:e2:fc:a3:79:1c:6d 452s 47:7c:3e:52:0d:e3:dc:7d:fc:f3:40:0a:a7:c3:f4:5d 452s 08:e3:ad:4c:39:39:09:fb:89:3a:ed:31:be:dc:52:06 452s 3d:4b:9c:5e:05:e6:54:18:14:a7:48:9f:9f:7e:79:f9 452s 36:57:58:82:9a:99:ad:38:dc:cd:31:47:4e:c5:2b:48 452s 61:b3:07:d7:37:e8:f0:6e:50:fa:37:44:a8:0d:c6:a6 452s a9:d9:1d:37:ca:61:04:6d:a9:c7:b6:35:f5:12:2f:91 452s 23:39:d7:10:79:6f:53:17:88:b7:fa:18:72:7f:bf:8e 452s 17 452s Exponent (bits 24): 452s 01:00:01 452s Extensions: 452s Basic Constraints (critical): 452s Certificate Authority (CA): TRUE 452s Subject Key Identifier (not critical): 452s 99c6d74b9feeddd283d026ed3deb0698933c523e 452s Authority Key Identifier (not critical): 452s 753ab7fc73642914496111fdce90cbf63d1c8a13 452s Other Information: 452s Public Key ID: 452s sha1:99c6d74b9feeddd283d026ed3deb0698933c523e 452s sha256:04eaac9f742c54f81aeac4246113c3314a11c9dc5fba86e5b86038d088503677 452s Public Key PIN: 452s pin-sha256:BOqsn3QsVPga6sQkYRPDMUoRydxfuobluGA40IhQNnc= 452s 452s 452s 452s Signing certificate... 452s |<2>| signing structure using RSA-SHA256 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s Subject: CN=sub-CA 452s Issuer: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 452s Checked against: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 452s Signature algorithm: RSA-SHA256 452s Output: Verified. The certificate is trusted. 452s 452s Chain verification output: Verified. The certificate is trusted. 452s 452s SUCCESS [27]../../tests/cert-tests/inhibit-anypolicy.sh 452s running [28]../../tests/cert-tests/invalid-sig.sh ... 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s Subject: CN=Different sig in PKCS #1 452s Issuer: CN=GnuTLS Test CA 452s Checked against: CN=GnuTLS Test CA 452s Signature algorithm: RSA-SHA256 452s Output: Not verified. The certificate is NOT trusted. The signature in the certificate is invalid. 452s 452s Chain verification output: Not verified. The certificate is NOT trusted. The signature in the certificate is invalid. 452s 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s error parsing CRTs: Error in the certificate. 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s error parsing CRTs: Error in the certificate. 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s error parsing CRTs: Error in the certificate. 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s error parsing CRTs: Error in the certificate. 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s Subject: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 452s Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 452s Signature algorithm: RSA-SHA1 452s Output: Not verified. The certificate is NOT trusted. The certificate issuer is unknown. The certificate chain uses insecure algorithm. 452s 452s Subject: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 452s Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 452s Checked against: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 452s Signature algorithm: RSA-SHA1 452s Output: Verified. The certificate is trusted. 452s 452s Subject: CN=ROBLOX Corporation,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=ROBLOX Corporation,L=Menlo Park,ST=California,C=US 452s Issuer: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 452s Checked against: CN=VeriSign Class 3 Code Signing 2010 CA,OU=Terms of use at https://www.verisign.com/rpa (c)10,OU=VeriSign Trust Network,O=VeriSign\, Inc.,C=US 452s Signature algorithm: RSA-SHA1 452s Output: Not verified. The certificate is NOT trusted. The certificate issuer is not a CA. The certificate chain uses insecure algorithm. The certificate chain uses expired certificate. 452s 452s Chain verification output: Not verified. The certificate is NOT trusted. The certificate issuer is not a CA. The certificate chain uses insecure algorithm. The certificate chain uses expired certificate. 452s 452s SUCCESS [28]../../tests/cert-tests/invalid-sig.sh 452s running [29]../../tests/cert-tests/key-id.sh ... 452s Generating a signed certificate... 452s 452s Expiration time: Fri Sep 4 17:38:25 2026 452s CA expiration time: Sat Jan 28 09:23:01 2017 452s Warning: The time set exceeds the CA's expiration time 452s X.509 Certificate Information: 452s Version: 3 452s Serial Number (hex): 01 452s Validity: 452s Not Before: Thu Sep 04 17:38:25 UTC 2025 452s Not After: Fri Sep 04 17:38:25 UTC 2026 452s Subject: 452s Subject Public Key Algorithm: RSA 452s Algorithm Security Level: Low (1024 bits) 452s Modulus (bits 1024): 452s 00:bc:f2:be:ee:e4:d5:e2:48:4d:f9:d9:06:13:f5:5f 452s 45:8d:a2:c7:b6:bd:b6:0f:da:3e:62:9f:94:ed:01:6c 452s e3:9d:d8:04:24:bc:cc:93:93:9d:33:8d:40:6a:fb:e1 452s 85:83:6d:8b:d3:3d:cf:db:88:5b:53:78:66:95:d2:d4 452s 5d:21:da:98:0a:2e:ef:db:59:28:08:4e:d6:c7:66:4b 452s 41:17:24:16:de:f3:92:ce:5e:f8:06:8a:b8:f5:5f:88 452s 4e:47:c6:98:3c:4d:07:46:ae:e6:88:67:9e:be:a7:f7 452s db:a0:5b:f8:33:9d:ab:fa:25:a3:86:f8:67:ef:33:90 452s e5 452s Exponent (bits 24): 452s 01:00:01 452s Extensions: 452s Basic Constraints (critical): 452s Certificate Authority (CA): FALSE 452s Subject Key Identifier (not critical): 452s 6e68fb2fd1fca5eb9169c7e160af051d35cee0a6 452s Authority Key Identifier (not critical): 452s 7a2c7a6097460603cbfb28e8e219df18deeb4e0d 452s Other Information: 452s Public Key ID: 452s sha1:6e68fb2fd1fca5eb9169c7e160af051d35cee0a6 452s sha256:cfb982c7a56a85949ebebdcb434fb0b17dc2e7be4d369e7272016ef8dada3a64 452s Public Key PIN: 452s pin-sha256:z7mCx6VqhZSevr3LQ0+wsX3C575NNp5ycgFu+NraOmQ= 452s 452s 452s 452s Signing certificate... 452s SUCCESS [29]../../tests/cert-tests/key-id.sh 452s running [30]../../tests/cert-tests/key-invalid.sh ... 452s OK ../../tests/cert-tests/data/key-invalid1.der - errno 1 452s OK ../../tests/cert-tests/data/key-invalid2.der - errno 1 452s OK ../../tests/cert-tests/data/key-invalid3.der - errno 1 452s OK ../../tests/cert-tests/data/key-invalid4.der - errno 1 452s OK ../../tests/cert-tests/data/key-invalid5.der - errno 1 452s OK ../../tests/cert-tests/data/key-invalid6.der - errno 1 452s DONE (rc 0) 452s SUCCESS [30]../../tests/cert-tests/key-invalid.sh 452s running [31]../../tests/cert-tests/krb5-test.sh ... 452s SUCCESS [31]../../tests/cert-tests/krb5-test.sh 452s running [32]../../tests/cert-tests/md5-test.sh ... 452s SUCCESS [32]../../tests/cert-tests/md5-test.sh 452s running [33]../../tests/cert-tests/mldsa.sh ... 452s import error: ASN1 parser: Error in TAG. 452s import error: ASN1 parser: Error in TAG. 452s import error: ASN1 parser: Error in TAG. 452s import error: ASN1 parser: Error in TAG. 452s import error: ASN1 parser: Error in TAG. 452s import error: ASN1 parser: Error in TAG. 452s Testing ML-DSA-44 452s Testing ML-DSA-65 452s Testing ML-DSA-87 452s SUCCESS [33]../../tests/cert-tests/mldsa.sh 452s running [34]../../tests/cert-tests/name-constraints.sh ... 452s Subject: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 452s Issuer: OU=Public Key Infrastructure,CN=Foo Bar Root CA,O=Foo Bar Inc.,C=US 452s Signature algorithm: RSA-SHA1 452s Output: Not verified. The certificate is NOT trusted. The certificate issuer is unknown. 452s 452s Subject: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 452s Issuer: OU=Public Key Infrastructure,CN=Foo Bar Root CA,O=Foo Bar Inc.,C=US 452s Checked against: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 452s Signature algorithm: RSA-SHA1 452s Output: Verified. The certificate is trusted. 452s 452s Subject: CN=bazz.foobar.com,O=Foo Bar Inc.,C=US 452s Issuer: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 452s Checked against: OU=Public Key Infrastructure,CN=Foo Bar Sub CA 1,O=Foo Bar Inc.,C=US 452s Signature algorithm: RSA-SHA1 452s Output: Verified. The certificate is trusted. 452s 452s Chain verification output: Verified. The certificate is trusted. 452s 452s SUCCESS [34]../../tests/cert-tests/name-constraints.sh 452s running [35]../../tests/cert-tests/othername-test.sh ... 452s SUCCESS [35]../../tests/cert-tests/othername-test.sh 452s running [36]../../tests/cert-tests/pathlen.sh ... 452s SUCCESS [36]../../tests/cert-tests/pathlen.sh 452s running [37]../../tests/cert-tests/pem-decoding.sh ... 452s SUCCESS [37]../../tests/cert-tests/pem-decoding.sh 452s running [38]../../tests/cert-tests/pkcs1-pad.sh ... 452s PKCS1-PAD1 OK 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 452s PKCS1-PAD2 OK 452s Use --verify-profile low to apply the default verification of NORMAL priority string. 452s PKCS1-PAD3 OK 452s SUCCESS [38]../../tests/cert-tests/pkcs1-pad.sh 452s running [39]../../tests/cert-tests/pkcs12-corner-cases.sh ... 452s bag_decrypt: The cipher type is unsupported. 452s There were errors parsing the structure 452s Generating a PKCS #12 structure... 452s Loading private key list... 452s Loaded 1 private keys. 452s SUCCESS [39]../../tests/cert-tests/pkcs12-corner-cases.sh 452s running [40]../../tests/cert-tests/pkcs12-encode.sh ... 453s Generating a PKCS #12 structure... 453s Loading private key list... 453s Loaded 1 private keys. 455s SUCCESS [40]../../tests/cert-tests/pkcs12-encode.sh 455s running [41]../../tests/cert-tests/pkcs12-gost.sh ... 455s Generating a PKCS #12 structure... 455s Loading private key list... 455s Loaded 1 private keys. 455s Testing decoding of known keys 455s ============================== 455s 455s Testing encoding/decoding 455s ========================= 476s Generating a PKCS #12 structure... 476s Loading private key list... 476s Loaded 1 private keys. 495s SUCCESS [41]../../tests/cert-tests/pkcs12-gost.sh 495s running [42]../../tests/cert-tests/pkcs12-pbmac1.sh ... 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 32 495s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 32 495s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s Setting log level to 99 495s MAC info: 495s MAC: PBMAC1 (1.2.840.113549.1.5.14) 495s Salt: 4e4f542055534544 495s Salt size: 8 495s Iteration count: 1 495s 495s BAG #0 495s Type: Encrypted 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: 3da715f1636cac73 495s Salt size: 8 495s Iteration count: 2048 495s 495s Decrypting... 495s Elements: 1 495s Type: Certificate 495s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 495s -----BEGIN CERTIFICATE----- 495s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 495s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 495s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 495s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 495s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 495s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 495s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 495s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 495s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 495s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 495s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 495s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 495s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 495s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 495s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 495s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 495s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 495s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 495s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 495s -----END CERTIFICATE----- 495s 495s BAG #1 495s Elements: 1 495s Type: PKCS #8 Encrypted key 495s PKCS #8 information: 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: 53c73c3e569b6b60 495s Salt size: 8 495s Iteration count: 2048 495s 495s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 495s -----BEGIN ENCRYPTED PRIVATE KEY----- 495s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 495s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 495s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 495s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 495s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 495s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 495s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 495s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 495s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 495s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 495s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 495s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 495s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 495s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 495s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 495s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 495s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 495s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 495s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 495s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 495s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 495s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 495s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 495s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 495s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 495s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 495s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 495s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 495s -----END ENCRYPTED PRIVATE KEY----- 495s Setting log level to 99 495s MAC info: 495s MAC: PBMAC1 (1.2.840.113549.1.5.14) 495s Salt: 4e4f542055534544 495s Salt size: 8 495s Iteration count: 1 495s 495s BAG #0 495s Type: Encrypted 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: b88fa501058da23a 495s Salt size: 8 495s Iteration count: 2048 495s 495s Decrypting... 495s Elements: 1 495s Type: Certificate 495s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 495s -----BEGIN CERTIFICATE----- 495s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 495s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 495s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 495s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 495s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 495s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 495s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 495s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 495s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 495s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 495s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 495s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 495s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 495s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 495s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 495s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 495s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 495s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 495s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 495s -----END CERTIFICATE----- 495s 495s BAG #1 495s Elements: 1 495s Type: PKCS #8 Encrypted key 495s PKCS #8 information: 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: 438b0b21e30b7768 495s Salt size: 8 495s Iteration count: 2048 495s 495s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 495s -----BEGIN ENCRYPTED PRIVATE KEY----- 495s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIQ4sLIeMLd2gCAggA 495s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCzRZxKSU+ucLF8HX2dYOenBIIE 495s 0EaNOGz/31nzz2a0xHM6tajtRx1fOo++koMWrtlkPTkABvffBxbTajcTvEeunp+k 495s BYaqVgiO97UiQ/qANvajrE/l7dm0ds+fiuw+EKIl7i2t4F7+tlZIwdAywhwEuzLv 495s oZKeTigqVwku36NDpwIkIzOBJbgLIsMC6x7u89RNelMKZpYCkJ2gtUuOH1fc50vU 495s 8aH0U57gqtZbqXZ9qkI0snTlOop0HiiwX5SkYi6yRzqG2hZo1sKdVDkADLmawC4R 495s 8iGzhVzD2JN5plP9VD7kRnG3Feb9lLdlDBPlmBMV0gjmEd/0eFH1ZCHxM3kTxbNr 495s JSTCA0tn5jMhZBBBJQXJISjvSM4UFd5KHilAXTNOurn8msf7iMlz5jIgfXwKm0EO 495s I5EE0/NGypAQD9Qb8oNi/AbLLLUeYgqGYFp3wPVM+ESORm0amws+x4kpLjiKMBKj 495s qMdyFm17cuVXVgVzY2QR6WxNAsjC0h/+EHRlcPEdA4ggAtJpmjGmat9sqwUd9hOO 495s 9jftimonL199TMAfy5GTeOnN+Exmpy+SyWcdA0eiE43TYD/E5Ukq6e8tpqou1Wyq 495s fwv9vAo+a/pvvhpOhDlKSx7GdndobYa6+8aqD81ABJJMmFnnRyWqEE5KCIrGW9DB 495s pV2/bYY0PBHuNvXpH47+wkH0g0uikxP/pobid95j89WXCGnB43R4ROq26yoY0qy2 495s 4JqxmvIu3s3fPU+BDjbtMJBvSltMDNnJ+Rm9djxeq8Y0388qRu2udMnNSCdlq5tA 495s e4BrmKVaAniKIa+yJcT2HXkBkTv0pc03dMWGiVZvRcyWjDStGap2aEDBD2nqvDwt 495s 5DI6WvHgIh15PStw1nTlmL4hlQj1WCGSugqcHvhMH17PtoWYGZWM3L6VFoOtJndT 495s w+FLMi0GoGo9+7m0eiuAuJs5YRceTaL1fwvyg/i4HpDG4wrcBEHlsmoHr9pfSlBM 495s +9/wU+E4EBTOStqmaVWpsJrDppXT6XpBj4lAruWMWIP8uI1CrwKo9UvbeMFAEnAi 495s cfDr11H4KZktvpoRTwYhabNDODt51hvdUOpijKmzRz1HBQ5/T+3FIbNcbtzUS8if 495s kCH1X22t2AU1fAOlgWBJi/ZcX9bi9Vktgcevgq4dJHsjVD6PXEY6cdaI/8ZCJ6HN 495s h0DgxJL7ivQw+1ay6+7A4X5ib69ZlHyTEOf0x5O2fhPjQLjHTLZDNsil8YIWQGwa 495s 0JFN5iFtedIuz7I5VMNKNPyyb0MCSLIesniQx2PJm8vZiHXj9y0ABXJWCszcJoMG 495s 3bZlQF5kMS7oZhKV37LSM5AazScwoc29qJzUn2vq+S+lxBzR5e8AsE7rlfyVpXTb 495s mFy31X7r95rH0o0lpL+mkbUViL5jr9EG2tqNOS5cBTHdT8yjObjeAw2LbEvQOskD 495s lxLL1JFnCziZwrPEpCUXV4SU8XZs3gajNSbbSsC24BjG6Y28ZYN57DfmfrBBaMft 495s mVjoJYJwR49JgmTogAvMKlLvrMbC0+Fp3Wj1ilaqEUAobw2mWjTmjah3IhfRz1HH 495s 2aMPnx/E50h53okHA3ul3DIUmkNjLaWPP464DSoLmbdtsh/YMP1aU9/0DgexQYCh 495s SBG71Gn951YxSJa8iIXoPi3ogXdorKDDTV2gcHINmF7p 495s -----END ENCRYPTED PRIVATE KEY----- 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 64 495s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.11 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s Setting log level to 99 495s MAC info: 495s MAC: PBMAC1 (1.2.840.113549.1.5.14) 495s Salt: 4e4f542055534544 495s Salt size: 8 495s Iteration count: 1 495s 495s BAG #0 495s Type: Encrypted 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: acaea2fca1b48169 495s Salt size: 8 495s Iteration count: 2048 495s 495s Decrypting... 495s Elements: 1 495s Type: Certificate 495s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 495s -----BEGIN CERTIFICATE----- 495s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 495s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 495s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 495s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 495s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 495s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 495s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 495s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 495s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 495s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 495s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 495s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 495s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 495s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 495s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 495s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 495s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 495s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 495s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 495s -----END CERTIFICATE----- 495s 495s BAG #1 495s Elements: 1 495s Type: PKCS #8 Encrypted key 495s PKCS #8 information: 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: b573b4b92041bbef 495s Salt size: 8 495s Iteration count: 2048 495s 495s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 495s -----BEGIN ENCRYPTED PRIVATE KEY----- 495s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQItXO0uSBBu+8CAggA 495s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBDeq80bSHWMajp2Pmg0twBWBIIE 495s 0DXcFKGQ1wq8jhQVCP8+9b36MgMZZ8CS0RzV0FJSO8NCpB9tmjZ0psYmlx6Aj9R4 495s HJrGDkUu6fyE4v/WrQh6pxkeMx5njzYaDKTRxXoXY5VFFoLdNOL1CeWcE3V8HjPi 495s uFnugn1gP7cr7MhjQLLrp3pfvNuN2bL9JhiyqYwPmcgC7edbNJJ5lzg9g1uPRXJC 495s JlFZzQuS5rxCAJlQv2TcnK8mUCPthAZCSnvgQt/N+BnsSZ0sLVAYN14N92Ve1+up 495s MPLStVrOczQ+RkACciLuO5p42ZCFkAWPl21qMKwWfLlyELsTGQtKfLutqCALWWlU 495s KFU0dS8kf+zyEhVugKcLW05+rkMbG9eqhfJRDNEtfsdAHyWOmZtdbcgqm29rWGRf 495s l9+DKFJEfyGAvygqvyiXaZ3fGKoH68I4PHUdlhiMW6dhgR6ugSvwyHoTizHC3LDr 495s j9AxF6aX3HpTDhjSLPuIeCrI1oh1QzD7Ki3aMwXZuhSxnJ6N5WORTvmr1a5RJQDg 495s fvXr4GgWw9pUqxDKDowKA9PdLYF18GARJ1pyKXZPuenH+SKbIaywQP/h9dywS3rP 495s l9aOXXdDLvt2m6eUbQL+8yz0UbV5A2CT84DXE7ydlscNgvs6wHJc2eyEXXCxElGu 495s ArDdNWhL0IDrZAjVY0grZCRj9BbLbFjOIT+5X0gez9rQy/roMuhrwV9bM/XzAu0D 495s ABS/fJw5v8qnJ3oxtQXEF2YaPJ9LL0n23FQchpT2RjLiPbduftAdjEwMdH+s6A/P 495s nxZoXFYEujED8mxihWsHJGJdM7pbHj6rPhuL6CFte6MBirEYr9OiZmUsHdyqBpoz 495s OPQA87hvcq0OT0mtJ4VZNbcmzWqXuBzWB6wJpjdCC5TfhNAbPxHc+J7WGbqHP2d+ 495s bQoJu/XVeP1Zeh1GdSay7C6xFggclcrcFRcn9/zME1nX/gHPl8wbgshDKj5b5z1r 495s MHZ2ond+acYqLO/Xz5dR69P0Ovg6AORsmKvEhXT+xGC6xjBmuRifseZ0u8+lOFJm 495s drF7imB57oQdM4umNOGvn4U+9cdNnk3gu2j5RAd9fVKsrLoyVSZ7KG5HMDrvyY9C 495s LPWHhXevd3QeOMXmbmMr5cKA9fZanIptE0mtk8Ow9Vv8ruO3Sq1T9lSsUaqJrgED 495s qaGYrkn6tf+8rK1fFOISJSFNr560lSfBLT0CrKAVuZe9HUBsF8sQZAVEx6nyeCxv 495s 5DxkTDrVM4KhcNg4ybW8ptatTGYKdsnDKJ+L6ew3kCxrNl3xADQfmJ0cLY6Xr6gJ 495s yLiuit2NNi2OBV0zUKQt+129OG5nSEAHBNDGqD+P4WPO2kvNj0OvIN2yO/biqOMH 495s toPlmhCZRM0O9eO2c1dsGw6vPVuvcdTFk32g8JRLXeFGmnGHIQL+wU1WmlRYkQFM 495s sFmhxnj6WRtlldX3h/83frXpsVkfajBYAWckoNY4qQT1XIsJdC6pVrP62iAWJi5g 495s GjDIDN++fVJDVc5w6BR62OM9hAA16dERx1cyUtcfsmL6f/SPgHFueaDdFD/97kOn 495s ss/4sdtrKL0MITCfK5oEegn8kTypl7tUTyt6bjb+5mxU3016WDdr174RGUXl2PIS 495s Rf/aOBt1KydRdDIFBzAhvOnMNc9G4T0ml1aLnzp8f30a 495s -----END ENCRYPTED PRIVATE KEY----- 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 32 495s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2049 495s |<9>| keyLength: 32 495s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 495s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1162 495s verify_mac: The Message Authentication Code verification failed. 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 495s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 495s |<9>| salt.specified.size: 8 495s |<9>| iterationCount: 2048 495s |<9>| keyLength: 0 495s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 495s |<9>| IV.size: 16 495s There were errors parsing the structure 495s Setting log level to 99 495s MAC info: 495s MAC: PBMAC1 (1.2.840.113549.1.5.14) 495s Salt: 203ad82b117c7b05 495s Salt size: 8 495s Iteration count: 2048 495s 495s BAG #0 495s Type: Encrypted 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: 044114e54ca74641 495s Salt size: 8 495s Iteration count: 2048 495s 495s Decrypting... 495s Elements: 1 495s Type: Certificate 495s Key ID: 7A:00:45:5D:1D:93:1A:8B:5B:F0:C1:16:05:A9:63:B4:04:BB:74:1E 495s -----BEGIN CERTIFICATE----- 495s MIIDZTCCAk2gAwIBAgIUPwNhX2dXIFfhmIfav1IfwgSjRYMwDQYJKoZIhvcNAQEL 495s BQAwQjELMAkGA1UEBhMCWFgxFTATBgNVBAcMDERlZmF1bHQgQ2l0eTEcMBoGA1UE 495s CgwTRGVmYXVsdCBDb21wYW55IEx0ZDAeFw0yMjA4MTkxMDAxMTBaFw0yMjA5MTgx 495s MDAxMTBaMEIxCzAJBgNVBAYTAlhYMRUwEwYDVQQHDAxEZWZhdWx0IENpdHkxHDAa 495s BgNVBAoME0RlZmF1bHQgQ29tcGFueSBMdGQwggEiMA0GCSqGSIb3DQEBAQUAA4IB 495s DwAwggEKAoIBAQC7UnID9tzVZ8zGL/zAjV6FdZ7DPwGnl+WBs0S+D0IVKTiOrVvJ 495s W+bxC4jquba8jK8h/BKYNbi/4UjvteRG3n5+GzyJuL8p9ovXKn0jrKykGVgsn9Bo 495s 6f+Yd0M6soR5Y4AhFmJFKgLVlbk3IgPpKaF4hBukvPfNBhEMWMK9FOEcSYEZNV68 495s hCT1vtMPg7J2kwX/i9e76gK0ZnNU6odM+lx7veZ7kgWCmn5j7Fr6F1kxM9uOmMZx 495s 2mneZThMEwG/0unUdfLWuCEKUuG0hJAGXrUbPWphXIFr8rR9NzhjOW6yptjAbm/6 495s kb+Im6ED77WeG2Ql6QvcWSVOWtDn4qNnnqAHAgMBAAGjUzBRMB0GA1UdDgQWBBSP 495s WBge9gMQwhb1lpNh7PGQw/ln+zAfBgNVHSMEGDAWgBSPWBge9gMQwhb1lpNh7PGQ 495s w/ln+zAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCIvqFeoAsf 495s yWVD07ev1fBb4GcxT91ZPBZRjLu5cNeZZn4nOHTMilC0Ck2C8y6Mum+qTwPID69U 495s RlmgmIpIs+86KjYsw6j373NSLdhZZPB22KOv98i4mBjg7ot7AVG3gWwV30Zk/f3k 495s vIw0IxkbcxM19C3xknLoN0NJhdBo+Ntd4w57TMcWa7QZc22kGAcUBtD56NEGlGMG 495s cilsHCtg7sSpO2XEPPUKrF4u2EWAdiz4GoeWi5NEQHOEnTmCUqp9tHMxKpDZAtk4 495s s+MKiVXmCHU1gFWPYqdYOSVXQwaoOLyYiTm0+2ZjHtDN/jDVTPX+cBjKtAG63S6V 495s Sk4Clw3hNWij 495s -----END CERTIFICATE----- 495s 495s BAG #1 495s Elements: 1 495s Type: PKCS #8 Encrypted key 495s PKCS #8 information: 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: cf843f4b901fc97d 495s Salt size: 8 495s Iteration count: 2048 495s 495s Key ID: 7A:00:45:5D:1D:93:1A:8B:5B:F0:C1:16:05:A9:63:B4:04:BB:74:1E 495s -----BEGIN ENCRYPTED PRIVATE KEY----- 495s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIz4Q/S5AfyX0CAggA 495s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBBLT+yOw5AN8OFFV6OyKsmhBIIE 495s 0DMb6iGIuDDXki/D/81UyBN9PSLax5dKSehgcIb6FW4CAqStZ4/6m49CcMzEmD2O 495s o6Zi+bsMk7cTj+Gkm2kociZS5dWjtJA1kv4l8vTk9wQSW+v3I/fZ9JJ+z7ert7S/ 495s jcxgCTemYb2YCWto/blyrKBt8/7W2qfOUfGUMv9M89DjukXklnQX/byJtMsXnMDt 495s t3aH/BqZp9V9ETpBjw4a82ulXwUvEpF2qzgMMBad6YZBMtJo8U9wJsQZjTYh9Xja 495s NBl4VlvNcTBWY3/OhC88vESN0Go4APny+/hxw3EQTHkCX/EOeQFroSS4nv9pD0B9 495s TqkCN5dOoAvC9er0T8obKFn8du05GfVd+3wkDH9HMMAGx+XFUGIjl9KRVexpl5+p 495s rda4nAUIWRd9upoUmHKySJOyApobe4N8/5pVqtCSe0OzyQFHnMmAMNjK1GcU+2hu 495s wHEFTOS11gA6uo1waPlhGGEnm1sszZlPArrnWGPdPjZBo5lZO3xm/mC/USECmXE9 495s kKi4URd3os8alYl0pzA9RSmeZRn9iSjnryae0OlZsmC7yASqZ+UNVlPurJT4vJ/4 495s M3gEENTz+y8lkUZgolkN5sjo47jMBb6bmYi5mZkhyOkvnpY2rpUmhEaifQMM8sJg 495s S5CF03dL9PY2IlPuF1Z3vADzvqmZDklTre8NuJHsnLLWq9Xr+/qd+i5bJi1nloKG 495s a81r0rfR5hcTknyJ4vZighxgHW9uo+pHWVHXB4X2idd9WbjBiFlRzfNJpxC93H/8 495s gOTXRzmz4Ed9yx1+KEwbfJZNt8p9/7PQxwJQ5QHkLKBViJwCPnSwq9HheVQ54/iD 495s luLyBzowzLhAaOYgpv8eDUXTavDQwxu3AOXY6xv3ZjVVPjnU4iZZaz9f9ROTVcH+ 495s vs3EaNHOqz4nafk3NkJyETRe1zpopObDpus2vGIOS33+CqRd7PMFq7N+WeWWzsHl 495s JBWi0wDbK6W8tlRpeoW3/Sa66/CkmkFxy50RL0EIVVrFsIJERsnJN77R/9fNbKkP 495s gMmPkMQ/J3Ua9ooh/ew5R9kpftYNq3cw/spd+rcJTeYrvyFydhYXemlCKHTwbw+h 495s 8390ZqOIHhZ7O8F8yJ/lFIDk6Z4nioW1fbkQ9wdJcVJy7lRlAnYo2OJGL5YZVG4S 495s vESfk5X8aOVKam1TwSaH01cN1U95ufWLpfdMbO0xjzzoFEdblXkbgau9VgjrPke/ 495s 7rElpFu7XOPd21afXrhYlogmLbb5Up753nJhPFknZ30v9oW1MTGHCeRZtIMkIazs 495s N5+4mWip9VBcOLKnjWlBNNGcD6c16Y2Jsz+w7NxLnTPOIPL1NbelUzNXhDzZHGdn 495s uGf3oGUIUU/IFABo1UaiYDQYCdZfFjHhs+0I7ebBuR1D5x9T4h2m8WMWJTY07O+A 495s XKet0ZGWJrL6RhR/Yy4JxdK4HGh3QCJvDbfttD3s9YJDm7LjLzo36iXKjWDBSCT/ 495s txSGgRIVcVf2Ph2XRSHhMfld8MKsmFtvrJ6F5WKzhU0l90s9k1/1J92DA73gDjO8 495s ez9whwMZt+ofDmGyrjjTomr2O3Opo9jUkqKaEtXFh/93GOnNxysMQ1j32sUiSse5 495s T2wG52/1jL4SWCDgCxaxpygOADsm/ZODLk99jxVyFNtm 495s -----END ENCRYPTED PRIVATE KEY----- 495s Setting log level to 99 495s MAC info: 495s MAC: PBMAC1 (1.2.840.113549.1.5.14) 495s Salt: 4e4f542055534544 495s Salt size: 8 495s Iteration count: 2048 495s 495s BAG #0 495s Type: Encrypted 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: 3da715f1636cac73 495s Salt size: 8 495s Iteration count: 2048 495s 495s Decrypting... 495s Elements: 1 495s Type: Certificate 495s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 495s -----BEGIN CERTIFICATE----- 495s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 495s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 495s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 495s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 495s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 495s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 495s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 495s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 495s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 495s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 495s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 495s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 495s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 495s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 495s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 495s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 495s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 495s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 495s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 495s -----END CERTIFICATE----- 495s 495s BAG #1 495s Elements: 1 495s Type: PKCS #8 Encrypted key 495s PKCS #8 information: 495s Cipher: AES-256-CBC 495s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 495s Salt: 53c73c3e569b6b60 495s Salt size: 8 495s Iteration count: 2048 495s 495s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 495s -----BEGIN ENCRYPTED PRIVATE KEY----- 495s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 495s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 495s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 495s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 495s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 495s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 495s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 495s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 495s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 495s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 495s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 495s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 495s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 495s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 495s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 495s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 495s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 495s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 495s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 495s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 495s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 495s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 495s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 495s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 495s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 495s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 495s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 495s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 495s -----END ENCRYPTED PRIVATE KEY----- 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 32 496s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 496s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1162 496s verify_mac: The Message Authentication Code verification failed. 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 496s |<9>| IV.size: 16 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 496s |<9>| IV.size: 16 496s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 496s |<9>| IV.size: 16 496s There were errors parsing the structure 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 496s |<3>| ASSERT: ../../../lib/x509/pkcs7-crypt.c[_gnutls_read_pbmac1_params]:1824 496s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1123 496s verify_mac: One of the involved algorithms has insufficient security level. 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 496s |<9>| IV.size: 16 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 496s |<9>| IV.size: 16 496s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 496s |<9>| IV.size: 16 496s There were errors parsing the structure 496s Setting log level to 99 496s MAC info: 496s MAC: PBMAC1 (1.2.840.113549.1.5.14) 496s Salt: 6f473c38b02e3173 496s Salt size: 8 496s Iteration count: 1 496s 496s BAG #0 496s Type: Encrypted 496s Cipher: AES-256-CBC 496s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 496s Salt: 3da715f1636cac73 496s Salt size: 8 496s Iteration count: 2048 496s 496s Decrypting... 496s Elements: 1 496s Type: Certificate 496s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 496s -----BEGIN CERTIFICATE----- 496s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 496s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 496s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 496s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 496s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 496s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 496s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 496s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 496s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 496s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 496s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 496s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 496s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 496s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 496s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 496s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 496s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 496s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 496s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 496s -----END CERTIFICATE----- 496s 496s BAG #1 496s Elements: 1 496s Type: PKCS #8 Encrypted key 496s PKCS #8 information: 496s Cipher: AES-256-CBC 496s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 496s Salt: 53c73c3e569b6b60 496s Salt size: 8 496s Iteration count: 2048 496s 496s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 496s -----BEGIN ENCRYPTED PRIVATE KEY----- 496s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 496s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 496s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 496s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 496s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 496s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 496s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 496s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 496s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 496s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 496s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 496s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 496s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 496s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 496s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 496s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 496s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 496s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 496s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 496s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 496s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 496s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 496s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 496s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 496s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 496s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 496s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 496s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 496s -----END ENCRYPTED PRIVATE KEY----- 496s Setting log level to 99 496s MAC info: 496s MAC: PBMAC1 (1.2.840.113549.1.5.14) 496s Salt: 6f473c38b02e3173 496s Salt size: 8 496s Iteration count: 2048 496s 496s BAG #0 496s Type: Encrypted 496s Cipher: AES-256-CBC 496s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 496s Salt: 3da715f1636cac73 496s Salt size: 8 496s Iteration count: 2048 496s 496s Decrypting... 