Tue Feb 18 04:25:27 UTC 2025  I: starting to build pkcs11-provider/trixie/arm64 on jenkins on '2025-02-18 04:25'
Tue Feb 18 04:25:27 UTC 2025  I: The jenkins build log is/was available at https://jenkins.debian.net/userContent/reproducible/debian/build_service/arm64_6/79896/console.log
Tue Feb 18 04:25:27 UTC 2025  I: Downloading source for trixie/pkcs11-provider=1.0-1
--2025-02-18 04:25:28--  http://deb.debian.org/debian/pool/main/p/pkcs11-provider/pkcs11-provider_1.0-1.dsc
Connecting to 46.16.76.132:3128... connected.
Proxy request sent, awaiting response... 200 OK
Length: 2213 (2.2K) [text/prs.lines.tag]
Saving to: ‘pkcs11-provider_1.0-1.dsc’

     0K ..                                                    100%  349M=0s

2025-02-18 04:25:28 (349 MB/s) - ‘pkcs11-provider_1.0-1.dsc’ saved [2213/2213]

Tue Feb 18 04:25:28 UTC 2025  I: pkcs11-provider_1.0-1.dsc
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 3.0 (quilt)
Source: pkcs11-provider
Binary: pkcs11-provider
Architecture: any
Version: 1.0-1
Maintainer: Luca Boccassi <bluca@debian.org>
Homepage: https://github.com/latchset/pkcs11-provider
Standards-Version: 4.7.0
Vcs-Browser: https://salsa.debian.org/debian/pkcs11-provider
Vcs-Git: https://salsa.debian.org/debian/pkcs11-provider.git
Build-Depends: debhelper-compat (= 13), dh-package-notes, libssl-dev (>= 3.0.7~), meson (>= 0.57~), pkgconf, expect <!nocheck>, gnutls-bin <!nocheck>, libnss3-dev <!nocheck>, libp11-kit-dev <!nocheck>, libstoken-dev <!nocheck>, opensc <!nocheck>, openssl <!nocheck>, p11-kit <!nocheck>, p11-kit-modules <!nocheck>, softhsm2 <!nocheck>
Package-List:
 pkcs11-provider deb libs optional arch=any
Checksums-Sha1:
 c1f7deab3a3af9fa2c3ef63ed95536c7c5a52707 210633 pkcs11-provider_1.0.orig.tar.gz
 3c408dc6896465991fcdbf8f1c8e88b5490138d6 2452 pkcs11-provider_1.0-1.debian.tar.xz
Checksums-Sha256:
 f62771642f24525305233fab01df361a0893912b7e92d2f550f26f131a7b36c2 210633 pkcs11-provider_1.0.orig.tar.gz
 54a837067294fae1d3a92370734be1942f3d257a8c89d93e8e92aab7d9573383 2452 pkcs11-provider_1.0-1.debian.tar.xz
Files:
 2933ec36edff8ab9c132e82f04cbd4dd 210633 pkcs11-provider_1.0.orig.tar.gz
 9dee0c01916770d74c9120a1e7a11e10 2452 pkcs11-provider_1.0-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=8rIG
-----END PGP SIGNATURE-----
Tue Feb 18 04:25:28 UTC 2025  I: Checking whether the package is not for us
Tue Feb 18 04:25:28 UTC 2025  I: Starting 1st build on remote node codethink03-arm64.debian.net.
Tue Feb 18 04:25:28 UTC 2025  I: Preparing to do remote build '1' on codethink03-arm64.debian.net.
Tue Feb 18 04:27:54 UTC 2025  I: Deleting $TMPDIR on codethink03-arm64.debian.net.
I: pbuilder: network access will be disabled during build
I: Current time: Sun Mar 22 22:48:29 -12 2026
I: pbuilder-time-stamp: 1774262909
I: Building the build Environment
I: extracting base tarball [/var/cache/pbuilder/trixie-reproducible-base.tgz]
I: copying local configuration
W: --override-config is not set; not updating apt.conf Read the manpage for details.
I: mounting /proc filesystem
I: mounting /sys filesystem
I: creating /{dev,run}/shm
I: mounting /dev/pts filesystem
I: redirecting /dev/ptmx to /dev/pts/ptmx
I: policy-rc.d already exists
I: Copying source file
I: copying [pkcs11-provider_1.0-1.dsc]
I: copying [./pkcs11-provider_1.0.orig.tar.gz]
I: copying [./pkcs11-provider_1.0-1.debian.tar.xz]
I: Extracting source
dpkg-source: warning: cannot verify inline signature for ./pkcs11-provider_1.0-1.dsc: unsupported subcommand
dpkg-source: info: extracting pkcs11-provider in pkcs11-provider-1.0
dpkg-source: info: unpacking pkcs11-provider_1.0.orig.tar.gz
dpkg-source: info: unpacking pkcs11-provider_1.0-1.debian.tar.xz
I: Not using root during the build.
I: Installing the build-deps
I: user script /srv/workspace/pbuilder/1369869/tmp/hooks/D02_print_environment starting
I: set
  BUILDDIR='/build/reproducible-path'
  BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other'
  BUILDUSERNAME='pbuilder1'
  BUILD_ARCH='arm64'
  DEBIAN_FRONTEND='noninteractive'
  DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=12 '
  DISTRIBUTION='trixie'
  HOME='/root'
  HOST_ARCH='arm64'
  IFS=' 	
  '
  INVOCATION_ID='874801d4bdcb4fd0810cff5de1b896e2'
  LANG='C'
  LANGUAGE='en_US:en'
  LC_ALL='C'
  MAIL='/var/mail/root'
  OPTIND='1'
  PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games'
  PBCURRENTCOMMANDLINEOPERATION='build'
  PBUILDER_OPERATION='build'
  PBUILDER_PKGDATADIR='/usr/share/pbuilder'
  PBUILDER_PKGLIBDIR='/usr/lib/pbuilder'
  PBUILDER_SYSCONFDIR='/etc'
  PPID='1369869'
  PS1='# '
  PS2='> '
  PS4='+ '
  PWD='/'
  SHELL='/bin/bash'
  SHLVL='2'
  SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/pbuilderrc_h0Ks --distribution trixie --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/b1 --logfile b1/build.log pkcs11-provider_1.0-1.dsc'
  SUDO_GID='109'
  SUDO_UID='104'
  SUDO_USER='jenkins'
  TERM='unknown'
  TZ='/usr/share/zoneinfo/Etc/GMT+12'
  USER='root'
  _='/usr/bin/systemd-run'
  http_proxy='http://192.168.101.4:3128'
I: uname -a
  Linux codethink03-arm64 6.1.0-31-cloud-arm64 #1 SMP Debian 6.1.128-1 (2025-02-07) aarch64 GNU/Linux
I: ls -l /bin
  lrwxrwxrwx 1 root root 7 Nov 22  2024 /bin -> usr/bin
I: user script /srv/workspace/pbuilder/1369869/tmp/hooks/D02_print_environment finished
 -> Attempting to satisfy build-dependencies
 -> Creating pbuilder-satisfydepends-dummy package
Package: pbuilder-satisfydepends-dummy
Version: 0.invalid.0
Architecture: arm64
Maintainer: Debian Pbuilder Team <pbuilder-maint@lists.alioth.debian.org>
Description: Dummy package to satisfy dependencies with aptitude - created by pbuilder
 This package was created automatically by pbuilder to satisfy the
 build-dependencies of the package being currently built.
Depends: debhelper-compat (= 13), dh-package-notes, libssl-dev (>= 3.0.7~), meson (>= 0.57~), pkgconf, expect, gnutls-bin, libnss3-dev, libp11-kit-dev, libstoken-dev, opensc, openssl, p11-kit, p11-kit-modules, softhsm2
dpkg-deb: building package 'pbuilder-satisfydepends-dummy' in '/tmp/satisfydepends-aptitude/pbuilder-satisfydepends-dummy.deb'.
Selecting previously unselected package pbuilder-satisfydepends-dummy.
(Reading database ... 19923 files and directories currently installed.)
Preparing to unpack .../pbuilder-satisfydepends-dummy.deb ...