496s Elements: 1 496s Type: Certificate 496s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 496s -----BEGIN CERTIFICATE----- 496s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 496s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 496s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 496s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 496s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 496s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 496s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 496s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 496s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 496s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 496s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 496s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 496s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 496s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 496s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 496s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 496s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 496s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 496s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 496s -----END CERTIFICATE----- 496s 496s BAG #1 496s Elements: 1 496s Type: PKCS #8 Encrypted key 496s PKCS #8 information: 496s Cipher: AES-256-CBC 496s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 496s Salt: 53c73c3e569b6b60 496s Salt size: 8 496s Iteration count: 2048 496s 496s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 496s -----BEGIN ENCRYPTED PRIVATE KEY----- 496s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 496s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 496s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 496s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 496s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 496s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 496s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 496s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 496s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 496s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 496s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 496s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 496s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 496s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 496s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 496s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 496s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 496s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 496s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 496s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 496s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 496s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 496s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 496s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 496s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 496s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 496s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 496s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 496s -----END ENCRYPTED PRIVATE KEY----- 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 600000 496s |<9>| keyLength: 19 496s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 496s |<3>| ASSERT: ../../../lib/x509/pkcs7-crypt.c[_gnutls_read_pbmac1_params]:1824 496s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1123 496s verify_mac: One of the involved algorithms has insufficient security level. 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 13 496s |<9>| iterationCount: 600000 496s |<9>| keyLength: 16 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 496s |<9>| IV.size: 16 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 13 496s |<9>| iterationCount: 600000 496s |<9>| keyLength: 16 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 496s |<9>| IV.size: 16 496s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 16 496s |<9>| iterationCount: 600000 496s |<9>| keyLength: 16 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 496s |<9>| IV.size: 16 496s There were errors parsing the structure 496s Setting log level to 99 496s MAC info: 496s MAC: PBMAC1 (1.2.840.113549.1.5.14) 496s Salt: ab3705b0eeb5d7dc 496s Salt size: 8 496s Iteration count: 600000 496s 496s BAG #0 496s Type: Encrypted 496s Cipher: AES-128-CBC 496s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 496s Salt: 4a3a38ce1e1baff2e97e006a3d 496s Salt size: 13 496s Iteration count: 600000 496s 496s Decrypting... 496s Elements: 1 496s Type: Certificate 496s Friendly name: my-key 496s Key ID: 56:70:F4:A6:3B:92:7D:1E:96:E8:2F:F6:5E:AD:EC:BB:6A:47:5D:AD 496s -----BEGIN CERTIFICATE----- 496s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 496s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 496s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 496s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 496s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 496s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 496s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 496s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 496s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 496s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 496s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 496s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 496s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 496s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 496s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 496s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 496s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 496s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 496s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 496s -----END CERTIFICATE----- 496s 496s BAG #1 496s Elements: 1 496s Type: PKCS #8 Encrypted key 496s PKCS #8 information: 496s Cipher: AES-128-CBC 496s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 496s Salt: 65c9e9fa55c1c5de85ab89d34b9a5cdb 496s Salt size: 16 496s Iteration count: 600000 496s 496s Friendly name: my-key 496s Key ID: 56:70:F4:A6:3B:92:7D:1E:96:E8:2F:F6:5E:AD:EC:BB:6A:47:5D:AD 496s -----BEGIN ENCRYPTED PRIVATE KEY----- 496s MIIFNzBhBgkqhkiG9w0BBQ0wVDAzBgkqhkiG9w0BBQwwJgQQZcnp+lXBxd6Fq4nT 496s S5pc2wIDCSfAAgEQMAoGCCqGSIb3DQIJMB0GCWCGSAFlAwQBAgQQhPUnObpbX1bU 496s NvIYOdXSmwSCBNBL3aGVlx6GBump88n1lzu1JrGSk2ZowBLpB+nSrNFpUQw4iQnc 496s rtwddlH/ZfokkLMu/irt3vbelNU8OV4IcQYakUSXqS1Fs6XVuGzQYYFxKtYucRcM 496s NC/2FeQlZ5i7Y5dwQK+vRxQkWFtuEvwc/nkoJAKfbNnUVuIEL1eX4/CksotdxZZd 496s bWNic22bFkZED89gXL9weUFJCozpf9+8eZt11OW7zJYc05/+kT04YgjpXF3FveMp 496s SWdxmXq7l718jWC9Tma53D0mhJ5lOLHg+YXP/h9/OaKxCgsOXwOD8yyEJxue48FU 496s A6MYsZ48rk0kDqo+CtozGtARH0+1Y+jk20ZHuuegjgL0lpZgagfRSJnvHFY3gcIK 496s HfaHo/4ggimHCptqnKZGyqp/uWwslqO/nobok0qbRX/NYP4cNqA7yf6qgh/48MPD 496s rdxAh3BzHvPN/hvZ615T4ZXP0YY5+dHYVc4HuGJOBMnOMvdVDNNkM8k1TDdJ4hjl 496s JvXFBpd4meIg2GiYcsmUaMCWqc7IR8lhygiUyURejYoDVQi0b5Kus6wF+TgFgGB4 496s 8gWw48LIPwyawVpraUadlJtZyNebNXGYKvbJRZMrnKTTTv5Zp9dh57WAl86kcury 496s hPHNV8F3m+f2QU33U5rPvD0uUAHcXY3/0THj3O8HN3rGtBf3gCelIKvS4IHavwlY 496s NfY5JSjChholkRP4zsTyfDaurkJPPB0XLxC+MjZC/s5YxfHF6W9XU2IiavRTF7nf 496s YJYtJlfLDHus3TC95QtZ4/7MJRyR/CRvtW/nR+nyXM2dslql76tWqeCqneJL//Ls 496s EGN+EKLNOXmM+8yZGup5Pp7PRQGrscxy8iG2+wAM2mDoxBMTGRJaBzvCzrRVz6hu 496s zdFhZ4XMV2/ObKR1MhMJ23xbC7i6dbutnuiICMUCwWToHcpZEWq2F8PXHvtxD0F+ 496s UHGAh6zdwI/8p0Fk5v/RwbQIEYgsJZ1TO5ASXGn+lOx5YHQqmNqGxRUCX0pwwLc3 496s zFt8X5HDnhcIePNeoTe9ACmheJphEvoq71icDsZvKFi0jS5ClFYiyFHhyWCg2XJ4 496s herbj887AItOaDnj7aJTwHfLsv+Cf93RKWHv8MJsvZKrGbkwKVo76HK0IdRAVbdh 496s cVCWWKlyAyHiU6/m7pOuuysoulv9M5hi32QpJTFHPWA5yeyvFc96KPvrpfg3RSDM 496s C2gI1RTn7xNoKRsthbnPCE4Zdzs7cREyO1ZjUtFADRtY++sOk0b/W/yRcKkc8Ndb 496s O7WhbARjWkxQ22vWgkQS4Ye2LOqgEpsVC7JY3974hmFXtuHor3HlD5HxnWmxKTxg 496s kMKvhJaLoYkQ2ZbdRYFxps92GTF+xcna/2ghgEuDEQ38s+BBKBIbyl4GsX6k+c4n 496s WQ7p10GvFJ1gKiHC6SoSZqgHnAv0tOcNHH1wKBGXi2cjvD2d3CwTvzIaoPkpt3AX 496s nit2qVpzyxtCx3sYsHPNMIDAwCtf+r8gTJ6WFg6IFs/yXB2ktsi6i4ppEmH2x12G 496s LTp8O73hZB50qNYyEFDPx+Q2/jWPAbpRYQKIq40tBCdZ1KYd80PMTGgf+AIK42XV 496s hvNTQadHKtD5cQgV1gMWB8DAtSrwLjZ/+mu0s+QiizOoQ5plE4mrFyxCUA== 496s -----END ENCRYPTED PRIVATE KEY----- 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 32 496s |<9>| messageAuthScheme.algorithm: 1.2.840.113549.2.9 496s |<3>| ASSERT: ../../../lib/x509/pkcs12.c[pkcs12_verify_mac_pbmac1]:1162 496s verify_mac: The Message Authentication Code verification failed. 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 496s |<9>| IV.size: 16 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 496s |<9>| IV.size: 16 496s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 496s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 496s |<9>| salt.specified.size: 8 496s |<9>| iterationCount: 2048 496s |<9>| keyLength: 0 496s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.42 496s |<9>| IV.size: 16 496s There were errors parsing the structure 496s Setting log level to 99 496s MAC info: 496s MAC: PBMAC1 (1.2.840.113549.1.5.14) 496s Salt: 4e4f542055534544 496s Salt size: 8 496s Iteration count: 1 496s 496s BAG #0 496s Type: Encrypted 496s Cipher: AES-256-CBC 496s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 496s Salt: 3da715f1636cac73 496s Salt size: 8 496s Iteration count: 2048 496s 496s Decrypting... 496s Elements: 1 496s Type: Certificate 496s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 496s -----BEGIN CERTIFICATE----- 496s MIIDfTCCAmWgAwIBAgIUeOdebExxNTjUFCilWX9HoXcdFu8wDQYJKoZIhvcNAQEL 496s BQAwTjELMAkGA1UEBhMCWFgxCzAJBgNVBAgMAnFxMQswCQYDVQQHDAJ3dzELMAkG 496s A1UECgwCZWUxCzAJBgNVBAsMAnJyMQswCQYDVQQDDAJ0dDAeFw0yMzA1MjIxMzE0 496s MjFaFw0yMzA2MjExMzE0MjFaME4xCzAJBgNVBAYTAlhYMQswCQYDVQQIDAJxcTEL 496s MAkGA1UEBwwCd3cxCzAJBgNVBAoMAmVlMQswCQYDVQQLDAJycjELMAkGA1UEAwwC 496s dHQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC8oOL1jSEa7l1HWxta 496s vRbx0LbgzDPe8JVZJMlK5/HRpoBbwp72WHISizxA2PgUT+hwdUtpOVrw02arA/8Z 496s YfSG5nvhwJPf3C+Pf5vr9sbNPAc6kWWp76oCVy4H8LvL1agDpbS+jdMnkz8YJhMk 496s rxQpAk9ZBytWJqiT6aGiYnMJyBs2YgWMlwKyud6za1FX+UobRNiR8oxv8bfKdyEd 496s 6eWqX9Ujny/roPaWKTQZCCpiZl5eXVFaWJX9pjj6gjFUTBLcV+ULZx213XBCS38f 496s 3TTSHS+25Q+mmf+ZzSmZ7fm/zy3tzHgEWBfl6tEEQ0xb+wh8Yi2MUCnG6xvbui0K 496s ksjPAgMBAAGjUzBRMB0GA1UdDgQWBBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAfBgNV 496s HSMEGDAWgBQ3wPwMQ6XJ4ZCGwOG3J3KQLP2fdjAPBgNVHRMBAf8EBTADAQH/MA0G 496s CSqGSIb3DQEBCwUAA4IBAQAiU46Xg8ThhuI41U5g5y5lO9MXeiriYFqT5IEr5IXY 496s fX4u9grqKeHwqluk4jhyM/Gg+mdc1KdqIEVqWcVFBXim6cyeWIhdiGeujv5388oh 496s 5xRtSZNkHA8c7odBpYPjpVkOYNo1fZqwto76uvZT+XukhKUvReazxNP0kE1eh6PS 496s yung98M+gYU7xfYW/J9kxd9igZpKfFoqvOZJx3srKql2at6E1i7YZKbxtlbSTM+5 496s XKCSVOftBEhpszrv08fbVgiAeIr8L490GbIo2atSh5aWXzE2RBVJESDGfoItddK6 496s UwsNw3X8Vlg7btxl3XlhA/ISU4HzEl8okMocUDcozDKS 496s -----END CERTIFICATE----- 496s 496s BAG #1 496s Elements: 1 496s Type: PKCS #8 Encrypted key 496s PKCS #8 information: 496s Cipher: AES-256-CBC 496s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 496s Salt: 53c73c3e569b6b60 496s Salt size: 8 496s Iteration count: 2048 496s 496s Key ID: C1:63:B9:0E:8A:EF:55:66:05:DC:15:94:98:0C:34:AD:41:1A:8D:27 496s -----BEGIN ENCRYPTED PRIVATE KEY----- 496s MIIFLTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIU8c8Plaba2ACAggA 496s MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAEqBBCvZ0qnNSNreLTFRm1h6XbUBIIE 496s 0MwsCO49+IAk734+p7jkp3QI0oRr+5jdo+1jFdKbJU6atm/QZ9759WNCTLy+BO7C 496s 61MzVNNqXTnHwpxKTBXHDb9rEKy6dZjgisbvDo0qh2S6ClS9ETlbGfHTBAiy4oA5 496s TykYksixK5deLRK1+P825FGljETjtvJBW027m0PGKB5UVMLCltcS4L34tIEZBv8x 496s 10X0B41//DUrb+4V5XoZ+/xsthCj7ERYWnZv4lBwH5gjJDIB01NuPCREffp7F5bX 496s efR/iHg6Y/5G8WfmLx6MPV1GSrvNvHdzEJ1KS2dQXyRoTAT1cG1VAwONAokAVXQq 496s BrTycmpS9vMaEtx9CCxQp8EDq+rtB8JXjSTxh6u/B1Mh+h8MZ4dG9OaNet6+sExW 496s Z+XDDsaW7P07Xft068Zq2KXdl57kZnt3J2mCdCC76XP/Hiy0e0iow0+CYWdIfwn3 496s Fdllr4aULoJGNKVq2fhCDJ3gdXWQfepiVS8TotePDnkoItD7MWTDYmDN9606cEE+ 496s VqjrBMg8FEKZ3uW/CpLf7OxDdCyTZz8iSUS9S3Kjna+o/umKkbT2u2vaFiajHLkz 496s /m6sxkSYftxw5RQcNmM6fYmnb+CpgdjM4UrS1KItjEo7555JHeS3nbLIQHelmynx 496s e5CwB0B0+AIunTBDuBCpBFRfSQbcQkeCRJ+gvfC6YPi5Pq32O4Bzn2cbYBlEcIF0 496s WN2i1K3U+eWSoJNxMVSj84uRIXaQGruySoaTsMiqMwKfziljDa8+oaG7tjG59Qfi 496s AOtKbGBx8cpwYLCR7+1kJm2IfB8hnx4Fb2gPKWQmKscY6S40ia0fAQbvR/cZE4ey 496s pYcYK3l2L9fbgGG1HfeZHKMfYs2nelT56L4BUm/jpncujyQAj4+oRVujyW7nD9GD 496s 6TtFbVrUHWWd3X9T9IWe6rysDjxQPoCmUnJIKgEn8oIj/Vd2XPIyIsIzc6AzNkE/ 496s lFCSoohmFyVBDjvYccxR5Ro++fQ3DUYaYJeQIEee6HyEg/cgbggCWD0P2mRzxbkU 496s 63FRt0WiGwgEu95xM5yshWizl388n8mkpsobB9ud7Z8i9THowvtm0RJKP8pXYBVM 496s b1OSSPkNyiegMI/j53bh18e9ROFMErrtsV2DKcZ0MCOq66EKWQV/Nh4aoHC1fNz/ 496s Jac0MD3R4x+c5KMZlnQtPo1P7XEHzV2KSXcqGl+7Q5lXJS4cJfabPzvONaSLDSyV 496s l8L8Rugftyzf5MOEI8DdfeD6KYjg+/qA5uZobbTu/Aqwa0cRzA/9EKp4mYys0mXq 496s cZWavie/drvL7TJ7s8wocbtAX9z4SF3CTXFYcFLa9MinvzfjbwtLZqfMMopPwZZ3 496s cTfXim3UzotsCIuuIdkBvJzpOusEPz0iCWMGZengzREEsx/9Zhgn1EJ1E9e1Av6f 496s kIHp3+gLmqdhlpb7Cawe7v6crc+ua7Y7f6LqOiIehMFqsFVaRl2Q9O4FVh9Cnv1a 496s +mjxjb5C3Jn7T7g2bJ/Y4ooN4LoXXskVX9dDsd+vZClnBu+au+4cRCM0sw8lJQTW 496s 56JvUiI7rd6/qlWJljjWrQuqv+A9CONi543d3RMmce45h94P0tgEjBc1q/ab13Ot 496s XbGDpHWeD2GvVz1GcVxWoGbKEtxdbFO/ffiCVVNLQtDB 496s -----END ENCRYPTED PRIVATE KEY----- 496s Cannot open ../../tests/cert-tests/data/pbmac1_256_256.truncated-len.p12 for reading 496s Generating a PKCS #12 structure... 496s Loading private key list... 496s Loaded 1 private keys. 497s SUCCESS [42]../../tests/cert-tests/pkcs12-pbmac1.sh 497s running [43]../../tests/cert-tests/pkcs12-utf8.sh ... 497s Testing decoding of known keys 497s ============================== 497s 497s Testing encoding/decoding 497s ========================= 497s Generating a PKCS #12 structure... 497s Loading private key list... 497s Loaded 1 private keys. 498s SUCCESS [43]../../tests/cert-tests/pkcs12-utf8.sh 498s running [44]../../tests/cert-tests/pkcs12.sh ... 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 498s |<9>| salt.specified.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| keyLength: 0 498s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 498s |<9>| IV.size: 16 498s Setting log level to 99 498s MAC info: 498s MAC: SHA1 (1.3.14.3.2.26) 498s Salt: 6a5a70a22b14fca1 498s Salt size: 8 498s Iteration count: 2048 498s 498s BAG #0 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: AES-128-CBC 498s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 498s Salt: 8f9768fe442a3123 498s Salt size: 8 498s Iteration count: 2048 498s 498s Friendly name: localhost 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIFHzBJBgkqhkiG9w0BBQ0wPDAbBgkqhkiG9w0BBQwwDgQIj5do/kQqMSMCAggA 498s MB0GCWCGSAFlAwQBAgQQurIuL4cSxHg95+AjR+xOZgSCBNAxqIIsFleFzQ1wqhbB 498s JlMweSFx4BPmw2w/bsdqY9UT2IE+6xwdbQHc8aCTqYLcELe4S0LnTymSfWjWx19h 498s TEbkhZwMXyR7xDJXxXkyzlOzpIhpPcAH4BfchXIam0sxaza4stRLS66e26Vf5wJL 498s lfnL5VfWwoZUKaCYSLfGkRGD824JG6OTZuyQuNZ9q4/FeSGzdh1c2Pxn2jJIegXo 498s s6DKsdrLSs0l0L2eeZmF6XzUdWNxYGr2dL4sC/jHUbWId+W5fv8L79Tw4hGDAoJn 498s 44ZOTBHzotMo96rlHJRbPorS8QcD8AIBL6jXVqcEsrxIzb8DlXAxFISbLmQVao8x 498s /zJczzzGMCsPVutARKtGkyk0pkXhe8otXr0E0xgdG3LaAMxSgaj5df0R6G1beJvo 498s +mHVY+wZb1odljfGON9sqmuNRqOp/+KfN7paYKsYJkiz6+w7KGAre52DpEIDxYoJ 498s H2pRYSPazZoazvtYBT4AC2VEuYag03KFm9hpN1k8yfI6ZZecohbk/cLNp+QeNzv6 498s T7Xiku+EcZUXds3qUon81cvuTxmQnZcrTlilaNGsg5E/nVbv8fYhY/bYHp844GaH 498s lzuLK+hRAVYy7FAdYUgHkDGCFlYgoJqdxXjyvn7oj0rWFeuUvk6fbbYxAP88fy/R 498s FjdnTjmNLnpDByrkxisDvj+Nti/BXNcDQ24aDWMoH5bhYUovb8fwsLieYUrEIDca 498s NfC+xBWznKj1GXdJkJ8dt19nM2entGB3cdK8wRBLqxUzb/CGY7WbaHRpz8wVVubi 498s NkT1gwFe0ZNGSjCGKsyMe9QAWrAJpgbteWBifEw+YAOP1UUa1Qs75II7cJxGoy0m 498s VOhtKXUr6/5StcI59poXjls2/1iAGzq0gN4/rQ9BqG94FIUQE+7qlEBWF+cainBN 498s KGIVK/qVhtMHI5QNmxetWYUsYV99MhNBsKlYPnkiQys/4XIMMA/e7TSem6hqHc/3 498s tbGpXUibx1Fg0/j4Vy+ieUtWEN8igqCGlEisDPfDgWJ4yZx5uBd+39a/WxIvoCvH 498s sU06kMzAD0SWe9WKqfBz12IFQDbHkOQSfksC9jveF50DNRBlRHemDThZvITB6tQq 498s PNJnRJiWAqlNNCNjr161044utJu/OG1CEn5BizrjHCp0g15AZpcV7aVh3QbhjEze 498s p26SxDQ19J+SB4zD2GobDexw87A5tq3qcFAlRl50t70ZnHSl50E9X3kFxzSRJaxA 498s JTHPWFLe+ldZ4hyfT2JAd/0+fFT2WkXUPQSQZ6wi8WnKxaxvDAghbmWj0asbkVPb 498s +q0CbzIOHLOHoL3p8DhfA/1f563ngMjRWRkA6cweK8W+gtCxZo6/+sE4CRTuaqzz 498s 1qInoiOCh1fwLQTUWkJ8o8KmKVmND8pfBzDYlYSvx9IeLE5vsGMmlzbJbp/KzxhV 498s hcE5xSvpwlBww1OCyudRKpxCMYvi+w6SqY3pSQ/5H8pRwMt5DqBRZxNnQtPzslZP 498s IIlp6GE4xD8xiNXdKSndzWBHTMzn4k/DscsAS8FfOvqsARKtxHi3aT6sbLGPSAiZ 498s tevuAmtWZ34dmZZGreN+ycva9NtFv2NNDgfJlHPohq6LlapyfoxloB3cwaaNzR9K 498s mrCHP6uaanRDaXfVv4jxzDYGyw== 498s -----END ENCRYPTED PRIVATE KEY----- 498s |<9>| salt.size: 0 498s |<9>| iterationCount: 2048 498s Setting log level to 99 498s MAC info: 498s MAC: SHA1 (1.3.14.3.2.26) 498s Salt: 15858adb65af0af6 498s Salt size: 8 498s Iteration count: 2048 498s 498s BAG #0 498s Type: Encrypted 498s Cipher: 3DES-CBC 498s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 498s Salt: 498s Salt size: 0 498s Iteration count: 2048 498s 498s Decrypting... 498s Elements: 1 498s Type: Certificate 498s Friendly name: localhost 498s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 498s -----BEGIN CERTIFICATE----- 498s MIIC+zCCAeOgAwIBAgIJALcX+trIX5ynMA0GCSqGSIb3DQEBCwUAMBQxEjAQBgNV 498s BAMMCWxvY2FsaG9zdDAeFw0xNzAzMTYxMTAzMTBaFw0xNzA0MTUxMTAzMTBaMBQx 498s EjAQBgNVBAMMCWxvY2FsaG9zdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC 498s ggEBANykRgfq8TW1B6NNUaR3cG0OW0nzy1RW74k4pfg/3CxOh/JBk6YX9TJ2GJ2j 498s mE9el3mMgItrCAv6cduWvYkl7H/B/iLpLO/8ie5bwL6IDC/s107uxTMBJwE83gwt 498s jE1bgJ02rf602BKqTB9COuCLQAM46u3liukOPOAFhiF6dGSOX7wGm36EqS11EZiO 498s UHRLJeIV6ruLf35Sme26Lzefd1Pj6J5T/vYlrd54QcBqRRL3jBw2j4DUphG4LroR 498s eVCNMiYTx9+kqlqHrz4NWNFsms7r6LYTA1Q3KcwjuDVq7aznVKXRxnI09e919Txk 498s veYoK+E7e4M+X4o/Mc41IUZguAkCAwEAAaNQME4wHQYDVR0OBBYEFJ2pF/DIt1Gf 498s DHgXypnHtptyeghoMB8GA1UdIwQYMBaAFJ2pF/DIt1GfDHgXypnHtptyeghoMAwG 498s A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFO29MmqGIBwP4F3ehNlIBnv 498s pSZiLraBN9HKOCJKOJxSJ69KL4FFV/pqXegdXDHebdx3YfRV0tC+nF0izUtNC+kO 498s 8XKU/sFwwMG4bP+rU1cl2mZZK8vVWA0mippphOe3Jwr/cZWK5rMja6OIGsIQieWx 498s Ot5vBruOYOfoNAOIms7ezEKCIhgi7lhT06Voe8DlVM2/dxmyIgxenl0i45WRVd9u 498s 4C+a2HQULDbBS2GdqHkyD8guY6HFLkeDZrymKZDYDsH6P+qUqK97/WhFqgTCSTQy 498s XcMXQPzfo2bP7KqY/WvwAbekZ4psv22fRs3g6NPxQvMSpqoRZ0sHHvnM40NoBWQ= 498s -----END CERTIFICATE----- 498s 498s BAG #1 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: 3DES-CBC 498s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 498s Salt: 498s Salt size: 0 498s Iteration count: 2048 498s 498s Friendly name: localhost 498s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIE4jAUBgoqhkiG9w0BDAEDMAYEAAICCAAEggTIuxclc6IuT+cch9Ku6doUJJD7 498s VUklouMlb5ECyJlM8tBQLUh04RGTdQNUM5RRoZvWJXTcBRiQVbVJTWQPZzPx4hwe 498s oitoaJigRUhgIKzJ7R71ij3t2qCx8f2iULgJBzWY/qOsN2fORxlMV0QrosVgcj8/ 498s VoKxZpts7whAZbvgzD6SpQaVpvFNNN2WUyEyz6UJ5rzQmI7CnWaSaWVVyhpzOhZX 498s X2wVYsT2oPC952hSZ3t8z0CAUbTVtqjtC4eWwFv82Z1cx8bFA7wwTZBJd3x/riUx 498s Jxa5ieOykwuzg8dyysG4meYfZ8VVCIYnsyk/1oZRaBXmEZgDjj3rchTNYoTGyMte 498s yDYeqllb1Rzk3zmbxm2/OnubsYJ9Ra0fs0y46PITC8Jg74AyQ5WGXR8LDSOLogwL 498s z2rWnSJyOgSPMWrBZR99dV4QenRXGLSh4WIJsrB7RJ/7Utfj7TSJtaoHjVHy13MM 498s MmKposnznlBRECWmBeqFRI0GqkLv2DI/CZWBM7VYWxUNHOiCPaoCEx7q38Dmi+O7 498s g2bj7tpTKcW2n0pvm2rE8ULf9ZtmLcGJFGdflnr3ZeSEp+BnmaMmzE0r4TnMscpu 498s PUIra1wOuICcau7HtalguEsppaYW1RL+/OJmV/0x7sDK6trpa1xliDKNDRcoBxrl 498s 9AAmDIqZl4pNe05Z+HFZ94+4gbm+3Ttt3DPUDLE9//nWdKRYBcoQ1DZqTphTLQ3Y 498s kVe2BvmW912fJuiGXDOIpefEyMxwbfeKkuofHaMHd9xIPoP/Q4AOb7FAFNPQlihi 498s rvQw2TlP0p/BqPrbQNr+CYxrISu0FuJopb3YHO9bD421uTuwVJn7nj2J1Yc9x63F 498s x+ysru41o27zIY9c8+9lyRQVjnMqb98HSdBA2WloGXA8GHwq487/H8HPKKOIy5ne 498s p/sgBKAtJHAJGm4affTesqHDnhYC+AuNueNdtPWJZVEo8wH3w08aQJJIa5SWPfdU 498s HqsuHa0C0iUzo8IEYQjq6L2cvNnUVtzJE1ATNLUMz3a8WI7XLGdmPi0A7FTCesi0 498s lQKoTPovqRIF86ZkqFAXXsY8hiNF7xL/DdHTFYxSJWyaQ6AI8syi4amTQBwkMueW 498s j5MpiRt3tbKRT+um1DgMMem5cHSA9/LefuHO2O8CiIQZX1aEQew+4EdUILNd9uTd 498s iGc74LZ7SpNmD0HyUHn8P9V3hltc7hjoAqUfp3oufD7F6wRflsyafVG6A1EIi5ie 498s 6/sjQSFfYQv/bkRTumOLMZQFS3d9O3jI9RhCMGZni4tElctkIucEZ6Aq5pNbMBDu 498s CzfZV1ii+JZ9pceQPIN5ofbHQM5+FSeBvzZN9uAB+wDFka4uAEt5lMUEaCmXIe4J 498s 0Sj9al6R5roebW1/ATA4yBO2kP/lynQW3vshWZWDWjQCWdrgBPUgbucKIGook7Hh 498s J9Sjen3IDxhnu3deuhehXiLErDW+M+hcbp895OuhoUK4kA+ERkTJTjDynFNs9M33 498s HkkTYMeTByr/E1vX5IdPoOqD3Pt8D6KZjVNeGkgVCo/rLLVevo3FMusvRRT0v+mO 498s 4vSFuSwEp3n4DlvRuMOgxJhEeA3iymXZ99PnsMY4QEIaiGm9GluIJfHynoUp6J4i 498s hUGJcW8q 498s -----END ENCRYPTED PRIVATE KEY----- 498s |<9>| salt.size: 0 498s |<9>| iterationCount: 2048 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| salt.size: 0 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s Setting log level to 99 498s MAC info: 498s MAC: SHA1 (1.3.14.3.2.26) 498s Salt: 498s Salt size: 0 498s Iteration count: 2048 498s 498s BAG #0 498s Type: Encrypted 498s Cipher: RC2-40 498s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 498s Salt: 5c444d6d3f7e9be8 498s Salt size: 8 498s Iteration count: 2048 498s 498s Decrypting... 498s Elements: 1 498s Type: Certificate 498s Friendly name: localhost 498s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 498s -----BEGIN CERTIFICATE----- 498s MIIC+zCCAeOgAwIBAgIJALcX+trIX5ynMA0GCSqGSIb3DQEBCwUAMBQxEjAQBgNV 498s BAMMCWxvY2FsaG9zdDAeFw0xNzAzMTYxMTAzMTBaFw0xNzA0MTUxMTAzMTBaMBQx 498s EjAQBgNVBAMMCWxvY2FsaG9zdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC 498s ggEBANykRgfq8TW1B6NNUaR3cG0OW0nzy1RW74k4pfg/3CxOh/JBk6YX9TJ2GJ2j 498s mE9el3mMgItrCAv6cduWvYkl7H/B/iLpLO/8ie5bwL6IDC/s107uxTMBJwE83gwt 498s jE1bgJ02rf602BKqTB9COuCLQAM46u3liukOPOAFhiF6dGSOX7wGm36EqS11EZiO 498s UHRLJeIV6ruLf35Sme26Lzefd1Pj6J5T/vYlrd54QcBqRRL3jBw2j4DUphG4LroR 498s eVCNMiYTx9+kqlqHrz4NWNFsms7r6LYTA1Q3KcwjuDVq7aznVKXRxnI09e919Txk 498s veYoK+E7e4M+X4o/Mc41IUZguAkCAwEAAaNQME4wHQYDVR0OBBYEFJ2pF/DIt1Gf 498s DHgXypnHtptyeghoMB8GA1UdIwQYMBaAFJ2pF/DIt1GfDHgXypnHtptyeghoMAwG 498s A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFO29MmqGIBwP4F3ehNlIBnv 498s pSZiLraBN9HKOCJKOJxSJ69KL4FFV/pqXegdXDHebdx3YfRV0tC+nF0izUtNC+kO 498s 8XKU/sFwwMG4bP+rU1cl2mZZK8vVWA0mippphOe3Jwr/cZWK5rMja6OIGsIQieWx 498s Ot5vBruOYOfoNAOIms7ezEKCIhgi7lhT06Voe8DlVM2/dxmyIgxenl0i45WRVd9u 498s 4C+a2HQULDbBS2GdqHkyD8guY6HFLkeDZrymKZDYDsH6P+qUqK97/WhFqgTCSTQy 498s XcMXQPzfo2bP7KqY/WvwAbekZ4psv22fRs3g6NPxQvMSpqoRZ0sHHvnM40NoBWQ= 498s -----END CERTIFICATE----- 498s 498s BAG #1 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: 3DES-CBC 498s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 498s Salt: 66708f882d4a50b8 498s Salt size: 8 498s Iteration count: 2048 498s 498s Friendly name: localhost 498s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIE6jAcBgoqhkiG9w0BDAEDMA4ECGZwj4gtSlC4AgIIAASCBMipOHz1mQS9Ovsx 498s WntNF5plwfRoorPFadZE6pFuyy0WmeSycBvwZxmR9R1jQEPtzxUQ8DVHdi08hA7P 498s z9baDI74dRqVoRPT5qqonLZt0wNHPVFOkSpntk2CYb7fJz+GDeT9f/cskpGYiOji 498s 7sHuPedm/8YjwEVbWqAQW766G8LgV8l9XFEQesAqud60lpeDcOqYWmG7X8viy2CS 498s QxKgXV7Lvw1IK2tiP5aypj3T5khMgwQ4X9OETZFoexjbI8yNRmtNFEOTv4WTmoGy 498s URU/629ouCOaRtD0jbRFCazgHxoAZ3Sh4//0OF/a/2mB1JmR+ug6q7zT8ebBkFxc 498s sxv5jhfX5o66nnWZaLvEa5iUgzv4m0oXR72qgEZa5E8n+uyibPvnx0WHLUq34b87 498s TXl/P0CkV3qlOS3Rf3xY/72f3rZ2Bp4PUeyZG1y+9kRMyBBaPh5dwMjGVhOJauel 498s MGyH65210wWGqAhCOR2uOkFGK5KDNYtWjn19xThsd9nx0zhDXdZ5852UOIMdlbqC 498s 8SRcOjm3uqFvVNxS3SbQEstiyHwT5P3CbupnulvqfBqKjXc4xNLffBNfEt88RF+6 498s /7l1/tuapppFO+uyUCfjR6FmB8K5v9HbNUrvBWBf0eEVljdlghYV5A4UsLvrV82Z 498s +/9L2cnBM1jW70vFs8HBTu5UqT4BP/QKbajGk6NXPQnhIVFfIMvKG3j6CaFhKxgO 498s nIkWgDUglSB5JyjWMszMAZY0tKy6G8vZUcGKBT195mftXw4fkPVoZOseCRfOIgDk 498s 5aDAAAs6TkiVm2JhnehP0FLkBrwT3sLEEe/HNri54mvFJdPEG8bA+fDlE7+ZeOm3 498s 84WAuJja26mUjj6zSEytPAsa1n4qtrupLbByIgiBx+oqvW5aWJUhw0jgllchePyd 498s c5hemxNhTUIimiffnMXQbsnjeIh+v82FkxdBV+vQzhfhcGp5wH7PsSquun8Vs4Dd 498s Te54DjjOeHugnIk7a7p4U4hJg8ebLHebkjHnw72YeBVuM2+hm2FcnsyGvvTRFslF 498s bTRd9X5U248VMAIKDqjl8K2YUy7touPXM9D6FzK2EmCZcKwZI4mn4k01A/GDZAvH 498s 5Lm7IAlearbLIzb8TnYHJG6EgszQdU96MhOkBZ9vSviAz9nmZ8tEnq2xRuXovMjX 498s K2FmCPw5diqI0uNUCUM7CkVh2hOwHEfSOpO0Egj1ydECoX4XapY3RF+zJKoynSrs 498s MGsRZ2VSNZAt/Grl6xSt7yemOFJsBJCBj5YYsjQMk0KOFkyqUZ3tGkTrgCkTqEeD 498s Wg2n03iHpopaSVU1pKtFSkLhQ9drmlxQw9ONIxwQU2Kwjqu83kSfUN1BMRhh+5LG 498s amPCGK1MshNNr0xMSk/cU0gBj1C6P4mG87ec1fET7oqk4kl2ckOIbyiAaMS30XS8 498s LjRx7ZaKJpZBeJRw+B4k4VU1j8JoHsIFKXBWl/g73yCN8kJOY0AviU4u5ZW9+WRe 498s TOpwI0T+xioi0LHgImOQpqNSNVVkCeMQGlQgkGOCv7eP8hINHXovC3vli6i03xoj 498s SgwGCyhMQJDQRLrDmqwyrNfAUtkTYVWBDqQu5brMWvAW2hhJCcNlX7V+Xj3iWAyt 498s 5VxpB11meNNurDzvc9s= 498s -----END ENCRYPTED PRIVATE KEY----- 498s Setting log level to 99 498s MAC info: 498s MAC: SHA512 (2.16.840.1.101.3.4.2.3) 498s Salt: 22bea5019a50e7aa 498s Salt size: 8 498s Iteration count: 2048 498s 498s BAG #0 498s Type: Encrypted 498s Cipher: RC2-40 498s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 498s Salt: fdfabd44165a2ae7 498s Salt size: 8 498s Iteration count: 2048 498s 498s Decrypting... 498s Elements: 1 498s Type: Certificate 498s Friendly name: localhost 498s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 498s -----BEGIN CERTIFICATE----- 498s MIIC+zCCAeOgAwIBAgIJALcX+trIX5ynMA0GCSqGSIb3DQEBCwUAMBQxEjAQBgNV 498s BAMMCWxvY2FsaG9zdDAeFw0xNzAzMTYxMTAzMTBaFw0xNzA0MTUxMTAzMTBaMBQx 498s EjAQBgNVBAMMCWxvY2FsaG9zdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC 498s ggEBANykRgfq8TW1B6NNUaR3cG0OW0nzy1RW74k4pfg/3CxOh/JBk6YX9TJ2GJ2j 498s mE9el3mMgItrCAv6cduWvYkl7H/B/iLpLO/8ie5bwL6IDC/s107uxTMBJwE83gwt 498s jE1bgJ02rf602BKqTB9COuCLQAM46u3liukOPOAFhiF6dGSOX7wGm36EqS11EZiO 498s UHRLJeIV6ruLf35Sme26Lzefd1Pj6J5T/vYlrd54QcBqRRL3jBw2j4DUphG4LroR 498s eVCNMiYTx9+kqlqHrz4NWNFsms7r6LYTA1Q3KcwjuDVq7aznVKXRxnI09e919Txk 498s veYoK+E7e4M+X4o/Mc41IUZguAkCAwEAAaNQME4wHQYDVR0OBBYEFJ2pF/DIt1Gf 498s DHgXypnHtptyeghoMB8GA1UdIwQYMBaAFJ2pF/DIt1GfDHgXypnHtptyeghoMAwG 498s A1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFO29MmqGIBwP4F3ehNlIBnv 498s pSZiLraBN9HKOCJKOJxSJ69KL4FFV/pqXegdXDHebdx3YfRV0tC+nF0izUtNC+kO 498s 8XKU/sFwwMG4bP+rU1cl2mZZK8vVWA0mippphOe3Jwr/cZWK5rMja6OIGsIQieWx 498s Ot5vBruOYOfoNAOIms7ezEKCIhgi7lhT06Voe8DlVM2/dxmyIgxenl0i45WRVd9u 498s 4C+a2HQULDbBS2GdqHkyD8guY6HFLkeDZrymKZDYDsH6P+qUqK97/WhFqgTCSTQy 498s XcMXQPzfo2bP7KqY/WvwAbekZ4psv22fRs3g6NPxQvMSpqoRZ0sHHvnM40NoBWQ= 498s -----END CERTIFICATE----- 498s 498s BAG #1 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: 3DES-CBC 498s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 498s Salt: 9c50941085b66613 498s Salt size: 8 498s Iteration count: 2048 498s 498s Friendly name: localhost 498s Key ID: E3:76:B4:62:05:2B:2F:D4:B9:12:5B:B0:EA:E0:4F:10:C8:C0:C5:B0 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIE6jAcBgoqhkiG9w0BDAEDMA4ECJxQlBCFtmYTAgIIAASCBMhJaY9wQqh13Znw 498s X+Ox40Vs5oxYxV/F1rUFvLaVeL283k1Ru3KaNE+lzMLkG6mYqK21O5bzCSE5Ep6+ 498s wlgGgSkJmhxqzS132k3Xv0uUQgc6iJfPuvG3AHLbdZDSjBkW5jTTnRjX4srK1XDe 498s LPyPicdgiJXfoFMNSylJyDZ74FzwLETsO3MFkGyZC9KcZj8+1dL1yx7Wf9RdPzKg 498s bYsaGhmK0y6HiS99r3OerBd3TVHXHDvTzFq7goNglkQpBbhC/PZCEYw+h5V4vTIF 498s envVvma13wLy2/JJSd8ixtT2aiZ/Phe1N1mH9/xNXKH1F0Nzse2gWIwx6RkBTWcy 498s tYmedNqEKgMw/p7uYHvSEvTdnFvJIzGvbUMEGQT+6jjJWzXaYkRsZ4ptfBHNWpuH 498s 3whx5FZN4hIsK0N/GPPZ05+d1GMQVt03qzz9jmG/SDxBEl/GD+UJ3RCXfZxPCKhZ 498s Uvi6nxyAm/gZLxY/u5lcx0XOSCae+FKC8FjOhE92rhrsnUjlfeoEflZFe7VZkYiZ 498s t0Knp5QfZCcrXSLcJJhlPQoISsbe9IwRCosmpBwNi/dd5nqxQ0YQLI31rQDajvY8 498s h8B5TW90Lt44G3zAELjz6FH1YzhOwxqtqdcz7W+GzfRrMiPFFz8eorF+9e44X14Y 498s OTo+a0awOctxFc/k51wNAqnhDLqn1C7anPsEGwj/uZ1UPyO3NjAiKfexn8vSwKvp 498s 94sgMVYzcxBnyZQT1uNn/WDFJXDFoLzeu2ktyXEYVP+saeSvYAK0NNMVpJqO8nA/ 498s +fW5pb4xolkjhmPJ7srYmR1DJfM5huevuEPAMtMmIbrXQUcLb8si7nKo5Z5C81SH 498s H3do1xeRkE6flKkYnZX25gpSvcN6QKfPJzAItpqR6HghjvF3y4EycrQg0gD6kVuF 498s nR8HuntM6EpK2XGgvcc+3o0eTCH+sZEozB0UNncLqi8mGtpxL6qCtXwWAYVf8UAI 498s Iuy5Ug45CJMXRIpF5OG6anKyD54BMttAcxkYR2lJ5GplusPrVLMsh2ag3+gwepO0 498s dQh5c5jjwFtzgzukko+PDMjL4GJSyzF2+dHvd05SB8OP2MWZpNZ6fAgnF9epR3U0 498s h1I16Af4qfSJt56Cgzzx0j3bvBoFIhFkZ5W97FOcWmkHnLQ3eolR6hjt8HBmDiFU 498s DUTKeXkQg0XElqGX9JGj5zLLCNwgde7GEgdC/9zE6n1gb8nzaphfYwCDYMqiECza 498s Qy1hGu4KME15wc3Sj3pVRCFzdwYDtgFIeJ9aMeERK6mYYKwrzh2/pU7hvoNYTvXl 498s rM0Q1fB0mbZorVcDYnvyeMOhkAgYPapCRadEN0R3HLt3CEu1mTo/kuWgkcfqkh/q 498s fdF6ticNjFWfTBLHWyUa/h8fV5x02sbOLfAfvBDLCCkpXH2M8mJDrghX25XcbQyp 498s dNFB4Gu2PsdJHIX9oy3efIlYrhDx4maJgXM1Zk0mXVVOoqBK4w+0alE2UU9ZRvFU 498s 9LzSKlG67x8l8ULaIlVAlLndXVbZQN8tc66iSJHY4/SHrP9Y4IzTBA/13A9WoohB 498s lxD26yYdgvLiVt9CqZ4rCI3ntXvjH6mZCKQqxeXceVZVo+UywGCudHfRrKg7oRcw 498s Wmxf9VNIh6FAdjvgk9k= 498s -----END ENCRYPTED PRIVATE KEY----- 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 498s |<9>| salt.specified.size: 15 498s |<9>| iterationCount: 5185 498s |<9>| keyLength: 0 498s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 498s |<9>| IV.size: 16 498s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 498s |<9>| salt.specified.size: 15 498s |<9>| iterationCount: 5185 498s |<9>| keyLength: 0 498s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 498s |<9>| IV.size: 16 498s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 498s |<9>| salt.specified.size: 15 498s |<9>| iterationCount: 5171 498s |<9>| keyLength: 0 498s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 498s |<9>| IV.size: 16 498s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 498s |<9>| salt.specified.size: 15 498s |<9>| iterationCount: 5171 498s |<9>| keyLength: 0 498s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 498s |<9>| IV.size: 16 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| keyDerivationFunc.algorithm: 1.2.840.113549.1.5.12 498s |<9>| salt.specified.size: 12 498s |<9>| iterationCount: 5250 498s |<9>| keyLength: 0 498s |<9>| encryptionScheme.algorithm: 2.16.840.1.101.3.4.1.2 498s |<9>| IV.size: 16 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s Setting log level to 99 498s MAC info: 498s MAC: SHA1 (1.3.14.3.2.26) 498s Salt: 950d56ea02d811b8 498s Salt size: 8 498s Iteration count: 10240 498s 498s BAG #0 498s Type: Encrypted 498s Cipher: AES-128-CBC 498s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 498s Salt: a58e219e72cc0fc85d353fac9768c5 498s Salt size: 15 498s Iteration count: 5185 498s 498s Decrypting... 498s Elements: 1 498s Type: Certificate 498s Friendly name: key and cert with CRL 498s Key ID: D9:FF:25:58:CE:CB:13:91:A4:30:B4:29:CB:27:E9:68:E8:E1:71:9F 498s -----BEGIN CERTIFICATE----- 498s MIIDmDCCAoCgAwIBAgIBATANBgkqhkiG9w0BAQsFADBQMQswCQYDVQQGEwJVUzEf 498s MB0GA1UEChMWVGVzdCBDZXJ0aWZpY2F0ZXMgMjAxMTEgMB4GA1UEAxMXUDEgTWFw 498s cGluZyAxdG8yMzQgc3ViQ0EwHhcNMTAwMTAxMDgzMDAwWhcNMzAxMjMxMDgzMDAw 498s WjBiMQswCQYDVQQGEwJVUzEfMB0GA1UEChMWVGVzdCBDZXJ0aWZpY2F0ZXMgMjAx 498s MTEyMDAGA1UEAxMpVmFsaWQgUG9saWN5IE1hcHBpbmcgRUUgQ2VydGlmaWNhdGUg 498s VGVzdDUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCmiGMLjXA2ijC5 498s itMpJVXTbHXhguDwZQ2mcSY5FmZ2nPuO2JBp2lA6yUG7fCuxTKeC1mGSOej41Pz8 498s zTkOGiXC/UtDy73yQhJJPHFn/ka7HzC3UlIOzRbY3nXg89sqIrO4wFLKUvrM1VkW 498s FqXJw5XbDwrL/0vIhqHh7jyK64snUiP0AAm6kgR1r3aufS1/QwjozIkRGmP4Cxm/ 498s 8Gzz5is4kfB2NuaR8xE/i8BubAM8TnAyIXX6hy99TlyyXSD2tc8dlxTskD8lt6IY 498s w0NwwNTi9Rqq41ZKkLtixase00o+s345noAcI5SfLdnTKXM6zUwooJzBW/av+8C7 498s YyqmOjS1AgMBAAGjazBpMB8GA1UdIwQYMBaAFAMX5ZUA/So5eK/LRvZAmGUKAu27 498s MB0GA1UdDgQWBBRLgjD1Mqn9+vaGwm3k1zO/qu1RFTAOBgNVHQ8BAf8EBAMCBPAw 498s FwYDVR0gBBAwDjAMBgpghkgBZQMCATAGMA0GCSqGSIb3DQEBCwUAA4IBAQBSG/qP 498s hRrenfviZJK/kxNaJzIM2ppVq3YbCxbjSApzL/tqPFEKtJuw2r7UlAY05rqzaZyE 498s 1sxWuvyenub6f/K9BCQRBXHO5cPOnWS142x9komCqDUP7I7F4pnptXAp8nyc8eoL 498s zmsOJ8dlZv2aD//mISoFMZ69fvfIku/MAOZCTnSks1CPyT9omAfT6zdnMiDfk/kY 498s lZAWFas9/pm16Z88QP8y0z/IMrri12dOLMnFyKNBy/9TXNZof/VPkkD2keJ6eQGn 498s MUamXI/OIlBJXqu3AYiUDP9FQbxKxj4uTOtS1MhrZbAtTAI+3eqPKU92T8YFamCr 498s A1Z483lYO5ntY6/Z 498s -----END CERTIFICATE----- 498s 498s BAG #1 498s Type: Encrypted 498s Cipher: AES-128-CBC 498s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 498s Salt: 17ad7c697582811483dcc3ec95f649 498s Salt size: 15 498s Iteration count: 5171 498s 498s Decrypting... 498s Elements: 1 498s Type: CRL 498s -----BEGIN CRL----- 498s MIIByTCBsgIBATANBgkqhkiG9w0BAQsFADBPMQswCQYDVQQGEwJVUzEfMB0GA1UE 498s ChMWVGVzdCBDZXJ0aWZpY2F0ZXMgMjAxMTEfMB0GA1UEAxMWbmFtZUNvbnN0cmFp 498s bnRzIERONCBDQRcNMTAwMTAxMDgzMDAwWhcNMzAxMjMxMDgzMDAwWqAvMC0wHwYD 498s VR0jBBgwFoAUbEk2rS5YiRI2UUE7VFImJADTynUwCgYDVR0UBAMCAQEwDQYJKoZI 498s hvcNAQELBQADggEBAH6NXW4G6VFh6lalxV0HfwwV4W70J+q058P1U/nVsOOg7s46 498s v+bhzKwJrIovS+fGE+WmDCMbeeIzvmMnkF7ZSGmZarmGDzNGsxghmiNHW9eP2Wk2 498s 7QjyePG/cAff8ILOqzCHw1WZMtIgyVM3tQY492xqKPRTBac5P5DN6COtBGzKsk7O 498s mtOvhcqtwMt5ejXil9ibRhAKHcgoNtzOoZoaQOvTajOP0vdFYnHHkF+bFDd+lxUE 498s IHgX9IOmk1xGFgdEcSpQL+6mvV0aKk9iavdbVBQCeWzul24GRr21EVO2emR3oceI 498s vBeEL509yRgDMZoosPcUPzU3MCre4KHexkxNGKg= 498s -----END CRL----- 498s 498s BAG #2 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: AES-128-CBC 498s Schema: PBES2-AES128-CBC (2.16.840.1.101.3.4.1.2) 498s Salt: 9657f49edbc989d67e172505 498s Salt size: 12 498s Iteration count: 5250 498s 498s Friendly name: key and cert with CRL 498s Key ID: D9:FF:25:58:CE:CB:13:91:A4:30:B4:29:CB:27:E9:68:E8:E1:71:9F 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIFIzBNBgkqhkiG9w0BBQ0wQDAfBgkqhkiG9w0BBQwwEgQMllf0ntvJidZ+FyUF 498s AgIUgjAdBglghkgBZQMEAQIEEEczYFMNNfnMXzNRc1q3f7gEggTQ+rlhcOd3s8Tq 498s H+d2CJDTbhxMNwCZCNHZ0EfjcgJh+xwGYhhyyiKHnheriXmAmIso9ssOlMwdXigm 498s N+Iks78102CFdMk2BoqYBIglDc4lL4wlmELHo+2g7xX+Bu2E9UeqJY1rpP7k5ilI 498s HrgzQ0A575RIfN0t7ZRiAKKJ9+ZvYKX4ZI1ieuvqVqjqGZY5ugjCjqAM9nqHzdRn 498s rbrSQusi85k/EU5vWxA7WRhx3B0MMjeNKoJU8uvWfhU2xp968n0zDn4yUjA291g/ 498s 4BZ6chCS+zAeCE2YdXZm9kPKrxTu0VemtTnOKA6GxBnToybFQM5nhsEmzHiWOv7c 498s 6noNptMMaMzZfj2u6aNMb/ctvqyB7VgkxTq0rcAfGAUW2uiAYLdZaGtM6/KemrA9 498s ypiY9lnikFNbHmXAisZrNzItwNslVV4MkqwiY5n2tPCSaQ9pDi3/556iTnlW0xN9 498s boJADUJzU7MgHwi2haM45yj16lUxfqGxQPH7rVzXxmd/DoWQqZKHEPy9tybxtK6L 498s XnIma8+NElYENUANmGWyDHyJS7Cr8cL7syv6qx+x4pYkwu0N98J/3eaLvZAqOcSO 498s 2Nhci8lYo3JK6f71eG59ae6YXOhRXdBMWOXQAp6FjO5ssfiH2vymZueuPCpnTuiS 498s rvlnkYIy1/5fGQcYiVhX2C8qei5h8qZJUnZv+G9ozvktTqQotbW6y8+WzMX3CNM3 498s VuRb5rScinTylCTO8h3NKnqhtWhyRZrSqYT7Uu+ioF2hOWVTShNWTB4AEcvd8cMo 498s HB7B+luoZWiZ67ApAhxAicEhbPJVVmAnjCH3SZ8GF7Y1487rJK/khppUKERAIDBB 498s 11w5k8MLJ4fB8xXApTAN4zKGV1Yl3aZr0+x+QaLdXRUd0xtJmfZqwXnk1jtQBtQc 498s 985yPPr8KmLlg5YtcxDMglGJ48V3uva3c29QNPE5JoFmrydhGXO49bNXcUU7yFIX 498s Q0V0hNwZkRx6aNgE/TNb4ZWi+x/yZZYjwgBPjldpnYgs+5YPzN+GQ/71Xxqm93Th 498s sa7Xpqyh9D7m6VdNYV2FGl8gy61kFU4NL4dzBhcd1y2StP7+bOvkjIpg/UX8SU2k 498s VGqXwpW0xAKE3G9avJGFD3pp2pUakTFHcq0ZbuWcYWW26bJc7ajkmoglYtXsH/39 498s /RUNASf+f/Gv20xpLGFSLU9Vxwn4r6oDPBU0bvUr1FDLnin1dKBEdFI9RdQsyjN3 498s sjmz5QRR8tQ2t3WB0l6qSdeWo/dFDaNQkmpgjUtqeojeKYWu1EzmL5T9U4k8tLKc 498s 047zvqc25IS0HtmxXIj/OWWXiAAH41aQpwvfJOw2PHfwFLRwnCgerZW9bxBvzIDA 498s kNpBvgCA/7wjzMa1vXq7KyjbS/X8H6jShwPg1jG4YtXzcjNk4wK62MZgR5ys2vYI 498s HDrh6hm9mlYmA4jRXPjwqTb2uFn95WbnGq0kYTpFqsctM7r74m1fQIH4yO1UK8Hv 498s o7Zvoat8IyMwJRB5SYl1ley80Qq7Qi15ELrgOSyVXLT3rJNYwwpzyqLFSkdoGkT1 498s EmBH6M6BI9UxyVF9EZ9MZt2X9g99KlwDqUjTYYT5I5LQy909dsVSBMG74xsWTUPs 498s JLqhdb98EgNcwKZDJ96URN9ztqjp31g= 498s -----END ENCRYPTED PRIVATE KEY----- 498s Setting log level to 99 498s MAC info: 498s MAC: SHA1 (1.3.14.3.2.26) 498s Salt: 8a0359c5490849ff 498s Salt size: 8 498s Iteration count: 2048 498s 498s BAG #0 498s Type: Encrypted 498s Cipher: RC2-40 498s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 498s Salt: e3501cdba64f1b76 498s Salt size: 8 498s Iteration count: 2048 498s 498s Decrypting... 498s Elements: 1 498s Type: Certificate 498s Friendly name: Just A Neon Client Cert 498s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 498s -----BEGIN CERTIFICATE----- 498s MIICSDCCAfKgAwIBAgIBAzANBgkqhkiG9w0BAQQFADCBmjELMAkGA1UEBhMCVVMx 498s EzARBgNVBAgTCkNhbGlmb3JuaWExEDAOBgNVBAcTB09ha2xhbmQxEDAOBgNVBAoT 498s B05lb3NpZ24xFDASBgNVBAsTC1JhbmRvbSBEZXB0MRwwGgYDVQQDExNub3doZXJl 498s LmV4YW1wbGUuY29tMR4wHAYJKoZIhvcNAQkBFg9uZW9uQHdlYmRhdi5vcmcwHhcN 498s MDQxMDE3MjAwMzQ1WhcNMDcwNDA1MjAwMzQ1WjCBrjELMAkGA1UEBhMCR0IxFzAV 498s BgNVBAgTDkNhbWJyaWRnZXNoaXJlMRIwEAYDVQQHEwlDYW1icmlkZ2UxGTAXBgNV 498s BAoTEE5lb24gSGFja2VycyBMdGQxGTAXBgNVBAsTEE5lb24gQ2xpZW50IENlcnQx 498s HDAaBgNVBAMTE2lnbm9yZWQuZXhhbXBsZS5jb20xHjAcBgkqhkiG9w0BCQEWD25l 498s b25Ad2ViZGF2Lm9yZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQDHQNEbyP1PUcT6 498s hqV0OrTcQ+ImR5Zd4RbAMBg4cs4+R7kpBKqaU8zpp7naxIOlg6OZI//3LDURC2ys 498s mAv+0oWJAgMBAAGjDTALMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQEEBQADQQANaI7Y 498s 8JJJhg8P09QMLKRr0kGVso4tGkGVLGse8QpMGxqONQMrZumoZLIzmNuldv6ypw6k 498s 0yH6H2lfVjF6BkOX 498s -----END CERTIFICATE----- 498s 498s BAG #1 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: 3DES-CBC 498s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 498s Salt: cd313968962e5cc1 498s Salt size: 8 498s Iteration count: 2048 498s 498s Friendly name: Just A Neon Client Cert 498s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIBgjAcBgoqhkiG9w0BDAEDMA4ECM0xOWiWLlzBAgIIAASCAWBzyJrv5aSpv/jQ 498s WEQWHfnHtoC3Ihcuuj3k6KzLPyC3Vx9YNRIofC8tHJZYljt/LCXAzc3fxcVhIKw3 498s 5u439xoQW/6n8q5o9M2OGk46mzHS8PxdM+CsrtYzNhER4q+6IFeYfuhTQzjWPhrS 498s Qrd+Da6YlxDE+4jK1bdGMXeywRTFY38Q5w04KC95NwKS73w2CDSvPhc9DqtdGL70 498s qGct1ijUPKSU2/DXeQ/skaj6yua6zeH4CaLgelXep0eOLYWdoTStZ9Zco/ZRcQt7 498s 4Aq09rYGClxSSP5xvY2CZKquCZJPUM5UE4i3RISnuejxQpUqGhVpV6LgPYd1gDDl 498s suobhJjdUM4jcQX3d58W6qdBfQ15jCMmpGhbvlmP+231lGs9iXTLA5GTucXO41sj 498s E69zr4DuZ7ckxgU5p3SPqvzJWbLnDVTK/a9+j6JWSPK0zT8xqTsOnkyq9kqjtdnI 498s h5RTg034 498s -----END ENCRYPTED PRIVATE KEY----- 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s Setting log level to 99 498s MAC info: 498s MAC: SHA1 (1.3.14.3.2.26) 498s Salt: ead3fe09dfca8d42 498s Salt size: 8 498s Iteration count: 2048 498s 498s BAG #0 498s Type: Encrypted 498s Cipher: RC2-40 498s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 498s Salt: 85e3f593f7599d4b 498s Salt size: 8 498s Iteration count: 2048 498s 498s Decrypting... 498s Elements: 2 498s Type: Certificate 498s Key ID: 28:04:07:6F:5A:73:95:5F:E7:D9:2B:65:69:83:EB:A5:BD:48:A2:76 498s -----BEGIN CERTIFICATE----- 498s MIIDtDCCAmygAwIBAgIETeC0yjANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5H 498s bnVUTFMgVGVzdCBDQTAeFw0xMTA1MjgwODM5MzlaFw0zODEwMTIwODM5NDBaMC8x 498s LTArBgNVBAMTJEdudVRMUyBUZXN0IFNlcnZlciAoUlNBIGNlcnRpZmljYXRlKTCC 498s AVIwDQYJKoZIhvcNAQEBBQADggE/ADCCAToCggExALRrJ5glr8H/HsqwfvTYvO1D 498s hmdUXdq0HsKQX4M8AhH8E3KFsoikZUELdl8jvoqf/nlLczsux0s8vxbJl1U1F/Oh 498s ckswwuAnlBLzVgDmzoJLEV2kHpv6+rkbKk0Ytbql5gzHqKihbaqIhNyWDrJsHDWq 498s 58eUPfnVx8KiDUuzbnr3CF/FCc0Vkxr3mN8qTGaJJO0f0BZjgWWlWDuhzSVim5mB 498s VAgXGOx8LwiiOyhXMp0XRwqG+2KxQZnm+96o6iB+8xvuuuqaIWQpkvKtc+UZBZ03 498s U+IRnxhfIrriiw0AjJ4vp4c9QL5KoqWSCAwuYcBYfJqZ4dasgzklzz4b7eujbZ3L 498s xTjewcdumzQUvjA+gpAeuUqaduTvMwxGojFy9sNhC/iqZ4n0peV2N6Epn4B5qnUC 498s AwEAAaOBjTCBijAMBgNVHRMBAf8EAjAAMBQGA1UdEQQNMAuCCWxvY2FsaG9zdDAT 498s BgNVHSUEDDAKBggrBgEFBQcDATAPBgNVHQ8BAf8EBQMDB6AAMB0GA1UdDgQWBBR2 498s B1hM6rUp9S2ABoyDSoINCeyT3jAfBgNVHSMEGDAWgBRNVrdqAFjxZ5L0pnVVG45T 498s AQPvzzANBgkqhkiG9w0BAQsFAAOCATEAdNWmTsh5uIfngyhOWwm7pK2+vgUMY8nH 498s gMoMFHt0yuxuImcUMXu3LRS1dZSoCJACBpTFGi/Dg2U0qvOHQcEmc3OwNqHB90R3 498s LG5jUSCtq/bYW7h/6Gd9KeWCgZczaHbQ9IPTjLH1dLswVPt+fXKB6Eh0ggSrGATE 498s /wRZT/XgDCW8t4C+2+TmJ8ZEzvU87KAPQ9rUBS1+p3EUAR/FfMApApsEig1IZ+ZD 498s 5joaGBW7zh1H0B9mEKidRvD7yuRJyzAcvD25nT15NLW0QR3dEeXosLc720xxJl1h 498s h8NJ7YOvn323mOjR9er4i4D6iJlXmJ8tvN9vakCankWvBzb7plFn2sfMQqICFpRc 498s w075D8hdQxfpGffL2tEeKSgjyNHXS7x3dFhUpN3IQjUi2x4f2e/ZXg== 498s -----END CERTIFICATE----- 498s Type: Certificate 498s -----BEGIN CERTIFICATE----- 498s MIIDUDCCAgigAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5HbnVU 498s TFMgVGVzdCBDQTAeFw0xMTA1MjgwODM2MzBaFw0zODEwMTIwODM2MzNaMBkxFzAV 498s BgNVBAMTDkdudVRMUyBUZXN0IENBMIIBUjANBgkqhkiG9w0BAQEFAAOCAT8AMIIB 498s OgKCATEAnORCsX1unl//fy2d1054XduIg/3CqVBaT3Hca65SEoDwh0KiPtQoOgZL 498s dKY2cobGs/ojYtOjcs0KnlPYdmtjEh6WEhuJU95v4TQdC4OLMiE56eIGq252hZAb 498s HoTL84Q14DxQWGuzQK830iml7fbw2WcIcRQ8vFGs8SzfXw63+MI6Fq6iMAQIqP08 498s WzGmRRzL5wvCiPhCVkrPmwbXoABub6AAsYwWPJB91M9/lx5gFH5k9/iPfi3s2Kg3 498s F8MOcppqFYjxDSnsfiz6eMh1+bYVIAo367vGVYHigXMEZC2FezlwIHaZzpEoFlY3 498s a7LFJ00yrjQ910r8UE+CEMTYzE40D0olCMo7FA9RCjeO3bUIoYaIdVTUGWEGHWSe 498s oxGei9Gkm6u+ASj8f+i0jxdD2qXsewIDAQABo0MwQTAPBgNVHRMBAf8EBTADAQH/ 498s MA8GA1UdDwEB/wQFAwMHBgAwHQYDVR0OBBYEFE1Wt2oAWPFnkvSmdVUbjlMBA+/P 498s MA0GCSqGSIb3DQEBCwUAA4IBMQAesOgjGFi1zOYpA/N3gkUVRcBHDxmN7g2yOcqH 498s VfhFc+e4zhOehR11WCt2RgzNlnYVmV5zBmQBdTAt8Po/MVhLCDW1BULHlLvL0DFc 498s 4sB1RlcGeQcCKQa4b+Q9VWf4f6TfuEWZQC5j5stiXjVgOqrOMrzKZ2eKWA4JsL9s 498s V+7ANSZE+hOt1X1mA8moyqe95U2Ecih+nFJSWSBd1WFiEzVnXv4FVWPXbH9HERDK 498s VbasjofWWmQO1YlQPishLgm1IbwqOkOk4sDgoLuUZ4GgP0DDeN6EmRDOzByrv+9u 498s f45Bl9IQf4IJNPLU9lEqjyMOydqT6kBi7fjV5ICuQZ4EeVJsOGuX7PqNyoDzJHLv 498s ferRfNLr6eQSHSxBhS0cVyDjb5gCawK6u7xTU+b7xikEie9k 498s -----END CERTIFICATE----- 498s 498s BAG #1 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: 3DES-CBC 498s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 498s Salt: cf11aabb54d2c2e3 498s Salt size: 8 498s Iteration count: 2048 498s 498s Key ID: 28:04:07:6F:5A:73:95:5F:E7:D9:2B:65:69:83:EB:A5:BD:48:A2:76 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIFwjAcBgoqhkiG9w0BDAEDMA4ECM8RqrtU0sLjAgIIAASCBaC8QSAiFiXuas0w 498s dzf0MrWaF/3vaVEjx595o2t+BXgFJjBkc2ctaEMzAE6je7TWSeeKT7IauNbHle50 498s oPUB0418xuWoN2DHlNnE4z5JnXFcRXPBiuG0Xb6TB/bXQMiB6hKZqLQUlxS2Fv+U 498s G5jOUShmCP9CqUJnJs30zMHChlQRxexbGw7GYSRzBNuxayr2bA2+Yk/dRlsjIPno 498s ltpY+CLlZZER0/fA7gW5mX9+QRm6OsoECDUCm3c5y2x+mFigbnFVMDU19rCOezHT 498s ujShGMhfamqUCDu+xenjHh85DRM/685N4Ie1DxrPA3pOJpkAlQHRigUMQF99Jqlp 498s l9pfdQ1Qn7MGORr+RPRyI50Cy7cjHL0sI8MrimiC/nZ/KGd/5t/taYVTs7NMwjut 498s iOV7jmVjYYOUgh1jibT7K9SOwFCYrcTKG9BDLTmrylcd0eId4QOvdlo2n8roetNa 498s AQ10a9/u1f5QX0gPmy3c7Mg5H/gitQBO4VtWXlsp7mR0CVCIDx+TJMpJsVJYXr7v 498s FT0VauIl8SCtGdx1hDGaMaoiwXJ/H55LifM6QB+CVs4BOGHe4ULpL1p3HxHA6JVW 498s 6QwPECDriQaOEnmG1O++qItt5sbMw8zZNcrxT4EcnDni5StrIXPU3oSwfNmrY1yP 498s GTmWDOzdF6fkxZSN9ffR93JXj2a5Gu54btfHY0vKv6byNWB5nEUYMQQpTgThPXjn 498s BfCIVjSMStD0liCgn8Lh3F4Nieq8BdM4B5ET1s3c6y9aQK8OhVXeE1+SQdqICzIj 498s 7BwX0k/UO2brXWt2I6yHNeo8tP3kXYnHLxZGLKzvaKv9CeRSC4+w0LuMTX9JkCKF 498s mxSGKwcmgA1lquBfMSvw5mHIlVj7/zcPAOh1rIKSI8fP7e/C8P/5UXvvUGZBwLS9 498s ZCfKquP8Whddq5q6vO3I6o7mQG0RcXwidPsvUGMc2+aN0S8rIH25cS1UFwYL2WZM 498s Qr7kOpQ1zOfcA/Jzay/UsObcGClu3agtKqPxlCkqK1ULA/Ydx9hz2l6K6aSBLxnb 498s zIFq+LEghy2wro3ydY+rUbk4UhVNHrDwwbr6IsLHch0JwMBdfTbsJBTmb6SryrEY 498s Oad5yNk4oG5s6uyrl5y57Crmz4W+4kKWPwzE13B8RJq7N0/w37yI4WCZYhpEokrH 498s p7kjghRZSwTPUbGEopZq6vgnd27PhYVoMWNL1b/OUYi675rN7qc8hV1nfjjRp+4Z 498s rmWC9Z3uSI9vR4L94iKKS+0eQrsuREWd5CZxYYnN+P1dUMXRehVjDTCawLk5H7RG 498s RaORlyC7uA0tsFVNogz+xGyIcRNFT3s7u7CziCpGigbBT91zbIDVD0j+ADBrEt43 498s 7eKvY9bJSEmSQzpUbh17KqKji1PyF3eof8rglXLn9XT0DB0/LmPGdPZps/mvlsuc 498s 0sc1q9nJffgVF+71J4+TPY/tJ9pHHdWz2bV0Ujy20b3HxhcCVRwtJxvJaaEm1XHm 498s KZABN/3Ua1HvPnShacif5UtWBE8czX0yGJSvmqBMcxtLc4OUuW/3keyIO+wJ8dlG 498s E9A/AL5+sfr0MwnU605lAuvHFFcf6rx36AbuUIJv368dbRglbJ6UznhDhO6y77dX 498s EfH0g662KV5q/1sBX5OL2Pe1cYG81e1ZKDxI82DCJIjGwizPQPRzAVyzR6RosNHs 498s Vbopxq5mnXJxxcPxwGT+TU1s9f1QrfDInYyd0EoxKa64nMJbgArMaAx2njFkxpYn 498s NK5hFgDl+QgJO6IktS/auW9O6Or5v6CcabAVIw8an4QeY0ssVYKPAtTYSE4mOWF5 498s Wu7nZCwL9sZ3kciFcPYi5HEa5T7M4s/s4AphwAWTZmZq5i6Xg5vqnU/YAKHj6ioP 498s TyaXor1HXZfdjjxj4Ze8WUFLqE7apK1ho/38OM1nw9PCLRtGG7k= 498s -----END ENCRYPTED PRIVATE KEY----- 498s Setting log level to 99 498s MAC info: 498s MAC: SHA1 (1.3.14.3.2.26) 498s Salt: abd24fb650c1619b 498s Salt size: 8 498s Iteration count: 2048 498s 498s BAG #0 498s Type: Encrypted 498s Cipher: RC2-40 498s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 498s Salt: 2286d3fd44ede135 498s Salt size: 8 498s Iteration count: 2048 498s 498s Decrypting... 498s Elements: 1 498s Type: Certificate 498s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 498s -----BEGIN CERTIFICATE----- 498s MIICSDCCAfKgAwIBAgIBAzANBgkqhkiG9w0BAQQFADCBmjELMAkGA1UEBhMCVVMx 498s EzARBgNVBAgTCkNhbGlmb3JuaWExEDAOBgNVBAcTB09ha2xhbmQxEDAOBgNVBAoT 498s B05lb3NpZ24xFDASBgNVBAsTC1JhbmRvbSBEZXB0MRwwGgYDVQQDExNub3doZXJl 498s LmV4YW1wbGUuY29tMR4wHAYJKoZIhvcNAQkBFg9uZW9uQHdlYmRhdi5vcmcwHhcN 498s MDQxMDE3MjAwMzQ1WhcNMDcwNDA1MjAwMzQ1WjCBrjELMAkGA1UEBhMCR0IxFzAV 498s BgNVBAgTDkNhbWJyaWRnZXNoaXJlMRIwEAYDVQQHEwlDYW1icmlkZ2UxGTAXBgNV 498s BAoTEE5lb24gSGFja2VycyBMdGQxGTAXBgNVBAsTEE5lb24gQ2xpZW50IENlcnQx 498s HDAaBgNVBAMTE2lnbm9yZWQuZXhhbXBsZS5jb20xHjAcBgkqhkiG9w0BCQEWD25l 498s b25Ad2ViZGF2Lm9yZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQDHQNEbyP1PUcT6 498s hqV0OrTcQ+ImR5Zd4RbAMBg4cs4+R7kpBKqaU8zpp7naxIOlg6OZI//3LDURC2ys 498s mAv+0oWJAgMBAAGjDTALMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQEEBQADQQANaI7Y 498s 8JJJhg8P09QMLKRr0kGVso4tGkGVLGse8QpMGxqONQMrZumoZLIzmNuldv6ypw6k 498s 0yH6H2lfVjF6BkOX 498s -----END CERTIFICATE----- 498s 498s BAG #1 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: 3DES-CBC 498s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 498s Salt: 5b73204da508c557 498s Salt size: 8 498s Iteration count: 2048 498s 498s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIBgjAcBgoqhkiG9w0BDAEDMA4ECFtzIE2lCMVXAgIIAASCAWBBAT5KiEY0q0oa 498s PiGb9qb0ts8x+/TXyP+AoUGw0dq5HMWqlE+AENzgf4tu3Yo0kJ8K+PHoptNEE3Uq 498s K+IvGjU80Pqk4uqYvmwuI3PECbKyXCWs1nWo7cfeieXL4EiY5pwJKbA28iXMpnA7 498s Toh4nOpuuctlBzb/CXvSeKOMgZnyG5VMjy4RrM9Uf6BuVvjXC4e5d2bcyHz+YWzb 498s rHIyMat2RIyRO9CwY4jTDqmlxEBkQ+S1vgReETcIbSIaaDDp5ZlwS/WvWZObUKc3 498s vpHap1MM4aBmItKU4jZTJU9A3tY0nguARMAUTST2ZpxSuOWWnYbNmO1FaI8fEVdX 498s IPddGyKuAr8uaPVIYmqCcNLpjR32le7GHUHnwOwilE6WFm8urrzNiuC10uI/BkMD 498s a4lhuWLpwy1mGz7Woj27aMwGaUKMzHt80jarlasv3QwC6uOddVr0EnkDy8skf/j0 498s +ePHosDb 498s -----END ENCRYPTED PRIVATE KEY----- 498s Setting log level to 99 498s MAC info: 498s MAC: SHA1 (1.3.14.3.2.26) 498s Salt: 7fc8e45f09b49270 498s Salt size: 8 498s Iteration count: 2048 498s 498s BAG #0 498s Type: Encrypted 498s Cipher: RC2-40 498s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 498s Salt: 276d84cc87c4698c 498s Salt size: 8 498s Iteration count: 2048 498s 498s Decrypting... 498s Elements: 1 498s Type: Certificate 498s Friendly name: An Unencrypted Neon Client Cert 498s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 498s -----BEGIN CERTIFICATE----- 498s MIICSDCCAfKgAwIBAgIBAzANBgkqhkiG9w0BAQQFADCBmjELMAkGA1UEBhMCVVMx 498s EzARBgNVBAgTCkNhbGlmb3JuaWExEDAOBgNVBAcTB09ha2xhbmQxEDAOBgNVBAoT 498s B05lb3NpZ24xFDASBgNVBAsTC1JhbmRvbSBEZXB0MRwwGgYDVQQDExNub3doZXJl 498s LmV4YW1wbGUuY29tMR4wHAYJKoZIhvcNAQkBFg9uZW9uQHdlYmRhdi5vcmcwHhcN 498s MDQxMDE3MjAwMzQ1WhcNMDcwNDA1MjAwMzQ1WjCBrjELMAkGA1UEBhMCR0IxFzAV 498s BgNVBAgTDkNhbWJyaWRnZXNoaXJlMRIwEAYDVQQHEwlDYW1icmlkZ2UxGTAXBgNV 498s BAoTEE5lb24gSGFja2VycyBMdGQxGTAXBgNVBAsTEE5lb24gQ2xpZW50IENlcnQx 498s HDAaBgNVBAMTE2lnbm9yZWQuZXhhbXBsZS5jb20xHjAcBgkqhkiG9w0BCQEWD25l 498s b25Ad2ViZGF2Lm9yZzBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQDHQNEbyP1PUcT6 498s hqV0OrTcQ+ImR5Zd4RbAMBg4cs4+R7kpBKqaU8zpp7naxIOlg6OZI//3LDURC2ys 498s mAv+0oWJAgMBAAGjDTALMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQEEBQADQQANaI7Y 498s 8JJJhg8P09QMLKRr0kGVso4tGkGVLGse8QpMGxqONQMrZumoZLIzmNuldv6ypw6k 498s 0yH6H2lfVjF6BkOX 498s -----END CERTIFICATE----- 498s 498s BAG #1 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: 3DES-CBC 498s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 498s Salt: 8326cd3b338b9fe2 498s Salt size: 8 498s Iteration count: 2048 498s 498s Friendly name: An Unencrypted Neon Client Cert 498s Key ID: 01:C4:94:FA:F3:47:EA:DF:6D:1F:E6:27:53:8D:B4:AD:6D:F0:A1:6F 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIBgjAcBgoqhkiG9w0BDAEDMA4ECIMmzTszi5/iAgIIAASCAWAbyomJIeBPWa8z 498s elKlYF3sEOB55of8A9KpkHwYQiJiB6qhav2+6EWWcluBDGqGKP1/ai3RA7Azp9HO 498s yhlyXmaIpf7QX48x+sq4AGwRRNcOMHfhxUGEbJN4JDEoz0py00Yb03PkMudd7r2E 498s mh1qcZTLBjKeB/3O/XydBkKbw+MCBDU6aqwisob4E0S+bKqWiIjdbs0n6bBorAst 498s Dftvw1DlPkZrZg3mTlFRms1V080E6ztjsQoz6w7hHoTZ65jUroZTQKp3xBkeV0PU 498s cOZRvR5/kz+q2P/OiIMQMqq3jSgVrpd3ZcZ2U9gb9Fj+i1ADk+GgpLZZf0xOJV4T 498s jGC8hUHPwLV+duJ860nMFG25WYZCwTaR5gZHs0TASZCO19GRK4pv3yWEwMuBQbTi 498s fDva7di039AU/tiU0Puf6oApYLpmFDFx5+TR8E9Gl8iTk6Dvv+IzFhfYFKB07irk 498s FI7cdo/K 498s -----END ENCRYPTED PRIVATE KEY----- 498s Setting log level to 99 498s MAC info: 498s MAC: SHA1 (1.3.14.3.2.26) 498s Salt: f2f5cb820c6947b7 498s Salt size: 8 498s Iteration count: 2048 498s 498s BAG #0 498s Type: Encrypted 498s Cipher: RC2-40 498s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 498s Salt: c8e1873a2e741021 498s Salt size: 8 498s Iteration count: 2048 498s 498s Decrypting... 498s Elements: 2 498s Type: Certificate 498s Key ID: 27:21:58:56:24:6E:2A:2B:EE:01:AA:45:CB:9D:92:DA:F4:E3:EC:9E 498s -----BEGIN CERTIFICATE----- 498s MIIGaDCCBVCgAwIBAgICAQAwDQYJKoZIhvcNAQEFBQAwga8xCzAJBgNVBAYTAlVT 498s MRAwDgYDVQQIEwdBbGFiYW1hMRMwEQYDVQQHEwpIdW50c3ZpbGxlMRUwEwYDVQQK 498s EwxEaWdpdW0sIEluYy4xIjAgBgNVBAsTGUFzdGVyaXNrIERldmVsb3BtZW50IFRl 498s YW0xFjAUBgNVBAMTDURpZ2l1bSBTVk4gQ0ExJjAkBgkqhkiG9w0BCQEWF2FzdGVy 498s aXNrdGVhbUBkaWdpdW0uY29tMB4XDTA4MTAzMDE1MzAzNVoXDTA4MTEwOTE1MzAz 498s NVowgZkxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBbGFiYW1hMRMwEQYDVQQHEwpI 498s dW50c3ZpbGxlMQ8wDQYDVQQKEwZEaWdpdW0xIjAgBgNVBAsTGUFzdGVyaXNrIERl 498s dmVsb3BtZW50IFRlYW0xEzARBgNVBAMTCmdudXRsc3Rlc3QxGTAXBgkqhkiG9w0B 498s CQEWCmdudXRsc3Rlc3QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ 498s 6tn3P/3gJc/sP4DKX8UluUChCZuZwaCES0pPa8okBGd9n6aB1C8z0+0/9eDe9D43 498s dI39I5Zl4tk2q1N9IGcyrUqQuUhURp7tAyAlBui5nys0vpP/5zZM97Nfi4arSVXJ 498s CkCVJx5uoGhbTo8yHGr/PSmrJsF/ayeaM9qJZ6J8QRx6cQ8LAaD0SSPOhbfyWaqN 498s lft0sjEEYONAL4oLg6F2Lw0mj00U8rw+Y9qBinzx9cGpo/baNHVvMa2ZpX5jGPcR 498s EQsLmt1WTceWqIg8tIsSHbOAOpSNHzeXKuCo4yW6V8OTBWUlJTkFAKMWLDHu8gmc 498s f+xQPGtGQcNspwqQCGOwMU3e6GJ4DGPso9ffssWmnms6zMRt/UP1+qB3P1V2PgGD 498s p+EF5j3CPcGe4eeTCriLbRG2WGbYKRTXSdkFmo7vrmv8ED79SH2xew4XfGiHjXOs 498s SiOQl0mUe3hN1MYXJ0/IK8/H3PbOrxTRkdhQaVb7bhIQZ97+LzbEci7qrvIQytaH 498s Q/fGg0cNonB1+4CsyyA9v+l1euxsyBjCFvat9K64whGcGSgJjVXeUThWuM/OcHAv 498s IjrY20EeZHudxANhpxjEsPEev3kJ4SInLO6/Ti1dQin7OuxEXJpFAqLdxXoYKhp6 498s OJqukyp9WRgWW+HxiDtHxB3EZFclv+CknFnIGB9clwIDAQABo4IBoDCCAZwwCQYD 498s VR0TBAIwADARBglghkgBhvhCAQEEBAMCBLAwKwYJYIZIAYb4QgENBB4WHFRpbnlD 498s QSBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFFd6yvxTb+C5Wu2VqXeJ 498s urBszzl/MIHkBgNVHSMEgdwwgdmAFFDT7v0IlQYmFkkEkL81AhEwkr0noYG1pIGy 498s MIGvMQswCQYDVQQGEwJVUzEQMA4GA1UECBMHQWxhYmFtYTETMBEGA1UEBxMKSHVu 498s dHN2aWxsZTEVMBMGA1UEChMMRGlnaXVtLCBJbmMuMSIwIAYDVQQLExlBc3Rlcmlz 498s ayBEZXZlbG9wbWVudCBUZWFtMRYwFAYDVQQDEw1EaWdpdW0gU1ZOIENBMSYwJAYJ 498s KoZIhvcNAQkBFhdhc3Rlcmlza3RlYW1AZGlnaXVtLmNvbYIJAMVFWVbZp6wSMCIG 498s A1UdEgQbMBmBF2FzdGVyaXNrdGVhbUBkaWdpdW0uY29tMBUGA1UdEQQOMAyBCmdu 498s dXRsc3Rlc3QwDgYDVR0PAQH/BAQDAgWgMA0GCSqGSIb3DQEBBQUAA4IBAQAi0VEb 498s iFbqUO2CyPs91ocvoEg4a7SvD3J9whrWtD5+CGb0d2YrmLaA20NDa7YEURO+YI23 498s Ura7z2y5W7bAYSeUqM4+7rljx/hVxabl/NgK0wJLNdilL3VAKO0XZK17Zebwr8Bt 498s q+3/7be3v2iIAT03aglV3gh8MmFmlO2FS9UwOeWLHLBfUWWPr/+CqeUx3KcXeo4w 498s ORZg1L+ANl2xcZ49nyLG24QCEshjF4llzZkIcZB5xmW4PHfUlcng1J8KOB4Sm+5v 498s XO6mRsE02ejXhlE6EqpkBaWOhcGFRcyHnIEV6r17EU9WPl40dlrJBybwMbV0t3BC 498s 0sTB4iw3Vhca1y1Y 498s -----END CERTIFICATE----- 498s Type: Certificate 498s -----BEGIN CERTIFICATE----- 498s MIIFfzCCBGegAwIBAgIJAMVFWVbZp6wSMA0GCSqGSIb3DQEBBAUAMIGvMQswCQYD 498s VQQGEwJVUzEQMA4GA1UECBMHQWxhYmFtYTETMBEGA1UEBxMKSHVudHN2aWxsZTEV 498s MBMGA1UEChMMRGlnaXVtLCBJbmMuMSIwIAYDVQQLExlBc3RlcmlzayBEZXZlbG9w 498s bWVudCBUZWFtMRYwFAYDVQQDEw1EaWdpdW0gU1ZOIENBMSYwJAYJKoZIhvcNAQkB 498s Fhdhc3Rlcmlza3RlYW1AZGlnaXVtLmNvbTAeFw0wNTExMjUyMzMxNDdaFw0xNTEx 498s MjMyMzMxNDdaMIGvMQswCQYDVQQGEwJVUzEQMA4GA1UECBMHQWxhYmFtYTETMBEG 498s A1UEBxMKSHVudHN2aWxsZTEVMBMGA1UEChMMRGlnaXVtLCBJbmMuMSIwIAYDVQQL 498s ExlBc3RlcmlzayBEZXZlbG9wbWVudCBUZWFtMRYwFAYDVQQDEw1EaWdpdW0gU1ZO 498s IENBMSYwJAYJKoZIhvcNAQkBFhdhc3Rlcmlza3RlYW1AZGlnaXVtLmNvbTCCASIw 498s DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOGY3YY5JL8a9ivUw+TEJmnoLNq8 498s ETgDZormPDctHEqnS09Kcj7ggAjxwheatdXxpthk88zRGwTLsH11h1Kaeuqr8mTx 498s DtSV+mClHvrWXYpVqDiYTacEKUytLSEn1Ye2iJPi/BWCbrXMfEWliAxdcSnynZXq 498s nP8BVXvH3o15JEkAAmmprPo55TddSfFAp2LAnqIh2cUhoqmDmWWCjnNhiYwdGC84 498s KWMZIGpCoyJMCHOKVv0NqKcQ6Lrp65CuSBBjWjMTvSK4UKYNGEvRgdJgJ304xvK1 498s Ls7vWuGGM84N34Dpt4Tz9tHP4biqrZ8j6wRYD8ZoXzvl8XybLGO7i/r91SUCAwEA 498s AaOCAZowggGWMB0GA1UdDgQWBBRQ0+79CJUGJhZJBJC/NQIRMJK9JzCB5AYDVR0j 498s BIHcMIHZgBRQ0+79CJUGJhZJBJC/NQIRMJK9J6GBtaSBsjCBrzELMAkGA1UEBhMC 498s VVMxEDAOBgNVBAgTB0FsYWJhbWExEzARBgNVBAcTCkh1bnRzdmlsbGUxFTATBgNV 498s BAoTDERpZ2l1bSwgSW5jLjEiMCAGA1UECxMZQXN0ZXJpc2sgRGV2ZWxvcG1lbnQg 498s VGVhbTEWMBQGA1UEAxMNRGlnaXVtIFNWTiBDQTEmMCQGCSqGSIb3DQEJARYXYXN0 498s ZXJpc2t0ZWFtQGRpZ2l1bS5jb22CCQDFRVlW2aesEjAPBgNVHRMBAf8EBTADAQH/ 498s MBEGCWCG|<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s |<3>| ASSERT: ../../../lib/x509/privkey_pkcs8.c[check_for_decrypted]:815 498s |<9>| salt.size: 8 498s |<9>| iterationCount: 2048 498s SAGG+EIBAQQEAwIBBjAJBgNVHRIEAjAAMCsGCWCGSAGG+EIBDQQeFhxU 498s aW55Q0EgR2VuZXJhdGVkIENlcnRpZmljYXRlMCIGA1UdEQQbMBmBF2FzdGVyaXNr 498s dGVhbUBkaWdpdW0uY29tMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQQFAAOC 498s AQEAWR9wMp3GtC0nAmY42GbD5l6+770kPMO5BXbt9jwLZNprzf8Oir4maE2J/zPO 498s COkfQoAFz9D2M6SCmcDwRX+6lub1rvPR6bt1i2kqMrJED/UN+7P3X+hQHh/b3fQG 498s Q3HMH1fdWuNMDqB2eQqTvEKq9bC8WeLwY48DnlGX1iGQFOSWwdbXmmF283xI7jtX 498s I8vNdvvchBGZx/5MNm4QJzw4Obky/PN1uNhyfMJLhT/ooNwCu6CBkNeCCsfhXaGZ 498s nocWKFBeRzI0xp0rGgZ0iWGXmXuGaKPvHzpYxmkqiXX/gnVS1vad1QpCLWVdpDnW 498s TNq9dm+vncMrcoDDaHnGTgtLag== 498s -----END CERTIFICATE----- 498s 498s BAG #1 498s Elements: 1 498s Type: PKCS #8 Encrypted key 498s PKCS #8 information: 498s Cipher: 3DES-CBC 498s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 498s Salt: d3c56c53bf052346 498s Salt size: 8 498s Iteration count: 2048 498s 498s Key ID: 27:21:58:56:24:6E:2A:2B:EE:01:AA:45:CB:9D:92:DA:F4:E3:EC:9E 498s -----BEGIN ENCRYPTED PRIVATE KEY----- 498s MIIJajAcBgoqhkiG9w0BDAEDMA4ECNPFbFO/BSNGAgIIAASCCUje/AHGOnkChHn3 498s pQN+V9+PiDnO0c8nSbh49XqafKN+Z8X3pPk2wqQKnRQ0z4adHkVe2ArWJ949O9rV 498s EQ1l/8DrrhA2maqbrttWTtX+DRyqFqTSB6VTkpiX3mjLA5PPlb4F3FwJ/QOFQBvK 498s ohHEd4BagB1S6I84uqFmJe8JURSOvbc5LXAOrAscIf/sIoBwbHrexq4KNqDKx4Xx 498s tBdyATIWrLQe2HO58PzgEUu/IRn8sAnGjVU3+h+DG6rJKJsx7gq0rkXU5E50Emk4 498s 9blvT+uaUFNpW7Usm0Nm2K5O3DmZR82VMEB57lZ8guG573LYIBrSp7bQIpyXao9f 498s Vfqkrvd7TF9RVTa/TigTaT30ep8tm+KzWiGNkXhBBHfwEZIcRKiPEC5tihqV5QBS 498s xo68SCAgP/TDQLGvOXE6O1z/Z2nd28tMF5XsrN7/F2pEn0cfQLrK+hB6FTwRtblE 498s TVQB6QDDxOR8wIjqnw7Jo21nactdWp914SnD2JmC/OWv1lNphcSdawmKYi5S9RIZ 498s KF/qevgWsz+L5zWPljD+eFTQeyBr/cm+nC0/NG1CWUoJEK0pNvyZKK3YswYub+se 498s knCokbUFq/WipPE5+Z7ZjoITGBjHFvWUEl7i87bLkkyyHj8pm5RwhoN1FHdM/Sez 498s kq+olMx8d+dXtnS+R9MtECEN4ONfuYHuDj10dMOiK+YAWOKj8lJhxKvkH+miuxcQ 498s 1/pbtuxwB6KcCJGQRz9yzN206VlGeb87hRnn74rPMm4pIVaxnZoteB0GW/uCAENP 498s z1wDtWnvRyzs/1cJuvjDvFHM8AtL9dKH7FUUh9aPGDm6guDq+6iz8xvL9zfY6V/d 498s EnAWWqExMd5doBj7OIFic+SQ36+NbdlTYsCjfPuwqYSDhgl0g00a7L+QU1BHPSu8 498s v0ecMeVH5GiclCRGhzYqo0PwVsj1pzR2vM2+ccf1+7YXwOzyaYkXLxjiDfGZyFgx 498s Ta/YW1uUpckheFVypb0RPZLZsD19fspLypK4VYh1gzWoWyrwBr9opP6Bc8dfCQj9 498s Xw/wa91xTZJXCzTK1Dhj3aLGJ1rN/lJ1Mlh0VfggdNIyMpBsBFoBMda0IhfOTL5d 498s 4gSgt+CTs1BpV+0o5VbtB6yXuf0446GQTVKDBpF3riFlvVPkCR78UquH3YcEnRmm 498s ydI6000C1AV0+54yUAIfbXpnlh0JQ9tfjUvNouvnWfEstfpjweeWNcyjufogkhYZ 498s d881lkY9YEYqCEdZg4iPBK53cJ0nWq9HmXzr34JbihBlz9QaQ1xYpOvILE+bAU// 498s y/OM6LO9hv1okbEroRpC0hHIR1pUSt/2yzN5yiQqqihyu1H+llKtG4xk7bNI8RMM 498s fP8nT/W8nkOswxK4+DeGllQzCTlx+s/7pTrjqxQlvyfRReMXR3HgvDRxrkDXrpAO 498s CHCixjX72D6iA+yYtC64pZvUsRb71sQI3trh0UjuT2vkQPD+gZSwWPjdjDySMPcb 498s Vt18vzR0E+7VSD4i66VaUHX2DBUYiSp0dWjTh0T0t6HKNzTKOm9eQmK7KX8Lgbx1 498s JP3iq1yqnbcKT4KirHySDYpiYCeiBTTXx4arV2NdTzikJ40EJu7PERFyo6yaXf0p 498s F4ZTHLj1E2pqHcoci5EPvVxZXfYcYQ4qtoLrUYk1oUw7Ny9RH+5yHGRAumniYqdP 498s T2yD6NP7dtvj8+mV+2OJ3Kp6/dfjooCN1e9EooEy+GcwnqVguV/kqQ0/5ya+b+P3 498s BoJdy+wJ1lta+SCgC+46nhfDXL2XOi+DqJnQ87aSCGaUOOxqpJLoEg/MNMM5PsYR 498s wpCd+G1K7DFxDUcml4YwqOyCoBzMNzhVm8X/Dq3ZMwHfO+drL3iFEKaGstdenHha 498s EEVlO8y88wfnLH9GhyoTAFt1EEcM6OoBL1D20N7Uy9+shX8V2pdX1qqBU7qQfDyI 498s Uelk2pzPslovrb2DkhjO+9llMuAp1J9neXQREFL3nSV2raYfmtPnpYeOWMGwiIhZ 498s Cr4bo6Hn6OWvrqQWnqibqaU4XOdik9cgo/CXEjayLBpyUPMemXQmG3aiBmTKx6LH 498s 0MP4gvz5j2dE6Qd5QSKpvozJWC3Ey9v0W9LjEf5kUwO5LYSobeIDxfoDwzQcjNBJ 498s QYi62QxhgqGjOiVa0p2fSQzSjiRxyFN1VoXW9JBhphE+59dr3h+xQmm5yYdlM3L/ 498s DhtPOI61ea8w8DExQP0zrV0CFmidvPvutKUMs/CwPUnoRTOeQXM1hDkzIQ+H2BL6 498s uHLJUYVEMq5iP78xwAeNWVJi1wFBH67F0jYbDvI6DR9Mx98I6IJnaePA0KENBnQt 498s XIx/xsEvdFdAbh6cKaNSoxsGTuNqIPtIMDcBJztsaKIskG7L/qdko1OX4GopQ9vv 498s NYwIRtTaQx3rniXnnbvCdZtJHGjMLXEBp7D1p2VonXZy/SeqpON5QLsQszWEG56i 498s 8pXzo/LJyH0UF3K8Ju7zW4o/Lle72il/f8Y1Tv3RyoGY0ZPgywKF300e2u2nwtVl 498s Nh4Yo0QgBZZ6hRiRoKMjB/Uo2BrLYfaZzvAaKCw3dD7lp6E0H8CsTBYCJZvl/QUJ 498s iMGY5FcCn9LRQVpwQr8HD0jR4kzmd4XiPUsR38OIVBvp980lqcDsWpcJedq7lXXQ 498s wREN3HUb76uZLmM3qISOfaxYqVd4/+2roGOh323X5cDIT9LqKWYRBTcgnbt0Lm5Q 498s 15sd4kXOp9ekQjQhEAEdjxp3MF0G1m8TJxXRANlMGVYf7X3Rge9b5LqCw1xZyJEc 498s Uo5uUST+r9F1VebeEMuEB2V7mOmnA5XXvoeDb8YtlAg+mX0IU64JdFUNnop2ya9/ 498s PcoKMfgPxVzT+9PC5Mi98NFBuXgeqhRJ1jjOpFsEJk86OWkiaRQrmJ4sPCjx/LxO 498s 3WI1UiLduNF8nzc3Igc09mp7P2BbiJKhNUBUu6wPJlLUv0kxUVH/AgL9CiZpKeob 498s r8k2FmmWWxxDZDSFOlpAfgzuuQClFyE3WknJtl5ZRTad7mnrAkK9/mzLzA29lK7Z 498s PBv6bB+cIN+F6SuK1rx77XYedbMLkZ5JYXtyLsAVI4XVwztmtmCg+GdhGNCXrJMN 498s 8YKK3fdvGYatERtZkDpSIVh+ZBJRLXRx/MkZozx0gzSg/SAKO4KCp+TZG9Lyhq9Y 498s Cf/lvqsNruKVsis3hWk= 498s -----END ENCRYPTED PRIVATE KEY----- 498s Generating a PKCS #12 structure... 498s Loading private key list... 498s Loaded 1 private keys. 499s SUCCESS [44]../../tests/cert-tests/pkcs12.sh 499s running [45]../../tests/cert-tests/pkcs7-broken-sigs.sh ... 499s Warning: MD5 is broken, and should not be used any more for digital signatures. 499s Signature status: verification failed: One of the involved algorithms has insufficient security level. 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 4de0b4ca 499s Signature Algorithm: RSA-MD5 499s 499s Signature status: ok 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 4de0b4ca 499s Signature Algorithm: RSA-MD5 499s 499s SUCCESS [45]../../tests/cert-tests/pkcs7-broken-sigs.sh 499s running [46]../../tests/cert-tests/pkcs7-cat.sh ... 499s Loaded CAs (1 available) 499s eContent Type: 1.3.6.1.4.1.311.10.1 499s Signers: 499s Signer's issuer DN: CN=Microsoft Windows Hardware Compatibility PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=US 499s Signer's serial: 330000001e258e7c4251c5d1fa00010000001e 499s Signature Algorithm: RSA-SHA1 499s 499s Signature status: ok 499s SUCCESS [46]../../tests/cert-tests/pkcs7-cat.sh 499s Loaded CAs (1 available) 499s Signature status: ok 499s Loaded CAs (1 available) 499s Signature status: ok 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Signature status: ok 499s running [47]../../tests/cert-tests/pkcs7-constraints.sh ... 499s test: signing 499s 499s test: signing-verify-no-purpose 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s 499s test: signing-verify-valid-purpose 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s 499s test: signing-verify-invalid-purpose 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s 499s test: signing-verify-invalid-date-1 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s 499s test: signing-verify-invalid-date-2 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s SUCCESS [47]../../tests/cert-tests/pkcs7-constraints.sh 499s running [48]../../tests/cert-tests/pkcs7-constraints2.sh ... 499s test: signing 499s 499s test: signing-verify-no-purpose 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s 499s test: signing-verify-valid-purpose 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s 499s test: signing-verify-invalid-purpose 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s 499s test: signing-verify-invalid-date-1 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s 499s test: signing-verify-invalid-date-2 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-0 499s Signer's serial: 5805d9f803a4ec9c60cf71bc 499s Signature Algorithm: RSA-SHA256 499s 499s SUCCESS [48]../../tests/cert-tests/pkcs7-constraints2.sh 499s running [49]../../tests/cert-tests/pkcs7-eddsa.sh ... 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 499s Signer's serial: 59365ab105863551 499s Signature Algorithm: EdDSA-Ed25519 499s 499s Signature status: ok 499s Signature status: verification failed: Some constraint limits were reached. 499s Signature status: verification failed: The certificate is not yet activated. 499s Signature status: verification failed: The session or certificate has expired. 499s Signature status: ok 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 499s Signer's serial: 59365ab105863551 499s Signature Algorithm: EdDSA-Ed25519 499s 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS certificate authority,ST=Leuven,OU=GnuTLS certificate authority,O=GnuTLS,C=BE 499s Signer's serial: 59365ab105863551 499s Signing time: Thu Sep 04 17:39:12 UTC 2025 499s Signature Algorithm: EdDSA-Ed25519 499s 499s Signature status: ok 499s Signature status: ok 499s Signature status: ok 499s SUCCESS [49]../../tests/cert-tests/pkcs7-eddsa.sh 499s running [50]../../tests/cert-tests/pkcs7-list-sign.sh ... 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CA-1 499s Signer's serial: 59155c6808a0431a4730b125 499s Signature Algorithm: RSA-SHA256 499s 499s Loaded CAs (1 available) 499s Signature status: ok 499s Loaded CAs (1 available) 499s Signature status: ok 499s SUCCESS [50]../../tests/cert-tests/pkcs7-list-sign.sh 499s running [51]../../tests/cert-tests/pkcs7.sh ... 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: ok 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: ok 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: ok 499s Loaded CAs (1 available) 499s Signature status: ok 499s Loaded CAs (1 available) 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 4de0b4ca 499s Signing time: Tue Jun 02 06:59:45 UTC 2015 499s Signature Algorithm: RSA-SHA256 499s 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 4de0b4ca 499s Signing time: Tue Jun 02 06:59:45 UTC 2015 499s Signature Algorithm: RSA-SHA256 499s 499s Signature status: verification failed: Public key signature verification has failed. 499s Loaded CAs (1 available) 499s Signature status: verification failed: There are no embedded data in the structure. 499s Loaded CAs (1 available) 499s Signature status: ok 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 4de0b4ca 499s Signature Algorithm: RSA-SHA256 499s 499s Signature status: ok 499s Signature status: ok 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 4de0b4ca 499s Signature Algorithm: RSA-SHA256 499s 499s Signature status: ok 499s Warning: MD5 is broken, and should not be used any more for digital signatures. 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 4de0b4ca 499s Signature Algorithm: RSA-MD5 499s 499s Signature status: verification failed: One of the involved algorithms has insufficient security level. 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 4de0b4ca 499s Signing time: Thu Sep 04 17:39:12 UTC 2025 499s Signature Algorithm: RSA-SHA256 499s 499s Signature status: ok 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 59897b84004ff2ed 499s Signature Algorithm: RSA-PSS-SHA256 499s 499s Signature status: ok 499s Loaded CAs (1 available) 499s Signature status: ok 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=CarlRSA 499s Signer's serial: 46346bc7800056bc11d36e2ec410b3b0 499s Signature Algorithm: RSA-SHA1 499s 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 583cfd8e18750e00 499s Signature Algorithm: GOSTR341001 499s 499s Signature status: verification failed: One of the involved algorithms has insufficient security level. 499s eContent Type: 1.2.840.113549.1.7.1 499s Signers: 499s Signer's issuer DN: CN=GnuTLS Test CA 499s Signer's serial: 583cfd8e18750e00 499s Signature Algorithm: GOSTR341001 499s 499s Signature status: ok 499s SUCCESS [51]../../tests/cert-tests/pkcs7.sh 499s running [52]../../tests/cert-tests/pkcs8-decode.sh ... 499s PKCS #8 information: 499s Cipher: DES-CBC 499s Schema: PBES1-DES-CBC-MD5 (1.2.840.113549.1.5.3) 499s Salt: 499s Salt size: 0 499s Iteration count: 2048 499s 499s Public Key Info: 499s Public Key Algorithm: RSA 499s Key Security Level: Medium (2432 bits) 499s 499s modulus: 499s 00:ab:54:98:fc:a9:c6:15:95:9d:a6:c1:94:84:94:91 499s 79:1e:78:db:2d:48:51:99:65:01:02:c0:40:52:49:5d 499s eb:70:bc:26:ef:68:39:1e:04:91:e2:db:cb:6f:93:40 499s 45:1e:22:8e:71:5a:58:89:28:79:5e:1a:32:25:3e:8b 499s 9d:3b:34:7f:19:f8:d0:2f:37:b7:62:32:b7:53:a5:43 499s 2c:c5:5d:ec:ac:f9:35:fa:14:2b:34:66:f1:d6:a7:a1 499s d0:83:9a:56:f4:19:83:bc:bf:11:74:30:2d:a8:28:5b 499s a2:ab:7a:c6:cd:9c:5c:f8:51:e9:a9:0c:48:db:71:bb 499s b1:34:77:f7:ee:de:5d:78:c0:48:0a:37:0d:65:1e:3b 499s 2b:14:03:89:72:f2:52:ed:5f:00:c5:06:60:ea:80:20 499s d0:43:ec:66:bc:d2:26:db:f0:29:3e:6a:f9:62:20:be 499s 58:26:44:ba:d7:8c:6f:76:a6:05:20:e4:98:b7:c4:72 499s 7a:5d:df:4f:0d:23:ec:2e:9c:71:ec:30:f9:14:5f:c8 499s 75:0b:ab:67:f6:7d:fb:4d:76:64:4a:a5:d5:fa:b4:08 499s 50:9d:13:c7:8f:c2:79:b0:b4:3e:2f:89:d3:33:27:4d 499s 9f:8b:d3:60:24:07:ab:b2:72:3d:29:a5:c4:4a:ec:3c 499s 04:d2:49:3e:26:1b:ec:7a:10:3d:ca:45:5a:80:8b:4d 499s 2a:96:63:4f:2d:63:28:0f:3b:47:47:ca:7c:2c:15:41 499s 32:d5:e0:c9:be:a5:55:2c:b3:6b:46:2a:56:b1:1b:ed 499s 29: 499s 499s public exponent: 499s 01:00:01: 499s 499s private exponent: 499s 5d:97:20:db:24:82:a8:57:ca:7e:c5:50:33:fc:54:5b 499s 2d:62:27:98:5c:e0:f6:42:4e:83:0a:32:18:c1:2b:24 499s e9:b8:5e:2c:79:6a:7a:13:54:fd:ef:c2:f9:78:1e:ab 499s a3:02:8d:7d:2e:35:1e:f7:95:14:ea:8a:69:fd:f8:96 499s 33:39:42:15:15:ed:e3:5d:34:37:d8:2c:7c:ec:d1:fd 499s 2a:f3:5b:ce:41:74:52:df:a1:9a:46:81:e5:18:3d:34 499s 82:2f:55:40:92:8f:7c:13:83:9d:4c:94:24:3f:a7:8e 499s fc:cd:5c:bc:04:a6:64:9f:9a:5c:55:f1:96:ae:52:31 499s 42:d0:26:07:be:40:a1:2d:a8:2c:ac:56:0c:de:ae:c3 499s a1:73:2d:2a:35:65:47:74:b0:9b:70:b9:d8:ad:12:74 499s 50:b3:00:fb:86:72:d5:00:e8:02:b2:d1:e3:d5:87:3f 499s cc:b6:f3:26:fe:25:c1:b5:59:bd:e0:c9:fa:d9:ba:47 499s f8:43:ea:af:cf:4d:92:ae:db:9d:11:49:ec:50:33:2a 499s b6:44:40:ac:06:c7:f6:64:2e:42:25:81:20:d5:f6:76 499s 79:b9:fb:bd:d2:c5:5d:f7:28:16:9d:cc:13:cd:d9:55 499s e3:ca:c7:d2:38:f1:92:32:d6:ba:db:73:b6:dc:b6:5f 499s 66:89:e3:4c:9e:d6:b8:d2:01:ee:a8:d2:69:64:dd:5c 499s 1a:7e:4c:e4:1d:5b:37:94:29:3c:93:3d:43:bb:33:8f 499s 10:23:14:12:b0:33:24:58:c3:ae:97:4c:3d:c5:c1:81 499s 499s 499s prime1: 499s 00:c1:9c:0d:4e:aa:1b:2e:c4:14:e6:78:ed:0b:76:90 499s af:da:3d:5e:15:6f:7d:9c:97:4d:71:a3:1d:6a:47:94 499s 25:20:9d:98:f4:d0:3b:d6:be:be:12:39:e7:d7:82:3d 499s 54:3d:f7:76:06:e2:ac:5d:e6:1f:34:fd:bc:9d:9c:8b 499s f5:4f:83:89:8f:79:ea:9e:5e:a5:5c:e9:b4:71:ae:59 499s 43:ff:ec:03:f6:57:3c:d6:33:0b:ba:4d:39:3f:90:62 499s b2:4f:af:e0:21:7a:5a:0f:93:f4:fc:5f:ba:29:b9:af 499s 67:18:3f:0e:23:3d:de:d9:bc:47:ad:de:56:11:d1:e3 499s c0:7e:29:bb:67:ac:1b:6a:af:5a:30:19:0c:14:49:af 499s db:1a:82:10:60:e1:d1:98:dd: 499s 499s prime2: 499s 00:e2:8a:9d:80:b5:29:33:06:44:d2:e3:77:bd:34:3e 499s c0:df:98:cc:ab:f3:ba:73:3c:19:5c:d8:ed:c8:22:bc 499s b9:8f:4f:1a:d8:0d:08:e2:e2:ca:e8:3c:13:aa:23:1b 499s 3d:75:d4:7c:e2:4e:cd:ca:d0:fc:b7:77:70:57:54:e1 499s 1c:22:a2:3e:0f:a7:59:c0:5a:4f:b1:e8:62:55:85:07 499s 7d:03:a4:8f:82:eb:2d:21:fc:cb:d5:b7:3c:77:a5:9d 499s 67:a6:ab:95:5d:1e:d3:a3:49:78:9b:75:2c:07:e9:bd 499s ba:0f:66:69:7e:2e:50:2f:76:5f:e9:28:f8:e1:c9:ce 499s 77:4a:48:ee:92:d1:d5:dc:29:2f:3f:29:7a:12:b0:d6 499s f9:8d:68:e4:82:45:ec:3a:bd: 499s 499s coefficient: 499s 00:82:d2:e4:3b:e3:aa:9e:99:75:0d:73:e4:e9:38:f5 499s 5e:73:e4:c2:3a:24:55:4e:ea:58:f7:2a:f2:0f:ff:42 499s d7:e2:ef:49:d2:25:8d:86:02:a7:2b:c9:45:1e:ee:a0 499s 1c:60:58:3e:4c:bb:40:99:42:20:ff:c7:3f:4e:68:8c 499s 8b:f4:e8:41:fe:f4:79:00:a4:7e:64:67:95:8e:bf:c3 499s 45:28:dc:da:57:b9:aa:20:ac:66:b0:c8:11:b2:9a:c2 499s 60:ac:24:32:7f:17:e4:6c:dc:24:43:56:22:50:86:29 499s a7:38:fb:4e:8c:e1:9a:c8:42:a4:59:ab:49:32:bd:0b 499s 65:30:37:06:95:29:63:88:09:11:0b:0a:f3:34:82:f6 499s 54:68:cc:71:e9:ea:9f:48:0f: 499s 499s exp1: 499s 78:8e:dc:b6:74:34:32:fd:c4:69:f3:38:e0:1f:77:5f 499s 19:4d:87:4d:5f:bc:5f:0a:d4:1d:83:cd:a8:45:64:19 499s 6e:62:d4:40:f5:7d:9d:6d:ee:db:58:95:66:5b:e2:26 499s 97:e3:84:ea:2a:b1:dc:52:94:72:21:e2:16:5e:c9:c3 499s fa:3c:55:27:33:6a:86:2d:37:59:50:e9:9c:b4:4d:3f 499s 8b:98:02:ab:9d:8c:f3:70:9b:c7:e9:98:51:5d:6e:27 499s cc:79:1e:de:99:da:84:c2:c4:15:76:e2:6c:63:04:b6 499s f4:a1:27:03:88:de:40:c4:fd:f9:65:6e:40:f0:6a:9a 499s 8d:b5:1c:ce:24:9c:79:e5:31:0a:ac:3e:1a:4f:fc:22 499s 3a:32:6d:52:76:ab:56:3d: 499s 499s exp2: 499s 00:9b:74:5b:58:72:f8:6e:97:22:ab:44:84:6a:45:6b 499s ba:96:b5:17:dd:f7:46:3e:c5:42:f2:3f:ba:0b:d8:2a 499s 81:7b:21:e1:5d:d8:b3:fc:5d:7c:b7:98:62:36:22:19 499s 13:37:c4:34:5e:67:8d:38:5b:e8:cf:4d:1a:be:12:f4 499s d6:85:bd:a7:b0:be:3a:0c:90:ec:97:3c:cc:1d:bb:47 499s c4:35:b7:ba:f3:2f:c6:ac:c7:f8:68:13:71:5e:f9:3a 499s e6:61:ac:e4:b6:1d:ed:44:e3:a9:eb:a3:a0:2f:5d:ea 499s 5f:bf:29:9b:c2:86:ad:67:a4:67:74:6c:35:3d:5b:6a 499s 5e:d9:8e:ea:87:bd:8e:6f:a1:a3:56:48:74:08:57:69 499s 6d:9d:e8:18:c6:7c:8c:fa:51: 499s 499s 499s Public Key PIN: 499s pin-sha256:RMtdrzhWeBv9f9dYGAe/lLVF+1Dgh65nQzCDUl9tWHU= 499s Public Key ID: 499s sha256:44cb5daf3856781bfd7fd7581807bf94b545fb50e087ae67433083525f6d5875 499s sha1:8b01094b3b91ece321b91dec8d6b4c5d9e40805e 499s 499s -----BEGIN RSA PRIVATE KEY----- 499s MIIFfAIBAAKCATEAq1SY/KnGFZWdpsGUhJSReR542y1IUZllAQLAQFJJXetwvCbv 499s aDkeBJHi28tvk0BFHiKOcVpYiSh5XhoyJT6LnTs0fxn40C83t2Iyt1OlQyzFXeys 499s +TX6FCs0ZvHWp6HQg5pW9BmDvL8RdDAtqChboqt6xs2cXPhR6akMSNtxu7E0d/fu 499s 3l14wEgKNw1lHjsrFAOJcvJS7V8AxQZg6oAg0EPsZrzSJtvwKT5q+WIgvlgmRLrX 499s jG92pgUg5Ji3xHJ6Xd9PDSPsLpxx7DD5FF/IdQurZ/Z9+012ZEql1fq0CFCdE8eP 499s wnmwtD4vidMzJ02fi9NgJAersnI9KaXESuw8BNJJPiYb7HoQPcpFWoCLTSqWY08t 499s YygPO0dHynwsFUEy1eDJvqVVLLNrRipWsRvtKQIDAQABAoIBMF2XINskgqhXyn7F 499s UDP8VFstYieYXOD2Qk6DCjIYwSsk6bheLHlqehNU/e/C+Xgeq6MCjX0uNR73lRTq 499s imn9+JYzOUIVFe3jXTQ32Cx87NH9KvNbzkF0Ut+hmkaB5Rg9NIIvVUCSj3wTg51M 499s lCQ/p478zVy8BKZkn5pcVfGWrlIxQtAmB75AoS2oLKxWDN6uw6FzLSo1ZUd0sJtw 499s uditEnRQswD7hnLVAOgCstHj1Yc/zLbzJv4lwbVZveDJ+tm6R/hD6q/PTZKu250R 499s SexQMyq2RECsBsf2ZC5CJYEg1fZ2ebn7vdLFXfcoFp3ME83ZVePKx9I48ZIy1rrb 499s c7bctl9mieNMnta40gHuqNJpZN1cGn5M5B1bN5QpPJM9Q7szjxAjFBKwMyRYw66X 499s TD3FwYECgZkAwZwNTqobLsQU5njtC3aQr9o9XhVvfZyXTXGjHWpHlCUgnZj00DvW 499s vr4SOefXgj1UPfd2BuKsXeYfNP28nZyL9U+DiY956p5epVzptHGuWUP/7AP2VzzW 499s Mwu6TTk/kGKyT6/gIXpaD5P0/F+6KbmvZxg/DiM93tm8R63eVhHR48B+KbtnrBtq 499s r1owGQwUSa/bGoIQYOHRmN0CgZkA4oqdgLUpMwZE0uN3vTQ+wN+YzKvzunM8GVzY 499s 7cgivLmPTxrYDQji4sroPBOqIxs9ddR84k7NytD8t3dwV1ThHCKiPg+nWcBaT7Ho 499s YlWFB30DpI+C6y0h/MvVtzx3pZ1npquVXR7To0l4m3UsB+m9ug9maX4uUC92X+ko 499s +OHJzndKSO6S0dXcKS8/KXoSsNb5jWjkgkXsOr0CgZh4jty2dDQy/cRp8zjgH3df 499s GU2HTV+8XwrUHYPNqEVkGW5i1ED1fZ1t7ttYlWZb4iaX44TqKrHcUpRyIeIWXsnD 499s +jxVJzNqhi03WVDpnLRNP4uYAqudjPNwm8fpmFFdbifMeR7emdqEwsQVduJsYwS2 499s 9KEnA4jeQMT9+WVuQPBqmo21HM4knHnlMQqsPhpP/CI6Mm1SdqtWPQKBmQCbdFtY 499s cvhulyKrRIRqRWu6lrUX3fdGPsVC8j+6C9gqgXsh4V3Ys/xdfLeYYjYiGRM3xDRe 499s Z404W+jPTRq+EvTWhb2nsL46DJDslzzMHbtHxDW3uvMvxqzH+GgTcV75OuZhrOS2 499s He1E46nro6AvXepfvymbwoatZ6RndGw1PVtqXtmO6oe9jm+ho1ZIdAhXaW2d6BjG 499s fIz6UQKBmQCC0uQ746qemXUNc+TpOPVec+TCOiRVTupY9yryD/9C1+LvSdIljYYC 499s pyvJRR7uoBxgWD5Mu0CZQiD/xz9OaIyL9OhB/vR5AKR+ZGeVjr/DRSjc2le5qiCs 499s ZrDIEbKawmCsJDJ/F+Rs3CRDViJQhimnOPtOjOGayEKkWatJMr0LZTA3BpUpY4gJ 499s EQsK8zSC9lRozHHp6p9IDw== 499s -----END RSA PRIVATE KEY----- 499s PKCS8 OK pkcs8-pbes1-des-md5.pem password 499s PKCS #8 information: 499s Cipher: 3DES-CBC 499s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 499s Salt: 72b4334f90b842fd 499s Salt size: 8 499s Iteration count: 290 499s 499s Public Key Info: 499s Public Key Algorithm: RSA 499s Key Security Level: Low (1024 bits) 499s 499s modulus: 499s 00:be:ec:64:d6:db:57:60:ac:2f:d4:c9:71:14:56:41 499s b9:bd:7f:5c:56:55:8e:ce:60:87:95:c7:98:07:37:6a 499s 7f:e5:b1:9f:95:b3:5c:a3:58:ea:5c:8a:bd:7a:e0:51 499s d4:9c:d2:f1:e4:59:69:a1:ae:94:54:60:3c:14:b2:78 499s 66:4a:0e:41:4e:bc:89:13:ac:b6:20:36:26:98:55:25 499s e1:7a:60:06:11:b0:28:54:2d:d0:56:2a:ad:78:7f:b4 499s f1:65:0a:a3:18:cd:cf:f7:51:e1:b1:87:cb:f6:78:5f 499s be:16:4e:98:09:49:1b:95:dd:68:48:05:67:c9:9b:1a 499s 57: 499s 499s public exponent: 499s 01:00:01: 499s 499s private exponent: 499s 0c:fe:31:6e:9d:c6:b8:81:7f:4f:cf:d5:ae:38:a0:88 499s 6f:68:f7:73:b8:a6:db:4c:9e:6d:87:03:c5:99:f3:d9 499s 78:5c:3a:2c:09:e4:c8:09:09:09:fb:37:21:e1:9a:30 499s 09:ec:21:22:15:23:a7:29:26:57:07:a5:8f:13:06:36 499s 71:c4:2a:40:96:ca:d3:78:ef:25:10:cb:59:e2:30:71 499s 48:9d:88:93:ac:49:34:dd:14:9f:34:f2:d0:94:be:a5 499s 7f:1c:80:27:c3:a7:72:48:ac:9b:91:21:87:37:d0:c3 499s c3:df:a7:d7:82:9e:69:77:cf:7d:99:56:88:c8:6c:81 499s 499s 499s prime1: 499s 00:db:12:2a:c8:57:b2:c0:43:7d:76:16:da:a9:8e:59 499s 7b:b7:5c:a9:ad:3a:47:a7:0b:ec:10:c1:00:36:03:32 499s 87:94:b2:25:c8:e3:ee:e6:ff:d3:fd:6d:22:53:d2:8e 499s 07:1f:e2:7d:62:9a:b0:72:fa:a1:43:77:ce:61:18:cb 499s 67: 499s 499s prime2: 499s 00:df:1b:8a:a8:50:6f:cb:bb:b9:d0:02:57:f2:97:5e 499s 38:b3:3d:26:98:fd:0f:37:e8:2d:7e:f3:8c:56:f2:1b 499s 6c:ed:63:c8:25:38:37:82:a7:11:5c:fc:c0:93:30:09 499s 87:db:d2:85:3b:51:8d:1c:8f:26:38:2a:2d:25:86:d3 499s 91: 499s 499s coefficient: 499s 13:6b:7b:1a:fa:c6:e6:27:9f:71:b2:42:17:b7:08:34 499s 85:a5:e8:27:d1:56:02:46:09:da:e3:9d:48:a6:bd:b5 499s 5a:f2:f0:62:cc:4a:3b:07:74:34:e6:ff:fa:d5:fa:a2 499s 9a:2b:5d:ba:2b:ed:3e:46:21:e4:78:c0:97:cc:fe:7f 499s 499s 499s exp1: 499s 00:be:18:ac:a1:3e:60:71:2f:df:5d:aa:85:42:1e:b1 499s 0d:86:d6:54:b2:69:e1:25:56:56:19:4f:b0:c4:2d:d0 499s 1a:10:70:ea:12:c1:9f:5c:39:e0:95:87:af:02:f7:b1 499s a1:03:0d:01:6a:9f:fa:bf:3b:36:d6:99:ce:af:38:d9 499s bf: 499s 499s exp2: 499s 71:aa:89:78:f9:0a:0c:05:07:44:b7:7c:f1:26:37:25 499s b2:03:ac:9f:73:06:06:d8:ae:1d:28:9d:ce:4a:28:b8 499s d5:34:e9:ea:34:7a:eb:80:8c:73:10:7e:58:3e:b8:0c 499s 54:6d:2b:dd:ad:cd:b3:c8:26:93:a4:c1:3d:86:34:51 499s 499s 499s 499s Public Key PIN: 499s pin-sha256:H0cGsuW/UFNbYVTMRF//JJ+6BkFvLzRkApkX+jR5hqI= 499s Public Key ID: 499s sha256:1f4706b2e5bf50535b6154cc445fff249fba06416f2f3464029917fa347986a2 499s sha1:6f9d79ae5a4b780578320543aa80b17bcc4b7d8c 499s 499s -----BEGIN RSA PRIVATE KEY----- 499s MIICXAIBAAKBgQC+7GTW21dgrC/UyXEUVkG5vX9cVlWOzmCHlceYBzdqf+Wxn5Wz 499s XKNY6lyKvXrgUdSc0vHkWWmhrpRUYDwUsnhmSg5BTryJE6y2IDYmmFUl4XpgBhGw 499s KFQt0FYqrXh/tPFlCqMYzc/3UeGxh8v2eF++Fk6YCUkbld1oSAVnyZsaVwIDAQAB 499s AoGADP4xbp3GuIF/T8/VrjigiG9o93O4pttMnm2HA8WZ89l4XDosCeTICQkJ+zch 499s 4ZowCewhIhUjpykmVweljxMGNnHEKkCWytN47yUQy1niMHFInYiTrEk03RSfNPLQ 499s lL6lfxyAJ8Onckism5EhhzfQw8Pfp9eCnml3z32ZVojIbIECQQDbEirIV7LAQ312 499s Ftqpjll7t1yprTpHpwvsEMEANgMyh5SyJcjj7ub/0/1tIlPSjgcf4n1imrBy+qFD 499s d85hGMtnAkEA3xuKqFBvy7u50AJX8pdeOLM9Jpj9DzfoLX7zjFbyG2ztY8glODeC 499s pxFc/MCTMAmH29KFO1GNHI8mOCotJYbTkQJBAL4YrKE+YHEv312qhUIesQ2G1lSy 499s aeElVlYZT7DELdAaEHDqEsGfXDnglYevAvexoQMNAWqf+r87NtaZzq842b8CQHGq 499s iXj5CgwFB0S3fPEmNyWyA6yfcwYG2K4dKJ3OSii41TTp6jR664CMcxB+WD64DFRt 499s K92tzbPIJpOkwT2GNFECQBNrexr6xuYnn3GyQhe3CDSFpegn0VYCRgna451Ipr21 499s WvLwYsxKOwd0NOb/+tX6oporXbor7T5GIeR4wJfM/n8= 499s -----END RSA PRIVATE KEY----- 499s PKCS8 OK encpkcs8.pem foobar 499s Encrypted structure detected... 