Unpacking pbuilder-satisfydepends-dummy (0.invalid.0) ...
dpkg: pbuilder-satisfydepends-dummy: dependency problems, but configuring anyway as you requested:
 pbuilder-satisfydepends-dummy depends on debhelper-compat (= 13); however:
  Package debhelper-compat is not installed.
 pbuilder-satisfydepends-dummy depends on dh-package-notes; however:
  Package dh-package-notes is not installed.
 pbuilder-satisfydepends-dummy depends on libssl-dev (>= 3.0.7~); however:
  Package libssl-dev is not installed.
 pbuilder-satisfydepends-dummy depends on meson (>= 0.57~); however:
  Package meson is not installed.
 pbuilder-satisfydepends-dummy depends on pkgconf; however:
  Package pkgconf is not installed.
 pbuilder-satisfydepends-dummy depends on expect; however:
  Package expect is not installed.
 pbuilder-satisfydepends-dummy depends on gnutls-bin; however:
  Package gnutls-bin is not installed.
 pbuilder-satisfydepends-dummy depends on libnss3-dev; however:
  Package libnss3-dev is not installed.
 pbuilder-satisfydepends-dummy depends on libp11-kit-dev; however:
  Package libp11-kit-dev is not installed.
 pbuilder-satisfydepends-dummy depends on libstoken-dev; however:
  Package libstoken-dev is not installed.
 pbuilder-satisfydepends-dummy depends on opensc; however:
  Package opensc is not installed.
 pbuilder-satisfydepends-dummy depends on openssl; however:
  Package openssl is not installed.
 pbuilder-satisfydepends-dummy depends on p11-kit; however:
  Package p11-kit is not installed.
 pbuilder-satisfydepends-dummy depends on p11-kit-modules; however:
  Package p11-kit-modules is not installed.
 pbuilder-satisfydepends-dummy depends on softhsm2; however:
  Package softhsm2 is not installed.

Setting up pbuilder-satisfydepends-dummy (0.invalid.0) ...
Reading package lists...
Building dependency tree...
Reading state information...
Initializing package states...
Writing extended state information...
Building tag database...
pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0)
pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0)
The following NEW packages will be installed:
  autoconf{a} automake{a} autopoint{a} autotools-dev{a} bsdextrautils{a} debhelper{a} dh-autoreconf{a} dh-package-notes{a} dh-strip-nondeterminism{a} dwz{a} expect{a} file{a} gettext{a} gettext-base{a} gnutls-bin{a} groff-base{a} intltool-debian{a} libarchive-zip-perl{a} libdebhelper-perl{a} libeac3{a} libelf1t64{a} libevent-2.1-7t64{a} libexpat1{a} libffi8{a} libfile-stripnondeterminism-perl{a} libglib2.0-0t64{a} libgnutls-dane0t64{a} libgnutls30t64{a} libicu72{a} libidn2-0{a} libmagic-mgc{a} libmagic1t64{a} libnspr4{a} libnspr4-dev{a} libnss3{a} libnss3-dev{a} libp11-kit-dev{a} libp11-kit0{a} libpipeline1{a} libpkgconf3{a} libproc2-0{a} libpython3-stdlib{a} libpython3.13-minimal{a} libpython3.13-stdlib{a} libreadline8t64{a} libsofthsm2{a} libssl-dev{a} libstoken-dev{a} libstoken1t64{a} libtasn1-6{a} libtcl8.6{a} libtext-charwidth-perl{a} libtext-wrapi18n-perl{a} libtomcrypt-dev{a} libtomcrypt1{a} libtommath1{a} libtool{a} libuchardet0{a} libunbound8{a} libunistring5{a} libxml2{a} m4{a} man-db{a} media-types{a} meson{a} netbase{a} ninja-build{a} opensc{a} opensc-pkcs11{a} openssl{a} p11-kit{a} p11-kit-modules{a} pkgconf{a} pkgconf-bin{a} po-debconf{a} procps{a} python3{a} python3-autocommand{a} python3-inflect{a} python3-jaraco.context{a} python3-jaraco.functools{a} python3-jaraco.text{a} python3-minimal{a} python3-more-itertools{a} python3-pkg-resources{a} python3-setuptools{a} python3-typeguard{a} python3-typing-extensions{a} python3-zipp{a} python3.13{a} python3.13-minimal{a} readline-common{a} sensible-utils{a} softhsm2{a} softhsm2-common{a} tcl-expect{a} tcl8.6{a} tzdata{a} ucf{a} 
The following packages are RECOMMENDED but will NOT be installed:
  ca-certificates curl libarchive-cpio-perl libglib2.0-data libltdl-dev libmail-sendmail-perl linux-sysctl-defaults lynx pcscd psmisc shared-mime-info wget xdg-user-dirs 
0 packages upgraded, 99 newly installed, 0 to remove and 0 not upgraded.
Need to get 46.7 MB of archives. After unpacking 184 MB will be used.
Writing extended state information...
Get: 1 http://deb.debian.org/debian trixie/main arm64 libpython3.13-minimal arm64 3.13.2-1 [853 kB]
Get: 2 http://deb.debian.org/debian trixie/main arm64 libexpat1 arm64 2.6.4-1 [90.7 kB]
Get: 3 http://deb.debian.org/debian trixie/main arm64 python3.13-minimal arm64 3.13.2-1 [1997 kB]
Get: 4 http://deb.debian.org/debian trixie/main arm64 python3-minimal arm64 3.13.1-2 [27.0 kB]
Get: 5 http://deb.debian.org/debian trixie/main arm64 media-types all 10.1.0 [26.9 kB]
Get: 6 http://deb.debian.org/debian trixie/main arm64 netbase all 6.4 [12.8 kB]
Get: 7 http://deb.debian.org/debian trixie/main arm64 tzdata all 2024b-6 [257 kB]
Get: 8 http://deb.debian.org/debian trixie/main arm64 libffi8 arm64 3.4.7-1 [21.2 kB]
Get: 9 http://deb.debian.org/debian trixie/main arm64 readline-common all 8.2-6 [69.4 kB]
Get: 10 http://deb.debian.org/debian trixie/main arm64 libreadline8t64 arm64 8.2-6 [159 kB]
Get: 11 http://deb.debian.org/debian trixie/main arm64 libpython3.13-stdlib arm64 3.13.2-1 [1914 kB]
Get: 12 http://deb.debian.org/debian trixie/main arm64 python3.13 arm64 3.13.2-1 [745 kB]
Get: 13 http://deb.debian.org/debian trixie/main arm64 libpython3-stdlib arm64 3.13.1-2 [9952 B]
Get: 14 http://deb.debian.org/debian trixie/main arm64 python3 arm64 3.13.1-2 [28.0 kB]
Get: 15 http://deb.debian.org/debian trixie/main arm64 libproc2-0 arm64 2:4.0.4-7 [62.4 kB]
Get: 16 http://deb.debian.org/debian trixie/main arm64 procps arm64 2:4.0.4-7 [868 kB]
Get: 17 http://deb.debian.org/debian trixie/main arm64 sensible-utils all 0.0.24 [24.8 kB]
Get: 18 http://deb.debian.org/debian trixie/main arm64 libmagic-mgc arm64 1:5.45-3+b1 [314 kB]
Get: 19 http://deb.debian.org/debian trixie/main arm64 libmagic1t64 arm64 1:5.45-3+b1 [102 kB]
Get: 20 http://deb.debian.org/debian trixie/main arm64 file arm64 1:5.45-3+b1 [43.4 kB]
Get: 21 http://deb.debian.org/debian trixie/main arm64 gettext-base arm64 0.23.1-1 [241 kB]
Get: 22 http://deb.debian.org/debian trixie/main arm64 libuchardet0 arm64 0.0.8-1+b2 [69.2 kB]
Get: 23 http://deb.debian.org/debian trixie/main arm64 groff-base arm64 1.23.0-7 [1129 kB]
Get: 24 http://deb.debian.org/debian trixie/main arm64 bsdextrautils arm64 2.40.4-3 [92.0 kB]
Get: 25 http://deb.debian.org/debian trixie/main arm64 libpipeline1 arm64 1.5.8-1 [40.2 kB]
Get: 26 http://deb.debian.org/debian trixie/main arm64 man-db arm64 2.13.0-1 [1404 kB]
Get: 27 http://deb.debian.org/debian trixie/main arm64 libtext-charwidth-perl arm64 0.04-11+b4 [9652 B]
Get: 28 http://deb.debian.org/debian trixie/main arm64 libtext-wrapi18n-perl all 0.06-10 [8808 B]
Get: 29 http://deb.debian.org/debian trixie/main arm64 ucf all 3.0049 [42.5 kB]
Get: 30 http://deb.debian.org/debian trixie/main arm64 m4 arm64 1.4.19-5 [284 kB]
Get: 31 http://deb.debian.org/debian trixie/main arm64 autoconf all 2.72-3 [493 kB]
Get: 32 http://deb.debian.org/debian trixie/main arm64 autotools-dev all 20220109.1 [51.6 kB]
Get: 33 http://deb.debian.org/debian trixie/main arm64 automake all 1:1.17-3 [862 kB]
Get: 34 http://deb.debian.org/debian trixie/main arm64 autopoint all 0.23.1-1 [770 kB]
Get: 35 http://deb.debian.org/debian trixie/main arm64 libdebhelper-perl all 13.24.1 [90.9 kB]
Get: 36 http://deb.debian.org/debian trixie/main arm64 libtool all 2.5.4-3 [539 kB]
Get: 37 http://deb.debian.org/debian trixie/main arm64 dh-autoreconf all 20 [17.1 kB]
Get: 38 http://deb.debian.org/debian trixie/main arm64 libarchive-zip-perl all 1.68-1 [104 kB]
Get: 39 http://deb.debian.org/debian trixie/main arm64 libfile-stripnondeterminism-perl all 1.14.1-2 [19.7 kB]
Get: 40 http://deb.debian.org/debian trixie/main arm64 dh-strip-nondeterminism all 1.14.1-2 [8620 B]
Get: 41 http://deb.debian.org/debian trixie/main arm64 libelf1t64 arm64 0.192-4 [189 kB]
Get: 42 http://deb.debian.org/debian trixie/main arm64 dwz arm64 0.15-1+b1 [102 kB]
Get: 43 http://deb.debian.org/debian trixie/main arm64 libunistring5 arm64 1.3-1 [449 kB]
Get: 44 http://deb.debian.org/debian trixie/main arm64 libicu72 arm64 72.1-6 [9239 kB]
Get: 45 http://deb.debian.org/debian trixie/main arm64 libxml2 arm64 2.12.7+dfsg+really2.9.14-0.2+b1 [630 kB]
Get: 46 http://deb.debian.org/debian trixie/main arm64 gettext arm64 0.23.1-1 [1610 kB]
Get: 47 http://deb.debian.org/debian trixie/main arm64 intltool-debian all 0.35.0+20060710.6 [22.9 kB]
Get: 48 http://deb.debian.org/debian trixie/main arm64 po-debconf all 1.0.21+nmu1 [248 kB]
Get: 49 http://deb.debian.org/debian trixie/main arm64 debhelper all 13.24.1 [920 kB]
Get: 50 http://deb.debian.org/debian trixie/main arm64 dh-package-notes all 0.15 [6692 B]
Get: 51 http://deb.debian.org/debian trixie/main arm64 libtcl8.6 arm64 8.6.16+dfsg-1 [984 kB]
Get: 52 http://deb.debian.org/debian trixie/main arm64 tcl8.6 arm64 8.6.16+dfsg-1 [121 kB]
Get: 53 http://deb.debian.org/debian trixie/main arm64 tcl-expect arm64 5.45.4-3+b1 [123 kB]
Get: 54 http://deb.debian.org/debian trixie/main arm64 expect arm64 5.45.4-3+b1 [159 kB]
Get: 55 http://deb.debian.org/debian trixie/main arm64 libidn2-0 arm64 2.3.7-2+b1 [127 kB]
Get: 56 http://deb.debian.org/debian trixie/main arm64 libp11-kit0 arm64 0.25.5-3 [409 kB]
Get: 57 http://deb.debian.org/debian trixie/main arm64 libtasn1-6 arm64 4.20.0-2 [47.3 kB]
Get: 58 http://deb.debian.org/debian trixie/main arm64 libgnutls30t64 arm64 3.8.9-2 [1374 kB]
Get: 59 http://deb.debian.org/debian trixie/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10+b1 [170 kB]
Get: 60 http://deb.debian.org/debian trixie/main arm64 libunbound8 arm64 1.22.0-1+b1 [553 kB]
Get: 61 http://deb.debian.org/debian trixie/main arm64 libgnutls-dane0t64 arm64 3.8.9-2 [452 kB]
Get: 62 http://deb.debian.org/debian trixie/main arm64 gnutls-bin arm64 3.8.9-2 [673 kB]
Get: 63 http://deb.debian.org/debian trixie/main arm64 libeac3 arm64 1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3 [48.1 kB]
Get: 64 http://deb.debian.org/debian trixie/main arm64 libglib2.0-0t64 arm64 2.83.3-2 [1421 kB]
Get: 65 http://deb.debian.org/debian trixie/main arm64 libnspr4 arm64 2:4.36-1 [102 kB]
Get: 66 http://deb.debian.org/debian trixie/main arm64 libnspr4-dev arm64 2:4.36-1 [203 kB]
Get: 67 http://deb.debian.org/debian trixie/main arm64 libnss3 arm64 2:3.107-1 [1289 kB]
Get: 68 http://deb.debian.org/debian trixie/main arm64 libnss3-dev arm64 2:3.107-1 [250 kB]
Get: 69 http://deb.debian.org/debian trixie/main arm64 libp11-kit-dev arm64 0.25.5-3 [208 kB]
Get: 70 http://deb.debian.org/debian trixie/main arm64 libpkgconf3 arm64 1.8.1-4 [35.3 kB]
Get: 71 http://deb.debian.org/debian trixie/main arm64 softhsm2-common arm64 2.6.1-2.2+b3 [12.4 kB]
Get: 72 http://deb.debian.org/debian trixie/main arm64 libsofthsm2 arm64 2.6.1-2.2+b3 [218 kB]
Get: 73 http://deb.debian.org/debian trixie/main arm64 libssl-dev arm64 3.4.0-2 [3234 kB]
Get: 74 http://deb.debian.org/debian trixie/main arm64 libtommath1 arm64 1.3.0-1 [64.5 kB]
Get: 75 http://deb.debian.org/debian trixie/main arm64 libtomcrypt1 arm64 1.18.2+dfsg-7+b2 [410 kB]
Get: 76 http://deb.debian.org/debian trixie/main arm64 libstoken1t64 arm64 0.92-1.1+b2 [28.1 kB]
Get: 77 http://deb.debian.org/debian trixie/main arm64 libtomcrypt-dev arm64 1.18.2+dfsg-7+b2 [1277 kB]
Get: 78 http://deb.debian.org/debian trixie/main arm64 libstoken-dev arm64 0.92-1.1+b2 [8196 B]
Get: 79 http://deb.debian.org/debian trixie/main arm64 ninja-build arm64 1.12.1-1+b1 [130 kB]
Get: 80 http://deb.debian.org/debian trixie/main arm64 python3-autocommand all 2.2.2-3 [13.6 kB]
Get: 81 http://deb.debian.org/debian trixie/main arm64 python3-more-itertools all 10.6.0-1 [65.3 kB]
Get: 82 http://deb.debian.org/debian trixie/main arm64 python3-typing-extensions all 4.12.2-2 [73.0 kB]
Get: 83 http://deb.debian.org/debian trixie/main arm64 python3-typeguard all 4.4.1-1 [37.0 kB]
Get: 84 http://deb.debian.org/debian trixie/main arm64 python3-inflect all 7.3.1-2 [32.4 kB]
Get: 85 http://deb.debian.org/debian trixie/main arm64 python3-jaraco.context all 6.0.0-1 [7984 B]
Get: 86 http://deb.debian.org/debian trixie/main arm64 python3-jaraco.functools all 4.1.0-1 [12.0 kB]
Get: 87 http://deb.debian.org/debian trixie/main arm64 python3-pkg-resources all 75.6.0-1 [222 kB]
Get: 88 http://deb.debian.org/debian trixie/main arm64 python3-jaraco.text all 4.0.0-1 [11.4 kB]
Get: 89 http://deb.debian.org/debian trixie/main arm64 python3-zipp all 3.21.0-1 [10.6 kB]
Get: 90 http://deb.debian.org/debian trixie/main arm64 python3-setuptools all 75.6.0-1 [720 kB]
Get: 91 http://deb.debian.org/debian trixie/main arm64 meson all 1.7.0-1 [639 kB]
Get: 92 http://deb.debian.org/debian trixie/main arm64 opensc-pkcs11 arm64 0.26.0-1 [799 kB]
Get: 93 http://deb.debian.org/debian trixie/main arm64 opensc arm64 0.26.0-1 [394 kB]
Get: 94 http://deb.debian.org/debian trixie/main arm64 openssl arm64 3.4.0-2 [1385 kB]
Get: 95 http://deb.debian.org/debian trixie/main arm64 p11-kit-modules arm64 0.25.5-3 [253 kB]
Get: 96 http://deb.debian.org/debian trixie/main arm64 p11-kit arm64 0.25.5-3 [400 kB]
Get: 97 http://deb.debian.org/debian trixie/main arm64 pkgconf-bin arm64 1.8.1-4 [29.6 kB]
Get: 98 http://deb.debian.org/debian trixie/main arm64 pkgconf arm64 1.8.1-4 [26.1 kB]
Get: 99 http://deb.debian.org/debian trixie/main arm64 softhsm2 arm64 2.6.1-2.2+b3 [152 kB]
Fetched 46.7 MB in 0s (123 MB/s)
Preconfiguring packages ...