499s Encrypted structure detected... 499s Encrypted structure detected... 499s Encrypted structure detected... 499s Public Key Info: 499s Public Key Algorithm: RSA 499s Key Security Level: Low (1024 bits) 499s 499s modulus: 499s 00:bb:24:7a:09:7e:0e:b2:37:32:cc:39:67:ad:f1:9e 499s 3d:6b:82:83:d1:d0:ac:a4:c0:18:be:8d:98:00:c0:7b 499s ff:07:44:c9:ca:1c:ba:36:e1:27:69:ff:b1:e3:8d:8b 499s ee:57:a9:3a:aa:16:43:39:54:19:7c:ae:69:24:14:f6 499s 64:ff:bc:74:c6:67:6c:4c:f1:02:49:69:c7:2b:e1:e1 499s a1:a3:43:14:f4:77:8f:c8:d0:85:5a:35:95:ac:62:a9 499s c1:21:00:77:a0:8b:97:30:b4:5a:2c:b8:90:2f:48:a0 499s 05:28:4b:f2:0f:8d:ec:8b:4d:03:42:75:d6:ad:81:c0 499s 11: 499s 499s public exponent: 499s 01:00:01: 499s 499s private exponent: 499s 00:fc:b9:4a:26:07:89:51:2b:53:72:91:e0:18:3e:a6 499s 5e:31:ef:9c:0c:16:24:42:d0:28:33:f9:fa:d0:3c:54 499s 04:06:c0:15:f5:1b:9a:b3:24:31:ab:3c:6b:47:43:b0 499s d2:a9:dc:05:e1:81:59:b6:04:e9:66:61:aa:d7:0b:00 499s 8f:3d:e5:bf:a2:f8:5e:25:6c:1e:22:0f:b4:fd:41:e2 499s 03:31:5f:da:20:c5:c0:f3:55:0e:e1:c9:ec:d7:3e:2a 499s 0c:01:ca:7b:22:cb:ac:f4:2b:27:f0:78:5f:b5:c2:f9 499s e8:14:5a:6e:7e:86:bd:6a:9b:20:0c:ba:cc:97:20:11 499s 499s 499s prime1: 499s 00:c9:59:9f:29:8a:5b:9f:e3:2a:d8:7e:c2:40:9f:a8 499s 45:e5:3e:11:8d:3c:ed:6e:ab:ce:d0:65:46:d8:c7:07 499s 63:b5:23:34:f4:9f:7e:1c:c7:c7:f9:65:d1:f4:04:42 499s 38:be:3a:0c:9d:08:25:fc:a3:71:d9:ae:0c:39:61:f4 499s 89: 499s 499s prime2: 499s 00:ed:ef:ab:a9:d5:39:9c:ee:59:1b:ff:cf:48:44:1b 499s b6:32:e7:46:24:f3:04:7f:de:95:08:6d:75:9e:67:17 499s ba:5c:a4:d4:e2:e2:4d:77:ce:eb:66:29:c5:96:e0:62 499s bb:e5:ac:dc:44:62:54:86:ed:64:0c:ce:d0:60:03:9d 499s 49: 499s 499s coefficient: 499s 00:89:ea:6e:6d:70:df:25:5f:18:3f:48:da:63:10:8b 499s fe:a8:0c:94:0f:de:97:56:53:89:94:e2:1e:2c:74:3c 499s 91:81:34:0b:a6:40:f8:cb:2a:60:8c:e0:02:b7:89:93 499s cf:18:9f:49:54:fd:7d:3f:9a:ef:d4:a4:4f:c1:45:99 499s 91: 499s 499s exp1: 499s 54:d9:18:72:27:e4:be:76:bb:1a:6a:28:2f:95:58:12 499s c4:2c:a8:b6:cc:e2:fd:0d:17:64:c8:18:d7:c6:df:3d 499s 4c:1a:9e:f9:2a:b0:b9:2e:12:fd:ec:c3:51:c1:ed:a9 499s fd:b7:76:93:41:d8:c8:22:94:1a:77:f6:9c:c3:c3:89 499s 499s 499s exp2: 499s 00:8e:f9:a7:08:ad:b5:2a:04:db:8d:04:a1:b5:06:20 499s 34:d2:cf:c0:89:b1:72:31:b8:39:8b:cf:e2:8e:a5:da 499s 4f:45:1e:53:42:66:c4:30:4b:29:8e:c1:69:17:29:8c 499s 8a:e6:0f:82:68:a1:41:b3:b6:70:99:75:a9:27:18:e4 499s e9: 499s 499s 499s Public Key PIN: 499s pin-sha256:R8hrzXl3nlSmDJsjs0F9VSmZuh6LjSVaubsjie5iAiQ= 499s Public Key ID: 499s sha256:47c86bcd79779e54a60c9b23b3417d552999ba1e8b8d255ab9bb2389ee620224 499s sha1:58a4a7659444b2f7fd2b211cc5e5631b10551ea9 499s 499s -----BEGIN RSA PRIVATE KEY----- 499s MIICXQIBAAKBgQC7JHoJfg6yNzLMOWet8Z49a4KD0dCspMAYvo2YAMB7/wdEycoc 499s ujbhJ2n/seONi+5XqTqqFkM5VBl8rmkkFPZk/7x0xmdsTPECSWnHK+HhoaNDFPR3 499s j8jQhVo1laxiqcEhAHegi5cwtFosuJAvSKAFKEvyD43si00DQnXWrYHAEQIDAQAB 499s AoGAAPy5SiYHiVErU3KR4Bg+pl4x75wMFiRC0Cgz+frQPFQEBsAV9RuasyQxqzxr 499s R0Ow0qncBeGBWbYE6WZhqtcLAI895b+i+F4lbB4iD7T9QeIDMV/aIMXA81UO4cns 499s 1z4qDAHKeyLLrPQrJ/B4X7XC+egUWm5+hr1qmyAMusyXIBECQQDJWZ8piluf4yrY 499s fsJAn6hF5T4RjTztbqvO0GVG2McHY7UjNPSffhzHx/ll0fQEQji+OgydCCX8o3HZ 499s rgw5YfSJAkEA7e+rqdU5nO5ZG//PSEQbtjLnRiTzBH/elQhtdZ5nF7pcpNTi4k13 499s zutmKcWW4GK75azcRGJUhu1kDM7QYAOdSQJAVNkYcifkvna7GmooL5VYEsQsqLbM 499s 4v0NF2TIGNfG3z1MGp75KrC5LhL97MNRwe2p/bd2k0HYyCKUGnf2nMPDiQJBAI75 499s pwittSoE240EobUGIDTSz8CJsXIxuDmLz+KOpdpPRR5TQmbEMEspjsFpFymMiuYP 499s gmihQbO2cJl1qScY5OkCQQCJ6m5tcN8lXxg/SNpjEIv+qAyUD96XVlOJlOIeLHQ8 499s kYE0C6ZA+MsqYIzgAreJk88Yn0lU/X0/mu/UpE/BRZmR 499s -----END RSA PRIVATE KEY----- 499s PKCS8 OK unencpkcs8.pem 499s PKCS #8 information: 499s Cipher: RC2-40 499s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 499s Salt: 1f4071ac00426977 499s Salt size: 8 499s Iteration count: 484 499s 499s Public Key Info: 499s Public Key Algorithm: RSA 499s Key Security Level: Low (1024 bits) 499s 499s modulus: 499s 00:c3:32:18:c8:b0:49:3e:42:eb:3c:32:9e:51:71:2e 499s ec:ed:44:f7:f2:57:af:35:97:b9:21:56:35:ec:31:93 499s d1:29:52:06:d5:85:70:f8:2e:b6:a4:86:33:58:d4:f9 499s d1:93:c0:81:b5:49:85:2d:d0:c4:1f:bd:d1:29:fe:51 499s c5:6e:af:2c:91:cc:d6:24:49:3b:ef:25:9c:62:fb:e0 499s d3:9c:f6:b7:3f:d7:28:41:37:11:34:60:14:b6:83:f5 499s 18:ae:39:eb:ca:6e:53:08:92:4b:58:9c:d4:1d:4e:03 499s a2:be:33:20:d8:c1:94:1f:c7:c4:b4:3a:78:5d:10:e7 499s b9: 499s 499s public exponent: 499s 01:00:01: 499s 499s private exponent: 499s 0c:85:e0:06:58:c8:56:2c:d6:69:33:5e:7f:5f:49:7c 499s 02:01:46:54:0a:06:9a:63:b1:c8:fe:fe:30:ce:ac:75 499s ad:ec:39:36:85:31:63:d1:76:be:74:42:ad:3c:ba:b5 499s ff:55:49:82:64:90:08:0a:08:59:cd:f9:dc:f3:17:f2 499s a6:9b:26:ac:d2:40:f0:aa:00:57:18:8f:b7:90:e7:f6 499s 5c:7a:12:42:a4:6c:89:79:2e:a9:69:a3:cd:4d:fd:32 499s 2d:46:a9:4e:30:73:a2:f8:69:ed:82:ab:3a:1f:8b:c9 499s 21:b0:36:fe:83:50:3d:8e:ca:04:fe:bf:81:37:60:15 499s 499s 499s prime1: 499s 00:db:29:c2:79:b4:f0:61:64:a1:83:87:b5:77:36:e8 499s 53:a4:a8:35:bb:92:52:d1:eb:15:7b:9d:f1:06:07:9a 499s 92:39:5a:db:21:d8:f8:84:d5:35:fa:8b:58:4a:fb:cf 499s 61:8c:ed:b5:02:12:5d:8f:fb:09:5b:3c:f7:4a:69:28 499s 85: 499s 499s prime2: 499s 00:e4:01:0e:80:c7:e9:b9:51:31:69:5d:6c:d1:0d:a4 499s 33:c6:5f:c8:78:a7:60:79:5a:e1:c8:99:cc:af:d0:42 499s 6c:b1:7e:3f:13:f3:43:f8:a4:40:d6:ed:13:1c:44:03 499s 5a:39:26:68:b6:e8:9a:5d:df:18:29:3b:fb:ba:d1:c2 499s a5: 499s 499s coefficient: 499s 38:81:51:91:e9:e7:db:21:2d:19:4e:a7:25:69:c1:c8 499s 96:f1:6d:2d:a0:ce:0f:62:91:2e:6b:34:83:fd:27:94 499s 00:e2:27:bd:e8:e2:10:47:2a:10:ab:62:73:99:99:be 499s b5:3f:72:27:35:77:d7:af:b8:ab:69:05:07:a2:1c:70 499s 499s 499s exp1: 499s 58:f4:12:23:23:f5:8d:12:33:1c:17:b0:e7:ba:39:81 499s f9:8a:ec:84:3d:57:b0:2c:22:84:12:0f:09:cb:7c:49 499s 6d:4e:1b:33:19:c5:84:e4:a5:0c:14:12:ba:1c:8a:87 499s a5:93:b5:ac:29:98:20:20:5c:23:d4:12:ea:f8:d3:a1 499s 499s 499s exp2: 499s 00:b9:4c:9a:8a:d2:ee:02:6c:18:2a:37:81:4e:4d:35 499s db:d6:26:d5:f8:28:9f:61:41:19:2a:3c:c4:7b:46:58 499s 15:9a:12:ae:14:fa:a9:8d:13:80:96:ab:c9:d2:38:fc 499s 38:81:25:d4:08:82:f5:a1:c0:c4:14:0e:e9:c0:a4:e4 499s f9: 499s 499s 499s Public Key PIN: 499s pin-sha256:9F3bpcFKX01Sz/YJHsmzV6WCdR0JAH56cHgpJzevriI= 499s Public Key ID: 499s sha256:f45ddba5c14a5f4d52cff6091ec9b357a582751d09007e7a7078292737afae22 499s sha1:eaee9caf13c9583bb22f4aa81d19a71b6646cfeb 499s 499s -----BEGIN RSA PRIVATE KEY----- 499s MIICXAIBAAKBgQDDMhjIsEk+Qus8Mp5RcS7s7UT38levNZe5IVY17DGT0SlSBtWF 499s cPgutqSGM1jU+dGTwIG1SYUt0MQfvdEp/lHFbq8skczWJEk77yWcYvvg05z2tz/X 499s KEE3ETRgFLaD9RiuOevKblMIkktYnNQdTgOivjMg2MGUH8fEtDp4XRDnuQIDAQAB 499s AoGADIXgBljIVizWaTNef19JfAIBRlQKBppjscj+/jDOrHWt7Dk2hTFj0Xa+dEKt 499s PLq1/1VJgmSQCAoIWc353PMX8qabJqzSQPCqAFcYj7eQ5/ZcehJCpGyJeS6paaPN 499s Tf0yLUapTjBzovhp7YKrOh+LySGwNv6DUD2OygT+v4E3YBUCQQDbKcJ5tPBhZKGD 499s h7V3NuhTpKg1u5JS0esVe53xBgeakjla2yHY+ITVNfqLWEr7z2GM7bUCEl2P+wlb 499s PPdKaSiFAkEA5AEOgMfpuVExaV1s0Q2kM8ZfyHinYHla4ciZzK/QQmyxfj8T80P4 499s pEDW7RMcRANaOSZotuiaXd8YKTv7utHCpQJAWPQSIyP1jRIzHBew57o5gfmK7IQ9 499s V7AsIoQSDwnLfEltThszGcWE5KUMFBK6HIqHpZO1rCmYICBcI9QS6vjToQJBALlM 499s morS7gJsGCo3gU5NNdvWJtX4KJ9hQRkqPMR7RlgVmhKuFPqpjROAlqvJ0jj8OIEl 499s 1AiC9aHAxBQO6cCk5PkCQDiBUZHp59shLRlOpyVpwciW8W0toM4PYpEuazSD/SeU 499s AOInvejiEEcqEKtic5mZvrU/cic1d9evuKtpBQeiHHA= 499s -----END RSA PRIVATE KEY----- 499s PKCS8 OK enc2pkcs8.pem baz 499s PKCS #8 information: 499s Cipher: AES-256-CBC 499s Schema: PBES2-AES256-CBC (2.16.840.1.101.3.4.1.42) 499s Salt: d4d8680a69b46e27 499s Salt size: 8 499s Iteration count: 2048 499s 499s Public Key Info: 499s Public Key Algorithm: RSA 499s Key Security Level: Medium (2432 bits) 499s 499s modulus: 499s 00:ab:54:98:fc:a9:c6:15:95:9d:a6:c1:94:84:94:91 499s 79:1e:78:db:2d:48:51:99:65:01:02:c0:40:52:49:5d 499s eb:70:bc:26:ef:68:39:1e:04:91:e2:db:cb:6f:93:40 499s 45:1e:22:8e:71:5a:58:89:28:79:5e:1a:32:25:3e:8b 499s 9d:3b:34:7f:19:f8:d0:2f:37:b7:62:32:b7:53:a5:43 499s 2c:c5:5d:ec:ac:f9:35:fa:14:2b:34:66:f1:d6:a7:a1 499s d0:83:9a:56:f4:19:83:bc:bf:11:74:30:2d:a8:28:5b 499s a2:ab:7a:c6:cd:9c:5c:f8:51:e9:a9:0c:48:db:71:bb 499s b1:34:77:f7:ee:de:5d:78:c0:48:0a:37:0d:65:1e:3b 499s 2b:14:03:89:72:f2:52:ed:5f:00:c5:06:60:ea:80:20 499s d0:43:ec:66:bc:d2:26:db:f0:29:3e:6a:f9:62:20:be 499s 58:26:44:ba:d7:8c:6f:76:a6:05:20:e4:98:b7:c4:72 499s 7a:5d:df:4f:0d:23:ec:2e:9c:71:ec:30:f9:14:5f:c8 499s 75:0b:ab:67:f6:7d:fb:4d:76:64:4a:a5:d5:fa:b4:08 499s 50:9d:13:c7:8f:c2:79:b0:b4:3e:2f:89:d3:33:27:4d 499s 9f:8b:d3:60:24:07:ab:b2:72:3d:29:a5:c4:4a:ec:3c 499s 04:d2:49:3e:26:1b:ec:7a:10:3d:ca:45:5a:80:8b:4d 499s 2a:96:63:4f:2d:63:28:0f:3b:47:47:ca:7c:2c:15:41 499s 32:d5:e0:c9:be:a5:55:2c:b3:6b:46:2a:56:b1:1b:ed 499s 29: 499s 499s public exponent: 499s 01:00:01: 499s 499s private exponent: 499s 5d:97:20:db:24:82:a8:57:ca:7e:c5:50:33:fc:54:5b 499s 2d:62:27:98:5c:e0:f6:42:4e:83:0a:32:18:c1:2b:24 499s e9:b8:5e:2c:79:6a:7a:13:54:fd:ef:c2:f9:78:1e:ab 499s a3:02:8d:7d:2e:35:1e:f7:95:14:ea:8a:69:fd:f8:96 499s 33:39:42:15:15:ed:e3:5d:34:37:d8:2c:7c:ec:d1:fd 499s 2a:f3:5b:ce:41:74:52:df:a1:9a:46:81:e5:18:3d:34 499s 82:2f:55:40:92:8f:7c:13:83:9d:4c:94:24:3f:a7:8e 499s fc:cd:5c:bc:04:a6:64:9f:9a:5c:55:f1:96:ae:52:31 499s 42:d0:26:07:be:40:a1:2d:a8:2c:ac:56:0c:de:ae:c3 499s a1:73:2d:2a:35:65:47:74:b0:9b:70:b9:d8:ad:12:74 499s 50:b3:00:fb:86:72:d5:00:e8:02:b2:d1:e3:d5:87:3f 499s cc:b6:f3:26:fe:25:c1:b5:59:bd:e0:c9:fa:d9:ba:47 499s f8:43:ea:af:cf:4d:92:ae:db:9d:11:49:ec:50:33:2a 499s b6:44:40:ac:06:c7:f6:64:2e:42:25:81:20:d5:f6:76 499s 79:b9:fb:bd:d2:c5:5d:f7:28:16:9d:cc:13:cd:d9:55 499s e3:ca:c7:d2:38:f1:92:32:d6:ba:db:73:b6:dc:b6:5f 499s 66:89:e3:4c:9e:d6:b8:d2:01:ee:a8:d2:69:64:dd:5c 499s 1a:7e:4c:e4:1d:5b:37:94:29:3c:93:3d:43:bb:33:8f 499s 10:23:14:12:b0:33:24:58:c3:ae:97:4c:3d:c5:c1:81 499s 499s 499s prime1: 499s 00:c1:9c:0d:4e:aa:1b:2e:c4:14:e6:78:ed:0b:76:90 499s af:da:3d:5e:15:6f:7d:9c:97:4d:71:a3:1d:6a:47:94 499s 25:20:9d:98:f4:d0:3b:d6:be:be:12:39:e7:d7:82:3d 499s 54:3d:f7:76:06:e2:ac:5d:e6:1f:34:fd:bc:9d:9c:8b 499s f5:4f:83:89:8f:79:ea:9e:5e:a5:5c:e9:b4:71:ae:59 499s 43:ff:ec:03:f6:57:3c:d6:33:0b:ba:4d:39:3f:90:62 499s b2:4f:af:e0:21:7a:5a:0f:93:f4:fc:5f:ba:29:b9:af 499s 67:18:3f:0e:23:3d:de:d9:bc:47:ad:de:56:11:d1:e3 499s c0:7e:29:bb:67:ac:1b:6a:af:5a:30:19:0c:14:49:af 499s db:1a:82:10:60:e1:d1:98:dd: 499s 499s prime2: 499s 00:e2:8a:9d:80:b5:29:33:06:44:d2:e3:77:bd:34:3e 499s c0:df:98:cc:ab:f3:ba:73:3c:19:5c:d8:ed:c8:22:bc 499s b9:8f:4f:1a:d8:0d:08:e2:e2:ca:e8:3c:13:aa:23:1b 499s 3d:75:d4:7c:e2:4e:cd:ca:d0:fc:b7:77:70:57:54:e1 499s 1c:22:a2:3e:0f:a7:59:c0:5a:4f:b1:e8:62:55:85:07 499s 7d:03:a4:8f:82:eb:2d:21:fc:cb:d5:b7:3c:77:a5:9d 499s 67:a6:ab:95:5d:1e:d3:a3:49:78:9b:75:2c:07:e9:bd 499s ba:0f:66:69:7e:2e:50:2f:76:5f:e9:28:f8:e1:c9:ce 499s 77:4a:48:ee:92:d1:d5:dc:29:2f:3f:29:7a:12:b0:d6 499s f9:8d:68:e4:82:45:ec:3a:bd: 499s 499s coefficient: 499s 00:82:d2:e4:3b:e3:aa:9e:99:75:0d:73:e4:e9:38:f5 499s 5e:73:e4:c2:3a:24:55:4e:ea:58:f7:2a:f2:0f:ff:42 499s d7:e2:ef:49:d2:25:8d:86:02:a7:2b:c9:45:1e:ee:a0 499s 1c:60:58:3e:4c:bb:40:99:42:20:ff:c7:3f:4e:68:8c 499s 8b:f4:e8:41:fe:f4:79:00:a4:7e:64:67:95:8e:bf:c3 499s 45:28:dc:da:57:b9:aa:20:ac:66:b0:c8:11:b2:9a:c2 499s 60:ac:24:32:7f:17:e4:6c:dc:24:43:56:22:50:86:29 499s a7:38:fb:4e:8c:e1:9a:c8:42:a4:59:ab:49:32:bd:0b 499s 65:30:37:06:95:29:63:88:09:11:0b:0a:f3:34:82:f6 499s 54:68:cc:71:e9:ea:9f:48:0f: 499s 499s exp1: 499s 78:8e:dc:b6:74:34:32:fd:c4:69:f3:38:e0:1f:77:5f 499s 19:4d:87:4d:5f:bc:5f:0a:d4:1d:83:cd:a8:45:64:19 499s 6e:62:d4:40:f5:7d:9d:6d:ee:db:58:95:66:5b:e2:26 499s 97:e3:84:ea:2a:b1:dc:52:94:72:21:e2:16:5e:c9:c3 499s fa:3c:55:27:33:6a:86:2d:37:59:50:e9:9c:b4:4d:3f 499s 8b:98:02:ab:9d:8c:f3:70:9b:c7:e9:98:51:5d:6e:27 499s cc:79:1e:de:99:da:84:c2:c4:15:76:e2:6c:63:04:b6 499s f4:a1:27:03:88:de:40:c4:fd:f9:65:6e:40:f0:6a:9a 499s 8d:b5:1c:ce:24:9c:79:e5:31:0a:ac:3e:1a:4f:fc:22 499s 3a:32:6d:52:76:ab:56:3d: 499s 499s exp2: 499s 00:9b:74:5b:58:72:f8:6e:97:22:ab:44:84:6a:45:6b 499s ba:96:b5:17:dd:f7:46:3e:c5:42:f2:3f:ba:0b:d8:2a 499s 81:7b:21:e1:5d:d8:b3:fc:5d:7c:b7:98:62:36:22:19 499s 13:37:c4:34:5e:67:8d:38:5b:e8:cf:4d:1a:be:12:f4 499s d6:85:bd:a7:b0:be:3a:0c:90:ec:97:3c:cc:1d:bb:47 499s c4:35:b7:ba:f3:2f:c6:ac:c7:f8:68:13:71:5e:f9:3a 499s e6:61:ac:e4:b6:1d:ed:44:e3:a9:eb:a3:a0:2f:5d:ea 499s 5f:bf:29:9b:c2:86:ad:67:a4:67:74:6c:35:3d:5b:6a 499s 5e:d9:8e:ea:87:bd:8e:6f:a1:a3:56:48:74:08:57:69 499s 6d:9d:e8:18:c6:7c:8c:fa:51: 499s 499s 499s Public Key PIN: 499s pin-sha256:RMtdrzhWeBv9f9dYGAe/lLVF+1Dgh65nQzCDUl9tWHU= 499s Public Key ID: 499s sha256:44cb5daf3856781bfd7fd7581807bf94b545fb50e087ae67433083525f6d5875 499s sha1:8b01094b3b91ece321b91dec8d6b4c5d9e40805e 499s 499s -----BEGIN RSA PRIVATE KEY----- 499s MIIFfAIBAAKCATEAq1SY/KnGFZWdpsGUhJSReR542y1IUZllAQLAQFJJXetwvCbv 499s aDkeBJHi28tvk0BFHiKOcVpYiSh5XhoyJT6LnTs0fxn40C83t2Iyt1OlQyzFXeys 499s +TX6FCs0ZvHWp6HQg5pW9BmDvL8RdDAtqChboqt6xs2cXPhR6akMSNtxu7E0d/fu 499s 3l14wEgKNw1lHjsrFAOJcvJS7V8AxQZg6oAg0EPsZrzSJtvwKT5q+WIgvlgmRLrX 499s jG92pgUg5Ji3xHJ6Xd9PDSPsLpxx7DD5FF/IdQurZ/Z9+012ZEql1fq0CFCdE8eP 499s wnmwtD4vidMzJ02fi9NgJAersnI9KaXESuw8BNJJPiYb7HoQPcpFWoCLTSqWY08t 499s YygPO0dHynwsFUEy1eDJvqVVLLNrRipWsRvtKQIDAQABAoIBMF2XINskgqhXyn7F 499s UDP8VFstYieYXOD2Qk6DCjIYwSsk6bheLHlqehNU/e/C+Xgeq6MCjX0uNR73lRTq 499s imn9+JYzOUIVFe3jXTQ32Cx87NH9KvNbzkF0Ut+hmkaB5Rg9NIIvVUCSj3wTg51M 499s lCQ/p478zVy8BKZkn5pcVfGWrlIxQtAmB75AoS2oLKxWDN6uw6FzLSo1ZUd0sJtw 499s uditEnRQswD7hnLVAOgCstHj1Yc/zLbzJv4lwbVZveDJ+tm6R/hD6q/PTZKu250R 499s SexQMyq2RECsBsf2ZC5CJYEg1fZ2ebn7vdLFXfcoFp3ME83ZVePKx9I48ZIy1rrb 499s c7bctl9mieNMnta40gHuqNJpZN1cGn5M5B1bN5QpPJM9Q7szjxAjFBKwMyRYw66X 499s TD3FwYECgZkAwZwNTqobLsQU5njtC3aQr9o9XhVvfZyXTXGjHWpHlCUgnZj00DvW 499s vr4SOefXgj1UPfd2BuKsXeYfNP28nZyL9U+DiY956p5epVzptHGuWUP/7AP2VzzW 499s Mwu6TTk/kGKyT6/gIXpaD5P0/F+6KbmvZxg/DiM93tm8R63eVhHR48B+KbtnrBtq 499s r1owGQwUSa/bGoIQYOHRmN0CgZkA4oqdgLUpMwZE0uN3vTQ+wN+YzKvzunM8GVzY 499s 7cgivLmPTxrYDQji4sroPBOqIxs9ddR84k7NytD8t3dwV1ThHCKiPg+nWcBaT7Ho 499s YlWFB30DpI+C6y0h/MvVtzx3pZ1npquVXR7To0l4m3UsB+m9ug9maX4uUC92X+ko 499s +OHJzndKSO6S0dXcKS8/KXoSsNb5jWjkgkXsOr0CgZh4jty2dDQy/cRp8zjgH3df 499s GU2HTV+8XwrUHYPNqEVkGW5i1ED1fZ1t7ttYlWZb4iaX44TqKrHcUpRyIeIWXsnD 499s +jxVJzNqhi03WVDpnLRNP4uYAqudjPNwm8fpmFFdbifMeR7emdqEwsQVduJsYwS2 499s 9KEnA4jeQMT9+WVuQPBqmo21HM4knHnlMQqsPhpP/CI6Mm1SdqtWPQKBmQCbdFtY 499s cvhulyKrRIRqRWu6lrUX3fdGPsVC8j+6C9gqgXsh4V3Ys/xdfLeYYjYiGRM3xDRe 499s Z404W+jPTRq+EvTWhb2nsL46DJDslzzMHbtHxDW3uvMvxqzH+GgTcV75OuZhrOS2 499s He1E46nro6AvXepfvymbwoatZ6RndGw1PVtqXtmO6oe9jm+ho1ZIdAhXaW2d6BjG 499s fIz6UQKBmQCC0uQ746qemXUNc+TpOPVec+TCOiRVTupY9yryD/9C1+LvSdIljYYC 499s pyvJRR7uoBxgWD5Mu0CZQiD/xz9OaIyL9OhB/vR5AKR+ZGeVjr/DRSjc2le5qiCs 499s ZrDIEbKawmCsJDJ/F+Rs3CRDViJQhimnOPtOjOGayEKkWatJMr0LZTA3BpUpY4gJ 499s EQsK8zSC9lRozHHp6p9IDw== 499s -----END RSA PRIVATE KEY----- 499s PKCS8 OK pkcs8-pbes2-sha256.pem password 499s Encrypted structure detected... 499s PKCS #8 information: 499s Cipher: DES-CBC 499s Schema: PBES1-DES-CBC-SHA1 (1.2.840.113549.1.5.10) 499s Salt: 499s Salt size: 0 499s Iteration count: 2048 499s 499s Public Key Info: 499s Public Key Algorithm: RSA 499s Key Security Level: Low (1024 bits) 499s 499s modulus: 499s 00:c8:21:44:59:dc:ec:ae:35:b5:a7:06:98:0a:4e:0f 499s 2f:b8:5b:97:a9:85:c7:b7:26:64:3f:51:44:37:3c:ae 499s eb:77:21:05:db:c4:6f:9a:f4:1a:7c:58:d3:55:b2:f3 499s 15:f1:ad:82:a6:b4:a0:ca:2b:2c:e6:39:22:38:ff:5f 499s 39:22:55:fa:8a:b8:fa:af:1d:1c:49:49:cd:a2:c2:5b 499s ad:85:bb:c8:ce:e8:cc:f9:fa:5a:1c:10:73:4d:11:80 499s e4:bb:29:ac:40:72:84:d2:1a:2d:ae:e3:53:f2:9b:33 499s 1e:b4:c9:4a:c9:6d:a3:97:3b:b1:59:84:3a:2e:10:f6 499s 4b: 499s 499s public exponent: 499s 01:00:01: 499s 499s private exponent: 499s 00:ad:55:72:d7:ca:2b:0c:2f:e4:a7:47:64:c3:f8:1b 499s db:1e:f7:e5:81:a4:26:f8:10:3e:5f:40:c9:ae:75:d6 499s a2:86:49:89:c3:70:7d:a1:5d:ae:da:e8:2c:12:5b:ad 499s 82:e2:11:7f:c9:57:44:b4:15:75:0b:e9:8c:24:85:ba 499s 38:3f:c9:02:20:28:19:d1:c8:94:09:36:00:6c:11:a6 499s a6:71:fe:95:02:ce:f8:9f:3b:97:32:ee:a6:ec:59:a0 499s 96:cf:39:a9:30:cf:8d:dc:a3:83:fa:9c:57:19:b7:8a 499s 4a:2b:7b:08:16:dc:8e:63:95:41:ed:94:a7:55:3c:36 499s a1: 499s 499s prime1: 499s 00:e6:56:b3:24:08:5e:6e:18:8b:a9:3b:a8:df:48:70 499s 0c:f1:42:ab:e2:89:6e:27:2a:da:cd:69:6f:59:76:c0 499s 58:0a:b4:bf:9e:7f:df:b0:38:d0:29:f0:7b:c4:2a:50 499s 99:e9:30:42:e5:b5:aa:be:48:f7:9b:7b:92:3c:1e:cf 499s 09: 499s 499s prime2: 499s 00:de:6d:02:51:de:d4:5e:60:63:fc:50:17:62:ec:b0 499s 6d:83:a0:be:2b:73:47:c6:b2:10:0c:fc:92:69:2b:95 499s 7e:9c:16:51:c8:37:82:b8:3f:9f:6d:c3:f5:8c:f8:0a 499s d2:6a:1a:58:5e:15:29:8b:e4:0f:a0:cc:07:16:fe:5b 499s b3: 499s 499s coefficient: 499s 46:29:e1:b8:7f:3a:b9:22:5e:36:f3:62:08:4e:42:e6 499s 73:bc:3e:24:9e:0d:34:57:f9:e4:cd:7f:8c:6d:44:0f 499s da:b6:11:13:bd:84:8e:26:50:6f:2b:75:59:eb:08:4d 499s 3b:1e:11:a3:f0:5a:18:49:76:48:fe:59:34:8f:c6:1a 499s 499s 499s exp1: 499s 00:d3:d7:55:36:84:83:e4:99:aa:88:e0:97:b5:93:37 499s 8a:8f:b1:13:c8:6b:40:e5:c0:e2:2f:1d:13:0d:a2:cb 499s cf:ad:39:03:2a:d0:cc:77:94:28:cf:09:9f:aa:90:88 499s 44:a5:54:7f:92:28:7c:7a:39:3d:90:c0:1b:84:33:89 499s 91: 499s 499s exp2: 499s 01:2d:7c:94:a8:64:61:77:8b:2f:fb:d0:93:e2:82:f0 499s a1:80:c9:60:fb:84:46:c6:0c:95:b5:04:a5:6f:e8:a3 499s b9:f9:d8:47:02:1c:3c:13:82:29:97:9f:06:37:0d:ff 499s 9d:36:34:7f:93:07:1c:49:81:d7:ad:1c:e0:7f:4a:47 499s 499s 499s 499s Public Key PIN: 499s pin-sha256:JbSA+Q0YuTazlPZLiX9c8A240Jh07A3BEneUY0GxAOE= 499s Public Key ID: 499s sha256:25b480f90d18b936b394f64b897f5cf00db8d09874ec0dc11277946341b100e1 499s sha1:359207bbf0118d5866f17b349fe24787372745fa 499s 499s -----BEGIN RSA PRIVATE KEY----- 499s MIICXQIBAAKBgQDIIURZ3OyuNbWnBpgKTg8vuFuXqYXHtyZkP1FENzyu63chBdvE 499s b5r0GnxY01Wy8xXxrYKmtKDKKyzmOSI4/185IlX6irj6rx0cSUnNosJbrYW7yM7o 499s zPn6WhwQc00RgOS7KaxAcoTSGi2u41PymzMetMlKyW2jlzuxWYQ6LhD2SwIDAQAB 499s AoGBAK1VctfKKwwv5KdHZMP4G9se9+WBpCb4ED5fQMmuddaihkmJw3B9oV2u2ugs 499s ElutguIRf8lXRLQVdQvpjCSFujg/yQIgKBnRyJQJNgBsEaamcf6VAs74nzuXMu6m 499s 7Fmgls85qTDPjdyjg/qcVxm3ikorewgW3I5jlUHtlKdVPDahAkEA5lazJAhebhiL 499s qTuo30hwDPFCq+KJbicq2s1pb1l2wFgKtL+ef9+wONAp8HvEKlCZ6TBC5bWqvkj3 499s m3uSPB7PCQJBAN5tAlHe1F5gY/xQF2LssG2DoL4rc0fGshAM/JJpK5V+nBZRyDeC 499s uD+fbcP1jPgK0moaWF4VKYvkD6DMBxb+W7MCQQDT11U2hIPkmaqI4Je1kzeKj7ET 499s yGtA5cDiLx0TDaLLz605AyrQzHeUKM8Jn6qQiESlVH+SKHx6OT2QwBuEM4mRAkAB 499s LXyUqGRhd4sv+9CT4oLwoYDJYPuERsYMlbUEpW/oo7n52EcCHDwTgimXnwY3Df+d 499s NjR/kwccSYHXrRzgf0pHAkBGKeG4fzq5Il4282IITkLmc7w+JJ4NNFf55M1/jG1E 499s D9q2ERO9hI4mUG8rdVnrCE07HhGj8FoYSXZI/lk0j8Ya 499s -----END RSA PRIVATE KEY----- 499s PKCS8 OK der-key-PBE-SHA1-DES.p8 booo 499s PKCS8 DONE (rc 0) 499s SUCCESS [52]../../tests/cert-tests/pkcs8-decode.sh 499s running [53]../../tests/cert-tests/pkcs8-eddsa.sh ... 499s 499s PKCS8 DONE 499s SUCCESS [53]../../tests/cert-tests/pkcs8-eddsa.sh 499s running [54]../../tests/cert-tests/pkcs8-gost.sh ... 499s PKCS8 OK key-gost01.p8 499s PKCS8 OK key-gost12-256.p8 499s PKCS8 OK key-gost01-2.p8 499s PKCS8 OK key-gost12-256-2.p8 499s Encrypted structure detected... 499s PKCS8 OK key-gost01-2-enc.p8 Пароль%20для%20PFX 499s Encrypted structure detected... 499s PKCS8 OK key-gost12-256-2-enc.p8 Пароль%20для%20PFX 499s PKCS8 DONE (rc 0) 499s SUCCESS [54]../../tests/cert-tests/pkcs8-gost.sh 499s running [55]../../tests/cert-tests/pkcs8-invalid.sh ... 499s PKCS8 OK pkcs8-invalid1.der 1234 - errno 1 499s Encrypted structure detected... 499s import error: ASN1 parser: Error in TAG. 499s Encrypted structure detected... 499s PKCS #8 information: 499s Cipher: 3DES-CBC 499s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 499s Salt: 2a3f859d8061db1b 499s Salt size: 8 499s Iteration count: 5170 499s 499s PKCS8 OK pkcs8-invalid2.der 1234 - errno 1 499s import error: Decryption has failed. 499s Encrypted structure detected... 499s PKCS #8 information: 499s Cipher: RC2-40 499s Schema: PKCS12-RC2-40-SHA1 (1.2.840.113549.1.12.1.6) 499s Salt: 2a3f859d8061db1b 499s Salt size: 8 499s Iteration count: 5170 499s 499s import error: Decryption has failed. 499s PKCS8 OK pkcs8-invalid3.der 1234 - errno 1 499s PKCS8 OK pkcs8-invalid4.der 1234 - errno 1 499s Encrypted structure detected... 499s import error: ASN1 parser: Error in TAG. 499s Encrypted structure detected... 499s PKCS #8 information: 499s Cipher: 3DES-CBC 499s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 499s Salt: 2a3f859d8061db1b 499s Salt size: 8 499s Iteration count: 5121 499s 499s PKCS8 OK pkcs8-invalid5.der 1234 - errno 1 499s import error: Decryption has failed. 499s Encrypted structure detected... 499s PKCS #8 information: 499s Cipher: 3DES-CBC 499s Schema: PKCS12-3DES-SHA1 (1.2.840.113549.1.12.1.3) 499s Salt: 2a3f859d8061db1b 499s Salt size: 8 499s Iteration count: 4 499s 499s import error: Decryption has failed. 499s PKCS8 OK pkcs8-invalid6.der 1234 - errno 1 499s Encrypted structure detected... 499s import error: ASN1 parser: Error in TAG. 499s PKCS8 OK pkcs8-invalid7.der 1234 - errno 1 499s import error: ASN1 parser: Error in TAG. 499s PKCS8 OK pkcs8-invalid8.der password - errno 1 499s PKCS8 OK pkcs8-invalid9.der password - errno 1 499s PKCS8 OK pkcs8-invalid10.der password - errno 1 499s Encrypted structure detected... 499s import error: ASN1 parser: Error in TAG. 499s import error: ASN1 parser: Error in TAG. 499s PKCS8 DONE (rc 0) 499s SUCCESS [55]../../tests/cert-tests/pkcs8-invalid.sh 499s running [56]../../tests/cert-tests/pkcs8.sh ... 500s SUCCESS [56]../../tests/cert-tests/pkcs8.sh 500s running [57]../../tests/cert-tests/privkey-import.sh ... 500s Public Key Info: 500s Public Key Algorithm: RSA 500s Key Security Level: Medium (2048 bits) 500s 500s modulus: 500s 00:99:a7:ca:d0:a7:03:91:6f:05:c7:55:d7:92:d1:30 500s 34:59:cd:15:8b:7e:17:88:70:4b:cf:fc:34:92:74:b7 500s 80:5e:68:f0:f0:de:9c:2a:18:05:6a:00:d0:3a:3d:f5 500s e3:ea:11:97:e5:5b:02:98:35:a4:f5:26:0b:af:33:6a 500s 95:41:d0:df:38:34:dc:98:3c:b4:5a:b5:f3:59:e8:f6 500s ac:17:f3:a4:bf:b4:c8:8a:ea:e4:50:6c:1b:ed:1d:c8 500s ff:59:ad:d9:72:08:a8:1f:f2:17:34:34:36:5b:af:c6 500s 22:cd:c2:30:8d:7e:93:9e:3b:79:a9:b7:3c:91:0d:9d 500s fa:1d:ee:f1:d8:c0:2c:b3:cd:3d:f9:79:4b:ad:5c:2f 500s 7d:8c:51:32:42:31:f8:8e:a6:04:e8:5f:45:f7:08:a8 500s 8c:bf:ac:46:8f:b3:d4:83:ed:48:35:34:01:cf:9a:c8 500s e0:1c:95:9b:99:75:24:91:e5:34:1a:75:9e:fc:9d:04 500s 27:9c:7c:65:53:37:32:ff:ea:03:fc:e3:7b:7c:08:80 500s a9:b4:97:ec:85:ee:b9:81:df:93:33:e8:da:3e:4a:cf 500s 7d:e6:12:57:6e:c0:22:a9:88:29:e1:64:ad:50:4c:2b 500s d9:7c:15:09:4d:5f:a9:06:00:db:ee:ab:a6:76:ca:41 500s 2d: 500s 500s public exponent: 500s 01:00:01: 500s 500s private exponent: 500s 26:4d:96:98:56:d9:e3:da:2a:35:9b:a7:86:78:d1:2c 500s 6b:aa:5d:11:8d:d8:2d:f1:d8:64:3b:79:9b:7c:ae:f5 500s b8:13:2e:e4:cc:89:5f:50:e7:a0:9a:1d:4e:37:7d:e1 500s 57:cb:14:f3:5e:b1:91:e1:e5:82:1a:fe:d4:a8:db:8b 500s e3:81:3e:f3:d2:f1:9e:9d:9b:53:f5:81:79:4b:42:9a 500s 79:ca:09:aa:a4:55:4d:93:ea:60:45:e2:dc:44:0d:83 500s e2:06:1d:6b:78:ce:f8:4f:b0:0b:1a:6c:e6:84:35:bf 500s 1d:4d:a8:2e:cd:7b:dc:f8:f4:86:23:20:5d:04:68:f9 500s ba:b4:a3:cb:f6:2f:67:79:7a:59:3f:de:8c:29:5d:51 500s 37:e7:dd:83:83:b4:c6:22:c0:d7:8c:79:93:11:f7:64 500s 33:47:73:d6:1a:06:c5:d4:2c:a7:02:8c:d7:f7:8c:4b 500s 07:8d:95:2e:40:3c:52:64:31:21:85:72:91:b5:13:4d 500s e5:7c:e3:b3:b1:b2:24:aa:e1:f3:22:fb:96:bb:7a:d5 500s 4f:03:e5:91:cd:50:01:85:52:c7:83:cf:a8:23:e5:10 500s 0e:d5:1c:20:11:e6:d3:65:43:de:b8:dc:dd:07:f6:7b 500s a5:c2:bf:c9:6a:c4:2b:ac:03:fb:b5:48:32:3f:ff:dd 500s 500s 500s prime1: 500s 00:c6:f9:eb:a0:38:87:c7:3c:80:06:cd:74:8c:ce:4c 500s 04:43:11:93:88:ac:d2:9f:af:e6:3a:94:10:16:c6:62 500s 4f:4b:1f:22:56:01:33:e9:6c:9d:3c:0b:a5:48:88:82 500s 8d:c0:09:e2:cb:8c:2d:2f:74:6e:18:64:5c:99:93:40 500s 1c:aa:4a:66:9e:1c:81:ea:1f:c4:dd:39:7d:5c:b1:68 500s 9c:70:53:49:ed:51:24:76:30:32:04:3f:0b:a9:59:d4 500s ba:73:00:a2:40:03:ad:94:6d:a4:4a:e9:9c:53:06:fd 500s 9f:b8:a3:32:89:c0:37:f3:e3:65:b0:fc:ef:64:6b:98 500s 4f: 500s 500s prime2: 500s 00:c5:b0:de:28:b4:18:1a:82:f4:87:d8:84:bf:ef:49 500s 15:93:21:8a:f5:7c:4e:49:3a:4c:d6:7b:d3:15:87:3b 500s 08:8f:05:f8:7f:5e:57:35:2e:78:af:7d:73:99:f2:91 500s ff:a0:67:1a:fa:ac:2c:72:e6:ce:99:86:2b:e1:e4:58 500s 84:17:fe:9c:36:70:14:71:4d:58:ee:8a:2f:dd:02:1b 500s 60:8e:09:fd:30:59:7b:cd:d0:a0:66:bb:e3:2c:41:e5 500s 5f:ee:67:9c:6f:d8:29:d8:a9:c5:b9:a1:f3:33:d1:ef 500s 89:48:de:3c:2d:6e:ef:18:e9:b5:9d:53:e4:c1:ca:b3 500s c3: 500s 500s coefficient: 500s 3d:2b:f1:df:96:7e:c8:b8:7f:c5:bb:8b:fe:e9:c2:d6 500s b0:1e:7e:82:f8:22:91:e9:21:32:16:48:da:06:11:49 500s b2:6d:4a:26:7c:87:e4:4d:9d:e1:43:9d:36:e3:5e:0c 500s c6:e0:0c:53:09:71:92:0d:e3:9e:0a:2b:06:a8:86:d3 500s c3:42:a8:7f:23:c1:db:a9:55:a6:a1:51:3f:99:64:85 500s 50:ac:e2:3a:fb:15:86:39:94:f5:bd:5f:5b:0d:a6:cf 500s 41:c1:f5:9a:13:e7:92:a8:71:92:c7:b5:60:ce:38:9e 500s 7b:39:ef:8a:78:ab:34:2f:9d:8e:54:d8:b5:29:59:f4 500s 500s 500s exp1: 500s 00:9e:46:40:b2:d3:24:d6:4b:fe:be:ea:81:52:5b:eb 500s 45:dc:9f:c7:8e:89:82:85:39:a3:56:67:5e:a0:ef:2f 500s 56:49:b8:3b:54:d4:62:19:c4:a7:12:13:65:67:5c:07 500s 15:80:73:9c:af:33:12:e2:53:a8:1b:c9:01:8b:bc:00 500s dc:8c:6c:e0:51:d6:f5:54:69:ee:eb:d6:86:2c:cc:86 500s 1d:22:90:6e:16:d3:5b:c0:93:b7:c5:7e:ec:e4:ca:2b 500s 18:20:d0:99:3f:78:6d:83:ca:ef:4c:13:a5:a0:b9:c7 500s d7:5c:44:9c:b7:cc:69:f5:9b:a5:d1:72:71:6e:9c:d3 500s ab: 500s 500s exp2: 500s 45:f2:32:68:8c:70:0a:d1:52:db:cd:cc:0a:6d:0b:9a 500s ca:98:0f:a6:93:f8:cf:08:05:af:cd:d7:fd:c1:ff:2d 500s 24:0d:a4:c2:cc:0a:67:12:ae:38:c9:56:61:9d:e5:f2 500s 60:3a:9a:dd:1e:96:0b:81:86:8f:e3:5d:1b:6b:c3:b5 500s d9:17:89:05:e9:da:11:cc:a0:2e:a6:4e:11:10:71:c7 500s 53:fa:4c:cf:12:9a:2f:54:25:ac:b3:c5:c9:1e:f7:9d 500s 5d:a8:e3:3c:df:6a:ce:f2:22:b7:6f:89:b1:48:12:4c 500s ac:af:94:f3:2e:51:02:ab:8e:4a:c0:28:2c:39:20:29 500s 500s 500s 500s Public Key PIN: 500s pin-sha256:CQbwG1oy23J3TsxM/MAd4scNQBUE61ylyWsllyVyn68= 500s Public Key ID: 500s sha256:0906f01b5a32db72774ecc4cfcc01de2c70d401504eb5ca5c96b259725729faf 500s sha1:c6197340ba1ad211752c853d1c80e04cde75d9ff 500s 500s -----BEGIN RSA PRIVATE KEY----- 500s MIIEowIBAAKCAQEAmafK0KcDkW8Fx1XXktEwNFnNFYt+F4hwS8/8NJJ0t4BeaPDw 500s 3pwqGAVqANA6PfXj6hGX5VsCmDWk9SYLrzNqlUHQ3zg03Jg8tFq181no9qwX86S/ 500s tMiK6uRQbBvtHcj/Wa3ZcgioH/IXNDQ2W6/GIs3CMI1+k547eam3PJENnfod7vHY 500s wCyzzT35eUutXC99jFEyQjH4jqYE6F9F9wiojL+sRo+z1IPtSDU0Ac+ayOAclZuZ 500s dSSR5TQadZ78nQQnnHxlUzcy/+oD/ON7fAiAqbSX7IXuuYHfkzPo2j5Kz33mEldu 500s wCKpiCnhZK1QTCvZfBUJTV+pBgDb7qumdspBLQIDAQABAoIBACZNlphW2ePaKjWb 500s p4Z40Sxrql0Rjdgt8dhkO3mbfK71uBMu5MyJX1DnoJodTjd94VfLFPNesZHh5YIa 500s /tSo24vjgT7z0vGenZtT9YF5S0KaecoJqqRVTZPqYEXi3EQNg+IGHWt4zvhPsAsa 500s bOaENb8dTaguzXvc+PSGIyBdBGj5urSjy/YvZ3l6WT/ejCldUTfn3YODtMYiwNeM 500s eZMR92QzR3PWGgbF1CynAozX94xLB42VLkA8UmQxIYVykbUTTeV847OxsiSq4fMi 500s +5a7etVPA+WRzVABhVLHg8+oI+UQDtUcIBHm02VD3rjc3Qf2e6XCv8lqxCusA/u1 500s SDI//90CgYEAxvnroDiHxzyABs10jM5MBEMRk4is0p+v5jqUEBbGYk9LHyJWATPp 500s bJ08C6VIiIKNwAniy4wtL3RuGGRcmZNAHKpKZp4cgeofxN05fVyxaJxwU0ntUSR2 500s MDIEPwupWdS6cwCiQAOtlG2kSumcUwb9n7ijMonAN/PjZbD872RrmE8CgYEAxbDe 500s KLQYGoL0h9iEv+9JFZMhivV8Tkk6TNZ70xWHOwiPBfh/Xlc1LnivfXOZ8pH/oGca 500s +qwscubOmYYr4eRYhBf+nDZwFHFNWO6KL90CG2COCf0wWXvN0KBmu+MsQeVf7mec 500s b9gp2KnFuaHzM9HviUjePC1u7xjptZ1T5MHKs8MCgYEAnkZAstMk1kv+vuqBUlvr 500s Rdyfx46JgoU5o1ZnXqDvL1ZJuDtU1GIZxKcSE2VnXAcVgHOcrzMS4lOoG8kBi7wA 500s 3Ixs4FHW9VRp7uvWhizMhh0ikG4W01vAk7fFfuzkyisYINCZP3htg8rvTBOloLnH 500s 11xEnLfMafWbpdFycW6c06sCgYBF8jJojHAK0VLbzcwKbQuaypgPppP4zwgFr83X 500s /cH/LSQNpMLMCmcSrjjJVmGd5fJgOprdHpYLgYaP410ba8O12ReJBenaEcygLqZO 500s ERBxx1P6TM8Smi9UJayzxcke951dqOM832rO8iK3b4mxSBJMrK+U8y5RAquOSsAo 500s LDkgKQKBgD0r8d+Wfsi4f8W7i/7pwtawHn6C+CKR6SEyFkjaBhFJsm1KJnyH5E2d 500s 4UOdNuNeDMbgDFMJcZIN454KKwaohtPDQqh/I8HbqVWmoVE/mWSFUKziOvsVhjmU 500s 9b1fWw2mz0HB9ZoT55KocZLHtWDOOJ57Oe+KeKs0L52OVNi1KVn0 500s -----END RSA PRIVATE KEY----- 500s Public Key Info: 500s Public Key Algorithm: RSA 500s Key Security Level: Medium (2048 bits) 500s 500s modulus: 500s 00:ed:aa:b5:bf:b1:8d:eb:4b:2d:d0:33:ed:c5:20:8d 500s 33:14:e8:35:d3:86:1f:54:92:d1:0b:3f:42:a0:ba:f3 500s 96:b0:b6:1b:92:67:17:79:c0:75:7e:75:87:c2:30:54 500s c5:6d:98:6a:c2:d5:fa:31:f8:9b:38:52:11:6d:df:30 500s 1e:b3:59:75:e1:af:f0:76:5b:af:68:66:a0:0b:b7:56 500s 38:46:87:00:69:38:77:d3:96:f2:aa:b1:9d:4b:9d:47 500s 12:b3:7d:d9:6b:db:e0:b6:9e:6a:60:0c:b1:33:5c:fa 500s 4f:42:20:af:9c:44:da:27:88:79:98:50:96:58:8d:85 500s eb:28:09:30:be:28:95:e2:0c:36:dc:87:fd:a8:59:33 500s 86:e9:7e:60:cb:39:71:fd:e2:ac:92:62:c2:86:40:a6 500s 2f:b6:11:d3:2a:ef:c7:a1:3c:07:f5:ea:4e:1b:a6:42 500s bf:eb:29:be:7d:60:ee:fd:4d:5a:9c:4f:0a:06:5a:61 500s 7e:40:25:2c:2e:47:7a:88:11:19:4d:da:1e:16:f8:fb 500s c5:2c:4c:79:61:c5:e1:47:d0:97:91:61:02:fd:a5:7f 500s 99:ef:76:56:bc:0c:2a:c5:00:7f:b6:b9:de:42:33:44 500s 26:77:7b:c2:5e:5e:73:8a:41:cf:5e:d0:81:2f:9a:3e 500s b5: 500s 500s public exponent: 500s 01:00:01: 500s 500s private exponent: 500s 62:c6:10:d5:03:50:cd:1a:28:87:20:1d:d0:50:6f:fe 500s 6b:d0:fa:15:d7:e7:0b:7a:1d:01:04:a0:87:36:4b:68 500s 34:36:eb:0c:94:65:d0:46:e9:4d:ce:40:c6:b6:d9:74 500s 57:d1:01:85:c9:f2:3a:74:6c:e6:22:4d:76:11:4c:e9 500s 65:76:67:a4:8d:3f:6d:a1:3b:2c:33:82:8e:7b:fa:8c 500s 56:db:62:93:58:51:8c:91:6e:76:fc:6c:37:f1:bc:89 500s 0c:29:e0:83:90:15:3b:30:69:5b:53:cb:0d:62:b5:f0 500s dc:b5:c2:e6:3a:43:44:2c:d7:04:33:71:d8:89:b0:be 500s b6:8e:61:11:7e:33:d2:61:cb:c6:19:43:63:1f:ed:91 500s 75:be:64:86:f9:ba:f7:73:dd:4a:31:d7:79:06:a7:2f 500s 44:dd:10:9a:a9:93:47:b3:8f:75:d5:a1:a9:26:ab:d4 500s cb:a1:b5:da:da:8c:ec:68:4c:0f:fd:f9:06:95:98:36 500s 42:63:62:12:2e:99:24:27:59:3f:59:04:e7:55:1a:f4 500s ed:19:74:7d:87:66:fe:44:8f:7e:ef:49:e4:2c:29:54 500s 5d:93:ba:92:43:68:fb:1d:11:be:b5:15:9b:31:d9:91 500s 74:43:ef:c0:ef:3b:2f:c7:8b:aa:35:e8:8b:a0:e0:21 500s 500s 500s prime1: 500s 00:fa:82:ca:9e:03:b4:17:ee:14:e8:90:b4:fe:87:f5 500s c1:d7:d0:76:be:55:6d:56:22:27:d3:84:1e:68:12:f3 500s 45:f5:10:8b:f7:3d:dc:2d:0b:5f:d1:13:04:2b:0e:55 500s 1c:98:c3:b4:8a:84:05:2c:76:89:e6:d0:18:67:38:c6 500s 17:ea:a0:96:34:46:a7:91:eb:dd:3a:35:44:18:79:ff 500s d9:8c:27:26:c8:c9:aa:a7:49:8f:8f:f6:3c:56:fa:3a 500s 38:55:36:f9:94:f1:ab:49:50:78:70:68:f4:71:71:3e 500s 0a:23:3b:f7:81:42:eb:5a:ae:35:48:e8:56:9b:6c:47 500s 7d: 500s 500s prime2: 500s 00:f2:df:df:10:3d:0b:36:f8:8b:6d:e8:70:33:82:6a 500s 39:2b:f5:d5:2b:f8:7f:c5:52:a3:32:9d:ec:3f:34:91 500s 4b:2e:ec:44:5b:4a:8c:e0:f4:e0:b6:70:90:0e:e9:55 500s 3f:78:df:8d:be:c9:ed:f3:a4:37:55:6d:b7:20:63:bd 500s 7b:58:33:32:1d:d3:6a:20:ab:d5:6c:87:10:55:f1:ad 500s 55:d2:f8:cd:b4:a0:ec:f3:99:8f:12:d8:46:95:eb:67 500s a9:ed:b5:a6:0d:22:61:a5:57:ea:10:93:05:d7:31:21 500s a5:95:7e:44:6c:02:80:58:d4:c9:fe:95:28:26:1a:a9 500s 99: 500s 500s coefficient: 500s 7d:8a:99:32:ed:22:09:e1:f0:2f:64:49:73:ac:c5:93 500s 41:62:77:87:11:6c:bc:79:4c:49:de:75:f1:15:44:bc 500s 50:84:1c:a9:e6:f4:1d:f5:6c:57:4d:e7:cf:cb:cc:88 500s 43:eb:bf:86:74:47:a4:2c:c1:22:8f:74:1c:90:32:cc 500s 97:be:19:00:58:5e:3c:07:80:ea:49:fb:96:72:b7:dd 500s fd:69:5f:4a:44:07:24:d5:ee:56:6f:9f:a2:0a:b3:5a 500s 5c:06:5a:cf:4b:2b:2d:8b:f1:ea:4c:27:8d:25:e5:0e 500s 28:19:e3:6f:06:44:18:2e:36:30:fd:0c:ca:b3:6c:0a 500s 500s 500s exp1: 500s 00:f6:f8:a9:0f:3d:b1:78:82:25:24:df:3d:41:4f:03 500s 2f:d7:37:d3:49:74:69:35:a8:b8:c0:e4:19:22:1b:c4 500s b1:2c:98:e2:94:9e:ed:09:8f:94:28:48:6a:2c:94:95 500s be:7a:b1:3e:b5:ec:d0:38:f4:a8:a1:e0:78:9e:93:2f 500s 60:f6:d4:d9:20:b2:a3:93:ce:08:2d:d1:c3:cf:a9:bf 500s 5e:57:b9:65:98:40:91:b9:19:61:aa:d9:64:c5:8f:2e 500s 84:c9:26:48:ca:d9:b3:37:b5:58:f7:e1:d1:54:62:03 500s 7a:f5:1f:b2:b4:42:28:4c:1f:41:b3:1e:33:fc:48:b4 500s f5: 500s 500s exp2: 500s 0e:88:db:3e:8b:88:aa:47:81:80:98:52:6e:a2:b5:5c 500s aa:86:d1:b5:09:f0:0b:8d:00:7b:3c:fc:30:64:22:f5 500s ce:df:10:d0:2d:cb:f4:82:73:18:37:f0:47:14:2b:a7 500s da:c1:f6:27:9e:ca:00:b4:a9:23:11:a7:cd:e6:6a:26 500s 81:86:be:cf:0e:21:e1:c6:a6:c5:11:e8:26:5c:8a:35 500s 02:a5:25:1a:54:2f:19:fc:ec:95:02:20:67:44:69:35 500s c0:26:08:c3:ec:74:cf:82:4d:5d:a4:8e:ca:ec:03:c9 500s 77:02:d1:71:6d:4c:e5:04:06:fa:97:4e:89:c9:3a:b1 500s 500s 500s 500s Public Key PIN: 500s pin-sha256:+F2/o5lMHvrpHkiQ0SqohliYus2kUUQ+h3xAnglCgTY= 500s Public Key ID: 500s sha256:f85dbfa3994c1efae91e4890d12aa8865898bacda451443e877c409e09428136 500s sha1:32842a8e21552633d964bb5c2b8282d75c64862f 500s 500s -----BEGIN RSA PRIVATE KEY----- 500s MIIEowIBAAKCAQEA7aq1v7GN60st0DPtxSCNMxToNdOGH1SS0Qs/QqC685awthuS 500s Zxd5wHV+dYfCMFTFbZhqwtX6MfibOFIRbd8wHrNZdeGv8HZbr2hmoAu3VjhGhwBp 500s OHfTlvKqsZ1LnUcSs33Za9vgtp5qYAyxM1z6T0Igr5xE2ieIeZhQlliNhesoCTC+ 500s KJXiDDbch/2oWTOG6X5gyzlx/eKskmLChkCmL7YR0yrvx6E8B/XqThumQr/rKb59 500s YO79TVqcTwoGWmF+QCUsLkd6iBEZTdoeFvj7xSxMeWHF4UfQl5FhAv2lf5nvdla8 500s DCrFAH+2ud5CM0Qmd3vCXl5zikHPXtCBL5o+tQIDAQABAoIBAGLGENUDUM0aKIcg 500s HdBQb/5r0PoV1+cLeh0BBKCHNktoNDbrDJRl0EbpTc5AxrbZdFfRAYXJ8jp0bOYi 500s TXYRTOlldmekjT9toTssM4KOe/qMVttik1hRjJFudvxsN/G8iQwp4IOQFTswaVtT 500s yw1itfDctcLmOkNELNcEM3HYibC+to5hEX4z0mHLxhlDYx/tkXW+ZIb5uvdz3Uox 500s 13kGpy9E3RCaqZNHs4911aGpJqvUy6G12tqM7GhMD/35BpWYNkJjYhIumSQnWT9Z 500s BOdVGvTtGXR9h2b+RI9+70nkLClUXZO6kkNo+x0RvrUVmzHZkXRD78DvOy/Hi6o1 500s 6Iug4CECgYEA+oLKngO0F+4U6JC0/of1wdfQdr5VbVYiJ9OEHmgS80X1EIv3Pdwt 500s C1/REwQrDlUcmMO0ioQFLHaJ5tAYZzjGF+qgljRGp5Hr3To1RBh5/9mMJybIyaqn 500s SY+P9jxW+jo4VTb5lPGrSVB4cGj0cXE+CiM794FC61quNUjoVptsR30CgYEA8t/f 500s ED0LNviLbehwM4JqOSv11Sv4f8VSozKd7D80kUsu7ERbSozg9OC2cJAO6VU/eN+N 500s vsnt86Q3VW23IGO9e1gzMh3TaiCr1WyHEFXxrVXS+M20oOzzmY8S2EaV62ep7bWm 500s DSJhpVfqEJMF1zEhpZV+RGwCgFjUyf6VKCYaqZkCgYEA9vipDz2xeIIlJN89QU8D 500s L9c300l0aTWouMDkGSIbxLEsmOKUnu0Jj5QoSGoslJW+erE+tezQOPSooeB4npMv 500s YPbU2SCyo5POCC3Rw8+pv15XuWWYQJG5GWGq2WTFjy6EySZIytmzN7VY9+HRVGID 500s evUfsrRCKEwfQbMeM/xItPUCgYAOiNs+i4iqR4GAmFJuorVcqobRtQnwC40Aezz8 500s MGQi9c7fENAty/SCcxg38EcUK6fawfYnnsoAtKkjEafN5momgYa+zw4h4camxRHo 500s JlyKNQKlJRpULxn87JUCIGdEaTXAJgjD7HTPgk1dpI7K7APJdwLRcW1M5QQG+pdO 500s ick6sQKBgH2KmTLtIgnh8C9kSXOsxZNBYneHEWy8eUxJ3nXxFUS8UIQcqeb0HfVs 500s V03nz8vMiEPrv4Z0R6QswSKPdByQMsyXvhkAWF48B4DqSfuWcrfd/WlfSkQHJNXu 500s Vm+fogqzWlwGWs9LKy2L8epMJ40l5Q4oGeNvBkQYLjYw/QzKs2wK 500s -----END RSA PRIVATE KEY----- 500s Public Key Info: 500s Public Key Algorithm: EC/ECDSA 500s Key Security Level: High (256 bits) 500s 500s curve: SECP256R1 500s private key: 500s 00:d1:5d:86:7a:25:26:ba:3c:be:72:0d:c5:b3:3e:31 500s f5:77:14:8f:4d:f5:2b:21:45:c3:16:a9:ee:3d:1d:f7 500s f0: 500s 500s x: 500s 00:b2:eb:6a:a6:cb:dc:b7:b1:7d:01:68:1d:d5:b9:09 500s 0b:2d:85:b5:fa:ea:94:d2:92:58:6f:8e:12:12:a4:f6 500s ae: 500s 500s y: 500s 1f:54:4f:1f:8f:1f:e3:d9:b0:88:2b:79:f5:63:d2:7a 500s e5:2b:f8:f8:4f:04:6f:59:29:0f:73:f6:2c:f8:ac:9c 500s 500s 500s 500s Public Key PIN: 500s pin-sha256:q9+NARZG9msgShsTEpX3O1ePgz/58N7AW5uFgzHNSoM= 500s Public Key ID: 500s sha256:abdf8d011646f66b204a1b131295f73b578f833ff9f0dec05b9b858331cd4a83 500s sha1:a2f96b300db3659f5ea44a151edf326aa989dfe2 500s 500s -----BEGIN EC PRIVATE KEY----- 500s MHgCAQEEIQDRXYZ6JSa6PL5yDcWzPjH1dxSPTfUrIUXDFqnuPR338KAKBggqhkjO 500s PQMBB6FEA0IABLLraqbL3LexfQFoHdW5CQsthbX66pTSklhvjhISpPauH1RPH48f 500s 49mwiCt59WPSeuUr+PhPBG9ZKQ9z9iz4rJw= 500s -----END EC PRIVATE KEY----- 500s SUCCESS [57]../../tests/cert-tests/privkey-import.sh 500s running [58]../../tests/cert-tests/provable-dh-default.sh ... 500s Generating DH parameters (3072 bits)... 500s (might take long time) 535s Key was verified 535s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 535s Generating DH parameters (2048 bits)... 535s (might take long time) 535s SUCCESS [58]../../tests/cert-tests/provable-dh-default.sh 535s running [59]../../tests/cert-tests/provable-dh.sh ... 548s Key was verified 548s Key was verified 548s SUCCESS [59]../../tests/cert-tests/provable-dh.sh 548s running [60]../../tests/cert-tests/provable-privkey-dsa2048.sh ... 548s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 548s Generating a 2048 bit DSA private key... 548s Note that DSA keys with size over 1024 may cause incompatibility problems when used with earlier than TLS 1.2 versions. 548s 550s Key was verified 550s Key was verified 550s SUCCESS [60]../../tests/cert-tests/provable-privkey-dsa2048.sh 550s running [61]../../tests/cert-tests/provable-privkey-gen-default.sh ... 550s Generating a 3072 bit RSA private key... 552s SUCCESS [61]../../tests/cert-tests/provable-privkey-gen-default.sh 552s running [62]../../tests/cert-tests/provable-privkey-rsa2048.sh ... 552s ** Note: You may use '--sec-param Medium' instead of '--bits 2048' 552s Generating a 2048 bit RSA private key... 553s Key was verified 553s Key was verified 553s SUCCESS [62]../../tests/cert-tests/provable-privkey-rsa2048.sh 553s running [63]../../tests/cert-tests/provable-privkey.sh ... 553s Key was verified 555s Key was verified 555s Key was verified 555s Key was verified 555s Error verifying private key: Error in the private key verification; seed doesn't match. 559s Error verifying private key: Error in the private key verification; seed doesn't match. 