Selecting previously unselected package libpython3.13-minimal:arm64.
(Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 19923 files and directories currently installed.)
Preparing to unpack .../libpython3.13-minimal_3.13.2-1_arm64.deb ...
Unpacking libpython3.13-minimal:arm64 (3.13.2-1) ...
Selecting previously unselected package libexpat1:arm64.
Preparing to unpack .../libexpat1_2.6.4-1_arm64.deb ...
Unpacking libexpat1:arm64 (2.6.4-1) ...
Selecting previously unselected package python3.13-minimal.
Preparing to unpack .../python3.13-minimal_3.13.2-1_arm64.deb ...
Unpacking python3.13-minimal (3.13.2-1) ...
Setting up libpython3.13-minimal:arm64 (3.13.2-1) ...
Setting up libexpat1:arm64 (2.6.4-1) ...
Setting up python3.13-minimal (3.13.2-1) ...
Selecting previously unselected package python3-minimal.
(Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 20257 files and directories currently installed.)
Preparing to unpack .../0-python3-minimal_3.13.1-2_arm64.deb ...
Unpacking python3-minimal (3.13.1-2) ...
Selecting previously unselected package media-types.
Preparing to unpack .../1-media-types_10.1.0_all.deb ...
Unpacking media-types (10.1.0) ...
Selecting previously unselected package netbase.
Preparing to unpack .../2-netbase_6.4_all.deb ...
Unpacking netbase (6.4) ...
Selecting previously unselected package tzdata.
Preparing to unpack .../3-tzdata_2024b-6_all.deb ...
Unpacking tzdata (2024b-6) ...
Selecting previously unselected package libffi8:arm64.
Preparing to unpack .../4-libffi8_3.4.7-1_arm64.deb ...
Unpacking libffi8:arm64 (3.4.7-1) ...
Selecting previously unselected package readline-common.
Preparing to unpack .../5-readline-common_8.2-6_all.deb ...
Unpacking readline-common (8.2-6) ...
Selecting previously unselected package libreadline8t64:arm64.
Preparing to unpack .../6-libreadline8t64_8.2-6_arm64.deb ...
Adding 'diversion of /lib/aarch64-linux-gnu/libhistory.so.8 to /lib/aarch64-linux-gnu/libhistory.so.8.usr-is-merged by libreadline8t64'
Adding 'diversion of /lib/aarch64-linux-gnu/libhistory.so.8.2 to /lib/aarch64-linux-gnu/libhistory.so.8.2.usr-is-merged by libreadline8t64'
Adding 'diversion of /lib/aarch64-linux-gnu/libreadline.so.8 to /lib/aarch64-linux-gnu/libreadline.so.8.usr-is-merged by libreadline8t64'
Adding 'diversion of /lib/aarch64-linux-gnu/libreadline.so.8.2 to /lib/aarch64-linux-gnu/libreadline.so.8.2.usr-is-merged by libreadline8t64'
Unpacking libreadline8t64:arm64 (8.2-6) ...
Selecting previously unselected package libpython3.13-stdlib:arm64.
Preparing to unpack .../7-libpython3.13-stdlib_3.13.2-1_arm64.deb ...
Unpacking libpython3.13-stdlib:arm64 (3.13.2-1) ...
Selecting previously unselected package python3.13.
Preparing to unpack .../8-python3.13_3.13.2-1_arm64.deb ...
Unpacking python3.13 (3.13.2-1) ...
Selecting previously unselected package libpython3-stdlib:arm64.
Preparing to unpack .../9-libpython3-stdlib_3.13.1-2_arm64.deb ...
Unpacking libpython3-stdlib:arm64 (3.13.1-2) ...
Setting up python3-minimal (3.13.1-2) ...
Selecting previously unselected package python3.
(Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 21267 files and directories currently installed.)
Preparing to unpack .../00-python3_3.13.1-2_arm64.deb ...
Unpacking python3 (3.13.1-2) ...
Selecting previously unselected package libproc2-0:arm64.
Preparing to unpack .../01-libproc2-0_2%3a4.0.4-7_arm64.deb ...
Unpacking libproc2-0:arm64 (2:4.0.4-7) ...
Selecting previously unselected package procps.
Preparing to unpack .../02-procps_2%3a4.0.4-7_arm64.deb ...
Unpacking procps (2:4.0.4-7) ...
Selecting previously unselected package sensible-utils.
Preparing to unpack .../03-sensible-utils_0.0.24_all.deb ...
Unpacking sensible-utils (0.0.24) ...
Selecting previously unselected package libmagic-mgc.
Preparing to unpack .../04-libmagic-mgc_1%3a5.45-3+b1_arm64.deb ...
Unpacking libmagic-mgc (1:5.45-3+b1) ...
Selecting previously unselected package libmagic1t64:arm64.
Preparing to unpack .../05-libmagic1t64_1%3a5.45-3+b1_arm64.deb ...
Unpacking libmagic1t64:arm64 (1:5.45-3+b1) ...
Selecting previously unselected package file.
Preparing to unpack .../06-file_1%3a5.45-3+b1_arm64.deb ...
Unpacking file (1:5.45-3+b1) ...
Selecting previously unselected package gettext-base.
Preparing to unpack .../07-gettext-base_0.23.1-1_arm64.deb ...
Unpacking gettext-base (0.23.1-1) ...
Selecting previously unselected package libuchardet0:arm64.
Preparing to unpack .../08-libuchardet0_0.0.8-1+b2_arm64.deb ...
Unpacking libuchardet0:arm64 (0.0.8-1+b2) ...
Selecting previously unselected package groff-base.
Preparing to unpack .../09-groff-base_1.23.0-7_arm64.deb ...
Unpacking groff-base (1.23.0-7) ...
Selecting previously unselected package bsdextrautils.
Preparing to unpack .../10-bsdextrautils_2.40.4-3_arm64.deb ...
Unpacking bsdextrautils (2.40.4-3) ...
Selecting previously unselected package libpipeline1:arm64.
Preparing to unpack .../11-libpipeline1_1.5.8-1_arm64.deb ...
Unpacking libpipeline1:arm64 (1.5.8-1) ...
Selecting previously unselected package man-db.
Preparing to unpack .../12-man-db_2.13.0-1_arm64.deb ...
Unpacking man-db (2.13.0-1) ...
Selecting previously unselected package libtext-charwidth-perl:arm64.
Preparing to unpack .../13-libtext-charwidth-perl_0.04-11+b4_arm64.deb ...
Unpacking libtext-charwidth-perl:arm64 (0.04-11+b4) ...
Selecting previously unselected package libtext-wrapi18n-perl.
Preparing to unpack .../14-libtext-wrapi18n-perl_0.06-10_all.deb ...