559s Hash: SHA384 559s Seed: ab499ea55a5f4cb743434e49ca1ee3a491544309c6f59ab2cd5507de 559s SUCCESS [63]../../tests/cert-tests/provable-privkey.sh 559s running [64]../../tests/cert-tests/reject-invalid-time.sh ... 559s ../../tests/cert-tests/reject-invalid-time.sh: 35: pkg-config: not foundSKIPPED [64]../../tests/cert-tests/reject-invalid-time.sh 559s running [65]../../tests/cert-tests/reject-negative-serial.sh ... 559s 559s SKIPPED [65]../../tests/cert-tests/reject-negative-serial.sh 559s running [66]../../tests/cert-tests/rsa-pss-pad.sh ... 559s Generating a self signed certificate... 559s X.509 Certificate Information: 559s Version: 3 559s Serial Number (hex): 07 559s Validity: 559s Not Before: Sun Apr 22 00:00:00 UTC 2007 559s Not After: Sun May 25 00:00:00 UTC 2014 559s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 559s Subject Public Key Algorithm: RSA-PSS 559s Algorithm Security Level: Medium (2048 bits) 559s Parameters: 559s Hash Algorithm: SHA256 559s Salt Length: 32 559s Modulus (bits 2048): 559s 00:99:a7:ca:d0:a7:03:91:6f:05:c7:55:d7:92:d1:30 559s 34:59:cd:15:8b:7e:17:88:70:4b:cf:fc:34:92:74:b7 559s 80:5e:68:f0:f0:de:9c:2a:18:05:6a:00:d0:3a:3d:f5 559s e3:ea:11:97:e5:5b:02:98:35:a4:f5:26:0b:af:33:6a 559s 95:41:d0:df:38:34:dc:98:3c:b4:5a:b5:f3:59:e8:f6 559s ac:17:f3:a4:bf:b4:c8:8a:ea:e4:50:6c:1b:ed:1d:c8 559s ff:59:ad:d9:72:08:a8:1f:f2:17:34:34:36:5b:af:c6 559s 22:cd:c2:30:8d:7e:93:9e:3b:79:a9:b7:3c:91:0d:9d 559s fa:1d:ee:f1:d8:c0:2c:b3:cd:3d:f9:79:4b:ad:5c:2f 559s 7d:8c:51:32:42:31:f8:8e:a6:04:e8:5f:45:f7:08:a8 559s 8c:bf:ac:46:8f:b3:d4:83:ed:48:35:34:01:cf:9a:c8 559s e0:1c:95:9b:99:75:24:91:e5:34:1a:75:9e:fc:9d:04 559s 27:9c:7c:65:53:37:32:ff:ea:03:fc:e3:7b:7c:08:80 559s a9:b4:97:ec:85:ee:b9:81:df:93:33:e8:da:3e:4a:cf 559s 7d:e6:12:57:6e:c0:22:a9:88:29:e1:64:ad:50:4c:2b 559s d9:7c:15:09:4d:5f:a9:06:00:db:ee:ab:a6:76:ca:41 559s 2d 559s Exponent (bits 24): 559s 01:00:01 559s Extensions: 559s Basic Constraints (critical): 559s Certificate Authority (CA): TRUE 559s Subject Alternative Name (not critical): 559s DNSname: www.none.org 559s DNSname: www.morethanone.org 559s DNSname: www.evenmorethanone.org 559s IPAddress: 192.168.1.1 559s RFC822Name: none@none.org 559s RFC822Name: where@none.org 559s Key Purpose (not critical): 559s OCSP signing. 559s Key Usage (critical): 559s Digital signature. 559s Certificate signing. 559s Subject Key Identifier (not critical): 559s c6197340ba1ad211752c853d1c80e04cde75d9ff 559s CRL Distribution points (not critical): 559s URI: http://www.getcrl.crl/getcrl1/ 559s URI: http://www.getcrl.crl/getcrl2/ 559s URI: http://www.getcrl.crl/getcrl3/ 559s Other Information: 559s Public Key ID: 559s sha1:78a4aa159f5af1774313cb42ad9e171a974cb4d7 559s sha256:0225fb04fe3ab4c94abd6486090e785e71882e8b663541ed9b0c135ed3e168b0 559s Public Key PIN: 559s pin-sha256:AiX7BP46tMlKvWSGCQ54XnGILotmNUHtmwwTXtPhaLA= 559s 559s 559s 559s Signing certificate... 559s Generating a self signed certificate... 559s X.509 Certificate Information: 559s Version: 3 559s Serial Number (hex): 07 559s Validity: 559s Not Before: Sun Apr 22 00:00:00 UTC 2007 559s Not After: Sun May 25 00:00:00 UTC 2014 559s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 559s Subject Public Key Algorithm: RSA-PSS 559s Algorithm Security Level: Medium (2048 bits) 559s Parameters: 559s Hash Algorithm: SHA384 559s Salt Length: 48 559s Modulus (bits 2048): 559s 00:99:a7:ca:d0:a7:03:91:6f:05:c7:55:d7:92:d1:30 559s 34:59:cd:15:8b:7e:17:88:70:4b:cf:fc:34:92:74:b7 559s 80:5e:68:f0:f0:de:9c:2a:18:05:6a:00:d0:3a:3d:f5 559s e3:ea:11:97:e5:5b:02:98:35:a4:f5:26:0b:af:33:6a 559s 95:41:d0:df:38:34:dc:98:3c:b4:5a:b5:f3:59:e8:f6 559s ac:17:f3:a4:bf:b4:c8:8a:ea:e4:50:6c:1b:ed:1d:c8 559s ff:59:ad:d9:72:08:a8:1f:f2:17:34:34:36:5b:af:c6 559s 22:cd:c2:30:8d:7e:93:9e:3b:79:a9:b7:3c:91:0d:9d 559s fa:1d:ee:f1:d8:c0:2c:b3:cd:3d:f9:79:4b:ad:5c:2f 559s 7d:8c:51:32:42:31:f8:8e:a6:04:e8:5f:45:f7:08:a8 559s 8c:bf:ac:46:8f:b3:d4:83:ed:48:35:34:01:cf:9a:c8 559s e0:1c:95:9b:99:75:24:91:e5:34:1a:75:9e:fc:9d:04 559s 27:9c:7c:65:53:37:32:ff:ea:03:fc:e3:7b:7c:08:80 559s a9:b4:97:ec:85:ee:b9:81:df:93:33:e8:da:3e:4a:cf 559s 7d:e6:12:57:6e:c0:22:a9:88:29:e1:64:ad:50:4c:2b 559s d9:7c:15:09:4d:5f:a9:06:00:db:ee:ab:a6:76:ca:41 559s 2d 559s Exponent (bits 24): 559s 01:00:01 559s Extensions: 559s Basic Constraints (critical): 559s Certificate Authority (CA): TRUE 559s Subject Alternative Name (not critical): 559s DNSname: www.none.org 559s DNSname: www.morethanone.org 559s DNSname: www.evenmorethanone.org 559s IPAddress: 192.168.1.1 559s RFC822Name: none@none.org 559s RFC822Name: where@none.org 559s Key Purpose (not critical): 559s OCSP signing. 559s Key Usage (critical): 559s Digital signature. 559s Certificate signing. 559s Subject Key Identifier (not critical): 559s c6197340ba1ad211752c853d1c80e04cde75d9ff 559s CRL Distribution points (not critical): 559s URI: http://www.getcrl.crl/getcrl1/ 559s URI: http://www.getcrl.crl/getcrl2/ 559s URI: http://www.getcrl.crl/getcrl3/ 559s Other Information: 559s Public Key ID: 559s sha1:21ed33e4cca314f84914fb4247ed9763fe58f302 559s sha256:eb9076b59a55e58fb922b915b6cd200591dcb55b9a09ee1f3ac4571b00378b79 559s Public Key PIN: 559s pin-sha256:65B2tZpV5Y+5IrkVts0gBZHctVuaCe4fOsRXGwA3i3k= 559s 559s 559s 559s Signing certificate... 559s Generating a self signed certificate... 559s X.509 Certificate Information: 559s Version: 3 559s Serial Number (hex): 07 559s Validity: 559s Not Before: Sun Apr 22 00:00:00 UTC 2007 559s Not After: Sun May 25 00:00:00 UTC 2014 559s Subject: EMAIL=none@none.org,pseudonym=jackal,title=Dr.,UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 559s Subject Public Key Algorithm: RSA-PSS 559s Algorithm Security Level: Medium (2048 bits) 559s Parameters: 559s Hash Algorithm: SHA512 559s Salt Length: 64 559s Modulus (bits 2048): 559s 00:99:a7:ca:d0:a7:03:91:6f:05:c7:55:d7:92:d1:30 559s 34:59:cd:15:8b:7e:17:88:70:4b:cf:fc:34:92:74:b7 559s 80:5e:68:f0:f0:de:9c:2a:18:05:6a:00:d0:3a:3d:f5 559s e3:ea:11:97:e5:5b:02:98:35:a4:f5:26:0b:af:33:6a 559s 95:41:d0:df:38:34:dc:98:3c:b4:5a:b5:f3:59:e8:f6 559s ac:17:f3:a4:bf:b4:c8:8a:ea:e4:50:6c:1b:ed:1d:c8 559s ff:59:ad:d9:72:08:a8:1f:f2:17:34:34:36:5b:af:c6 559s 22:cd:c2:30:8d:7e:93:9e:3b:79:a9:b7:3c:91:0d:9d 559s fa:1d:ee:f1:d8:c0:2c:b3:cd:3d:f9:79:4b:ad:5c:2f 559s 7d:8c:51:32:42:31:f8:8e:a6:04:e8:5f:45:f7:08:a8 559s 8c:bf:ac:46:8f:b3:d4:83:ed:48:35:34:01:cf:9a:c8 559s e0:1c:95:9b:99:75:24:91:e5:34:1a:75:9e:fc:9d:04 559s 27:9c:7c:65:53:37:32:ff:ea:03:fc:e3:7b:7c:08:80 559s a9:b4:97:ec:85:ee:b9:81:df:93:33:e8:da:3e:4a:cf 559s 7d:e6:12:57:6e:c0:22:a9:88:29:e1:64:ad:50:4c:2b 559s d9:7c:15:09:4d:5f:a9:06:00:db:ee:ab:a6:76:ca:41 559s 2d 559s Exponent (bits 24): 559s 01:00:01 559s Extensions: 559s Basic Constraints (critical): 559s Certificate Authority (CA): TRUE 559s Subject SUCCESS [66]../../tests/cert-tests/rsa-pss-pad.sh 559s running [67]../../tests/cert-tests/sha2-dsa-test.sh ... 559s SUCCESS [67]../../tests/cert-tests/sha2-dsa-test.sh 559s running [68]../../tests/cert-tests/sha2-test.sh ... 559s Alternative Name (not critical): 559s DNSname: www.none.org 559s DNSname: www.morethanone.org 559s DNSname: www.evenmorethanone.org 559s IPAddress: 192.168.1.1 559s RFC822Name: none@none.org 559s RFC822Name: where@none.org 559s Key Purpose (not critical): 559s OCSP signing. 559s Key Usage (critical): 559s Digital signature. 559s Certificate signing. 559s Subject Key Identifier (not critical): 559s c6197340ba1ad211752c853d1c80e04cde75d9ff 559s CRL Distribution points (not critical): 559s URI: http://www.getcrl.crl/getcrl1/ 559s URI: http://www.getcrl.crl/getcrl2/ 559s URI: http://www.getcrl.crl/getcrl3/ 559s Other Information: 559s Public Key ID: 559s sha1:29b7b958d46609dc0d68d92dfee1e3ae0ada5033 559s sha256:0ffc107e1044e38328a95f8a1ccc80b026e9cb7810aa40dc68e3fe2cf66475bf 559s Public Key PIN: 559s pin-sha256:D/wQfhBE44MoqV+KHMyAsCbpy3gQqkDcaOP+LPZkdb8= 559s 559s 559s 559s Signing certificate... 559s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 559s Use --verify-profile low to apply the default verification of NORMAL priority string. 559s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 559s Use --verify-profile low to apply the default verification of NORMAL priority string. 559s SUCCESS [68]../../tests/cert-tests/sha2-test.sh 559s running [69]../../tests/cert-tests/sha3-test.sh ... 559s SUCCESS [69]../../tests/cert-tests/sha3-test.sh 559s running [70]../../tests/cert-tests/smime.sh ... 559s eContent Type: 1.2.840.113549.1.7.1 559s Signers: 559s Signer's issuer DN: CN=GnuTLS Test CA 559s Signer's serial: 4de0b4ca 559s Signing time: Wed Apr 05 11:50:32 UTC 2017 559s Signature Algorithm: RSA-SHA256 559s 559s Signature status: ok 559s SUCCESS [70]../../tests/cert-tests/smime.sh 559s running [71]../../tests/cert-tests/template-exts-test.sh ... 559s Generating a self signed certificate... 559s X.509 Certificate Information: 559s Version: 3 559s Serial Number (hex): 09 559s Validity: 559s Not Before: Sun Apr 22 00:00:00 UTC 2007 559s Not After: Sun May 25 00:00:00 UTC 2014 559s Subject: UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 559s Subject Public Key Algorithm: RSA 559s Algorithm Security Level: Low (1024 bits) 559s Modulus (bits 1024): 559s 00:a5:c6:ce:75:43:84:bf:64:9e:02:27:13:f1:03:59 559s f7:79:2d:92:ed:7c:2f:50:a4:03:f1:2d:79:b9:86:8b 559s 05:7e:3a:bb:44:aa:af:84:cf:13:98:1e:1c:4a:38:f7 559s 33:2d:7a:9f:72:d4:6b:6d:26:b0:31:37:70:10:fb:42 559s e9:d8:9d:18:65:7e:19:49:fc:05:96:04:68:83:1e:77 559s 86:bf:ed:f5:e5:12:3b:13:fe:33:18:9c:1a:7a:1d:69 559s af:47:02:60:7a:1f:b9:e8:cf:db:c8:34:30:51:96:3d 559s 8c:96:5c:00:bc:61:de:08:0f:b1:36:21:7f:a9:00:e3 559s 05 559s Exponent (bits 24): 559s 01:00:01 559s Extensions: 559s Unknown extension 1.2.3.4 (not critical): 559s ASCII: ........... 559s Hexdump: 0001020304050607aaabcd 559s Unknown extension 1.6.7.8 (not critical): 559s ASCII: ........... 559s Hexdump: 0001020304050607aaabcd 559s Unknown extension 1.2.3.4.5.6.7 (not critical): 559s ASCII: .4.Z.e.'.~.G.... 559s Hexdump: 1d34cd5ad065dc27c17e9447b0aaaca7 559s Unknown extension 1.2.3.4294967295.7 (not critical): 559s ASCII: ...A?....J.K..l|...4..~.L..&.ap.E........}!'...s.....b=...K..6Sb.4.Z.e.'.~.G.... 559s Hexdump: 178f0e413f041cc9d64af64bf3b66c7ceac6fa34a4d77ed64c968b26c761709445f40d9ca0a00091af7d212789c00b7387b1d0d7ab623dd4029d4b86db3653621d34cd5ad065dc27c17e9447b0aaaca7 559s Unknown extension 1.2.6710656.7 (not critical): 559s ASCII: .J.K..l|...4..~.L..&.ap.E........}!'...s.....b=...K..6Sb.4.Z.e.'.~.G.... 559s Hexdump: d64af64bf3b66c7ceac6fa34a4d77ed64c968b26c761709445f40d9ca0a00091af7d212789c00b7387b1d0d7ab623dd4029d4b86db3653621d34cd5ad065dc27c17e9447b0aaaca7 559s Unknown extension 1.0.1.5 (not critical): 559s ASCII: ...... 559s Hexdump: 0404cafebeaf 559s Unknown extension 1.10.11.12.13.14.15.16.17.1.5 (critical): 559s ASCII: .. 559s Hexdump: cafe 559s Unknown extension 1.0.1.5.1 (critical): 559s ASCII: ........ 559s Hexdump: 0406beafcafefafa 559s Basic Constraints (critical): 559s Certificate Authority (CA): FALSE 559s Key Purpose (not critical): 559s Email protection. 559s Subject Key Identifier (not critical): 559s 5d40adf0ce9440958b7e99941d925422ca72365f 559s Other Information: 559s Public Key ID: 559s sha1:5d40adf0ce9440958b7e99941d925422ca72365f 559s sha256:472f7ef457b70a57a585094b285fdaef7ad72553495701ecd4f2a6dcb477b50e 559s Public Key PIN: 559s pin-sha256:Ry9+9Fe3ClelhQlLKF/a73rXJVNJVwHs1PKm3LR3tQ4= 559s 559s 559s 559s Signing certificate... 559s Generating a self signed certificate... 559s X.509 Certificate Information: 559s Version: 3 559s Serial Number (hex): 09 559s Validity: 559s Not Before: Sun Apr 22 00:00:00 UTC 2007 559s Not After: Sun May 25 00:00:00 UTC 2014 559s Subject: UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 559s Subject Public Key Algorithm: RSA 559s Algorithm Security Level: Low (1024 bits) 559s Modulus (bits 1024): 559s 00:a5:c6:ce:75:43:84:bf:64:9e:02:27:13:f1:03:59 559s f7:79:2d:92:ed:7c:2f:50:a4:03:f1:2d:79:b9:86:8b 559s 05:7e:3a:bb:44:aa:af:84:cf:13:98:1e:1c:4a:38:f7 559s 33:2d:7a:9f:72:d4:6b:6d:26:b0:31:37:70:10:fb:42 559s e9:d8:9d:18:65:7e:19:49:fc:05:96:04:68:83:1e:77 559s 86:bf:ed:f5:e5:12:3b:13:fe:33:18:9c:1a:7a:1d:69 559s af:47:02:60:7a:1f:b9:e8:cf:db:c8:34:30:51:96:3d 559s 8c:96:5c:00:bc:61:de:08:0f:b1:36:21:7f:a9:00:e3 559s 05 559s Exponent (bits 24): 559s 01:00:01 559s Extensions: 559s Unknown extension 1.10.11.12.13.14.15.16.17.1.5 (critical): 559s ASCII: .. 559s Hexdump: cafe 559s Unknown extension 1.2.1.5.1 (critical): 559s ASCII: ........ 559s Hexdump: 0406beafcafefafa 559s Basic Constraints (critical): 559s Certificate Authority (CA): FALSE 559s Subject Key Identifier (not critical): 559s 5d40adf0ce9440958b7e99941d925422ca72365f 559s Other Information: 559s Public Key ID: 559s sha1:5d40adf0ce9440958b7e99941d925422ca72365f 559s sha256:472f7ef457b70a57a585094b285fdaef7ad72553495701ecd4f2a6dcb477b50e 559s Public Key PIN: 559s pin-sha256:Ry9+9Fe3ClelhQlLKF/a73rXJVNJVwHs1PKm3LR3tQ4= 559s 559s 559s 559s Signing certificate... 559s SUCCESS [71]../../tests/cert-tests/template-exts-test.sh 559s running [72]../../tests/cert-tests/template-policy-test.sh ... 559s Generating a self signed certificate... 559s X.509 Certificate Information: 559s Version: 3 559s Serial Number (hex): 0a 559s Validity: 559s Not Before: Sun Apr 22 00:00:00 UTC 2007 559s Not After: Sun May 25 00:00:00 UTC 2014 559s Subject: UID=clauper,CN=Cindy Lauper,OU=sleeping dept.,O=Koko inc.,ST=Attiki,C=GR 559s Subject Public Key Algorithm: RSA 559s Algorithm Security Level: Low (1024 bits) 559s Modulus (bits 1024): 559s 00:a5:c6:ce:75:43:84:bf:64:9e:02:27:13:f1:03:59 559s f7:79:2d:92:ed:7c:2f:50:a4:03:f1:2d:79:b9:86:8b 559s 05:7e:3a:bb:44:aa:af:84:cf:13:98:1e:1c:4a:38:f7 559s 33:2d:7a:9f:72:d4:6b:6d:26:b0:31:37:70:10:fb:42 559s e9:d8:9d:18:65:7e:19:49:fc:05:96:04:68:83:1e:77 559s 86:bf:ed:f5:e5:12:3b:13:fe:33:18:9c:1a:7a:1d:69 559s af:47:02:60:7a:1f:b9:e8:cf:db:c8:34:30:51:96:3d 559s 8c:96:5c:00:bc:61:de:08:0f:b1:36:21:7f:a9:00:e3 559s 05 559s Exponent (bits 24): 559s 01:00:01 559s Extensions: 559s Basic Constraints (critical): 559s Certificate Authority (CA): FALSE 559s Certificate Policies (not critical): 559s 2.16.840.1.101.3.2.1.48.1 559s Subject Key Identifier (not critical): 559s 5d40adf0ce9440958b7e99941d925422ca72365f 559s Other Information: 559s Public Key ID: 559s sha1:5d40adf0ce9440958b7e99941d925422ca72365f 559s sha256:472f7ef457b70a57a585094b285fdaef7ad72553495701ecd4f2a6dcb477b50e 559s Public Key PIN: 559s pin-sha256:Ry9+9Fe3ClelhQlLKF/a73rXJVNJVwHs1PKm3LR3tQ4= 559s 559s 559s 559s Signing certificate... 559s SUCCESS [72]../../tests/cert-tests/template-policy-test.sh 559s running [73]../../tests/cert-tests/template-test.sh ... 559s Running test for 8-byte time_t 559s Running test for certificate generation with --generate-self-signed 559s SUCCESS [73]../../tests/cert-tests/template-test.sh 559s running [74]../../tests/cert-tests/tlsfeature-test.sh ... 559s Generating a PKCS #10 certificate request... 559s |<3>| ASSERT: ../../../lib/x509/attributes.c[_x509_parse_attribute]:97 559s |<3>| ASSERT: ../../../lib/x509/attributes.c[_x509_parse_attribute]:163 559s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_attribute_by_oid]:515 559s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_extension_info]:1315 559s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_extension_by_oid]:1804 559s |<3>| ASSERT: ../../../lib/x509/attributes.c[_x509_parse_attribute]:97 559s |<3>| ASSERT: ../../../lib/x509/attributes.c[_x509_parse_attribute]:163 559s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_attribute_by_oid]:515 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_copy_data]:1578 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_extension_by_oid]:1804 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 559s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 559s |<3>| ASSERT: ../../../lib/x509/crq.c[gnutls_x509_crq_get_version]:614 559s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 559s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:107 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/x509_ext.c[gnutls_x509_key_purpose_get]:3029 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s Setting log level to 4 559s SUCCESS [74]../../tests/cert-tests/tlsfeature-test.sh 559s running [75]../../tests/cert-tests/x25519-and-x448.sh ... 559s SUCCESS [75]../../tests/cert-tests/x25519-and-x448.sh 559s running [76]../../tests/cert-tests/x509-duplicate-ext.sh ... 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/x509/tls_features.c[gnutls_x509_tlsfeatures_get]:93 559s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_strdatum_to_buf]:1512 559s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 559s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 559s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 559s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 559s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 559s Use --verify-profile low to apply the default verification of NORMAL priority string. 559s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 559s Use --verify-profile low to apply the default verification of NORMAL priority string. 559s import error: Duplicate extension in X.509 certificate. 559s SUCCESS [76]../../tests/cert-tests/x509-duplicate-ext.sh 559s running [77]../../tests/certtool-pkcs11.sh ... 559s Testing PKCS11 verification 559s * Initializing smart card... ok 559s * Token: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=989ada6536089b9e;token=GnuTLS-Test 559s * Writing the CA certificate... ok 559s * Verifying a certificate... ok 559s * Verifying a certificate... ok 559s * Generating a certificate... ok 559s * Writing the CA private key... ok 559s * Generating a certificate (privkey in pkcs11)... ok 559s * All tests succeeded 559s SUCCESS [77]../../tests/certtool-pkcs11.sh 559s running [78]../../tests/cfg-test.sh ... 559s SKIPPED [78]../../tests/cfg-test.sh 559s running [79]../../tests/cipher-listings.sh ... 559s Checking ciphersuite listings 560s Running without support for SSL3.0 560s checking NORMAL:-VERS-ALL:+VERS-TLS1.0:+VERS-SSL3.0:+VERS-TLS1.1 560s library is NOT in FIPS140-2 mode 560s checking NORMAL:-VERS-ALL:+VERS-TLS1.0 560s checking NORMAL:-VERS-ALL:+VERS-TLS1.1 560s checking NORMAL:-VERS-ALL:+VERS-DTLS1.0 560s checking NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+AES-128-GCM:+SIGN-ALL:+COMP-NULL 560s checking NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+CAMELLIA-256-GCM:+SIGN-ALL:+COMP-NULL 560s checking NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+CAMELLIA-256-GCM:+SIGN-ALL:+COMP-NULL:+CTYPE-OPENPGP 560s checking NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+CAMELLIA-256-GCM:+SIGN-ALL:+COMP-NULL:-CTYPE-OPENPGP 560s SUCCESS [79]../../tests/cipher-listings.sh 560s running [80]../../tests/danetool.sh ... 560s SUCCESS [80]../../tests/danetool.sh 560s running [81]../../tests/dh-fips-approved.sh ... 560s Checking with approved DH params: rfc3526-group-14-2048 560s reserved port 5724 560s RTNETLINK answers: Invalid argument 560s RTNETLINK answers: Invalid argument 560s HTTP Server listening on IPv4 0.0.0.0 port 5724...done 560s HTTP Server listening on IPv6 :: port 5724...done 561s RTNETLINK answers: Invalid argument 561s Checking with approved DH params: rfc3526-group-15-3072 561s Exiting via signal 15 561s RTNETLINK answers: Invalid argument 561s reserved port 51570 561s RTNETLINK answers: Invalid argument 561s HTTP Server listening on IPv4 0.0.0.0 port 51570...done 561s HTTP Server listening on IPv6 :: port 51570...done 562s RTNETLINK answers: Invalid argument 562s Checking with approved DH params: rfc3526-group-16-4096 562s Exiting via signal 15 562s reserved port 6727 562s RTNETLINK answers: Invalid argument 562s RTNETLINK answers: Invalid argument 562s HTTP Server listening on IPv4 0.0.0.0 port 6727...done 562s HTTP Server listening on IPv6 :: port 6727...done 563s RTNETLINK answers: Invalid argument 563s Checking with approved DH params: rfc3526-group-17-6144 563s reserved port 14476 563s Exiting via signal 15 563s RTNETLINK answers: Invalid argument 563s RTNETLINK answers: Invalid argument 563s HTTP Server listening on IPv4 0.0.0.0 port 14476...done 563s HTTP Server listening on IPv6 :: port 14476...done 564s RTNETLINK answers: Invalid argument 564s Exiting via signal 15 564s Checking with approved DH params: rfc3526-group-18-8192 564s reserved port 35864 564s RTNETLINK answers: Invalid argument 564s RTNETLINK answers: Invalid argument 564s HTTP Server listening on IPv4 0.0.0.0 port 35864...done 564s HTTP Server listening on IPv6 :: port 35864...done 565s RTNETLINK answers: Invalid argument 565s Checking with approved DH params: rfc7919-ffdhe2048 565s Exiting via signal 15 565s reserved port 46828 565s RTNETLINK answers: Invalid argument 565s RTNETLINK answers: Invalid argument 565s HTTP Server listening on IPv4 0.0.0.0 port 46828...done 565s HTTP Server listening on IPv6 :: port 46828...done 566s RTNETLINK answers: Invalid argument 566s Checking with approved DH params: rfc7919-ffdhe3072 566s Exiting via signal 15 566s reserved port 61782 566s RTNETLINK answers: Invalid argument 566s RTNETLINK answers: Invalid argument 566s HTTP Server listening on IPv4 0.0.0.0 port 61782...done 566s HTTP Server listening on IPv6 :: port 61782...done 567s RTNETLINK answers: Invalid argument 567s Checking with approved DH params: rfc7919-ffdhe4096 567s Exiting via signal 15 567s reserved port 63187 567s RTNETLINK answers: Invalid argument 567s RTNETLINK answers: Invalid argument 567s HTTP Server listening on IPv4 0.0.0.0 port 63187...done 567s HTTP Server listening on IPv6 :: port 63187...done 568s RTNETLINK answers: Invalid argument 568s Exiting via signal 15 568s Checking with approved DH params: rfc7919-ffdhe6144 568s reserved port 56061 568s RTNETLINK answers: Invalid argument 568s RTNETLINK answers: Invalid argument 568s HTTP Server listening on IPv4 0.0.0.0 port 56061...done 568s HTTP Server listening on IPv6 :: port 56061...done 569s RTNETLINK answers: Invalid argument 569s Checking with approved DH params: rfc7919-ffdhe8192 569s Exiting via signal 15 569s reserved port 52202 569s RTNETLINK answers: Invalid argument 569s RTNETLINK answers: Invalid argument 569s HTTP Server listening on IPv4 0.0.0.0 port 52202...done 569s HTTP Server listening on IPv6 :: port 52202...done 570s RTNETLINK answers: Invalid argument 570s Exiting via signal 15 570s Checking with non-approved DH params: rfc2409-group-2-1024 570s reserved port 44072 570s RTNETLINK answers: Invalid argument 570s RTNETLINK answers: Invalid argument 570s HTTP Server listening on IPv4 0.0.0.0 port 44072...done 570s HTTP Server listening on IPv6 :: port 44072...done 571s RTNETLINK answers: Invalid argument 571s Checking with non-approved DH params: rfc3526-group-5-1536 571s Exiting via signal 15 571s reserved port 39514 571s RTNETLINK answers: Invalid argument 571s RTNETLINK answers: Invalid argument 571s HTTP Server listening on IPv4 0.0.0.0 port 39514...done 571s HTTP Server listening on IPv6 :: port 39514...done 572s RTNETLINK answers: Invalid argument 572s Checking with non-approved DH params: rfc5054-1024 572s Exiting via signal 15 572s reserved port 43799 572s RTNETLINK answers: Invalid argument 572s RTNETLINK answers: Invalid argument 572s HTTP Server listening on IPv4 0.0.0.0 port 43799...done 572s HTTP Server listening on IPv6 :: port 43799...done 573s RTNETLINK answers: Invalid argument 573s Checking with non-approved DH params: rfc5054-1536 573s Exiting via signal 15 573s reserved port 47865 573s RTNETLINK answers: Invalid argument 573s RTNETLINK answers: Invalid argument 573s HTTP Server listening on IPv4 0.0.0.0 port 47865...done 573s HTTP Server listening on IPv6 :: port 47865...done 574s RTNETLINK answers: Invalid argument 574s Checking with non-approved DH params: rfc5054-2048 574s Exiting via signal 15 574s reserved port 29777 574s RTNETLINK answers: Invalid argument 574s RTNETLINK answers: Invalid argument 574s HTTP Server listening on IPv4 0.0.0.0 port 29777...done 574s HTTP Server listening on IPv6 :: port 29777...done 575s RTNETLINK answers: Invalid argument 575s Checking with non-approved DH params: rfc5054-3072 575s Exiting via signal 15 575s reserved port 26916 575s RTNETLINK answers: Invalid argument 575s RTNETLINK answers: Invalid argument 575s HTTP Server listening on IPv4 0.0.0.0 port 26916...done 575s HTTP Server listening on IPv6 :: port 26916...done 576s RTNETLINK answers: Invalid argument 576s Checking with non-approved DH params: rfc5054-4096 576s Exiting via signal 15 576s reserved port 52108 576s RTNETLINK answers: Invalid argument 576s RTNETLINK answers: Invalid argument 576s HTTP Server listening on IPv4 0.0.0.0 port 52108...done 576s HTTP Server listening on IPv6 :: port 52108...done 577s RTNETLINK answers: Invalid argument 577s Checking with non-approved DH params: rfc5054-6144 577s Exiting via signal 15 577s reserved port 60631 577s RTNETLINK answers: Invalid argument 577s RTNETLINK answers: Invalid argument 577s HTTP Server listening on IPv4 0.0.0.0 port 60631...done 577s HTTP Server listening on IPv6 :: port 60631...done 578s RTNETLINK answers: Invalid argument 578s Checking with non-approved DH params: rfc5054-8192 578s Exiting via signal 15 578s reserved port 32998 578s RTNETLINK answers: Invalid argument 578s RTNETLINK answers: Invalid argument 578s HTTP Server listening on IPv4 0.0.0.0 port 32998...done 578s HTTP Server listening on IPv6 :: port 32998...done 579s RTNETLINK answers: Invalid argument 579s Exiting via signal 15 579s Checking with non-approved DH params: rfc5114-group-22-1024 579s reserved port 9323 579s RTNETLINK answers: Invalid argument 579s RTNETLINK answers: Invalid argument 579s HTTP Server listening on IPv4 0.0.0.0 port 9323...done 579s HTTP Server listening on IPv6 :: port 9323...done 580s RTNETLINK answers: Invalid argument 580s Checking with non-approved DH params: rfc5114-group-23-2048 580s Exiting via signal 15 580s reserved port 53458 580s RTNETLINK answers: Invalid argument 580s RTNETLINK answers: Invalid argument 580s HTTP Server listening on IPv4 0.0.0.0 port 53458...done 580s HTTP Server listening on IPv6 :: port 53458...done 581s RTNETLINK answers: Invalid argument 581s Checking with non-approved DH params: rfc5114-group-24-2048 581s Exiting via signal 15 581s reserved port 12841 581s RTNETLINK answers: Invalid argument 581s RTNETLINK answers: Invalid argument 581s HTTP Server listening on IPv4 0.0.0.0 port 12841...done 581s HTTP Server listening on IPv6 :: port 12841...done 582s RTNETLINK answers: Invalid argument 582s unreserved port 12841 582s Exiting via signal 15 582s SUCCESS [81]../../tests/dh-fips-approved.sh 582s running [82]../../tests/fastopen.sh ... 582s Checking Fast open 582s reserved port 46443 582s RTNETLINK answers: Invalid argument 582s RTNETLINK answers: Invalid argument 583s Echo Server listening on IPv4 0.0.0.0 port 46443...done 583s Echo Server listening on IPv6 :: port 46443...done 583s RTNETLINK answers: Invalid argument 584s Processed 1 CA certificate(s). 584s Resolving 'localhost:46443'... 584s Connecting to '::1:46443' (TFO)... 584s - Certificate type: X.509 584s - Got a certificate list of 1 certificates. 584s - Certificate[0] info: 584s - subject `CN=GnuTLS Test Server (RSA certificate)', issuer `CN=GnuTLS Test CA', serial 0x4de0b4ca, RSA key 2432 bits, signed using RSA-SHA256, activated `2011-05-28 08:39:39 UTC', expires `2038-10-12 08:39:40 UTC', pin-sha256="ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE=" 584s Public Key ID: 584s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 584s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 584s Public Key PIN: 584s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 584s 584s - Status: The certificate is trusted. 584s - Successfully sent 0 certificate(s) to server. 584s - Description: (TLS1.2-X.509)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) 584s - Session ID: CB:F9:C3:01:6D:A4:FE:CC:4B:E3:89:D7:DF:03:92:5D:A8:CC:26:9D:6F:D3:F7:BA:A9:0F:90:DE:46:70:4C:01 584s - Options: extended master secret, safe renegotiation, 584s - Handshake was completed 584s 584s - Simple Client Mode: 584s 584s - Peer has closed the GnuTLS connection 584s Processed 1 CA certificate(s). 584s Resolving 'localhost:46443'... 584s Connecting to '::1:46443' (TFO)... 584s - Successfully sent 0 certificate(s) to server. 584s - Server has requested a certificate. 584s - Certificate type: X.509 584s - Got a certificate list of 1 certificates. 584s - Certificate[0] info: 584s - subject `CN=GnuTLS Test Server (RSA certificate)', issuer `CN=GnuTLS Test CA', serial 0x4de0b4ca, RSA key 2432 bits, signed using RSA-SHA256, activated `2011-05-28 08:39:39 UTC', expires `2038-10-12 08:39:40 UTC', pin-sha256="ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE=" 584s Public Key ID: 584s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 584s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 584s Public Key PIN: 584s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 584s 584s - Status: The certificate is trusted. 584s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) 584s - Session ID: 2A:8D:1F:58:37:6E:F4:5C:9D:91:23:9C:2A:7B:2B:6E:EA:44:87:D1:2D:EB:10:D5:0E:9A:55:AA:2C:44:AE:2E 584s - Options: 584s - Handshake was completed 584s 584s - Simple Client Mode: 584s 584s - Peer has closed the GnuTLS connection 584s Exiting via signal 15 584s unreserved port 46443 584s SUCCESS [82]../../tests/fastopen.sh 584s running [83]../../tests/gnutls-cli-invalid-crl.sh ... 584s Checking whether connecting to a server but with an invalid CRL provided, returns the expected error 584s reserved port 61657 584s RTNETLINK answers: Invalid argument 584s RTNETLINK answers: Invalid argument 584s Echo Server listening on IPv4 0.0.0.0 port 61657...done 584s Echo Server listening on IPv6 :: port 61657...done 585s RTNETLINK answers: Invalid argument 585s Exiting via signal 15 585s Error setting the x509 CRL file: Error in the CRL verification. 585s unreserved port 61657 585s SUCCESS [83]../../tests/gnutls-cli-invalid-crl.sh 585s running [84]../../tests/gnutls-cli-rawpk.sh ... 585s Checking whether we can connect with raw public-keys 585s * testing server X.509, client RAW 585s reserved port 25454 585s RTNETLINK answers: Invalid argument 585s RTNETLINK answers: Invalid argument 585s Echo Server listening on IPv4 0.0.0.0 port 25454...done 585s Echo Server listening on IPv6 :: port 25454...done 586s RTNETLINK answers: Invalid argument 586s - Handshake was completed 586s - Handshake was completed 586s Error in handshake: Certificate is required. 586s *** Received alert [116]: Certificate is required 586s * testing server RAW, client none 586s Exiting via signal 15 586s reserved port 20318 586s RTNETLINK answers: Invalid argument 586s RTNETLINK answers: Invalid argument 586s Echo Server listening on IPv4 0.0.0.0 port 20318...done 586s Echo Server listening on IPv6 :: port 20318...done 587s RTNETLINK answers: Invalid argument 587s - Handshake was completed 587s - Handshake was completed 587s Error in handshake: No supported cipher suites have been found. 587s * testing server RAW, client RAW 587s Exiting via signal 15 587s reserved port 59905 587s RTNETLINK answers: Invalid argument 587s RTNETLINK answers: Invalid argument 587s Echo Server listening on IPv4 0.0.0.0 port 59905...done 587s Echo Server listening on IPv6 :: port 59905...done 588s RTNETLINK answers: Invalid argument 588s - Handshake was completed 588s - Handshake was completed 588s Error in handshake: No supported cipher suites have been found. 588s * testing server X.509+RAW, client none 588s Exiting via signal 15 588s reserved port 4493 588s RTNETLINK answers: Invalid argument 588s RTNETLINK answers: Invalid argument 588s Echo Server listening on IPv4 0.0.0.0 port 4493...done 588s Echo Server listening on IPv6 :: port 4493...done 589s RTNETLINK answers: Invalid argument 589s - Handshake was completed 589s - Handshake was completed 589s - Handshake was completed 589s - Handshake was completed 589s Exiting via signal 15 589s unreserved port 4493 589s SUCCESS [84]../../tests/gnutls-cli-rawpk.sh 589s running [85]../../tests/gnutls-cli-resume.sh ... 589s reserved port 47731 589s RTNETLINK answers: Invalid argument 589s RTNETLINK answers: Invalid argument 589s Echo Server listening on IPv4 0.0.0.0 port 47731...done 589s Echo Server listening on IPv6 :: port 47731...done 590s RTNETLINK answers: Invalid argument 590s Checking whether session resumption works reliably under TLS1.3 590s resume.4631-0.tmp:*** This is a resumed session 591s resume.4631-1.tmp:*** This is a resumed session 591s Exiting via signal 15 591s resume.4631-4.tmp:*** This is a resumed session 591s resume.4631-2.tmp:*** This is a resumed session 591s resume.4631-5.tmp:*** This is a resumed session 591s resume.4631-3.tmp:*** This is a resumed session 591s resume.4631-6.tmp:*** This is a resumed session 591s resume.4631-8.tmp:*** This is a resumed session 591s resume.4631-7.tmp:*** This is a resumed session 591s resume.4631-9.tmp:*** This is a resumed session 591s Checking whether session resumption works reliably under TLS1.2 591s resume.4631-2.tmp:*** This is a resumed session 591s resume.4631-4.tmp:*** This is a resumed session 591s resume.4631-0.tmp:*** This is a resumed session 591s resume.4631-3.tmp:*** This is a resumed session 591s resume.4631-1.tmp:*** This is a resumed session 591s resume.4631-8.tmp:*** This is a resumed session 591s resume.4631-5.tmp:*** This is a resumed session 591s resume.4631-6.tmp:*** This is a resumed session 591s resume.4631-9.tmp:*** This is a resumed session 591s resume.4631-7.tmp:*** This is a resumed session 591s Checking whether session resumption works reliably under TLS1.2 (no tickets) 591s resume.4631-0.tmp:*** This is a resumed session 591s resume.4631-5.tmp:*** This is a resumed session 591s resume.4631-1.tmp:*** This is a resumed session 591s resume.4631-2.tmp:*** This is a resumed session 591s resume.4631-3.tmp:*** This is a resumed session 591s resume.4631-4.tmp:*** This is a resumed session 591s resume.4631-7.tmp:*** This is a resumed session 591s resume.4631-8.tmp:*** This is a resumed session 591s resume.4631-9.tmp:*** This is a resumed session 591s resume.4631-6.tmp:*** This is a resumed session 591s unreserved port 47731 591s SUCCESS [85]../../tests/gnutls-cli-resume.sh 591s running [86]../../tests/gnutls-cli-save-data.sh ... 591s Checking whether saving OCSP response and cert succeeds 591s reserved port 3350 591s RTNETLINK answers: Invalid argument 591s RTNETLINK answers: Invalid argument 591s |<3>| ASSERT: ../../../lib/x509/x509_ext.c[gnutls_subject_alt_names_get]:107 591s |<3>| ASSERT: ../../../lib/x509/x509.c[get_alt_name]:2012 591s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 591s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1563 591s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1577 591s |<2>| The OCSP response is old 591s |<3>| ASSERT: ../../../lib/x509/ocsp.c[_gnutls_ocsp_get_validity]:2518 591s Echo Server listening on IPv4 0.0.0.0 port 3350...done 591s Echo Server listening on IPv6 :: port 3350...done 591s RTNETLINK answers: Invalid argument 591s |<5>| REC[0x2aa2cf97b00]: Allocating epoch #0 591s |<2>| added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 591s |<5>| REC[0x2aa2cf97b00]: Allocating epoch #1 591s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 591s |<5>| REC[0x2aa2cf97b00]: SSL 3.3 Handshake packet received. Epoch 0, length: 364 591s |<5>| REC[0x2aa2cf97b00]: Expected Packet Handshake(22) 591s |<5>| REC[0x2aa2cf97b00]: Received Packet Handshake(22) with length: 364 591s |<5>| REC[0x2aa2cf97b00]: Decrypted Packet[0] Handshake(22) with length: 364 591s |<4>| HSK[0x2aa2cf97b00]: CLIENT HELLO (1) was received. Length 360[360], frag offset 0, frag length: 360, sequence: 0 591s |<4>| HSK[0x2aa2cf97b00]: Client's version: 3.3 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Supported Versions/43' (5 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Found version: 3.4 591s |<4>| EXT[0x2aa2cf97b00]: Found version: 3.3 591s |<4>| EXT[0x2aa2cf97b00]: Negotiated version: 3.4 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Encrypt-then-MAC/22' (0 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Extended Master Secret/23' (0 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Record Size Limit/28' (2 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: record_size_limit 16385 negotiated 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Session Ticket/35' (0 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Supported Groups/10' (22 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Received group SECP256R1 (0x17) 591s |<4>| EXT[0x2aa2cf97b00]: Received group SECP384R1 (0x18) 591s |<4>| EXT[0x2aa2cf97b00]: Received group SECP521R1 (0x19) 591s |<4>| EXT[0x2aa2cf97b00]: Received group X25519 (0x1d) 591s |<4>| EXT[0x2aa2cf97b00]: Received group X448 (0x1e) 591s |<4>| EXT[0x2aa2cf97b00]: Received group FFDHE2048 (0x100) 591s |<4>| EXT[0x2aa2cf97b00]: Received group FFDHE3072 (0x101) 591s |<4>| EXT[0x2aa2cf97b00]: Received group FFDHE4096 (0x102) 591s |<4>| EXT[0x2aa2cf97b00]: Received group FFDHE6144 (0x103) 591s |<4>| EXT[0x2aa2cf97b00]: Received group FFDHE8192 (0x104) 591s |<4>| EXT[0x2aa2cf97b00]: Selected group SECP256R1 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Signature Algorithms/13' (34 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (4.1) RSA-SHA256 591s unreserved port 3350 591s SUCCESS [86]../../tests/gnutls-cli-save-data.sh 591s running [87]../../tests/gnutls-cli-self-signed.sh ... 