Unpacking libtext-wrapi18n-perl (0.06-10) ...
Selecting previously unselected package ucf.
Preparing to unpack .../15-ucf_3.0049_all.deb ...
Moving old data out of the way
Unpacking ucf (3.0049) ...
Selecting previously unselected package m4.
Preparing to unpack .../16-m4_1.4.19-5_arm64.deb ...
Unpacking m4 (1.4.19-5) ...
Selecting previously unselected package autoconf.
Preparing to unpack .../17-autoconf_2.72-3_all.deb ...
Unpacking autoconf (2.72-3) ...
Selecting previously unselected package autotools-dev.
Preparing to unpack .../18-autotools-dev_20220109.1_all.deb ...
Unpacking autotools-dev (20220109.1) ...
Selecting previously unselected package automake.
Preparing to unpack .../19-automake_1%3a1.17-3_all.deb ...
Unpacking automake (1:1.17-3) ...
Selecting previously unselected package autopoint.
Preparing to unpack .../20-autopoint_0.23.1-1_all.deb ...
Unpacking autopoint (0.23.1-1) ...
Selecting previously unselected package libdebhelper-perl.
Preparing to unpack .../21-libdebhelper-perl_13.24.1_all.deb ...
Unpacking libdebhelper-perl (13.24.1) ...
Selecting previously unselected package libtool.
Preparing to unpack .../22-libtool_2.5.4-3_all.deb ...
Unpacking libtool (2.5.4-3) ...
Selecting previously unselected package dh-autoreconf.
Preparing to unpack .../23-dh-autoreconf_20_all.deb ...
Unpacking dh-autoreconf (20) ...
Selecting previously unselected package libarchive-zip-perl.
Preparing to unpack .../24-libarchive-zip-perl_1.68-1_all.deb ...
Unpacking libarchive-zip-perl (1.68-1) ...
Selecting previously unselected package libfile-stripnondeterminism-perl.
Preparing to unpack .../25-libfile-stripnondeterminism-perl_1.14.1-2_all.deb ...
Unpacking libfile-stripnondeterminism-perl (1.14.1-2) ...
Selecting previously unselected package dh-strip-nondeterminism.
Preparing to unpack .../26-dh-strip-nondeterminism_1.14.1-2_all.deb ...
Unpacking dh-strip-nondeterminism (1.14.1-2) ...
Selecting previously unselected package libelf1t64:arm64.
Preparing to unpack .../27-libelf1t64_0.192-4_arm64.deb ...
Unpacking libelf1t64:arm64 (0.192-4) ...
Selecting previously unselected package dwz.
Preparing to unpack .../28-dwz_0.15-1+b1_arm64.deb ...
Unpacking dwz (0.15-1+b1) ...
Selecting previously unselected package libunistring5:arm64.
Preparing to unpack .../29-libunistring5_1.3-1_arm64.deb ...
Unpacking libunistring5:arm64 (1.3-1) ...
Selecting previously unselected package libicu72:arm64.
Preparing to unpack .../30-libicu72_72.1-6_arm64.deb ...
Unpacking libicu72:arm64 (72.1-6) ...
Selecting previously unselected package libxml2:arm64.
Preparing to unpack .../31-libxml2_2.12.7+dfsg+really2.9.14-0.2+b1_arm64.deb ...
Unpacking libxml2:arm64 (2.12.7+dfsg+really2.9.14-0.2+b1) ...
Selecting previously unselected package gettext.
Preparing to unpack .../32-gettext_0.23.1-1_arm64.deb ...
Unpacking gettext (0.23.1-1) ...
Selecting previously unselected package intltool-debian.
Preparing to unpack .../33-intltool-debian_0.35.0+20060710.6_all.deb ...
Unpacking intltool-debian (0.35.0+20060710.6) ...
Selecting previously unselected package po-debconf.
Preparing to unpack .../34-po-debconf_1.0.21+nmu1_all.deb ...
Unpacking po-debconf (1.0.21+nmu1) ...
Selecting previously unselected package debhelper.
Preparing to unpack .../35-debhelper_13.24.1_all.deb ...
Unpacking debhelper (13.24.1) ...
Selecting previously unselected package dh-package-notes.
Preparing to unpack .../36-dh-package-notes_0.15_all.deb ...
Unpacking dh-package-notes (0.15) ...
Selecting previously unselected package libtcl8.6:arm64.
Preparing to unpack .../37-libtcl8.6_8.6.16+dfsg-1_arm64.deb ...
Unpacking libtcl8.6:arm64 (8.6.16+dfsg-1) ...
Selecting previously unselected package tcl8.6.
Preparing to unpack .../38-tcl8.6_8.6.16+dfsg-1_arm64.deb ...
Unpacking tcl8.6 (8.6.16+dfsg-1) ...
Selecting previously unselected package tcl-expect:arm64.
Preparing to unpack .../39-tcl-expect_5.45.4-3+b1_arm64.deb ...
Unpacking tcl-expect:arm64 (5.45.4-3+b1) ...
Selecting previously unselected package expect.
Preparing to unpack .../40-expect_5.45.4-3+b1_arm64.deb ...
Unpacking expect (5.45.4-3+b1) ...
Selecting previously unselected package libidn2-0:arm64.
Preparing to unpack .../41-libidn2-0_2.3.7-2+b1_arm64.deb ...
Unpacking libidn2-0:arm64 (2.3.7-2+b1) ...
Selecting previously unselected package libp11-kit0:arm64.
Preparing to unpack .../42-libp11-kit0_0.25.5-3_arm64.deb ...
Unpacking libp11-kit0:arm64 (0.25.5-3) ...
Selecting previously unselected package libtasn1-6:arm64.
Preparing to unpack .../43-libtasn1-6_4.20.0-2_arm64.deb ...
Unpacking libtasn1-6:arm64 (4.20.0-2) ...
Selecting previously unselected package libgnutls30t64:arm64.
Preparing to unpack .../44-libgnutls30t64_3.8.9-2_arm64.deb ...
Unpacking libgnutls30t64:arm64 (3.8.9-2) ...
Selecting previously unselected package libevent-2.1-7t64:arm64.
Preparing to unpack .../45-libevent-2.1-7t64_2.1.12-stable-10+b1_arm64.deb ...
Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10+b1) ...
Selecting previously unselected package libunbound8:arm64.
Preparing to unpack .../46-libunbound8_1.22.0-1+b1_arm64.deb ...
Unpacking libunbound8:arm64 (1.22.0-1+b1) ...
Selecting previously unselected package libgnutls-dane0t64:arm64.
Preparing to unpack .../47-libgnutls-dane0t64_3.8.9-2_arm64.deb ...
Unpacking libgnutls-dane0t64:arm64 (3.8.9-2) ...
Selecting previously unselected package gnutls-bin.
Preparing to unpack .../48-gnutls-bin_3.8.9-2_arm64.deb ...
Unpacking gnutls-bin (3.8.9-2) ...
Selecting previously unselected package libeac3:arm64.
Preparing to unpack .../49-libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3_arm64.deb ...
Unpacking libeac3:arm64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ...
Selecting previously unselected package libglib2.0-0t64:arm64.
Preparing to unpack .../50-libglib2.0-0t64_2.83.3-2_arm64.deb ...
Unpacking libglib2.0-0t64:arm64 (2.83.3-2) ...
Selecting previously unselected package libnspr4:arm64.
Preparing to unpack .../51-libnspr4_2%3a4.36-1_arm64.deb ...
Unpacking libnspr4:arm64 (2:4.36-1) ...
Selecting previously unselected package libnspr4-dev.
Preparing to unpack .../52-libnspr4-dev_2%3a4.36-1_arm64.deb ...
Unpacking libnspr4-dev (2:4.36-1) ...
Selecting previously unselected package libnss3:arm64.
Preparing to unpack .../53-libnss3_2%3a3.107-1_arm64.deb ...
Unpacking libnss3:arm64 (2:3.107-1) ...
Selecting previously unselected package libnss3-dev:arm64.
Preparing to unpack .../54-libnss3-dev_2%3a3.107-1_arm64.deb ...
Unpacking libnss3-dev:arm64 (2:3.107-1) ...
Selecting previously unselected package libp11-kit-dev:arm64.