591s Checking whether connecting to a self signed certificate returns the expected error 591s reserved port 34964 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (8.9) RSA-PSS-SHA256 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (8.4) RSA-PSS-RSAE-SHA256 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (4.3) ECDSA-SECP256R1-SHA256 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (8.7) EdDSA-Ed25519 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (5.1) RSA-SHA384 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (8.10) RSA-PSS-SHA384 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (8.5) RSA-PSS-RSAE-SHA384 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (5.3) ECDSA-SECP384R1-SHA384 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (8.8) EdDSA-Ed448 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (6.1) RSA-SHA512 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (8.11) RSA-PSS-SHA512 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (8.6) RSA-PSS-RSAE-SHA512 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (6.3) ECDSA-SECP521R1-SHA512 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (2.1) RSA-SHA1 591s |<4>| EXT[0x2aa2cf97b00]: rcvd signature algo (2.3) ECDSA-SHA1 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'PSK Key Exchange Modes/45' (3 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: PSK KE mode 01 received 591s |<4>| EXT[0x2aa2cf97b00]: PSK KE mode 00 received 591s |<2>| checking 13.02 (GNUTLS_AES_256_GCM_SHA384) for compatibility 591s |<3>| ASSERT: ../../../lib/ext/server_name.c[gnutls_server_name_get]:234 591s |<4>| HSK[0x2aa2cf97b00]: Requested server name: '' 591s |<4>| HSK[0x2aa2cf97b00]: checking compat of GNUTLS_AES_256_GCM_SHA384 with certificate[0] (RSA/X.509) 591s |<4>| checking cert compat with RSA-SHA256 591s |<3>| ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 591s |<4>| Signature algorithm RSA-SHA256 is not enabled 591s |<4>| checking cert compat with RSA-PSS-SHA256 591s |<4>| checking cert compat with RSA-PSS-RSAE-SHA256 591s |<4>| Selected signature algorithm: RSA-PSS-RSAE-SHA256 591s |<2>| Selected (RSA) cert based on ciphersuite 13.2: GNUTLS_AES_256_GCM_SHA384 591s |<4>| HSK[0x2aa2cf97b00]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 591s |<4>| HSK[0x2aa2cf97b00]: Selected version TLS1.3 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'OCSP Status Request/5' (5 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: OCSP status was requested 591s |<4>| EXT[0x2aa2cf97b00]: Parsing extension 'Key Share/51' (107 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Received key share for SECP256R1 591s |<4>| HSK[0x2aa2cf97b00]: Selected group SECP256R1 (2) 591s |<2>| EXT[0x2aa2cf97b00]: server generated SECP256R1 shared key 591s |<4>| HSK[0x2aa2cf97b00]: Safe renegotiation succeeded 591s |<4>| HSK[0x2aa2cf97b00]: SessionID: 562d520fab162044bf58d7021ad195ac05d796a32b4a5b1f1f54a269d7782b10 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (OCSP Status Request/5) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Client Certificate Type/19) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Server Certificate Type/20) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Supported Groups/10) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Supported EC Point Formats/11) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Signature Algorithms/13) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (SRTP/14) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (ALPN/16) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Encrypt-then-MAC/22) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Extended Master Secret/23) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Session Ticket/35) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Key Share/51) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: sending key share for SECP256R1 591s |<4>| EXT[0x2aa2cf97b00]: Sending extension Key Share/51 (69 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Supported Versions/43) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Sending extension Supported Versions/43 (2 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Post Handshake Auth/49) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Safe Renegotiation/65281) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Server Name Indication/0) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Cookie/44) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Early Data/42) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (PSK Key Exchange Modes/45) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Record Size Limit/28) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Maximum Record Size/1) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Compress Certificate/27) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (ClientHello Padding/21) for 'TLS 1.3 server hello' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Pre Shared Key/41) for 'TLS 1.3 server hello' 591s |<4>| HSK[0x2aa2cf97b00]: SERVER HELLO was queued [155 bytes] 591s |<5>| REC[0x2aa2cf97b00]: Preparing Packet Handshake(22) with length: 155 and min pad: 0 591s |<5>| REC[0x2aa2cf97b00]: Sent Packet[1] Handshake(22) in epoch 0 and length: 160 591s |<5>| REC[0x2aa2cf97b00]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0 591s |<5>| REC[0x2aa2cf97b00]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6 591s |<4>| REC[0x2aa2cf97b00]: Sent ChangeCipherSpec 591s |<5>| REC[0x2aa2cf97b00]: Initializing epoch #1 591s |<5>| REC[0x2aa2cf97b00]: Epoch #1 ready 591s |<4>| HSK[0x2aa2cf97b00]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (OCSP Status Request/5) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Client Certificate Type/19) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Server Certificate Type/20) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Supported Groups/10) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Supported EC Point Formats/11) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Signature Algorithms/13) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (SRTP/14) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (ALPN/16) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Encrypt-then-MAC/22) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Extended Master Secret/23) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Session Ticket/35) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Key Share/51) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Supported Versions/43) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Post Handshake Auth/49) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Safe Renegotiation/65281) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Server Name Indication/0) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Cookie/44) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Early Data/42) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (PSK Key Exchange Modes/45) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Record Size Limit/28) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Sending extension Record Size Limit/28 (2 bytes) 591s |<4>| EXT[0x2aa2cf97b00]: Preparing extension (Maximum Record Size/1) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Compress Certificate/27) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (ClientHello Padding/21) for 'encrypted extensions' 591s |<4>| EXT[0x2aa2cf97b00]: Not sending extension (Pre Shared Key/41) for 'encrypted extensions' 591s |<4>| HSK[0x2aa2cf97b00]: ENCRYPTED EXTENSIONS was queued [12 bytes] 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (4.1) RSA-SHA256 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (8.9) RSA-PSS-SHA256 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (4.3) ECDSA-SHA256 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (8.7) EdDSA-Ed25519 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (5.1) RSA-SHA384 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (8.10) RSA-PSS-SHA384 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (5.3) ECDSA-SHA384 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (8.8) EdDSA-Ed448 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (6.1) RSA-SHA512 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (8.11) RSA-PSS-SHA512 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (6.3) ECDSA-SHA512 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (2.1) RSA-SHA1 591s |<4>| EXT[0x2aa2cf97b00]: sent signature algo (2.3) ECDSA-SHA1 591s |<4>| HSK[0x2aa2cf97b00]: CERTIFICATE REQUEST was queued [49 bytes] 591s |<4>| HSK[0x2aa2cf97b00]: CERTIFICATE was queued [2193 bytes] 591s |<4>| checking cert compat with RSA-SHA256 591s |<3>| ASSERT: ../../../lib/ext/signature.c[_gnutls_session_sign_algo_enabled]:428 591s |<4>| Signature algorithm RSA-SHA256 is not enabled 591s |<4>| checking cert compat with RSA-PSS-SHA256 591s |<4>| checking cert compat with RSA-PSS-RSAE-SHA256 591s |<4>| HSK[0x2aa2cf97b00]: signing TLS 1.3 handshake data: using RSA-PSS-RSAE-SHA256 and PRF: SHA384 591s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 591s |<4>| HSK[0x2aa2cf97b00]: CERTIFICATE VERIFY was queued [312 bytes] 591s |<4>| HSK[0x2aa2cf97b00]: sending finished 591s |<4>| HSK[0x2aa2cf97b00]: FINISHED was queued [52 bytes] 591s |<5>| REC[0x2aa2cf97b00]: Preparing Packet Handshake(22) with length: 12 and min pad: 0 591s |<5>| REC[0x2aa2cf97b00]: Sent Packet[1] Handshake(22) in epoch 1 and length: 34 591s |<5>| REC[0x2aa2cf97b00]: Preparing Packet Handshake(22) with length: 49 and min pad: 0 591s |<5>| REC[0x2aa2cf97b00]: Sent Packet[2] Handshake(22) in epoch 1 and length: 71 591s |<5>| REC[0x2aa2cf97b00]: Preparing Packet Handshake(22) with length: 2193 and min pad: 0 591s |<5>| REC[0x2aa2cf97b00]: Sent Packet[3] Handshake(22) in epoch 1 and length: 2215 591s |<5>| REC[0x2aa2cf97b00]: Preparing Packet Handshake(22) with length: 312 and min pad: 0 591s |<5>| REC[0x2aa2cf97b00]: Sent Packet[4] Handshake(22) in epoch 1 and length: 334 591s |<5>| REC[0x2aa2cf97b00]: Preparing Packet Handshake(22) with length: 52 and min pad: 0 591s |<5>| REC[0x2aa2cf97b00]: Sent Packet[5] Handshake(22) in epoch 1 and length: 74 591s |<1>| Got OCSP response with an unrelated certificate. 591s *** Fatal error: Error in the certificate. 591s Exiting via signal 15 591s RTNETLINK answers: Invalid argument 591s RTNETLINK answers: Invalid argument 591s Echo Server listening on IPv4 0.0.0.0 port 34964...done 591s Echo Server listening on IPv6 :: port 34964...done 592s RTNETLINK answers: Invalid argument 592s Error in handshake: A TLS fatal alert has been received. 592s Exiting via signal 15 592s - Status: The certificate is NOT trusted. The certificate issuer is unknown. 592s unreserved port 34964 592s SUCCESS [87]../../tests/gnutls-cli-self-signed.sh 592s running [88]../../tests/logfile-option.sh ... 592s Checking whether logfile option works. 592s reserved port 47836 592s RTNETLINK answers: Invalid argument 592s RTNETLINK answers: Invalid argument 592s Warning: no private key and certificate pairs were set. 592s Echo Server listening on IPv4 0.0.0.0 port 47836...done 592s Echo Server listening on IPv6 :: port 47836...done 593s RTNETLINK answers: Invalid argument 593s Exiting via signal 15 593s Find the expected output! 593s reserved port 60559 593s RTNETLINK answers: Invalid argument 593s RTNETLINK answers: Invalid argument 593s Warning: no private key and certificate pairs were set. 593s Echo Server listening on IPv4 0.0.0.0 port 60559...done 593s Echo Server listening on IPv6 :: port 60559...done 594s RTNETLINK answers: Invalid argument 595s Exiting via signal 15 595s Found the expected output! 595s x509 functionality test 595s reserved port 31840 595s RTNETLINK answers: Invalid argument 595s RTNETLINK answers: Invalid argument 595s Echo Server listening on IPv4 0.0.0.0 port 31840...done 595s Echo Server listening on IPv6 :: port 31840...done 596s RTNETLINK answers: Invalid argument 596s Exiting via signal 15 596s Find the expected output! 596s reserved port 51240 596s RTNETLINK answers: Invalid argument 596s RTNETLINK answers: Invalid argument 596s Echo Server listening on IPv4 0.0.0.0 port 51240...done 596s Echo Server listening on IPv6 :: port 51240...done 597s RTNETLINK answers: Invalid argument 597s Exiting via signal 15 597s Found the expected output! 597s unreserved port 51240 597s SUCCESS [88]../../tests/logfile-option.sh 597s running [89]../../tests/long-crl.sh ... 597s SUCCESS [89]../../tests/long-crl.sh 597s running [90]../../tests/ocsp-tests/ocsp-load-chain.sh ... 597s OCSP Response Information: 597s Response Status: Successful 597s Response Type: Basic OCSP Response 597s Version: 1 597s Responder Key ID: b1a06212090b2c833135f92f8b3a8e849de471fe 597s Produced At: Fri Jun 16 13:54:55 UTC 2017 597s Responses: 597s Certificate ID: 597s Hash Algorithm: SHA1 597s Issuer Name Hash: d1b1648b8c9f0dd16ba38acd2b5017d5f9cfc064 597s Issuer Key Hash: 5f60cf619055df8443148a602ab2f57af44318ef 597s Serial Number: 1d4abdaa78d09afe799d41bceb7a7662 597s Certificate Status: good 597s This Update: Fri Jun 16 13:54:55 UTC 2017 597s Next Update: Fri Jun 23 13:54:55 UTC 2017 597s Extensions: 597s Signature Algorithm: RSA-SHA1 597s 597s 597s Verifying OCSP Response: Success. 597s OCSP Response Information: 597s Response Status: Successful 597s Response Type: Basic OCSP Response 597s Version: 1 597s Responder Key ID: b1a06212090b2c833135f92f8b3a8e849de471fe 597s Produced At: Fri Jun 16 13:54:55 UTC 2017 597s Responses: 597s Certificate ID: 597s Hash Algorithm: SHA1 597s Issuer Name Hash: d1b1648b8c9f0dd16ba38acd2b5017d5f9cfc064 597s Issuer Key Hash: 5f60cf619055df8443148a602ab2f57af44318ef 597s Serial Number: 1d4abdaa78d09afe799d41bceb7a7662 597s Certificate Status: good 597s This Update: Fri Jun 16 13:54:55 UTC 2017 597s Next Update: Fri Jun 23 13:54:55 UTC 2017 597s Extensions: 597s Signature Algorithm: RSA-SHA1 597s 597s 597s Verifying OCSP Response: Success. 597s |<3>| ASSERT: ../../../lib/x509/dn.c[_gnutls_x509_get_dn]:211 597s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1577 597s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_x509_get_raw_field2]:1536 597s |<3>| ASSERT: ../../../lib/x509/ocsp.c[find_signercert]:1914 597s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_x509_der_encode]:876 597s |<3>| checking whether signed against: subject `CN=Symantec Class 3 ECC 256 bit SSL CA - G2 OCSP Responder', issuer `CN=Symantec Class 3 ECC 256 bit SSL CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=US', serial 0x3c75f538018e89f764ae24298f515602, EC/ECDSA key 256 bits, signed using ECDSA-SHA256, activated `2017-04-15 00:00:00 UTC', expires `2017-07-14 23:59:59 UTC', pin-sha256="zcJoPfD6XQLwGkAFiLJCW9pX2yt3g/GW4ZrLtyshdcE=" 597s |<2>| checking key ID against SPK identifier 597s |<3>| ASSERT: ../../../lib/x509/name_constraints.c[gnutls_x509_crt_get_name_constraints]:592 597s |<3>| ocsp signer: subject `CN=Symantec Class 3 ECC 256 bit SSL CA - G2 OCSP Responder', issuer `CN=Symantec Class 3 ECC 256 bit SSL CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=US', serial 0x3c75f538018e89f764ae24298f515602, EC/ECDSA key 256 bits, signed using ECDSA-SHA256, activated `2017-04-15 00:00:00 UTC', expires `2017-07-14 23:59:59 UTC', pin-sha256="zcJoPfD6XQLwGkAFiLJCW9pX2yt3g/GW4ZrLtyshdcE=" 597s OCSP Response Information: 597s Response Status: Successful 597s Response Type: Basic OCSP Response 597s Version: 1 597s Responder Key ID: df4e8dc89de7896a6a4a7f5716a03b881e640565 597s Produced At: Fri Jun 23 23:57:22 UTC 2017 597s Responses: 597s Certificate ID: 597s Hash Algorithm: SHA1 597s Issuer Name Hash: 7d14ca1e3e08269e1a333d0e0e6ff31361215eea 597s Issuer Key Hash: 25f08ae14b7ad901950aedc653f18c781fd9f3f8 597s Serial Number: 63b9ec7eff988335f113d67d2f864d35 597s Certificate Status: good 597s This Update: Fri Jun 23 23:57:22 UTC 2017 597s Next Update: Fri Jun 30 23:57:22 UTC 2017 597s Extensions: 597s Signature Algorithm: ECDSA-SHA256 597s 597s 597s Verifying OCSP Response: Success. 597s SUCCESS [90]../../tests/ocsp-tests/ocsp-load-chain.sh 597s running [91]../../tests/ocsp-tests/ocsp-must-staple-connection.sh ... 597s SKIPPED [91]../../tests/ocsp-tests/ocsp-must-staple-connection.sh 597s running [92]../../tests/ocsp-tests/ocsp-signer-verify.sh ... 597s verifying ../../tests//ocsp-tests/signer-verify/response-ca.der using ../../tests//ocsp-tests/signer-verify/trust.pem 597s OCSP Response Information: 597s Response Status: Successful 597s Response Type: Basic OCSP Response 597s Version: 1 597s Responder ID: CN=Sub CA 597s Produced At: Tue Jul 13 18:50:26 UTC 2021 597s Responses: 597s Certificate ID: 597s Hash Algorithm: SHA1 597s Issuer Name Hash: 1dfc0a78ecdd2b4e005ce93dfb2663e50256b362 597s Issuer Key Hash: b733d82dc4bb44afb0f45943615b26946aef648e 597s Serial Number: 22fff0da 597s Certificate Status: good 597s This Update: Tue Jul 13 18:50:26 UTC 2021 597s Next Update: Wed Jul 14 18:50:26 UTC 2021 597s Extensions: 597s Signature Algorithm: RSA-SHA256 597s 597s 597s Verifying OCSP Response: Success. 597s verifying ../../tests//ocsp-tests/signer-verify/response-delegated.der using ../../tests//ocsp-tests/signer-verify/trust.pem 597s OCSP Response Information: 597s Response Status: Successful 597s Response Type: Basic OCSP Response 597s Version: 1 597s Responder ID: CN=Sub CA OCSP Responder 597s Produced At: Tue Jul 13 18:50:26 UTC 2021 597s Responses: 597s Certificate ID: 597s Hash Algorithm: SHA1 597s Issuer Name Hash: 1dfc0a78ecdd2b4e005ce93dfb2663e50256b362 597s Issuer Key Hash: b733d82dc4bb44afb0f45943615b26946aef648e 597s Serial Number: 22fff0da 597s Certificate Status: good 597s This Update: Tue Jul 13 18:50:26 UTC 2021 597s Next Update: Wed Jul 14 18:50:26 UTC 2021 597s Extensions: 597s Signature Algorithm: RSA-SHA256 597s 597s 597s Verifying OCSP Response: Success. 597s verifying ../../tests//ocsp-tests/signer-verify/response-non-delegated.der using ../../tests//ocsp-tests/signer-verify/trust.pem 597s OCSP Response Information: 597s Response Status: Successful 597s Response Type: Basic OCSP Response 597s Version: 1 597s Responder ID: CN=localhost 597s Produced At: Tue Jul 13 18:50:26 UTC 2021 597s Responses: 597s Certificate ID: 597s Hash Algorithm: SHA1 597s Issuer Name Hash: 1dfc0a78ecdd2b4e005ce93dfb2663e50256b362 597s Issuer Key Hash: b733d82dc4bb44afb0f45943615b26946aef648e 597s Serial Number: 22fff0da 597s Certificate Status: good 597s This Update: Tue Jul 13 18:50:26 UTC 2021 597s Next Update: Wed Jul 14 18:50:26 UTC 2021 597s Extensions: 597s Signature Algorithm: RSA-SHA256 597s 597s 597s Verifying OCSP Response: Failure, Signer cert is not trusted. 597s SUCCESS [92]../../tests/ocsp-tests/ocsp-signer-verify.sh 597s running [93]../../tests/ocsp-tests/ocsp-test.sh ... 597s OCSP Response Information: 597s Response Status: Successful 597s Response Type: Basic OCSP Response 597s Version: 1 597s Responder ID: CN=Testing Authority 597s Produced At: Wed Mar 23 21:55:28 UTC 2016 597s Responses: 597s Certificate ID: 597s Hash Algorithm: SHA1 597s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 597s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 597s Serial Number: 56f304a1326dc9b2d51b31b3 597s Certificate Status: unknown 597s This Update: Wed Mar 23 21:55:28 UTC 2016 597s Extensions: 597s Signature Algorithm: RSA-SHA256 597s 597s 597s Verifying OCSP Response: Success. 597s OCSP Response Information: 597s Response Status: Successful 597s Response Type: Basic OCSP Response 597s Version: 1 597s Responder ID: CN=Testing Authority OCSP Responder 597s Produced At: Wed Mar 23 22:31:19 UTC 2016 597s Responses: 597s Certificate ID: 597s Hash Algorithm: SHA1 597s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 597s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 597s Serial Number: 56f318d612de99176ccaa1e0 597s Certificate Status: unknown 597s This Update: Wed Mar 23 22:31:19 UTC 2016 597s Extensions: 597s Signature Algorithm: RSA-SHA256 597s 597s 597s Verifying OCSP Response: Success. 597s OCSP Response Information: 597s Response Status: Successful 597s Response Type: Basic OCSP Response 597s Version: 1 597s Responder ID: CN=Testing Authority OCSP Responder 597s Produced At: Wed Mar 23 22:31:19 UTC 2016 597s Responses: 597s Certificate ID: 597s Hash Algorithm: SHA1 597s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 597s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 597s Serial Number: 56f318d612de99176ccaa1e0 597s Certificate Status: unknown 597s This Update: Wed Mar 23 22:31:19 UTC 2016 597s Extensions: 597s Signature Algorithm: RSA-SHA256 597s 597s 597s Verifying OCSP Response: Success. 597s SUCCESS [93]../../tests/ocsp-tests/ocsp-test.sh 597s running [94]../../tests/ocsp-tests/ocsp-tls-connection.sh ... 597s reserved port 50871 597s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1563 597s |<3>| ASSERT: ../../../lib/x509/ocsp.c[gnutls_ocsp_resp_get_single]:1577 597s |<3>| ASSERT: ../../../lib/x509/common.c[_gnutls_x509_der_encode]:876 597s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 597s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 597s |<3>| checking whether signed against: subject `CN=Testing Authority OCSP Responder', issuer `CN=Testing Authority', serial 0x56f318d612de99176ccaa1e0, RSA key 2048 bits, signed using RSA-SHA256, activated `2016-03-23 22:29:42 UTC', expires `2017-03-23 22:29:42 UTC', pin-sha256="9/MUMGO4USOKxFhAZukKhfJRT4Vsx31KvyAghzq5TU4=" 597s |<2>| checking issuer DN 597s |<3>| ASSERT: ../../../lib/x509/name_constraints.c[gnutls_x509_crt_get_name_constraints]:592 597s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 597s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 597s |<3>| ocsp signer: subject `CN=Testing Authority OCSP Responder', issuer `CN=Testing Authority', serial 0x56f318d612de99176ccaa1e0, RSA key 2048 bits, signed using RSA-SHA256, activated `2016-03-23 22:29:42 UTC', expires `2017-03-23 22:29:42 UTC', pin-sha256="9/MUMGO4USOKxFhAZukKhfJRT4Vsx31KvyAghzq5TU4=" 597s RTNETLINK answers: Invalid argument 597s RTNETLINK answers: Invalid argument 597s RTNETLINK answers: Invalid argument 597s ocsp: waiting for OCSP client connections... 597s reserved port 48820 597s === Generating good server certificate === 597s === Bringing OCSP server up === 598s RTNETLINK answers: Invalid argument 598s === Verifying OCSP server is up === 598s Connecting to OCSP server: localhost... 598s ocsp: received request, 1st line: POST /ocsp/ HTTP/1.0 598s ocsp: sending response, 1st line: HTTP/1.0 200 OK 598s 598s Assuming response's signer = issuer (use --load-signer to override). 598s Resolving 'localhost:48820'... 598s Connecting to '::1:48820'... 598s Connecting to '127.0.0.1:48820'... 598s OCSP Response Information: 598s Response Status: Successful 598s Response Type: Basic OCSP Response 598s Version: 1 598s Responder ID: CN=Testing Authority OCSP Responder 598s Produced At: Thu Sep 04 17:40:51 UTC 2025 598s Responses: 598s Certificate ID: 598s Hash Algorithm: SHA1 598s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 598s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 598s Serial Number: 02 598s Certificate Status: good 598s This Update: Thu Sep 04 17:40:51 UTC 2025 598s Extensions: 598s Signature Algorithm: RSA-SHA256 598s 598s -----BEGIN OCSP RESPONSE----- 598s MIIFFwoBAKCCBRAwggUMBgkrBgEFBQcwAQEEggT9MIIE+TCBk6EtMCsxKTAnBgNV 598s BAMTIFRlc3RpbmcgQXV0aG9yaXR5IE9DU1AgUmVzcG9uZGVyGA8yMDI1MDkwNDE3 598s NDA1MVowUTBPMDowCQYFKw4DAhoFAAQUusaHkDUs60xN4VNERTSPi0tTCbMEFOhl 598s /LkSPHKF/CjIAxSfBq2U39k0AgECgAAYDzIwMjUwOTA0MTc0MDUxWjANBgkqhkiG 598s 9w0BAQsFAAOCAQEAf48VYPQ3Tq7p4V1jz2SmaK9LP/FJOojcAbQSnf5KAGpF05xB 598s UL/9lYk9I+Bi/n/edzWatMyDZ1Nol8uXIeJpbda3GHdcVbJj7ANDUsp+JtaFB5CN 598s pf0OxgJbV2fKdjEBveUtQJym8+W2h2poybi8gTTq4C+7KhYJdrfSCvzXsp+FI2Xw 598s M9Qgcvirk1bHK2XzYMjTFshi76ZZVtWr6zm3qs4sJrKuW/PJ4nOKu2wCthrBNlRp 598s 2BixmX0UTir5iF9uOSPSkMOBzUUkexvyQkBggz+kqoM2nuT3sRVRmq/auFgdkJdM 598s DvmBYmZkbCXIi7sO+hRNkZgOk5LhsvM4RqvGKKCCA0swggNHMIIDQzCCAiugAwIB 598s AgIMVvMY1hLemRdsyqHgMA0GCSqGSIb3DQEBCwUAMBwxGjAYBgNVBAMTEVRlc3Rp 598s bmcgQXV0aG9yaXR5MB4XDTE2MDMyMzIyMjk0MloXDTE3MDMyMzIyMjk0MlowKzEp 598s MCcGA1UEAxMgVGVzdGluZyBBdXRob3JpdHkgT0NTUCBSZXNwb25kZXIwggEiMA0G 598s CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDTAmQKDWIlbuH07G3whNxFOG5e6yQr 598s jKmSgRFR2eNEz21cP9GyEhZ7Pu6yuZWs02L70rkydXQmR5p8Fq/fyZOeFy64nmcl 598s YfXzz+sIHndx/qwvI3gQGKoM4y46efURdhY3D7Y+m7X7By2x7wjYxnjoXZek8MdP 598s zDGABL612tkZQHP9WxQ+k20gTsx6zYKUBgxFP84zr7EiVS33XoM4Hb9zWmHCc9Qd 598s wm1mXx25Dp6oOR97oQS/Sa+pBM+hgf8bgUgWd1GXKOa1c8RWAsJH/FmkTTkKMdDT 598s cBk6ICsz+pf5jBZe2q2Gxq8Gh/jsk54Y0KDBkc6rCYnsRz1OWmQYc9SVAgMBAAGj 598s djB0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYBBQUHAwkwDwYDVR0PAQH/ 598s BAUDAweAADAdBgNVHQ4EFgQU5z6hcBUBqNrycEPvTMiHGsOYdD0wHwYDVR0jBBgw 598s FoAULdgUmhbVbf77sODe8fXFIwvTYr4wDQYJKoZIhvcNAQELBQADggEBAHqmxPdE 598s tXJAcLZnvfyExhlkS4QHxj9dw8OWYma1HHAyEiNxLlvXgcngYspTVNHHHiErluOa 598s 3TdDkBlgdTdQ14aRJqEIT+EDXorU8MvvT7ujvDW/hm2IDDbrbd4Cyd1g6sQJpuil 598s BUvm4RV/LpkkAhRhd4dEhngHsoV0q1FbA7IxiPSNSixVjpBou2EhOPQFp4nFxFQv 598s nEFK1gzltj22+plrekuiZtMS7Ofhg+ZaHb2QB0bhvqbMyL6jb0/sxQZyy1qjID54 598s G6nrr7j+PzN+SHqo1dfWhuYbHBQMJdp+AGmusGFhwGem1PmO5AadPjc6lXs9mS// 598s /txyiheLGJJodQY= 598s -----END OCSP RESPONSE----- 598s 598s Verifying OCSP Response: Success. 598s 598s === Test 1: Server with valid certificate === 598s RTNETLINK answers: Invalid argument 598s Echo Server listening on IPv4 0.0.0.0 port 50871...done 598s Echo Server listening on IPv6 :: port 50871...done 599s RTNETLINK answers: Invalid argument 600s RTNETLINK answers: Invalid argument 600s Connecting to OCSP server: localhost... 600s ocsp: received request, 1st line: POST /ocsp/ HTTP/1.0 600s ocsp: sending response, 1st line: HTTP/1.0 200 OK 600s Processed 1 CA certificate(s). 600s Resolving 'localhost:50871'... 600s Connecting to '::1:50871'... 600s - Certificate type: X.509 600s - Got a certificate list of 1 certificates. 600s - Certificate[0] info: 600s - subject `CN=localhost', issuer `CN=Testing Authority', serial 0x02, RSA key 3072 bits, signed using RSA-SHA256, activated `2016-03-29 16:21:42 UTC', expires `2026-03-29 16:24:41 UTC', pin-sha256="STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0=" 600s Public Key ID: 600s sha1:e4d27568778399f943e2efe21575b3a6bd47ec22 600s sha256:4935de9d21fd5999550ce70d044e59cb2c6a5b13454ecc29be8e4d00e74a556d 600s Public Key PIN: 600s pin-sha256:STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0= 600s 600s - Status: The certificate is trusted. 600s Resolving 'localhost:48820'... 600s Connecting to '::1:48820'... 600s Connecting to '127.0.0.1:48820'... 600s - OCSP server flags certificate not revoked as of Thu Sep 4 17:40:53 2025 600s *** OCSP: verified 1 certificate(s). 600s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) 600s - Session ID: AC:FD:2C:8B:9C:A5:70:0F:9D:47:ED:E4:9C:E6:D7:DE:67:AE:7C:63:C5:1B:7E:95:D9:37:A3:FC:34:B3:95:9F 600s - Options: 600s - Handshake was completed 600s 600s - Simple Client Mode: 600s 600s received cmd: test 123456 600s 600s *** Processing 12 bytes command: test 123456 600s 600s test 123456 600s - Peer has closed the GnuTLS connection 600s === Generating bad server certificate === 600s Exiting via signal 15 600s Generating a signed certificate... 600s X.509 Certificate Information: 600s Version: 3 600s Serial Number (hex): 03 600s Validity: 600s Not Before: Tue Mar 29 16:21:42 UTC 2016 600s Not After: Sun Mar 29 16:24:41 UTC 2026 600s Subject: CN=localhost 600s Subject Public Key Algorithm: RSA 600s Algorithm Security Level: High (3072 bits) 600s Modulus (bits 3072): 600s 00:af:0b:b6:b9:e8:98:8a:7e:db:d7:be:ce:81:28:d6 600s 63:41:2d:ef:2a:44:d6:05:d3:b9:77:60:4f:2b:be:2c 600s 7d:a9:62:6b:1b:1f:16:c0:14:80:df:d8:e7:8e:b3:ff 600s 33:f8:52:b4:56:ac:6f:71:1c:36:cd:bd:e5:9e:c2:d8 600s 0f:77:e0:1c:d8:fc:6d:97:59:b2:c8:97:cb:cf:ae:9b 600s f3:2d:9d:e7:36:27:cb:64:6a:97:63:51:59:1d:ee:f4 600s ec:52:a6:ab:74:e4:d1:71:3c:0c:d1:25:8e:81:05:e2 600s ad:93:12:76:45:35:7a:8a:a4:cc:07:33:c6:c3:c9:4c 600s f5:4a:9e:a5:43:2a:10:44:70:fc:ff:ec:e4:7e:fe:87 600s 18:99:07:40:68:e7:65:f6:6e:a0:26:7e:25:04:1a:f6 600s bc:2a:33:8f:1d:0b:c9:68:a0:ef:37:f9:8f:a0:a0:91 600s 91:02:6f:b8:e0:ac:03:61:0c:4d:e0:0f:d8:87:0b:c0 600s b2:69:53:cb:ba:e0:e4:96:5c:08:7a:d0:53:7d:61:83 600s 8b:4b:5d:1e:fd:66:63:72:ba:62:eb:83:b2:37:54:9e 600s 63:9e:16:b3:cb:de:2d:f3:be:74:04:30:b0:03:d5:fd 600s 06:79:1c:d4:30:d4:c7:50:e7:b9:6c:a2:00:c4:a5:bd 600s 86:58:49:6a:dd:74:fd:56:72:b8:fd:52:8e:6d:60:76 600s 9a:09:91:4e:33:83:91:cf:ca:bf:c2:ee:61:c7:0b:6a 600s 1f:25:96:7a:f1:0e:1b:43:62:97:02:ae:39:33:03:cf 600s 92:ad:23:10:5c:cf:76:b0:d1:f7:6e:42:46:ff:b7:1c 600s ee:ab:c3:ed:be:6a:d2:32:96:f6:73:cd:dc:17:7c:1b 600s 81:e5:b3:8a:a5:c5:3a:f2:d6:e3:19:2a:b9:f0:dd:d5 600s ff:bd:83:19:2c:43:74:d7:a9:84:64:cc:02:6b:66:ba 600s 6d:b6:4f:ed:fc:29:23:ca:8a:e2:16:4f:f6:ec:49:e7 600s db 600s Exponent (bits 24): 600s 01:00:01 600s Extensions: 600s Basic Constraints (critical): 600s Certificate Authority (CA): FALSE 600s Subject Alternative Name (not critical): 600s DNSname: localhost 600s Key Purpose (not critical): 600s TLS WWW Server. 600s Authority Information Access (not critica=== Test 2: Server with revoked certificate === 600s reserved port 13126 600s l): 600s Access Method: 1.3.6.1.5.5.7.48.1 (id-ad-ocsp) 600s Access Location URI: http://localhost:48820/ocsp/ 600s Key Usage (critical): 600s Digital signature. 600s Key encipherment. 600s Subject Key Identifier (not critical): 600s cdabeaf4406b11227396e52b6041726ec50c780e 600s Authority Key Identifier (not critical): 600s 2dd8149a16d56dfefbb0e0def1f5c5230bd362be 600s Other Information: 600s Public Key ID: 600s sha1:cdabeaf4406b11227396e52b6041726ec50c780e 600s sha256:878b4e38ac81aabecb9701f2d5c0c0d2c59065bf2c8a5540a4930afdb6407f3b 600s Public Key PIN: 600s pin-sha256:h4tOOKyBqr7LlwHy1cDA0sWQZb8silVApJMK/bZAfzs= 600s 600s 600s 600s Signing certificate... 600s RTNETLINK answers: Invalid argument 600s RTNETLINK answers: Invalid argument 600s Echo Server listening on IPv4 0.0.0.0 port 13126...done 600s Echo Server listening on IPv6 :: port 13126...done 601s RTNETLINK answers: Invalid argument 602s RTNETLINK answers: Invalid argument 602s Connecting to OCSP server: localhost... 602s ocsp: received request, 1st line: POST /ocsp/ HTTP/1.0 602s ocsp: sending response, 1st line: HTTP/1.0 200 OK 602s *** Fatal error: Error in the certificate. 602s Processed 1 CA certificate(s). 602s Resolving 'localhost:13126'... 602s Connecting to '::1:13126'... 602s - Certificate type: X.509 602s - Got a certificate list of 1 certificates. 602s - Certificate[0] info: 602s - subject `CN=localhost', issuer `CN=Testing Authority', serial 0x03, RSA key 3072 bits, signed using RSA-SHA256, activated `2016-03-29 16:21:42 UTC', expires `2026-03-29 16:24:41 UTC', pin-sha256="h4tOOKyBqr7LlwHy1cDA0sWQZb8silVApJMK/bZAfzs=" 602s Public Key ID: 602s sha1:cdabeaf4406b11227396e52b6041726ec50c780e 602s sha256:878b4e38ac81aabecb9701f2d5c0c0d2c59065bf2c8a5540a4930afdb6407f3b 602s Public Key PIN: 602s pin-sha256:h4tOOKyBqr7LlwHy1cDA0sWQZb8silVApJMK/bZAfzs= 602s 602s - Status: The certificate is trusted. 602s Resolving 'localhost:48820'... 602s Connecting to '::1:48820'... 602s Connecting to '127.0.0.1:48820'... 602s *** Certificate was revoked at Thu Apr 28 14:24:41 2016 602s *** Verifying (with OCSP) server certificate chain failed... 602s Error in handshake: A TLS fatal alert has been received. 602s Exiting via signal 15 602s Terminated 602s unreserved port 13126 602s SUCCESS [94]../../tests/ocsp-tests/ocsp-tls-connection.sh 602s running [95]../../tests/ocsp-tests/ocsptool.sh ... 602s OCSP Response Information: 602s Response Status: Successful 602s Response Type: Basic OCSP Response 602s Version: 1 602s Responder ID: CN=Testing Authority 602s Produced At: Wed Mar 23 21:55:28 UTC 2016 602s Responses: 602s Certificate ID: 602s Hash Algorithm: SHA1 602s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 602s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 602s Serial Number: 56f304a1326dc9b2d51b31b3 602s Certificate Status: unknown 602s This Update: Wed Mar 23 21:55:28 UTC 2016 602s Extensions: 602s Signature Algorithm: RSA-SHA256 602s 602s -----BEGIN OCSP RESPONSE----- 602s MIIEwAoBAKCCBLkwggS1BgkrBgEFBQcwAQEEggSmMIIEojCBj6EeMBwxGjAYBgNV 602s BAMTEVRlc3RpbmcgQXV0aG9yaXR5GA8yMDE2MDMyMzIxNTUyOFowXDBaMEUwCQYF 602s Kw4DAhoFAAQUusaHkDUs60xN4VNERTSPi0tTCbMEFOhl/LkSPHKF/CjIAxSfBq2U 602s 39k0AgxW8wShMm3JstUbMbOCABgPMjAxNjAzMjMyMTU1MjhaMA0GCSqGSIb3DQEB 602s CwUAA4IBAQBKkt+j9Rd5Pjq67WsiWIc9rVjxA0vdiZahZUAYlCCauKpLN+FxSsda 602s uCUzYmotc4Jq4Erbmpl0pfvR5Y3nFArCQuKiLayOKk5NevUgnVMLbcaojrtwfPl/ 602s puf8zPFGOo+Ue2SQH+H8YX3wmQqeMEIblF2GonPVWm8pY+Gjx9ElBjUMCqAoCtig 602s CWcS9BbOm1BON0IEOsCb9gJ+VtRrLxpaOzLsc0lZGip74IuqHEyb6foA/bME8Ydy 602s T8v28oA9pfMdW0xoB/drpeq+lJfO3Hiu7QmHC56zRNyWNv3ovU9R87cEGEM2QD7o 602s /23eXMmoFODYx7Y5B6UOmiD34ufq7UaRoIIC+DCCAvQwggLwMIIB2KADAgECAghW 602s 8wrgLlKayzANBgkqhkiG9w0BAQsFADAcMRowGAYDVQQDExFUZXN0aW5nIEF1dGhv 602s cml0eTAiGA8yMDE2MDMyMzIxMzAxNVoYDzk5OTkxMjMxMjM1OTU5WjAcMRowGAYD 602s VQQDExFUZXN0aW5nIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC 602s AQoCggEBAKBV6T5EMSijMfx/e9MkasHxLi5VDv4gYb5Y/nuxilR1CpCRg6Twnqpu 602s /tmkj9XU23ewZuIxjb+ePdOH7AmiFZKYxZpo6+x1h6GCBqBpjniWN1ygt/mLs6jA 602s pJAlGOfgrjgFWzg8hwsgnN6T5gn3nFS7CLhFkJRav6DvgGcfRnSGQv9O/eGZDUAI 602s UGPou0lRpiON77UzDRmvENke6+60LBygJZD470YiQHbU6WZERQHEq1JCbh3iXB1S 602s uCRqe3R075I/u/+zOkDygDmVCPQYqoHJ+3AnfXpjsnTTjoMuqYXe0QVyCgzAeFga 602s tyXUuxSvPq8rVTVYvb6+AOXBVTDidp0CAwEAAaMyMDAwDwYDVR0TAQH/BAUwAwEB 602s /zAdBgNVHQ4EFgQULdgUmhbVbf77sODe8fXFIwvTYr4wDQYJKoZIhvcNAQELBQAD 602s ggEBAGGF8as/0Ew1prrQKOKSbVB3nrILF7D9fOxKIEUEOprtYGgjvvfkqG7xDQRP 602s SvIiVy3X0wZQpzytCgvkjXeQ8QsIIMnrYpjy6iRCRkDlti3iUqx6zo7B7iYaEIdK 602s Ky6uCn5z/RPti5WJIeqvg3WqTNeOXjWIK3ac6cROqUcUlLxy1AukNRYuvpVszQu9 602s FDs9ecdA5aOvBvb0WlVjbEU37EVuoveayBpgP0c2I7xu2zAkobNdn7JYNOGJx4x9 602s 8WMlcCP0ZU7O0wwk9y/U/FxARqfFIzDC2JanTi2LxyHdQw8iWAvaBksb7vLdMnn2 602s 9prXtfKhcCXLVECxSJuI1swHETA= 602s -----END OCSP RESPONSE----- 602s ../../tests/p11-kit-load.sh: 33: pkg-config: not found 602s ../../tests/p11-kit-load.sh: 51: pkg-config: not found 602s ../../tests/p11-kit-trust.sh: 32: pkg-config: not found 602s OCSP Response Information: 602s Response Status: Successful 602s Response Type: Basic OCSP Response 602s Version: 1 602s Responder ID: CN=Testing Authority 602s Produced At: Wed Mar 23 21:55:28 UTC 2016 602s Responses: 602s Certificate ID: 602s Hash Algorithm: SHA1 602s Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3 602s Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934 602s Serial Number: 56f304a1326dc9b2d51b31b3 602s Certificate Status: unknown 602s This Update: Wed Mar 23 21:55:28 UTC 2016 602s Extensions: 602s Signature Algorithm: RSA-SHA256 602s 602s -----BEGIN OCSP RESPONSE----- 602s MIIEwAoBAKCCBLkwggS1BgkrBgEFBQcwAQEEggSmMIIEojCBj6EeMBwxGjAYBgNV 602s BAMTEVRlc3RpbmcgQXV0aG9yaXR5GA8yMDE2MDMyMzIxNTUyOFowXDBaMEUwCQYF 602s Kw4DAhoFAAQUusaHkDUs60xN4VNERTSPi0tTCbMEFOhl/LkSPHKF/CjIAxSfBq2U 602s 39k0AgxW8wShMm3JstUbMbOCABgPMjAxNjAzMjMyMTU1MjhaMA0GCSqGSIb3DQEB 602s CwUAA4IBAQBKkt+j9Rd5Pjq67WsiWIc9rVjxA0vdiZahZUAYlCCauKpLN+FxSsda 602s uCUzYmotc4Jq4Erbmpl0pfvR5Y3nFArCQuKiLayOKk5NevUgnVMLbcaojrtwfPl/ 602s puf8zPFGOo+Ue2SQH+H8YX3wmQqeMEIblF2GonPVWm8pY+Gjx9ElBjUMCqAoCtig 602s CWcS9BbOm1BON0IEOsCb9gJ+VtRrLxpaOzLsc0lZGip74IuqHEyb6foA/bME8Ydy 602s T8v28oA9pfMdW0xoB/drpeq+lJfO3Hiu7QmHC56zRNyWNv3ovU9R87cEGEM2QD7o 602s /23eXMmoFODYx7Y5B6UOmiD34ufq7UaRoIIC+DCCAvQwggLwMIIB2KADAgECAghW 602s 8wrgLlKayzANBgkqhkiG9w0BAQsFADAcMRowGAYDVQQDExFUZXN0aW5nIEF1dGhv 602s cml0eTAiGA8yMDE2MDMyMzIxMzAxNVoYDzk5OTkxMjMxMjM1OTU5WjAcMRowGAYD 602s VQQDExFUZXN0aW5nIEF1dGhvcml0eTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC 602s AQoCggEBAKBV6T5EMSijMfx/e9MkasHxLi5VDv4gYb5Y/nuxilR1CpCRg6Twnqpu 602s /tmkj9XU23ewZuIxjb+ePdOH7AmiFZKYxZpo6+x1h6GCBqBpjniWN1ygt/mLs6jA 602s pJAlGOfgrjgFWzg8hwsgnN6T5gn3nFS7CLhFkJRav6DvgGcfRnSGQv9O/eGZDUAI 602s UGPou0lRpiON77UzDRmvENke6+60LBygJZD470YiQHbU6WZERQHEq1JCbh3iXB1S 602s uCRqe3R075I/u/+zOkDygDmVCPQYqoHJ+3AnfXpjsnTTjoMuqYXe0QVyCgzAeFga 602s tyXUuxSvPq8rVTVYvb6+AOXBVTDidp0CAwEAAaMyMDAwDwYDVR0TAQH/BAUwAwEB 602s /zAdBgNVHQ4EFgQULdgUmhbVbf77sODe8fXFIwvTYr4wDQYJKoZIhvcNAQELBQAD 602s ggEBAGGF8as/0Ew1prrQKOKSbVB3nrILF7D9fOxKIEUEOprtYGgjvvfkqG7xDQRP 602s SvIiVy3X0wZQpzytCgvkjXeQ8QsIIMnrYpjy6iRCRkDlti3iUqx6zo7B7iYaEIdK 602s Ky6uCn5z/RPti5WJIeqvg3WqTNeOXjWIK3ac6cROqUcUlLxy1AukNRYuvpVszQu9 602s FDs9ecdA5aOvBvb0WlVjbEU37EVuoveayBpgP0c2I7xu2zAkobNdn7JYNOGJx4x9 602s 8WMlcCP0ZU7O0wwk9y/U/FxARqfFIzDC2JanTi2LxyHdQw8iWAvaBksb7vLdMnn2 602s 9prXtfKhcCXLVECxSJuI1swHETA= 602s -----END OCSP RESPONSE----- 602s SUCCESS [95]../../tests/ocsp-tests/ocsptool.sh 602s running [96]../../tests/p11-kit-load.sh ... 