Preparing to unpack .../55-libp11-kit-dev_0.25.5-3_arm64.deb ...
Unpacking libp11-kit-dev:arm64 (0.25.5-3) ...
Selecting previously unselected package libpkgconf3:arm64.
Preparing to unpack .../56-libpkgconf3_1.8.1-4_arm64.deb ...
Unpacking libpkgconf3:arm64 (1.8.1-4) ...
Selecting previously unselected package softhsm2-common.
Preparing to unpack .../57-softhsm2-common_2.6.1-2.2+b3_arm64.deb ...
Unpacking softhsm2-common (2.6.1-2.2+b3) ...
Selecting previously unselected package libsofthsm2.
Preparing to unpack .../58-libsofthsm2_2.6.1-2.2+b3_arm64.deb ...
Unpacking libsofthsm2 (2.6.1-2.2+b3) ...
Selecting previously unselected package libssl-dev:arm64.
Preparing to unpack .../59-libssl-dev_3.4.0-2_arm64.deb ...
Unpacking libssl-dev:arm64 (3.4.0-2) ...
Selecting previously unselected package libtommath1:arm64.
Preparing to unpack .../60-libtommath1_1.3.0-1_arm64.deb ...
Unpacking libtommath1:arm64 (1.3.0-1) ...
Selecting previously unselected package libtomcrypt1:arm64.
Preparing to unpack .../61-libtomcrypt1_1.18.2+dfsg-7+b2_arm64.deb ...
Unpacking libtomcrypt1:arm64 (1.18.2+dfsg-7+b2) ...
Selecting previously unselected package libstoken1t64:arm64.
Preparing to unpack .../62-libstoken1t64_0.92-1.1+b2_arm64.deb ...
Unpacking libstoken1t64:arm64 (0.92-1.1+b2) ...
Selecting previously unselected package libtomcrypt-dev.
Preparing to unpack .../63-libtomcrypt-dev_1.18.2+dfsg-7+b2_arm64.deb ...
Unpacking libtomcrypt-dev (1.18.2+dfsg-7+b2) ...
Selecting previously unselected package libstoken-dev:arm64.
Preparing to unpack .../64-libstoken-dev_0.92-1.1+b2_arm64.deb ...
Unpacking libstoken-dev:arm64 (0.92-1.1+b2) ...
Selecting previously unselected package ninja-build.
Preparing to unpack .../65-ninja-build_1.12.1-1+b1_arm64.deb ...
Unpacking ninja-build (1.12.1-1+b1) ...
Selecting previously unselected package python3-autocommand.
Preparing to unpack .../66-python3-autocommand_2.2.2-3_all.deb ...
Unpacking python3-autocommand (2.2.2-3) ...
Selecting previously unselected package python3-more-itertools.
Preparing to unpack .../67-python3-more-itertools_10.6.0-1_all.deb ...
Unpacking python3-more-itertools (10.6.0-1) ...
Selecting previously unselected package python3-typing-extensions.
Preparing to unpack .../68-python3-typing-extensions_4.12.2-2_all.deb ...
Unpacking python3-typing-extensions (4.12.2-2) ...
Selecting previously unselected package python3-typeguard.
Preparing to unpack .../69-python3-typeguard_4.4.1-1_all.deb ...
Unpacking python3-typeguard (4.4.1-1) ...
Selecting previously unselected package python3-inflect.
Preparing to unpack .../70-python3-inflect_7.3.1-2_all.deb ...
Unpacking python3-inflect (7.3.1-2) ...
Selecting previously unselected package python3-jaraco.context.
Preparing to unpack .../71-python3-jaraco.context_6.0.0-1_all.deb ...
Unpacking python3-jaraco.context (6.0.0-1) ...
Selecting previously unselected package python3-jaraco.functools.
Preparing to unpack .../72-python3-jaraco.functools_4.1.0-1_all.deb ...
Unpacking python3-jaraco.functools (4.1.0-1) ...
Selecting previously unselected package python3-pkg-resources.
Preparing to unpack .../73-python3-pkg-resources_75.6.0-1_all.deb ...
Unpacking python3-pkg-resources (75.6.0-1) ...
Selecting previously unselected package python3-jaraco.text.
Preparing to unpack .../74-python3-jaraco.text_4.0.0-1_all.deb ...
Unpacking python3-jaraco.text (4.0.0-1) ...
Selecting previously unselected package python3-zipp.
Preparing to unpack .../75-python3-zipp_3.21.0-1_all.deb ...
Unpacking python3-zipp (3.21.0-1) ...
Selecting previously unselected package python3-setuptools.
Preparing to unpack .../76-python3-setuptools_75.6.0-1_all.deb ...
Unpacking python3-setuptools (75.6.0-1) ...
Selecting previously unselected package meson.
Preparing to unpack .../77-meson_1.7.0-1_all.deb ...
Unpacking meson (1.7.0-1) ...
Selecting previously unselected package opensc-pkcs11:arm64.
Preparing to unpack .../78-opensc-pkcs11_0.26.0-1_arm64.deb ...
Unpacking opensc-pkcs11:arm64 (0.26.0-1) ...
Selecting previously unselected package opensc.
Preparing to unpack .../79-opensc_0.26.0-1_arm64.deb ...
Unpacking opensc (0.26.0-1) ...
Selecting previously unselected package openssl.
Preparing to unpack .../80-openssl_3.4.0-2_arm64.deb ...
Unpacking openssl (3.4.0-2) ...
Selecting previously unselected package p11-kit-modules:arm64.
Preparing to unpack .../81-p11-kit-modules_0.25.5-3_arm64.deb ...
Unpacking p11-kit-modules:arm64 (0.25.5-3) ...
Selecting previously unselected package p11-kit.
Preparing to unpack .../82-p11-kit_0.25.5-3_arm64.deb ...
Unpacking p11-kit (0.25.5-3) ...
Selecting previously unselected package pkgconf-bin.
Preparing to unpack .../83-pkgconf-bin_1.8.1-4_arm64.deb ...
Unpacking pkgconf-bin (1.8.1-4) ...
Selecting previously unselected package pkgconf:arm64.
Preparing to unpack .../84-pkgconf_1.8.1-4_arm64.deb ...
Unpacking pkgconf:arm64 (1.8.1-4) ...
Selecting previously unselected package softhsm2.
Preparing to unpack .../85-softhsm2_2.6.1-2.2+b3_arm64.deb ...
Unpacking softhsm2 (2.6.1-2.2+b3) ...
Setting up media-types (10.1.0) ...
Setting up libpipeline1:arm64 (1.5.8-1) ...
Setting up libtext-charwidth-perl:arm64 (0.04-11+b4) ...
Setting up libicu72:arm64 (72.1-6) ...
Setting up bsdextrautils (2.40.4-3) ...
Setting up libmagic-mgc (1:5.45-3+b1) ...
Setting up libarchive-zip-perl (1.68-1) ...
Setting up libtommath1:arm64 (1.3.0-1) ...
Setting up libdebhelper-perl (13.24.1) ...
Setting up libmagic1t64:arm64 (1:5.45-3+b1) ...
Setting up gettext-base (0.23.1-1) ...
Setting up m4 (1.4.19-5) ...
Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10+b1) ...
Setting up file (1:5.45-3+b1) ...
Setting up libtext-wrapi18n-perl (0.06-10) ...
Setting up ninja-build (1.12.1-1+b1) ...
Setting up libelf1t64:arm64 (0.192-4) ...
Setting up libeac3:arm64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ...
Setting up tzdata (2024b-6) ...

Current default time zone: 'Etc/UTC'
Local time is now:      Mon Mar 23 10:49:16 UTC 2026.
Universal Time is now:  Mon Mar 23 10:49:16 UTC 2026.
Run 'dpkg-reconfigure tzdata' if you wish to change it.

Setting up autotools-dev (20220109.1) ...
Setting up libunbound8:arm64 (1.22.0-1+b1) ...
Setting up libpkgconf3:arm64 (1.8.1-4) ...
Setting up libnspr4:arm64 (2:4.36-1) ...
Setting up libproc2-0:arm64 (2:4.0.4-7) ...
Setting up libunistring5:arm64 (1.3-1) ...