602s located 602s SKIPPED [96]../../tests/p11-kit-load.sh 602s running [97]../../tests/p11-kit-trust.sh ... 602s + : ../../tests/ 602s + : /tmp/autopkgtest.9eGLH5/build.GbA/src/nonexist-builddir 602s + : /usr/bin/certtool 602s + : /usr/bin/p11tool 602s + : diff 602s + test = 1 602s + . ../../tests//scripts/common.sh 602s + export TZ=UTC 602s + GETPORT= 602s rc=0 602s while test $rc = 0; do 602s unset myrandom 602s if test -n "$RANDOM"; then myrandom=$(($RANDOM + $RANDOM)); fi 602s if test -z "$myrandom"; then myrandom=$(date +%N | sed s/^0*//); fi 602s if test -z "$myrandom"; then myrandom=0; fi 602s PORT="$(((($$<<15)|$myrandom) % 63001 + 2000))" 602s check_if_port_in_use $PORT;rc=$? 602s done 602s 602s + create_testdir pkcs11-tool 602s + local PREFIX=pkcs11-tool 602s + mktemp -d -t pkcs11-tool.XXXXXX 602s + d=/tmp/pkcs11-tool.Aznpmu 602s + test 0 -ne 0 602s + trap test -e "/tmp/pkcs11-tool.Aznpmu" && rm -rf "/tmp/pkcs11-tool.Aznpmu" 1 15 2 602s + echo /tmp/pkcs11-tool.Aznpmu 602s + testdir=/tmp/pkcs11-tool.Aznpmu 602s + TMP_SOFTHSM_DIR=/tmp/pkcs11-tool.Aznpmu/softhsm-load.5027.tmp 602s + TEMPLATE=/tmp/pkcs11-tool.Aznpmu/cert.cfg 602s + PIN=1234 602s + PUK=1234 602s + test -x /usr/bin/p11tool 602s + test -x /usr/bin/certtool 602s + test -f /pkcs11/libsofthsm2.so 602s + test -f /usr/lib64/pkcs11//libsofthsm2.so 602s + test -f /usr/lib/pkcs11//libsofthsm2.so 602s + test -f /usr/lib/x86_64-linux-gnu/pkcs11//libsofthsm2.so 602s + test -f /usr/lib/softhsm//libsofthsm2.so 602s + SOFTHSM_MODULE=/usr/lib/softhsm//libsofthsm2.so 602s + echo located 602s + break 602s + test -f /usr/lib/softhsm//libsofthsm2.so 602s + which pkcs11-tool 602s + [ -z ] 602s + echo Need pkcs11-tool from opensc package to run this test. 602s + exit 77 602s Signature status: verification failed: The certificate is not yet activated. 602s Signature status: ok 602s p11-kit trust module was not found 602s SKIPPED [97]../../tests/p11-kit-trust.sh 602s running [98]../../tests/pkcs11-tool.sh ... 602s located 602s Need pkcs11-tool from opensc package to run this test. 602s SKIPPED [98]../../tests/pkcs11-tool.sh 602s running [99]../../tests/pkcs7-cat.sh ... 602s eContent Type: 1.3.6.1.4.1.311.10.1 602s Signers: 602s Signer's issuer DN: CN=Microsoft Windows Hardware Compatibility PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=US 602s Signer's serial: 330000001e258e7c4251c5d1fa00010000001e 602s Signature Algorithm: RSA-SHA1 602s 602s X25519-KYBER768 is not supported nor enabled, skipping 602s SECP256R1-MLKEM768 is not supported nor enabled, skipping 602s eContent Type: 1.3.6.1.4.1.311.10.1 602s Signers: 602s Signer's issuer DN: CN=Microsoft Windows Hardware Compatibility PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=US 602s Signer's serial: 330000001e258e7c4251c5d1fa00010000001e 602s Signature Algorithm: RSA-SHA1 602s 602s SUCCESS [99]../../tests/pkcs7-cat.sh 602s running [100]../../tests/pqc-hybrid-kx.sh ... 602s SECP384R1-MLKEM1024 is not supported nor enabled, skipping 602s X25519-MLKEM768 is not supported nor enabled, skipping 602s ../../tests/pqc-hybrid-kx.sh: 113: KYBER768 is not supported, skipping: not found 602s ../../tests/pqc-hybrid-kx.sh: 113: MLKEM768 is not supported, skipping: not found 602s ../../tests/pqc-hybrid-kx.sh: 113: MLKEM1024 is not supported, skipping: not found 602s X25519-KYBER768 is not supported, skipping 602s SECP256R1-MLKEM768 is not supported, skipping 602s SUCCESS [100]../../tests/pqc-hybrid-kx.sh 602s running [101]../../tests/profile-tests.sh ... 602s Testing with a 256 bit ECDSA key 602s reserved port 30446 602s SECP384R1-MLKEM1024 is not supported, skipping 602s X25519-MLKEM768 is not supported, skipping 602s RTNETLINK answers: Invalid argument 602s RTNETLINK answers: Invalid argument 602s Echo Server listening on IPv4 0.0.0.0 port 30446...done 602s Echo Server listening on IPv6 :: port 30446...done 603s RTNETLINK answers: Invalid argument 603s *** Fatal error: Error in the certificate. 603s Error in handshake: A TLS fatal alert has been received. 603s *** Fatal error: Error in the certificate. 603s Error in handshake: A TLS fatal alert has been received. 603s Testing with a 384 bit ECDSA key 603s Exiting via signal 15 603s reserved port 56281 603s RTNETLINK answers: Invalid argument 603s RTNETLINK answers: Invalid argument 603s Echo Server listening on IPv4 0.0.0.0 port 56281...done 603s Echo Server listening on IPv6 :: port 56281...done 604s RTNETLINK answers: Invalid argument 604s *** Fatal error: Error in the certificate. 604s Error in handshake: A TLS fatal alert has been received. 604s Exiting via signal 15 604s Testing with a 521 bit ECDSA key 604s reserved port 40892 604s RTNETLINK answers: Invalid argument 604s RTNETLINK answers: Invalid argument 604s Echo Server listening on IPv4 0.0.0.0 port 40892...done 604s Echo Server listening on IPv6 :: port 40892...done 605s RTNETLINK answers: Invalid argument 605s Exiting via signal 15 605s unreserved port 40892 605s SUCCESS [101]../../tests/profile-tests.sh 605s running [102]../../tests/psktool.sh ... 605s Checking PSK tool basic operations 605s Generating a random key for user 'test' 605s Key stored to psktool.5157.tmp 605s Generating a random key for user 'user2' 605s Key stored to psktool.5157.tmp 605s Generating a random key for user 'user:3' 605s Key stored to psktool.5157.tmp 605s Generating a random key for user 'user:3' 605s Key stored to psktool.5157.tmp 605s SUCCESS [102]../../tests/psktool.sh 605s running [103]../../tests/rfc2253-escape-test.sh ... 606s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 606s Use --verify-profile low to apply the default verification of NORMAL priority string. 606s Note that no verification profile was selected. In the future the medium profile will be enabled by default. 606s Use --verify-profile low to apply the default verification of NORMAL priority string. 606s RTNETLINK answers: Invalid argument 606s RTNETLINK answers: Invalid argument 606s UDP HTTP Server listening on IPv4 0.0.0.0 port 24964...done 606s UDP HTTP Server listening on IPv6 :: port 24964...done 606s SUCCESS [103]../../tests/rfc2253-escape-test.sh 606s running [104]../../tests/rsa-md5-collision/rsa-md5-collision.sh ... 606s Output: Not verified. The certificate is NOT trusted. The certificate chain uses insecure algorithm. 606s Output: Not verified. The certificate is NOT trusted. The certificate issuer is unknown. The certificate chain uses insecure algorithm. 606s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain uses insecure algorithm. 606s Output: Not verified. The certificate is NOT trusted. The certificate chain uses insecure algorithm. 606s Output: Not verified. The certificate is NOT trusted. The certificate issuer is unknown. The certificate chain uses insecure algorithm. 606s Chain verification output: Not verified. The certificate is NOT trusted. The certificate chain uses insecure algorithm. 606s SUCCESS [104]../../tests/rsa-md5-collision/rsa-md5-collision.sh 606s running [105]../../tests/sanity-lib.sh ... 606s SKIPPED [105]../../tests/sanity-lib.sh 606s running [106]../../tests/scripts/common.sh ... 606s SUCCESS [106]../../tests/scripts/common.sh 606s running [107]../../tests/scripts/starttls-common.sh ... 606s SKIPPED [107]../../tests/scripts/starttls-common.sh 606s running [108]../../tests/serv-udp.sh ... 606s Checking whether UDP server works 606s reserved port 24964 610s |<2>| added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 610s |<2>| checking c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384) for compatibility 610s |<2>| checking cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305) for compatibility 610s |<2>| checking c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM) for compatibility 610s |<2>| checking c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1) for compatibility 610s |<2>| checking c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256) for compatibility 610s |<2>| checking c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM) for compatibility 610s |<2>| checking c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1) for compatibility 610s |<2>| checking c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384) for compatibility 610s |<2>| Selected (RSA) cert based on ciphersuite c0.30: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 610s |<2>| EdDSA (Ed25519) is unsupported for cert request 610s |<2>| EdDSA (Ed448) is unsupported for cert request 612s |<2>| added 3 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 612s |<2>| checking c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384) for compatibility 612s |<2>| checking cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305) for compatibility 612s |<2>| checking c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM) for compatibility 612s |<2>| checking c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1) for compatibility 612s |<2>| checking c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256) for compatibility 612s |<2>| checking c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM) for compatibility 612s |<2>| checking c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1) for compatibility 612s |<2>| checking c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384) for compatibility 612s |<2>| Selected (RSA) cert based on ciphersuite c0.30: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 612s |<2>| EdDSA (Ed25519) is unsupported for cert request 612s |<2>| EdDSA (Ed448) is unsupported for cert request 614s Exiting via signal 15 614s unreserved port 24964 614s SUCCESS [108]../../tests/serv-udp.sh 614s running [109]../../tests/server-multi-keys.sh ... 614s Checking whether server can utilize multiple keys 614s reserved port 43757 614s RTNETLINK answers: Invalid argument 614s RTNETLINK answers: Invalid argument 614s Echo Server listening on IPv4 0.0.0.0 port 43757...done 614s Echo Server listening on IPv6 :: port 43757...done 615s RTNETLINK answers: Invalid argument 615s Processed 1 CA certificate(s). 615s Resolving 'localhost:43757'... 615s Connecting to '::1:43757'... 615s - Successfully sent 0 certificate(s) to server. 615s - Server has requested a certificate. 615s - Certificate type: X.509 615s - Got a certificate list of 1 certificates. 615s - Certificate[0] info: 615s - no subject,issuer `CN=GnuTLS Test CA', serial 0x59897b84004ff2ed, RSA-PSS key 2048 bits, signed using RSA-SHA256, activated `2017-08-08 08:51:16 UTC', expires `9999-12-31 23:59:59 UTC', pin-sha256="NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo=" 615s Public Key ID: 615s sha1:6a7ea695c72a532d59eb8c2f46fdf1c60e21db29 615s sha256:34dd62756235d38dda862af9378a9238a7ffe885f33ff5f52a3e0a8b967def1a 615s Public Key PIN: 615s pin-sha256:NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo= 615s 615s - Status: The certificate is trusted. 615s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-256-GCM) 615s - Session ID: 8D:DC:65:89:E8:37:A0:2D:02:58:16:27:67:5D:A8:29:FB:AF:59:49:69:8B:D2:A2:0F:8C:EC:31:AF:56:73:53 615s - Options: 615s - Handshake was completed 615s 615s - Simple Client Mode: 615s 615s - Peer has closed the GnuTLS connection 615s Processed 1 CA certificate(s). 615s Resolving 'localhost:43757'... 615s Connecting to '::1:43757'... 615s - Successfully sent 0 certificate(s) to server. 615s - Server has requested a certificate. 615s - Certificate type: X.509 615s - Got a certificate list of 1 certificates. 615s - Certificate[0] info: 615s - no subject,issuer `CN=GnuTLS Test CA', serial 0x59897b84004ff2ed, RSA-PSS key 2048 bits, signed using RSA-SHA256, activated `2017-08-08 08:51:16 UTC', expires `9999-12-31 23:59:59 UTC', pin-sha256="NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo=" 615s Public Key ID: 615s sha1:6a7ea695c72a532d59eb8c2f46fdf1c60e21db29 615s sha256:34dd62756235d38dda862af9378a9238a7ffe885f33ff5f52a3e0a8b967def1a 615s Public Key PIN: 615s pin-sha256:NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo= 615s 615s - Status: The certificate is trusted. 615s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-256-GCM) 615s - Session ID: 43:CD:64:28:63:2A:B8:AE:BA:35:D1:35:25:27:72:2B:14:5D:7B:E9:9B:1F:6A:EC:CF:FC:63:54:69:4D:D4:00 615s - Options: 615s - Handshake was completed 615s 615s - Simple Client Mode: 615s 616s - Peer has closed the GnuTLS connection 616s Processed 1 CA certificate(s). 616s Resolving 'localhost:43757'... 616s Connecting to '::1:43757'... 616s - Certificate type: X.509 616s - Got a certificate list of 1 certificates. 616s - Certificate[0] info: 616s - subject `CN=GnuTLS Test Server (RSA certificate)', issuer `CN=GnuTLS Test CA', serial 0x4de0b4ca, RSA key 2432 bits, signed using RSA-SHA256, activated `2011-05-28 08:39:39 UTC', expires `2038-10-12 08:39:40 UTC', pin-sha256="ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE=" 616s Public Key ID: 616s sha1:482334530a8931384a5aeacab6d2a6dece1d2b18 616s sha256:6429dcdb1f84533b60e9286712fc2d707c6eb325ea2794492cd0832dcfa554d1 616s Public Key PIN: 616s pin-sha256:ZCnc2x+EUztg6ShnEvwtcHxusyXqJ5RJLNCDLc+lVNE= 616s 616s - Status: The certificate is trusted. 616s - Successfully sent 0 certificate(s) to server. 616s - Description: (TLS1.2-X.509)-(ECDHE-SECP256R1)-(RSA-SHA256)-(AES-256-GCM) 616s - Session ID: A3:44:31:CF:F7:C6:3A:44:99:AC:4F:AB:57:6E:00:44:5B:8C:85:1E:DD:05:7F:F0:73:6D:F5:DD:39:18:9A:65 616s - Options: extended master secret, safe renegotiation, 616s - Handshake was completed 616s 616s - Simple Client Mode: 616s 616s - Peer has closed the GnuTLS connection 616s Processed 1 CA certificate(s). 616s Resolving 'localhost:43757'... 616s Connecting to '::1:43757'... 616s - Successfully sent 0 certificate(s) to server. 616s - Server has requested a certificate. 616s - Certificate type: X.509 616s - Got a certificate list of 1 certificates. 616s - Certificate[0] info: 616s - no subject,issuer `CN=GnuTLS Test CA', serial 0x59897b84004ff2ed, RSA-PSS key 2048 bits, signed using RSA-SHA256, activated `2017-08-08 08:51:16 UTC', expires `9999-12-31 23:59:59 UTC', pin-sha256="NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo=" 616s Public Key ID: 616s sha1:6a7ea695c72a532d59eb8c2f46fdf1c60e21db29 616s sha256:34dd62756235d38dda862af9378a9238a7ffe885f33ff5f52a3e0a8b967def1a 616s Public Key PIN: 616s pin-sha256:NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo= 616s 616s - Status: The certificate is trusted. 616s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-256-GCM) 616s - Session ID: FB:B9:62:73:E1:14:88:13:75:6F:BD:CC:ED:12:3D:8A:DD:59:9E:4C:83:59:97:93:DC:BB:0C:12:3B:92:85:CE 616s - Options: 616s - Handshake was completed 616s 616s - Simple Client Mode: 616s 616s - Peer has closed the GnuTLS connection 616s Processed 1 CA certificate(s). 616s Resolving 'localhost:43757'... 616s Connecting to '::1:43757'... 616s - Successfully sent 0 certificate(s) to server. 616s - Server has requested a certificate. 616s - Certificate type: X.509 616s - Got a certificate list of 1 certificates. 616s - Certificate[0] info: 616s - no subject,issuer `CN=GnuTLS Test CA', serial 0x59897b84004ff2ed, RSA-PSS key 2048 bits, signed using RSA-SHA256, activated `2017-08-08 08:51:16 UTC', expires `9999-12-31 23:59:59 UTC', pin-sha256="NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo=" 616s Public Key ID: 616s sha1:6a7ea695c72a532d59eb8c2f46fdf1c60e21db29 616s sha256:34dd62756235d38dda862af9378a9238a7ffe885f33ff5f52a3e0a8b967def1a 616s Public Key PIN: 616s pin-sha256:NN1idWI1043ahir5N4qSOKf/6IXzP/X1Kj4Ki5Z97xo= 616s 616s - Status: The certificate is trusted. 616s - Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-SHA256)-(AES-256-GCM) 616s - Session ID: CA:3D:C2:60:ED:40:74:B5:93:61:F8:50:FC:B0:2C:4E:D0:20:98:7F:30:A2:2C:F2:0B:63:5D:1A:7B:6E:5A:BC 616s - Options: 616s - Handshake was completed 616s 616s - Simple Client Mode: 616s 616s - Peer has closed the GnuTLS connection 616s Exiting via signal 15 616s unreserved port 43757 616s SUCCESS [109]../../tests/server-multi-keys.sh 616s running [110]../../tests/server-weak-keys.sh ... 616s Checking whether a client will refuse weak but trusted keys 616s reserved port 26073 616s RTNETLINK answers: Invalid argument 616s RTNETLINK answers: Invalid argument 616s Echo Server listening on IPv4 0.0.0.0 port 26073...done 616s Echo Server listening on IPv6 :: port 26073...done 617s RTNETLINK answers: Invalid argument 617s |<3>| ASSERT: ../../../lib/x509/verify-high.c[gnutls_x509_trust_list_add_cas]:340 617s |<1>| There was a non-CA certificate in the trusted list: CN=localhost. 617s |<2>| added 3 protocols, 29 ciphersuites, 16 sig algos and 10 groups into priority list 617s |<4>| HSK[0x2aa0ac94c80]: Adv. version: 3.3 617s |<2>| Keeping ciphersuite c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384) 617s |<2>| Keeping ciphersuite cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305) 617s |<2>| Keeping ciphersuite c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM) 617s |<2>| Keeping ciphersuite c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1) 617s |<2>| Keeping ciphersuite c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256) 617s |<2>| Keeping ciphersuite c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM) 617s |<2>| Keeping ciphersuite c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1) 617s |<2>| Keeping ciphersuite c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384) 617s |<2>| Keeping ciphersuite cc.a8 (GNUTLS_ECDHE_RSA_CHACHA20_POLY1305) 617s |<2>| Keeping ciphersuite c0.14 (GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1) 617s |<2>| Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256) 617s |<2>| Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) 617s |<2>| Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384) 617s |<2>| Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM) 617s |<2>| Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1) 617s |<2>| Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256) 617s |<2>| Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM) 617s |<2>| Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1) 617s |<2>| Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384) 617s |<2>| Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305) 617s |<2>| Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM) 617s |<2>| Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1) 617s |<2>| Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256) 617s |<2>| Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM) 617s |<2>| Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Cookie/44) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (ALPN/16) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Signature Algorithms/13) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (4.1) RSA-SHA256 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (8.9) RSA-PSS-SHA256 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (4.3) ECDSA-SHA256 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (8.7) EdDSA-Ed25519 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (5.1) RSA-SHA384 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (8.10) RSA-PSS-SHA384 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (5.3) ECDSA-SHA384 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (8.8) EdDSA-Ed448 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (6.1) RSA-SHA512 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (8.11) RSA-PSS-SHA512 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (6.3) ECDSA-SHA512 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (2.1) RSA-SHA1 617s |<4>| EXT[0x2aa0ac94c80]: sent signature algo (2.3) ECDSA-SHA1 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension Signature Algorithms/13 (34 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Server Certificate Type/20) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Server certificate type was set to default cert type (X.509). We therefore do not send this extension. 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Key Share/51) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Post Handshake Auth/49) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Maximum Record Size/1) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (SRTP/14) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Safe Renegotiation/65281) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension Safe Renegotiation/65281 (1 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Client Certificate Type/19) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Client certificate type was set to default cert type (X.509). We therefore do not send this extension. 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Extended Master Secret/23) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension Extended Master Secret/23 (0 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Supported EC Point Formats/11) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension Supported EC Point Formats/11 (2 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Server Name Indication/0) for 'client hello' 617s |<2>| HSK[0x2aa0ac94c80]: sent server name: 'localhost' 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension Server Name Indication/0 (14 bytes) 617s Processed 1 CA certificate(s). 617s Resolving 'localhost:26073'... 617s Connecting to '::1:26073'... 617s - Certificate type: X.509 617s - Got a certificate list of 1 certificates. 617s - Certificate[0] info: 617s - subject `CN=localhost', issuer `CN=localhost', serial 0x1c73ae48f234b15918dc4b5733c383112c873ca8, RSA key 512 bits, signed using RSA-SHA256, activated `2019-12-15 02:55:58 UTC', expires `2029-12-12 02:55:58 UTC', pin-sha256="oDIMOYWTA7+CxtxnzqZd3z1JFANQkweXoIsGC1gjEAk=" 617s Public Key ID: 617s sha1:aea8c3db4050e7c168f3879265f8b9982f7f39be 617s sha256:a0320c39859303bf82c6dc67cea65ddf3d49140350930797a08b060b58231009 617s Public Key PIN: 617s pin-sha256:oDIMOYWTA7+CxtxnzqZd3z1JFANQkweXoIsGC1gjEAk= 617s 617s - Status: The certificate is NOT trusted. The certificate chain uses insecure algorithm. 617s *** PKI verification of server certificate failed... 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Supported Groups/10) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Sent group SECP256R1 (0x17) 617s |<4>| EXT[0x2aa0ac94c80]: Sent group SECP384R1 (0x18) 617s |<4>| EXT[0x2aa0ac94c80]: Sent group SECP521R1 (0x19) 617s |<4>| EXT[0x2aa0ac94c80]: Sent group X25519 (0x1d) 617s |<4>| EXT[0x2aa0ac94c80]: Sent group X448 (0x1e) 617s |<4>| EXT[0x2aa0ac94c80]: Sent group FFDHE2048 (0x100) 617s |<4>| EXT[0x2aa0ac94c80]: Sent group FFDHE3072 (0x101) 617s |<4>| EXT[0x2aa0ac94c80]: Sent group FFDHE4096 (0x102) 617s |<4>| EXT[0x2aa0ac94c80]: Sent group FFDHE6144 (0x103) 617s |<4>| EXT[0x2aa0ac94c80]: Sent group FFDHE8192 (0x104) 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension Supported Groups/10 (22 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Compress Certificate/27) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Supported Versions/43) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Session Ticket/35) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension Session Ticket/35 (0 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Record Size Limit/28) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension Record Size Limit/28 (2 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (OCSP Status Request/5) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension OCSP Status Request/5 (5 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Early Data/42) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Encrypt-then-MAC/22) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Sending extension Encrypt-then-MAC/22 (0 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (ClientHello Padding/21) for 'client hello' 617s |<4>| EXT[0x2aa0ac94c80]: Preparing extension (Pre Shared Key/41) for 'client hello' 617s |<4>| HSK[0x2aa0ac94c80]: CLIENT HELLO was queued [215 bytes] 617s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 617s |<4>| HSK[0x2aa0ac94c80]: SERVER HELLO (2) was received. Length 97[97], frag offset 0, frag length: 97, sequence: 0 617s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1130 617s |<3>| ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1374 617s |<4>| HSK[0x2aa0ac94c80]: Server's version: 3.3 617s |<4>| HSK[0x2aa0ac94c80]: SessionID length: 32 617s |<4>| HSK[0x2aa0ac94c80]: SessionID: ebcb4bdbf4163746748f981ca7a343249738f9aa1b315830b95a7f2bda6e2fae 617s |<4>| HSK[0x2aa0ac94c80]: Selected cipher suite: GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384 617s |<4>| EXT[0x2aa0ac94c80]: Parsing extension 'Extended Master Secret/23' (0 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Parsing extension 'Session Ticket/35' (0 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Parsing extension 'Safe Renegotiation/65281' (1 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: Parsing extension 'Record Size Limit/28' (2 bytes) 617s |<4>| EXT[0x2aa0ac94c80]: record_size_limit 16384 negotiated 617s |<4>| EXT[0x2aa0ac94c80]: Parsing extension 'Supported EC Point Formats/11' (2 bytes) 617s |<4>| HSK[0x2aa0ac94c80]: Safe renegotiation succeeded 617s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 617s |<4>| HSK[0x2aa0ac94c80]: CERTIFICATE (11) was received. Length 344[344], frag offset 0, frag length: 344, sequence: 0 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../lib/ocsp-api.c[gnutls_ocsp_status_request_get2]:96 617s |<3>| ASSERT: ../../../lib/x509/x509.c[gnutls_x509_crt_get_authority_key_id]:1691 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| self-signed cert found: subject `CN=localhost', issuer `CN=localhost', serial 0x1c73ae48f234b15918dc4b5733c383112c873ca8, RSA key 512 bits, signed using RSA-SHA256, activated `2019-12-15 02:55:58 UTC', expires `2029-12-12 02:55:58 UTC', pin-sha256="oDIMOYWTA7+CxtxnzqZd3z1JFANQkweXoIsGC1gjEAk=" 617s |<3>| ASSERT: ../../../lib/x509/x509.c[gnutls_x509_crt_get_authority_key_id]:1691 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| ASSERT: ../../../lib/nettle/mpi.c[wrap_nettle_mpi_print]:59 617s |<3>| cert: subject `CN=localhost', issuer `CN=localhost', serial 0x1c73ae48f234b15918dc4b5733c383112c873ca8, RSA key 512 bits, signed using RSA-SHA256, activated `2019-12-15 02:55:58 UTC', expires `2029-12-12 02:55:58 UTC', pin-sha256="oDIMOYWTA7+CxtxnzqZd3z1JFANQkweXoIsGC1gjEAk=" 617s |<2>| GNUTLS_SEC_PARAM_LOW: certificate's security level is unacceptable 617s |<3>| ASSERT: ../../../lib/x509/verify.c[is_level_acceptable]:504 617s |<3>| ASSERT: ../../../lib/x509/verify.c[_gnutls_verify_crt_status]:1014 617s |<3>| ASSERT: ../../lib/handshake.c[_gnutls_run_verify_callback]:3039 617s |<3>| ASSERT: ../../lib/handshake.c[handshake_client]:3152 617s *** Fatal error: Error in the certificate. 617s Error in handshake: A TLS fatal alert has been received. 617s |<3>| ASSERT: ../../../lib/x509/verify-high.c[gnutls_x509_trust_list_add_cas]:340 617s |<1>| There was a non-CA certificate in the trusted list: CN=localhost. 617s |<2>| added 6 protocols, 29 ciphersuites, 19 sig algos and 10 groups into priority list 617s |<4>| HSK[0x2aa09aadc80]: Adv. version: 3.3 617s |<2>| Keeping ciphersuite 13.02 (GNUTLS_AES_256_GCM_SHA384) 617s |<2>| Keeping ciphersuite 13.03 (GNUTLS_CHACHA20_POLY1305_SHA256) 617s |<2>| Keeping ciphersuite 13.01 (GNUTLS_AES_128_GCM_SHA256) 617s |<2>| Keeping ciphersuite 13.04 (GNUTLS_AES_128_CCM_SHA256) 617s |<2>| Keeping ciphersuite c0.2c (GNUTLS_ECDHE_ECDSA_AES_256_GCM_SHA384) 617s |<2>| Keeping ciphersuite cc.a9 (GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305) 617s |<2>| Keeping ciphersuite c0.ad (GNUTLS_ECDHE_ECDSA_AES_256_CCM) 617s |<2>| Keeping ciphersuite c0.0a (GNUTLS_ECDHE_ECDSA_AES_256_CBC_SHA1) 617s |<2>| Keeping ciphersuite c0.2b (GNUTLS_ECDHE_ECDSA_AES_128_GCM_SHA256) 617s |<2>| Keeping ciphersuite c0.ac (GNUTLS_ECDHE_ECDSA_AES_128_CCM) 617s |<2>| Keeping ciphersuite c0.09 (GNUTLS_ECDHE_ECDSA_AES_128_CBC_SHA1) 617s |<2>| Keeping ciphersuite c0.30 (GNUTLS_ECDHE_RSA_AES_256_GCM_SHA384) 617s |<2>| Keeping ciphersuite cc.a8 (GNUTLS_ECDHE_RSA_CHACHA20_POLY1305) 617s |<2>| Keeping ciphersuite c0.14 (GNUTLS_ECDHE_RSA_AES_256_CBC_SHA1) 617s |<2>| Keeping ciphersuite c0.2f (GNUTLS_ECDHE_RSA_AES_128_GCM_SHA256) 617s |<2>| Keeping ciphersuite c0.13 (GNUTLS_ECDHE_RSA_AES_128_CBC_SHA1) 617s |<2>| Keeping ciphersuite 00.9d (GNUTLS_RSA_AES_256_GCM_SHA384) 617s |<2>| Keeping ciphersuite c0.9d (GNUTLS_RSA_AES_256_CCM) 617s |<2>| Keeping ciphersuite 00.35 (GNUTLS_RSA_AES_256_CBC_SHA1) 617s |<2>| Keeping ciphersuite 00.9c (GNUTLS_RSA_AES_128_GCM_SHA256) 617s |<2>| Keeping ciphersuite c0.9c (GNUTLS_RSA_AES_128_CCM) 617s |<2>| Keeping ciphersuite 00.2f (GNUTLS_RSA_AES_128_CBC_SHA1) 617s |<2>| Keeping ciphersuite 00.9f (GNUTLS_DHE_RSA_AES_256_GCM_SHA384) 617s |<2>| Keeping ciphersuite cc.aa (GNUTLS_DHE_RSA_CHACHA20_POLY1305) 617s |<2>| Keeping ciphersuite c0.9f (GNUTLS_DHE_RSA_AES_256_CCM) 617s |<2>| Keeping ciphersuite 00.39 (GNUTLS_DHE_RSA_AES_256_CBC_SHA1) 617s |<2>| Keeping ciphersuite 00.9e (GNUTLS_DHE_RSA_AES_128_GCM_SHA256) 617s |<2>| Keeping ciphersuite c0.9e (GNUTLS_DHE_RSA_AES_128_CCM) 617s |<2>| Keeping ciphersuite 00.33 (GNUTLS_DHE_RSA_AES_128_CBC_SHA1) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Safe Renegotiation/65281) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Safe Renegotiation/65281 (1 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (PSK Key Exchange Modes/45) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Sending extension PSK Key Exchange Modes/45 (3 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (ALPN/16) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Client Certificate Type/19) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Client certificate type was set to default cert type (X.509). We therefore do not send this extension. 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Server Certificate Type/20) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Server certificate type was set to default cert type (X.509). We therefore do not send this extension. 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Record Size Limit/28) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Record Size Limit/28 (2 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Session Ticket/35) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Session Ticket/35 (0 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Supported EC Point Formats/11) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Supported EC Point Formats/11 (2 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Encrypt-then-MAC/22) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Encrypt-then-MAC/22 (0 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Early Data/42) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (SRTP/14) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Server Name Indication/0) for 'client hello' 617s |<2>| HSK[0x2aa09aadc80]: sent server name: 'localhost' 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Server Name Indication/0 (14 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (OCSP Status Request/5) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Sending extension OCSP Status Request/5 (5 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Extended Master Secret/23) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Extended Master Secret/23 (0 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Key Share/51) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: sending key share for SECP256R1 617s |<4>| EXT[0x2aa09aadc80]: sending key share for X25519 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Key Share/51 (107 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Cookie/44) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Maximum Record Size/1) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Post Handshake Auth/49) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Supported Groups/10) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Sent group SECP256R1 (0x17) 617s |<4>| EXT[0x2aa09aadc80]: Sent group SECP384R1 (0x18) 617s |<4>| EXT[0x2aa09aadc80]: Sent group SECP521R1 (0x19) 617s |<4>| EXT[0x2aa09aadc80]: Sent group X25519 (0x1d) 617s |<4>| EXT[0x2aa09aadc80]: Sent group X448 (0x1e) 617s |<4>| EXT[0x2aa09aadc80]: Sent group FFDHE2048 (0x100) 617s |<4>| EXT[0x2aa09aadc80]: Sent group FFDHE3072 (0x101) 617s |<4>| EXT[0x2aa09aadc80]: Sent group FFDHE4096 (0x102) 617s |<4>| EXT[0x2aa09aadc80]: Sent group FFDHE6144 (0x103) 617s |<4>| EXT[0x2aa09aadc80]: Sent group FFDHE8192 (0x104) 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Supported Groups/10 (22 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Supported Versions/43) for 'client hello' 617s |<2>| Advertizing version 3.4 617s |<2>| Advertizing version 3.3 617s |<2>| Advertizing version 3.2 617s |<2>| Advertizing version 3.1 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Supported Versions/43 (9 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Signature Algorithms/13) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (4.1) RSA-SHA256 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (8.9) RSA-PSS-SHA256 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (8.4) RSA-PSS-RSAE-SHA256 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (4.3) ECDSA-SHA256 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (8.7) EdDSA-Ed25519 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (5.1) RSA-SHA384 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (8.10) RSA-PSS-SHA384 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (8.5) RSA-PSS-RSAE-SHA384 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (5.3) ECDSA-SHA384 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (8.8) EdDSA-Ed448 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (6.1) RSA-SHA512 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (8.11) RSA-PSS-SHA512 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (8.6) RSA-PSS-RSAE-SHA512 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (6.3) ECDSA-SHA512 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (2.1) RSA-SHA1 617s |<4>| EXT[0x2aa09aadc80]: sent signature algo (2.3) ECDSA-SHA1 617s |<4>| EXT[0x2aa09aadc80]: Sending extension Signature Algorithms/13 (34 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Compress Certificate/27) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (ClientHello Padding/21) for 'client hello' 617s |<4>| EXT[0x2aa09aadc80]: Preparing extension (Pre Shared Key/41) for 'client hello' 617s |<4>| HSK[0x2aa09aadc80]: CLIENT HELLO was queued [386 bytes] 617s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 617s |<4>| HSK[0x2aa09aadc80]: SERVER HELLO (2) was received. Length 151[151], frag offset 0, frag length: 151, sequence: 0 617s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1130 617s |<3>| ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1374 617s |<4>| HSK[0x2aa09aadc80]: Server's version: 3.3 617s |<4>| EXT[0x2aa09aadc80]: Parsing extension 'Supported Versions/43' (2 bytes) 617s |<4>| EXT[0x2aa09aadc80]: Negotiated version: 3.4 617s |<4>| HSK[0x2aa09aadc80]: Selected cipher suite: GNUTLS_AES_256_GCM_SHA384 617s Error in handshake: Some constraint limits were reached. 617s |<4>| EXT[0x2aa09aadc80]: Parsing extension 'Key Share/51' (69 bytes) 617s |<4>| HSK[0x2aa09aadc80]: Selected group SECP256R1 (2) 617s |<2>| EXT[0x2aa09aadc80]: client generated SECP256R1 shared key 617s |<4>| REC[0x2aa09aadc80]: Sent ChangeCipherSpec 617s |<4>| HSK[0x2aa09aadc80]: TLS 1.3 re-key with cipher suite: GNUTLS_AES_256_GCM_SHA384 617s |<3>| ASSERT: ../../lib/buffers.c[get_last_packet]:1138 617s |<3>| ASSERT: ../../lib/record.c[record_add_to_buffers]:887 617s |<3>| ASSERT: ../../lib/record.c[record_add_to_buffers]:893 617s |<3>| ASSERT: ../../lib/record.c[_gnutls_recv_in_buffers]:1565 617s |<3>| ASSERT: ../../lib/buffers.c[_gnutls_handshake_io_recv_int]:1412 617s |<3>| ASSERT: ../../lib/handshake.c[_gnutls_recv_handshake]:1613 617s |<3>| ASSERT: ../../lib/tls13/encrypted_extensions.c[_gnutls13_recv_encrypted_extensions]:38 617s |<3>| ASSERT: ../../lib/handshake-tls13.c[_gnutls13_handshake_client]:118 617s *** Fatal error: A TLS fatal alert has been received. 617s |<3>| ASSERT: ../../lib/alert.c[gnutls_alert_send_appropriate]:382 617s Exiting via signal 15 617s RTNETLINK answers: Invalid argument 617s RTNETLINK answers: Invalid argument 617s Echo Server listening on IPv4 0.0.0.0 port 38630...done 617s Echo Server listening on IPv6 :: port 38630...done 617s Processed 1 CA certificate(s). 617s Resolving 'localhost:26073'... 617s Connecting to '::1:26073'... 617s *** Received alert [80]: Internal error 617s unreserved port 26073 617s SUCCESS [110]../../tests/server-weak-keys.sh 617s running [111]../../tests/sni-hostname.sh ... 617s Checking SNI hostname in gnutls-cli 617s reserved port 38630 618s RTNETLINK answers: Invalid argument 618s Error in handshake: The SNI host name not recognised. 618s *** Fatal error: A TLS fatal alert has been received. 618s Error in handshake: The SNI host name not recognised. 618s *** Fatal error: A TLS fatal alert has been received. 618s *** Fatal error: Error in the certificate. 618s Error in handshake: A TLS fatal alert has been received. 618s unreserved port 38630 618s Exiting via signal 15 618s SUCCESS [111]../../tests/sni-hostname.sh 618s running [112]../../tests/sni-resume.sh ... 618s Checking if the SNI extension is parsed in gnutls-serv during cache-based session resumption 618s reserved port 26563 618s RTNETLINK answers: Invalid argument 619s RTNETLINK answers: Invalid argument 619s RTNETLINK answers: Invalid argument 619s Warning: no private key and certificate pairs were set. 619s Echo Server listening on IPv4 0.0.0.0 port 26563...done 619s Echo Server listening on IPv6 :: port 26563...done 619s Exiting via signal 15 619s unreserved port 26563 619s SUCCESS [112]../../tests/sni-resume.sh 619s running [113]../../tests/starttls-ftp.sh ... 619s SKIPPED [113]../../tests/starttls-ftp.sh 619s running [114]../../tests/starttls-lmtp.sh ... 619s SKIPPED [114]../../tests/starttls-lmtp.sh 619s running [115]../../tests/starttls-nntp.sh ... 619s SKIPPED [115]../../tests/starttls-nntp.sh 619s running [116]../../tests/starttls-pop3.sh ... 619s SKIPPED [116]../../tests/starttls-pop3.sh 619s running [117]../../tests/starttls-sieve.sh ... 619s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 619s gnutls[2]: getrandom random generator was selected 619s gnutls[2]: cfg: disabling curve secp256r1 619s gnutls[2]: cfg: disabling curve secp521r1 619s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 619s gnutls[2]: cfg: loaded system config config.5318.tmp mtime 1757007672 619s RTNETLINK answers: Invalid argument 619s RTNETLINK answers: Invalid argument 619s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 619s gnutls[2]: getrandom random generator was selected 619s gnutls[2]: cfg: disabling version tls1.0 619s gnutls[2]: cfg: disabling version tls1.1 619s gnutls[2]: cfg: disabling version dtls0.9 619s gnutls[2]: cfg: disabling version dtls1.0 619s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 619s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 619s Echo Server listening on IPv4 0.0.0.0 port 43604...SKIPPED [117]../../tests/starttls-sieve.sh 619s running [118]../../tests/starttls-smtp.sh ... 619s SKIPPED [118]../../tests/starttls-smtp.sh 619s running [119]../../tests/starttls-xmpp.sh ... 619s SKIPPED [119]../../tests/starttls-xmpp.sh 619s running [120]../../tests/starttls.sh ... 619s SKIPPED [120]../../tests/starttls.sh 619s running [121]../../tests/system-override-curves.sh ... 619s Groups: GROUP-SECP192R1, GROUP-SECP224R1, GROUP-SECP384R1, GROUP-X25519, GROUP-GC256B, GROUP-GC512A, GROUP-X448, GROUP-FFDHE2048, GROUP-FFDHE3072, GROUP-FFDHE4096, GROUP-FFDHE6144, GROUP-FFDHE8192 619s Groups: GROUP-SECP192R1, GROUP-SECP224R1, GROUP-SECP384R1, GROUP-X25519, GROUP-GC256B, GROUP-GC512A, GROUP-X448, GROUP-FFDHE2048, GROUP-FFDHE3072, GROUP-FFDHE4096, GROUP-FFDHE6144, GROUP-FFDHE8192 619s reserved port 43604 619s done 619s Echo Server listening on IPv6 :: port 43604...done 620s RTNETLINK answers: Invalid argument 620s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 620s gnutls[2]: getrandom random generator was selected 620s gnutls[2]: cfg: disabling version tls1.0 620s gnutls[2]: cfg: disabling version tls1.1 620s gnutls[2]: cfg: disabling version dtls0.9 620s gnutls[2]: cfg: disabling version dtls1.0 620s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 620s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 620s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 620s gnutls[2]: getrandom random generator was selected 620s reserved port 64410 620s gnutls[2]: cfg: disabling curve secp256r1 620s gnutls[2]: cfg: disabling curve secp521r1 620s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 620s gnutls[2]: cfg: loaded system config config.5318.tmp mtime 1757007672 620s Syntax error at: +CURVE-SECP256R1:+CURVE-SECP521R1 620s Error in handshake: The TLS connection was non-properly terminated. 620s Exiting via signal 15 620s RTNETLINK answers: Invalid argument 620s RTNETLINK answers: Invalid argument 620s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 620s gnutls[2]: getrandom random generator was selected 620s gnutls[2]: cfg: disabling curve secp256r1 620s gnutls[2]: cfg: disabling curve secp521r1 620s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 620s gnutls[2]: cfg: loaded system config config.5318.tmp mtime 1757007672 620s Echo Server listening on IPv4 0.0.0.0 port 64410...done 620s Echo Server listening on IPv6 :: port 64410...done 621s RTNETLINK answers: Invalid argument 621s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 621s gnutls[2]: getrandom random generator was selected 621s gnutls[2]: cfg: disabling version tls1.0 621s gnutls[2]: cfg: disabling version tls1.1 621s gnutls[2]: cfg: disabling version dtls0.9 621s gnutls[2]: cfg: disabling version dtls1.0 621s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 621s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 621s Error in handshake: No common key share with peer. 621s *** Fatal error: A TLS fatal alert has been received. 621s unreserved port 64410 621s SUCCESS [121]../../tests/system-override-curves.sh 621s running [122]../../tests/system-override-default-priority-string.sh ... 621s reserved port 36187 621s Exiting via signal 15 621s RTNETLINK answers: Invalid argument 621s RTNETLINK answers: Invalid argument 621s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 621s gnutls[2]: getrandom random generator was selected 621s gnutls[2]: cfg: setting default-priority-string to NONE 621s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 621s gnutls[2]: cfg: loaded system config ../../tests//system-override-default-priority-string.none.config mtime 1706514143 621s Echo Server listening on IPv4 0.0.0.0 port 36187...done 621s Echo Server listening on IPv6 :: port 36187...done 622s RTNETLINK answers: Invalid argument 622s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 622s gnutls[2]: getrandom random generator was selected 622s gnutls[2]: cfg: unable to access: : 2 622s Could not set default policy: No or insufficient priorities were set. 622s *** Fatal error: Error in the pull function. 622s ../../tests/system-override-default-priority-string.sh: 57: kill: No such process 622s 622s reserved port 26920 622s RTNETLINK answers: Invalid argument 622s RTNETLINK answers: Invalid argument 622s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 622s gnutls[2]: getrandom random generator was selected 622s gnutls[2]: cfg: setting default-priority-string to NORMAL:-VERS-ALL:+VERS-TLS1.3 622s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 622s gnutls[2]: cfg: loaded system config ../../tests//system-override-default-priority-string.only-tls13.config mtime 1706514143 622s Echo Server listening on IPv4 0.0.0.0 port 26920...done 622s Echo Server listening on IPv6 :: port 26920...done 623s RTNETLINK answers: Invalid argument 623s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 623s gnutls[2]: getrandom random generator was selected 623s gnutls[2]: cfg: unable to access: : 2 623s Error in handshake: No supported cipher suites have been found. 623s *** Fatal error: A TLS fatal alert has been received. 623s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 623s gnutls[2]: getrandom random generator was selected 623s gnutls[2]: cfg: unable to access: : 2 623s Exiting via signal 15 623s reserved port 35835 623s RTNETLINK answers: Invalid argument 623s RTNETLINK answers: Invalid argument 623s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 623s gnutls[2]: getrandom random generator was selected 623s gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL 623s gnutls[2]: cfg: setting default-priority-string to 623s gnutls[2]: cfg: empty default-priority-string, using default 623s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 623s gnutls[2]: cfg: loaded system config ../../tests//system-override-default-priority-string.bad.config mtime 1706514143 623s Echo Server listening on IPv4 0.0.0.0 port 35835...done 623s Echo Server listening on IPv6 :: port 35835...done 624s RTNETLINK answers: Invalid argument 624s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 624s gnutls[2]: getrandom random generator was selected 624s gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL 624s gnutls[2]: cfg: setting default-priority-string to 624s gnutls[2]: cfg: empty default-priority-string, using default 624s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 624s gnutls[2]: cfg: loaded system config ../../tests//system-override-default-priority-string.bad.config mtime 1706514143 624s unreserved port 35835 624s Exiting via signal 15 624s SUCCESS [122]../../tests/system-override-default-priority-string.sh 624s running [123]../../tests/system-override-hash-filters-prf.sh ... 624s SUCCESS [123]../../tests/system-override-hash-filters-prf.sh 624s running [124]../../tests/system-override-invalid.sh ... 624s SUCCESS [124]../../tests/system-override-invalid.sh 624s running [125]../../tests/system-override-kx.sh ... 624s reserved port 17825 624s RTNETLINK answers: Invalid argument 624s RTNETLINK answers: Invalid argument 624s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 624s gnutls[2]: getrandom random generator was selected 624s gnutls[2]: cfg: disabling version tls1.0 624s gnutls[2]: cfg: disabling version tls1.1 624s gnutls[2]: cfg: disabling version dtls0.9 624s gnutls[2]: cfg: disabling version dtls1.0 624s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 624s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 624s Echo Server listening on IPv4 0.0.0.0 port 17825...done 624s Echo Server listening on IPv6 :: port 17825...done 625s RTNETLINK answers: Invalid argument 625s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 625s gnutls[2]: getrandom random generator was selected 625s gnutls[2]: cfg: disabling version tls1.0 625s gnutls[2]: cfg: disabling version tls1.1 625s gnutls[2]: cfg: disabling version dtls0.9 625s gnutls[2]: cfg: disabling version dtls1.0 625s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 625s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 625s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 625s reserved port 63667 625s gnutls[2]: getrandom random generator was selected 625s gnutls[2]: cfg: disabling key exchange dhe-dss for TLS 625s gnutls[2]: cfg: disabling key exchange dhe-rsa for TLS 625s gnutls[2]: cfg: disabling key exchange unknown for TLS 625s gnutls[2]: cfg: unknown key exchange unknown listed at tls-disabled-kx 625s gnutls[2]: cfg: unable to parse: config.5429.tmp: 5 625s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 625s gnutls[2]: getrandom random generator was selected 625s gnutls[2]: cfg: disabling key exchange dhe-dss for TLS 625s gnutls[2]: cfg: disabling key exchange dhe-rsa for TLS 625s gnutls[2]: cfg: disabling key exchange unknown for TLS 625s gnutls[2]: cfg: unknown key exchange unknown listed at tls-disabled-kx 625s gnutls[2]: cfg: unable to parse: config.5429.tmp: 5 625s Exiting via signal 15 625s RTNETLINK answers: Invalid argument 625s RTNETLINK answers: Invalid argument 625s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 625s gnutls[2]: getrandom random generator was selected 625s gnutls[2]: cfg: disabling key exchange dhe-dss for TLS 625s gnutls[2]: cfg: disabling key exchange dhe-rsa for TLS 625s gnutls[2]: cfg: disabling key exchange unknown for TLS 625s gnutls[2]: cfg: unknown key exchange unknown listed at tls-disabled-kx 625s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 625s gnutls[2]: cfg: loaded system config config.5429.tmp mtime 1757007677 625s Echo Server listening on IPv4 0.0.0.0 port 63667...done 625s Echo Server listening on IPv6 :: port 63667...done 626s RTNETLINK answers: Invalid argument 626s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 626s gnutls[2]: getrandom random generator was selected 626s gnutls[2]: cfg: disabling version tls1.0 626s gnutls[2]: cfg: disabling version tls1.1 626s gnutls[2]: cfg: disabling version dtls0.9 626s gnutls[2]: cfg: disabling version dtls1.0 626s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 626s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 626s Error in handshake: No supported cipher suites have been found. 626s *** Fatal error: A TLS fatal alert has been received. 626s Exiting via signal 15 626s unreserved port 63667 626s SUCCESS [125]../../tests/system-override-kx.sh 626s running [126]../../tests/system-override-profiles.sh ... 626s reserved port 8233 626s RTNETLINK answers: Invalid argument 626s RTNETLINK answers: Invalid argument 626s Echo Server listening on IPv4 0.0.0.0 port 8233...done 626s Echo Server listening on IPv6 :: port 8233...done 627s RTNETLINK answers: Invalid argument 627s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 627s gnutls[2]: getrandom random generator was selected 627s gnutls[2]: cfg: disabling version tls1.0 627s gnutls[2]: cfg: disabling version tls1.1 627s gnutls[2]: cfg: disabling version dtls0.9 627s gnutls[2]: cfg: disabling version dtls1.0 627s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 627s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 627s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 627s gnutls[2]: getrandom random generator was selected 627s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 627s gnutls[2]: cfg: loaded system config config.5466.tmp mtime 1757007680 627s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 627s gnutls[2]: getrandom random generator was selected 627s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 627s gnutls[2]: cfg: loaded system config config.5466.tmp mtime 1757007680 627s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 627s gnutls[2]: getrandom random generator was selected 627s gnutls[2]: cfg: disabling version tls1.0 627s gnutls[2]: cfg: disabling version tls1.1 627s gnutls[2]: cfg: disabling version dtls0.9 627s gnutls[2]: cfg: disabling version dtls1.0 627s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 627s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 627s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 627s gnutls[2]: getrandom random generator was selected 627s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 627s gnutls[2]: cfg: loaded system config config.5466.tmp mtime 1757007680 627s *** Fatal error: Error in the certificate. 627s Error in handshake: A TLS fatal alert has been received. 627s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 627s gnutls[2]: getrandom random generator was selected 627s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 627s gnutls[2]: cfg: loaded system config config.5466.tmp mtime 1757007680 627s *** Fatal error: Error in the certificate. 627s Error in handshake: A TLS fatal alert has been received. 627s Exiting via signal 15 627s unreserved port 8233 627s SUCCESS [126]../../tests/system-override-profiles.sh 627s running [127]../../tests/system-override-session-hash.sh ... 627s library is NOT in FIPS140-2 mode 627s reserved port 10486 627s RTNETLINK answers: Invalid argument 627s RTNETLINK answers: Invalid argument 627s Echo Server listening on IPv4 0.0.0.0 port 10486...done 627s Echo Server listening on IPv6 :: port 10486...done 628s RTNETLINK answers: Invalid argument 628s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 628s gnutls[2]: getrandom random generator was selected 628s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 628s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.Cj1DJJ/request.cfg mtime 1757007680 628s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 628s gnutls[2]: getrandom random generator was selected 628s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 628s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.Cj1DJJ/request.cfg mtime 1757007680 628s kill 5508 628s unreserved port 10486 628s Exiting via signal 15 628s RTNETLINK answers: Invalid argument 630s reserved port 10486 630s unreserved port 10486 630s RTNETLINK answers: Invalid argument 632s reserved port 10486 632s RTNETLINK answers: Invalid argument 632s unreserved port 10486 634s reserved port 10486 634s RTNETLINK answers: Invalid argument 634s unreserved port 10486 637s reserved port 10486 637s RTNETLINK answers: Invalid argument 637s unreserved port 10486 638s reserved port 10486 638s RTNETLINK answers: Invalid argument 638s unreserved port 10486 640s Echo Server listening on IPv4 0.0.0.0 port 10486...done 640s Echo Server listening on IPv6 :: port 10486...done 641s RTNETLINK answers: Invalid argument 641s reserved port 10486 641s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 641s gnutls[2]: getrandom random generator was selected 641s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 641s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.Cj1DJJ/request.cfg mtime 1757007680 641s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 641s gnutls[2]: getrandom random generator was selected 641s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 641s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.Cj1DJJ/request.cfg mtime 1757007680 641s Exiting via signal 15 641s unreserved port 10486 641s RTNETLINK answers: Invalid argument 643s reserved port 10486 643s RTNETLINK answers: Invalid argument 643s unreserved port 10486 645s reserved port 10486 645s RTNETLINK answers: Invalid argument 645s unreserved port 10486 647s reserved port 10486 647s RTNETLINK answers: Invalid argument 647s unreserved port 10486 649s reserved port 10486 649s RTNETLINK answers: Invalid argument 649s unreserved port 10486 651s reserved port 10486 651s RTNETLINK answers: Invalid argument 651s unreserved port 10486 653s Echo Server listening on IPv4 0.0.0.0 port 10486...done 653s Echo Server listening on IPv6 :: port 10486...done 654s RTNETLINK answers: Invalid argument 654s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 654s gnutls[2]: getrandom random generator was selected 654s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 654s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.Cj1DJJ/require.cfg mtime 1757007680 654s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 654s gnutls[2]: getrandom random generator was selected 654s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 654s gnutls[2]: cfg: loaded system config /tmp/system-override-session-hash.Cj1DJJ/require.cfg mtime 1757007680 654s Exiting via signal 15 654s reserved port 10486 654s unreserved port 10486 654s RTNETLINK answers: Invalid argument 658s reserved port 10486 658s RTNETLINK answers: Invalid argument 658s unreserved port 10486 658s reserved port 10486 658s unreserved port 10486 658s RTNETLINK answers: Invalid argument 660s reserved port 10486 660s RTNETLINK answers: Invalid argument 660s unreserved port 10486 662s reserved port 10486 662s RTNETLINK answers: Invalid argument 662s unreserved port 10486 664s reserved port 10486 664s RTNETLINK answers: Invalid argument 664s unreserved port 10486 667s Echo Server listening on IPv4 0.0.0.0 port 10486...done 667s Echo Server listening on IPv6 :: port 10486...done 667s RTNETLINK answers: Invalid argument 667s Exiting via signal 15 667s unreserved port 10486 667s SUCCESS [127]../../tests/system-override-session-hash.sh 667s running [128]../../tests/system-override-special-allowlist.sh ... 668s SUCCESS [128]../../tests/system-override-special-allowlist.sh 668s running [129]../../tests/system-override-tls.sh ... 668s reserved port 49898 668s RTNETLINK answers: Invalid argument 668s RTNETLINK answers: Invalid argument 668s Echo Server listening on IPv4 0.0.0.0 port 49898...done 668s Echo Server listening on IPv6 :: port 49898...done 669s RTNETLINK answers: Invalid argument 669s Sanity testing 669s Testing TLS1.3 669s * sanity 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 669s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 669s gnutls[2]: cfg: disabling MAC sha1 for TLS 669s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5765.tmp mtime 1757007722 669s * fallback to good options 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 669s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 669s gnutls[2]: cfg: disabling MAC sha1 for TLS 669s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5765.tmp mtime 1757007722 669s * disabled cipher 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 669s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 669s gnutls[2]: cfg: disabling MAC sha1 for TLS 669s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5765.tmp mtime 1757007722 669s Error in priorities: No or insufficient priorities were set. 669s Error in handshake: The TLS connection was non-properly terminated. 669s Processed 1 CA certificate(s). 669s Resolving '127.0.0.1:49898'... 669s Connecting to '127.0.0.1:49898'... 669s * disabled group 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 669s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 669s gnutls[2]: cfg: disabling MAC sha1 for TLS 669s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5765.tmp mtime 1757007722 669s Testing TLS1.2 669s * sanity 669s *** Fatal error: The curve is unsupported 669s Error in handshake: A TLS fatal alert has been received. 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s * fallback to good options 669s * disabled cipher 669s * disabled MAC 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 669s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 669s gnutls[2]: cfg: disabling MAC sha1 for TLS 669s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5765.tmp mtime 1757007722 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 669s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 669s gnutls[2]: cfg: disabling MAC sha1 for TLS 669s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5765.tmp mtime 1757007722 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 669s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 669s gnutls[2]: cfg: disabling MAC sha1 for TLS 669s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5765.tmp mtime 1757007722 669s Error in priorities: No or insufficient priorities were set. 669s Error in handshake: The TLS connection was non-properly terminated. 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: disabling cipher aes-128-gcm for TLS 669s gnutls[2]: cfg: disabling cipher aes-128-cbc for TLS 669s gnutls[2]: cfg: disabling MAC sha1 for TLS 669s gnutls[2]: cfg: disabling group ffdhe2048 for TLS 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5765.tmp mtime 1757007722 669s Error in priorities: No or insufficient priorities were set. 669s Error in handshake: The TLS connection was non-properly terminated. 669s Exiting via signal 15 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: enabling version tls1.1 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5795.tmp mtime 1757007722 669s gnutls[2]: cfg: deferred setting system-wide priority string 669s gnutls[2]: cfg: system priority config.5795.tmp has not changed 669s gnutls[2]: cfg: finalized system-wide priority string 669s gnutls[2]: resolved 'SYSTEM' to 'NONE:+VERS-TLS1.1', next '' 669s gnutls[2]: selected priority string: NONE:+VERS-TLS1.1 669s gnutls[2]: added 1 protocols, 0 ciphersuites, 0 sig algos and 0 groups into priority list 669s gnutls[3]: ASSERT: ../../lib/priority.c[set_ciphersuite_list]:2954 669s Error in priorities: No or insufficient priorities were set. 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: enabling version tls1.1 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config config.5795.tmp mtime 1757007722 669s gnutls[2]: cfg: deferred setting system-wide priority string 669s gnutls[2]: cfg: system priority config.5795.tmp has not changed 669s gnutls[2]: cfg: finalized system-wide priority string 669s gnutls[2]: resolved 'SYSTEM' to 'NONE:+VERS-TLS1.1', next '' 669s gnutls[2]: selected priority string: NONE:+VERS-TLS1.1:+CIPHER-ALL:+MAC-ALL:+GROUP-ALL 669s gnutls[2]: added 1 protocols, 0 ciphersuites, 0 sig algos and 0 groups into priority list 669s gnutls[3]: ASSERT: ../../lib/priority.c[set_ciphersuite_list]:2954 669s Error in priorities: No or insufficient priorities were set. 669s RTNETLINK answers: Invalid argument 669s RTNETLINK answers: Invalid argument 669s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 669s gnutls[2]: getrandom random generator was selected 669s gnutls[2]: cfg: disabling version tls1.0 669s gnutls[2]: cfg: disabling version tls1.1 669s gnutls[2]: cfg: disabling version dtls0.9 669s gnutls[2]: cfg: disabling version dtls1.0 669s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 669s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 669s Echo Server listening on IPv4 0.0.0.0 port 38709...done 669s Echo Server listening on IPv6 :: port 38709...done 669s unreserved port 49898 669s SUCCESS [129]../../tests/system-override-tls.sh 669s running [130]../../tests/system-override-versions-allowlist.sh ... 669s reserved port 38709 670s RTNETLINK answers: Invalid argument 670s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 670s gnutls[2]: getrandom random generator was selected 670s gnutls[2]: cfg: enabling version tls1.1 670s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 670s gnutls[2]: cfg: loaded system config config.5795.tmp mtime 1757007722 670s gnutls[2]: cfg: deferred setting system-wide priority string 670s Error in priorities: No or insufficient priorities were set. 670s Exiting via signal 15 670s reserved port 44060 670s RTNETLINK answers: Invalid argument 670s RTNETLINK answers: Invalid argument 670s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 670s gnutls[2]: getrandom random generator was selected 670s gnutls[2]: cfg: enabling version tls1.1 670s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 670s gnutls[2]: cfg: loaded system config config.5795.tmp mtime 1757007722 670s gnutls[2]: cfg: deferred setting system-wide priority string 670s Echo Server listening on IPv4 0.0.0.0 port 44060...done 670s Echo Server listening on IPv6 :: port 44060...done 671s RTNETLINK answers: Invalid argument 671s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 671s gnutls[2]: getrandom random generator was selected 671s gnutls[2]: cfg: disabling version tls1.0 671s gnutls[2]: cfg: disabling version tls1.1 671s gnutls[2]: cfg: disabling version dtls0.9 671s gnutls[2]: cfg: disabling version dtls1.0 671s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 671s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 671s Syntax error at: @SYSTEM:+CIPHER-ALL:+MAC-ALL:+GROUP-ALL 671s unreserved port 44060 671s SUCCESS [130]../../tests/system-override-versions-allowlist.sh 671s running [131]../../tests/system-override-versions.sh ... 671s Protocols: VERS-TLS1.0, VERS-TLS1.1, VERS-DTLS0.9, VERS-DTLS1.0, VERS-DTLS1.2 671s *** Fatal error: Error in the pull function. 671s ../../tests/system-override-versions-allowlist.sh: 105: kill: No such process 671s 671s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 671s gnutls[2]: getrandom random generator was selected 671s gnutls[2]: cfg: disabling version tls1.2 671s gnutls[2]: cfg: disabling version tls1.3 671s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 671s gnutls[2]: cfg: loaded system config config.5838.tmp mtime 1757007724 671s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 671s gnutls[2]: getrandom random generator was selected 671s Protocols: VERS-TLS1.1, VERS-TLS1.0, VERS-DTLS1.2, VERS-DTLS1.0 671s reserved port 8594 671s gnutls[2]: cfg: disabling version tls1.2 671s gnutls[2]: cfg: disabling version tls1.3 671s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 671s gnutls[2]: cfg: loaded system config config.5838.tmp mtime 1757007724 671s gnutls[2]: added 4 protocols, 29 ciphersuites, 16 sig algos and 10 groups into priority list 671s RTNETLINK answers: Invalid argument 671s RTNETLINK answers: Invalid argument 671s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 671s gnutls[2]: getrandom random generator was selected 671s gnutls[2]: cfg: disabling version tls1.0 671s gnutls[2]: cfg: disabling version tls1.1 671s gnutls[2]: cfg: disabling version dtls0.9 671s gnutls[2]: cfg: disabling version dtls1.0 671s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 671s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 671s Echo Server listening on IPv4 0.0.0.0 port 8594...done 671s Echo Server listening on IPv6 :: port 8594...done 673s RTNETLINK answers: Invalid argument 673s reserved port 53843 673s unreserved port 53843 673s SUCCESS [131]../../tests/system-override-versions.sh 673s running [132]../../tests/systemkey.sh ... 673s SKIPPED [132]../../tests/systemkey.sh 673s running [133]../../tests/testpkcs11.sh ... 673s Testing PKCS11 support 673s usage: ../../tests/testpkcs11.sh: [pkcs15|softhsm|sc-hsm] 673s assuming 'softhsm' 673s 673s * Initializing smart card... ok 673s * Token: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=27c1cdafbcec20df;token=GnuTLS-Test 673s * Setting SO PIN... ok 673s * Re-setting SO PIN... ok 673s * Setting too large SO PIN... ok 673s * Setting large SO PIN... ok 673s * Re-setting SO PIN... ok 673s * Setting user PIN... ok 673s * Re-setting user PIN... ok 673s * Setting too large user PIN... ok 673s * Setting large user PIN... ok 673s * Re-setting user PIN... ok 673s * Writing a client private key... ok 673s * Checking whether object was marked private... ok 673s * Checking whether object was marked sensitive... ok 673s * Checking whether object was not marked always authenticate... ok 673s * Writing a client private key... ok 673s * Checking whether object was marked always authenticate... ok 673s * Generating ECC private key (256)... ok 673s * Deleting private key... ok 673s * Generating ECC private key without --login (256)... ok 673s * Deleting private key... ok 673s * Generating ECC private key (384)... ok 673s * Deleting private key... ok 673s * Generating RSA private key (2048)... gnutls[2]: Enabled GnuTLS 3.8.9 logging... 673s gnutls[2]: getrandom random generator was selected 673s gnutls[2]: cfg: disabling version tls1.2 673s gnutls[2]: cfg: disabling version tls1.3 673s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 673s gnutls[2]: cfg: loaded system config config.5838.tmp mtime 1757007724 673s Error in handshake: A packet with illegal or unsupported version was received. 673s *** Fatal error: A TLS fatal alert has been received. 673s Exiting via signal 15 673s RTNETLINK answers: Invalid argument 673s RTNETLINK answers: Invalid argument 673s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 673s gnutls[2]: getrandom random generator was selected 673s gnutls[2]: cfg: disabling version tls1.2 673s gnutls[2]: cfg: disabling version tls1.3 673s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 673s gnutls[2]: cfg: loaded system config config.5838.tmp mtime 1757007724 673s Echo Server listening on IPv4 0.0.0.0 port 53843...done 673s Echo Server listening on IPv6 :: port 53843...done 673s RTNETLINK answers: Invalid argument 673s gnutls[2]: Enabled GnuTLS 3.8.9 logging... 673s gnutls[2]: getrandom random generator was selected 673s gnutls[2]: cfg: disabling version tls1.0 673s gnutls[2]: cfg: disabling version tls1.1 673s gnutls[2]: cfg: disabling version dtls0.9 673s gnutls[2]: cfg: disabling version dtls1.0 673s gnutls[2]: cfg: unable to open: /var/lib/crypto-config/profiles/current/gnutls.conf: 2 673s gnutls[2]: cfg: loaded system config /etc/gnutls/config mtime 1752244743 673s *** Fatal error: A packet with illegal or unsupported version was received. 673s Error in handshake: A TLS fatal alert has been received. 673s Exiting via signal 15 673s ok 673s * Deleting private key... ok 681s * Generating DSA private key (3072)... ok 681s * Deleting private key... ok 681s * Importing RSA private key (1024)... ok 681s * Deleting private key... ok 681s * Importing ECC private key (256)... ok 681s * Deleting private key... ok 685s * Importing DSA private key (2048)... ok 685s * Deleting private key... ok 685s * Generating RSA private key (1024)... ok 686s * Checking whether generated private key was marked private... ok 686s * Checking whether private key was marked sensitive... ok 686s * Change the CKA_ID of generated private key... ok 686s * Exporting public key of generated private key... ok 686s * Change the CKA_LABEL of generated private key... ok 686s * Exporting public key as SO... ok 686s * List private key without GNUTLS_PIN... ok 686s * Generating client certificate... ok 686s * Writing client certificate... ok 686s * Checking whether ID was correctly set... ok 686s * Checking whether object was public... ok 686s * Writing certificate of client's CA... ok 686s * Testing certificate flags... ok 686s * Checking output of certificateok 686s * Trying to obtain back the cert... ok 686s * Trying to obtain the full chain... ok 686s * Writing the server private key... ok 686s * Writing the server certificate... ok 686s * Writing the server public key... ok 686s * Testing signatures using the private key... ok 686s * Testing RSA-PSS signatures using the private key... ok 686s * Testing signatures using the private key (with ID)... ok 686s * Using PKCS #11 with gnutls-cli (full URLs)... reserved port 33981 686s RTNETLINK answers: Invalid argument 687s RTNETLINK answers: Invalid argument 687s ok 687s * Using PKCS #11 with gnutls-cli (abbrv URLs)... reserved port 13740 687s RTNETLINK answers: Invalid argument 688s RTNETLINK answers: Invalid argument 688s ok 688s * Generating RSA private key on HSM... ok 688s * Checking whether right ID is set on copy... ok 688s * Generating RSA private key... ok 688s * Checking whether right ID is set on copy... ok 688s * Generating ECDSA private key... ok 688s * Checking whether right ID is set on copy... ok 688s * Deleting the server certificate... ok 688s * Testing signatures using the private key and --set-pin... ok 688s * All smart cards tests succeeded 688s unreserved port 13740 688s SUCCESS [133]../../tests/testpkcs11.sh 688s running [134]../../tests/tpm2.sh ... 688s Need swtpm package to run this test. 688s SKIPPED [134]../../tests/tpm2.sh 688s running [135]../../tests/tpmtool_test.sh ... 688s Need to be root to run this test. 688s SKIPPED [135]../../tests/tpmtool_test.sh 688s autopkgtest [17:42:21]: test run-upstream-testsuite: -----------------------] 689s autopkgtest [17:42:22]: test run-upstream-testsuite: - - - - - - - - - - results - - - - - - - - - - 689s run-upstream-testsuite PASS 689s autopkgtest [17:42:22]: @@@@@@@@@@@@@@@@@@@@ summary 689s run-upstream-testsuite PASS