Setting up libssl-dev:arm64 (3.4.0-2) ...
Setting up libtcl8.6:arm64 (8.6.16+dfsg-1) ...
Setting up autopoint (0.23.1-1) ...
Setting up pkgconf-bin (1.8.1-4) ...
Setting up autoconf (2.72-3) ...
Setting up libffi8:arm64 (3.4.7-1) ...
Setting up dwz (0.15-1+b1) ...
Setting up sensible-utils (0.0.24) ...
Setting up libuchardet0:arm64 (0.0.8-1+b2) ...
Setting up procps (2:4.0.4-7) ...
Setting up libtasn1-6:arm64 (4.20.0-2) ...
Setting up netbase (6.4) ...
Setting up openssl (3.4.0-2) ...
Setting up readline-common (8.2-6) ...
Setting up libxml2:arm64 (2.12.7+dfsg+really2.9.14-0.2+b1) ...
Setting up libtomcrypt1:arm64 (1.18.2+dfsg-7+b2) ...
Setting up automake (1:1.17-3) ...
update-alternatives: using /usr/bin/automake-1.17 to provide /usr/bin/automake (automake) in auto mode
Setting up libfile-stripnondeterminism-perl (1.14.1-2) ...
Setting up libnspr4-dev (2:4.36-1) ...
Setting up tcl8.6 (8.6.16+dfsg-1) ...
Setting up gettext (0.23.1-1) ...
Setting up libtool (2.5.4-3) ...
Setting up tcl-expect:arm64 (5.45.4-3+b1) ...
Setting up libidn2-0:arm64 (2.3.7-2+b1) ...
Setting up libnss3:arm64 (2:3.107-1) ...
Setting up pkgconf:arm64 (1.8.1-4) ...
Setting up intltool-debian (0.35.0+20060710.6) ...
Setting up libstoken1t64:arm64 (0.92-1.1+b2) ...
Setting up dh-autoreconf (20) ...
Setting up libtomcrypt-dev (1.18.2+dfsg-7+b2) ...
Setting up libglib2.0-0t64:arm64 (2.83.3-2) ...
No schema files found: doing nothing.
Setting up libstoken-dev:arm64 (0.92-1.1+b2) ...
Setting up libp11-kit0:arm64 (0.25.5-3) ...
Setting up ucf (3.0049) ...
Setting up libreadline8t64:arm64 (8.2-6) ...
Setting up dh-strip-nondeterminism (1.14.1-2) ...
Setting up libnss3-dev:arm64 (2:3.107-1) ...
Setting up groff-base (1.23.0-7) ...
Setting up libpython3.13-stdlib:arm64 (3.13.2-1) ...
Setting up libp11-kit-dev:arm64 (0.25.5-3) ...
Setting up libpython3-stdlib:arm64 (3.13.1-2) ...
Setting up libgnutls30t64:arm64 (3.8.9-2) ...
Setting up softhsm2-common (2.6.1-2.2+b3) ...
Creating config file /etc/softhsm/softhsm2.conf with new version
Setting up python3.13 (3.13.2-1) ...
Setting up po-debconf (1.0.21+nmu1) ...
Setting up expect (5.45.4-3+b1) ...
Setting up python3 (3.13.1-2) ...
Setting up python3-zipp (3.21.0-1) ...
Setting up python3-autocommand (2.2.2-3) ...
Setting up man-db (2.13.0-1) ...
Not building database; man-db/auto-update is not 'true'.
Setting up opensc-pkcs11:arm64 (0.26.0-1) ...
Setting up p11-kit-modules:arm64 (0.25.5-3) ...
Setting up libgnutls-dane0t64:arm64 (3.8.9-2) ...
Setting up python3-typing-extensions (4.12.2-2) ...
Setting up p11-kit (0.25.5-3) ...
Setting up gnutls-bin (3.8.9-2) ...
Setting up python3-more-itertools (10.6.0-1) ...
Setting up libsofthsm2 (2.6.1-2.2+b3) ...
Setting up softhsm2 (2.6.1-2.2+b3) ...
Setting up python3-jaraco.functools (4.1.0-1) ...
Setting up python3-jaraco.context (6.0.0-1) ...
Setting up opensc (0.26.0-1) ...
Setting up python3-typeguard (4.4.1-1) ...
Setting up debhelper (13.24.1) ...
Setting up python3-inflect (7.3.1-2) ...
Setting up python3-jaraco.text (4.0.0-1) ...
Setting up python3-pkg-resources (75.6.0-1) ...
Setting up dh-package-notes (0.15) ...
Setting up python3-setuptools (75.6.0-1) ...
Setting up meson (1.7.0-1) ...
Processing triggers for libc-bin (2.40-6) ...
Reading package lists...
Building dependency tree...
Reading state information...
Reading extended state information...
Initializing package states...
Writing extended state information...
Building tag database...
 -> Finished parsing the build-deps
I: Building the package
I: Running cd /build/reproducible-path/pkcs11-provider-1.0/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S  > ../pkcs11-provider_1.0-1_source.changes
dpkg-buildpackage: info: source package pkcs11-provider
dpkg-buildpackage: info: source version 1.0-1
dpkg-buildpackage: info: source distribution unstable
dpkg-buildpackage: info: source changed by Luca Boccassi <bluca@debian.org>
 dpkg-source --before-build .
dpkg-buildpackage: info: host architecture arm64
 debian/rules clean
dh clean --buildsystem=meson
   dh_auto_clean -O--buildsystem=meson
   dh_autoreconf_clean -O--buildsystem=meson
   dh_clean -O--buildsystem=meson
 debian/rules binary
dh binary --buildsystem=meson
   dh_update_autotools_config -O--buildsystem=meson
   dh_autoreconf -O--buildsystem=meson
   dh_auto_configure -O--buildsystem=meson
	cd obj-aarch64-linux-gnu && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 meson setup .. --wrap-mode=nodownload --buildtype=plain --prefix=/usr --sysconfdir=/etc --localstatedir=/var --libdir=lib/aarch64-linux-gnu -Dpython.bytecompile=-1
The Meson build system
Version: 1.7.0
Source dir: /build/reproducible-path/pkcs11-provider-1.0
Build dir: /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu
Build type: native build
Project name: pkcs11-provider
Project version: 1.0
C compiler for the host machine: cc (gcc 14.2.0 "cc (Debian 14.2.0-16) 14.2.0")
C linker for the host machine: cc ld.bfd 2.44
Host machine cpu family: aarch64
Host machine cpu: aarch64
Compiler for C supports arguments -Wwrite-strings: YES 
Compiler for C supports arguments -Wpointer-arith: YES 
Compiler for C supports arguments -Wno-missing-field-initializers: YES 
Compiler for C supports arguments -Wformat: YES 
Compiler for C supports arguments -Wshadow: YES 
Compiler for C supports arguments -Wno-unused-parameter: YES 
Compiler for C supports arguments -Werror=implicit-function-declaration: YES 
Compiler for C supports arguments -Werror=missing-prototypes: YES 
Compiler for C supports arguments -Werror=format-security: YES 
Compiler for C supports arguments -Werror=parentheses: YES 
Compiler for C supports arguments -Werror=implicit: YES 
Compiler for C supports arguments -Werror=strict-prototypes: YES 
Compiler for C supports arguments -fno-strict-aliasing: YES 
Compiler for C supports arguments -fno-delete-null-pointer-checks: YES 
Compiler for C supports arguments -fdiagnostics-show-option: YES 
Found pkg-config: YES (/usr/bin/pkg-config) 1.8.1
Run-time dependency libcrypto found: YES 3.4.0
Run-time dependency libssl found: YES 3.4.0
Run-time dependency p11-kit-1 found: YES 0.25.5
Has header "dlfcn.h" : YES 
Configuring config.h using configuration
Compiler for C supports link arguments -Wl,--version-script,/build/reproducible-path/pkcs11-provider-1.0/src/provider.map: YES 
Did not find CMake 'cmake'
Found CMake: NO
Run-time dependency nss-softokn found: NO (tried pkgconfig and cmake)
Run-time dependency nss found: YES 3.107
Program setup.sh found: YES (/build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh)
Program valgrind found: NO
Program test-wrapper found: YES (/build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper)
Build targets in project: 12

pkcs11-provider 1.0

  User defined options
    buildtype         : plain
    libdir            : lib/aarch64-linux-gnu
    localstatedir     : /var
    prefix            : /usr
    python.bytecompile: -1
    sysconfdir        : /etc
    wrap_mode         : nodownload

Found ninja-1.12.1 at /usr/bin/ninja
   dh_auto_build -O--buildsystem=meson
	cd obj-aarch64-linux-gnu && LC_ALL=C.UTF-8 ninja -j12 -v
[1/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/pk11_uri.c.o -MF src/pkcs11.so.p/pk11_uri.c.o.d -o src/pkcs11.so.p/pk11_uri.c.o -c ../src/pk11_uri.c
[2/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/debug.c.o -MF src/pkcs11.so.p/debug.c.o.d -o src/pkcs11.so.p/debug.c.o -c ../src/debug.c
[3/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/decoder.c.o -MF src/pkcs11.so.p/decoder.c.o.d -o src/pkcs11.so.p/decoder.c.o -c ../src/decoder.c
[4/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/digests.c.o -MF src/pkcs11.so.p/digests.c.o.d -o src/pkcs11.so.p/digests.c.o -c ../src/digests.c
[5/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/asymmetric_cipher.c.o -MF src/pkcs11.so.p/asymmetric_cipher.c.o.d -o src/pkcs11.so.p/asymmetric_cipher.c.o -c ../src/asymmetric_cipher.c
[6/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/exchange.c.o -MF src/pkcs11.so.p/exchange.c.o.d -o src/pkcs11.so.p/exchange.c.o -c ../src/exchange.c
[7/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/kdf.c.o -MF src/pkcs11.so.p/kdf.c.o.d -o src/pkcs11.so.p/kdf.c.o -c ../src/kdf.c
[8/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/random.c.o -MF src/pkcs11.so.p/random.c.o.d -o src/pkcs11.so.p/random.c.o -c ../src/random.c
[9/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/encoder.c.o -MF src/pkcs11.so.p/encoder.c.o.d -o src/pkcs11.so.p/encoder.c.o -c ../src/encoder.c
[10/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/tls.c.o -MF src/pkcs11.so.p/tls.c.o.d -o src/pkcs11.so.p/tls.c.o -c ../src/tls.c
[11/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/slot.c.o -MF src/pkcs11.so.p/slot.c.o.d -o src/pkcs11.so.p/slot.c.o -c ../src/slot.c
[12/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/store.c.o -MF src/pkcs11.so.p/store.c.o.d -o src/pkcs11.so.p/store.c.o -c ../src/store.c
[13/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/session.c.o -MF src/pkcs11.so.p/session.c.o.d -o src/pkcs11.so.p/session.c.o -c ../src/session.c
[14/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/keymgmt.c.o -MF src/pkcs11.so.p/keymgmt.c.o.d -o src/pkcs11.so.p/keymgmt.c.o -c ../src/keymgmt.c
[15/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/interface.c.o -MF src/pkcs11.so.p/interface.c.o.d -o src/pkcs11.so.p/interface.c.o -c ../src/interface.c
[16/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/util.c.o -MF src/pkcs11.so.p/util.c.o.d -o src/pkcs11.so.p/util.c.o -c ../src/util.c
[17/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/signature.c.o -MF src/pkcs11.so.p/signature.c.o.d -o src/pkcs11.so.p/signature.c.o -c ../src/signature.c
[18/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/objects.c.o -MF src/pkcs11.so.p/objects.c.o.d -o src/pkcs11.so.p/objects.c.o -c ../src/objects.c
[19/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/provider.c.o -MF src/pkcs11.so.p/provider.c.o.d -o src/pkcs11.so.p/provider.c.o -c ../src/provider.c
[20/20] cc  -o src/pkcs11.so src/pkcs11.so.p/asymmetric_cipher.c.o src/pkcs11.so.p/debug.c.o src/pkcs11.so.p/encoder.c.o src/pkcs11.so.p/decoder.c.o src/pkcs11.so.p/digests.c.o src/pkcs11.so.p/exchange.c.o src/pkcs11.so.p/kdf.c.o src/pkcs11.so.p/keymgmt.c.o src/pkcs11.so.p/pk11_uri.c.o src/pkcs11.so.p/interface.c.o src/pkcs11.so.p/objects.c.o src/pkcs11.so.p/provider.c.o src/pkcs11.so.p/random.c.o src/pkcs11.so.p/session.c.o src/pkcs11.so.p/signature.c.o src/pkcs11.so.p/slot.c.o src/pkcs11.so.p/store.c.o src/pkcs11.so.p/tls.c.o src/pkcs11.so.p/util.c.o -Wl,--as-needed -Wl,--allow-shlib-undefined -shared -fPIC -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--version-script,/build/reproducible-path/pkcs11-provider-1.0/src/provider.map /usr/lib/aarch64-linux-gnu/libcrypto.so
   dh_auto_test -O--buildsystem=meson
	cd obj-aarch64-linux-gnu && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 MESON_TESTTHREADS=12 meson test --verbose
ninja: Entering directory `/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu'
[1/29] Compiling C object tests/tsession.p/tsession.c.o
[2/29] Compiling C object tests/tdigests.p/tdigests.c.o
[3/29] Compiling C object tests/tlssetkey.p/tlssetkey.c.o
[4/29] Compiling C object tests/tcmpkeys.p/tcmpkeys.c.o
[5/29] Compiling C object tests/tlsctx.p/util.c.o
[6/29] Compiling C object tests/treadkeys.p/treadkeys.c.o
[7/29] Compiling C object tests/tpkey.p/tpkey.c.o
[8/29] Compiling C object tests/tlsctx.p/tlsctx.c.o
[9/29] Compiling C object tests/tgenkey.p/util.c.o
[10/29] Compiling C object tests/tcmpkeys.p/util.c.o
[11/29] Compiling C object tests/ccerts.p/ccerts.c.o
[12/29] Linking target tests/treadkeys
[13/29] Compiling C object tests/pincache.p/pincache.c.o
[14/29] Compiling C object tests/tlssetkey.p/util.c.o
[15/29] Compiling C object tests/tfork.p/tfork.c.o
[16/29] Linking target tests/tdigests
[17/29] Linking target tests/tsession
[18/29] Compiling C object tests/tpkey.p/util.c.o
[19/29] Compiling C object tests/tfork.p/util.c.o
[20/29] Compiling C object tests/tgenkey.p/tgenkey.c.o
[21/29] Linking target tests/tlsctx
[22/29] Linking target tests/tcmpkeys
[23/29] Linking target tests/pincache
[24/29] Linking target tests/tlssetkey
[25/29] Compiling C object tests/ccerts.p/util.c.o
[26/29] Linking target tests/tfork
[27/29] Linking target tests/tpkey
[28/29] Linking target tests/tgenkey
[29/29] Linking target tests/ccerts
 1/92 pkcs11-provider:softokn / setup          RUNNING       
>>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 SHARED_EXT=.so LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src MALLOC_PERTURB_=223 SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softokn
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
+ source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh
++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests
++ helper_emit=1
++ grep -q 'GNU sed'
++ sed --version
++ sed_inplace=('-i')
++ export sed_inplace
+ '[' 1 -ne 1 ']'
+ TOKENTYPE=softokn
+ SUPPORT_ED25519=1
+ SUPPORT_ED448=1
+ SUPPORT_RSA_PKCS1_ENCRYPTION=1
+ SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1
+ SUPPORT_TLSFUZZER=1
+ SUPPORT_ALLOWED_MECHANISMS=0
++ opensc-tool -i
++ grep OpenSC
++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/'
Failed to establish context: Unable to load external module
+ OPENSC_VERSION=26
+ [[ 26 -le 25 ]]
+ [[ '' = \1 ]]
++ cat /proc/sys/crypto/fips_enabled
+ [[ 0 = \1 ]]
+ TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn
+ TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn/tokens
+ '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn ']'
+ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn
+ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn/tokens
+ PINVALUE=12345678
+ PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn/pinfile.txt
+ echo 12345678
+ export GNUTLS_PIN=12345678
+ GNUTLS_PIN=12345678
+ '[' softokn == softhsm ']'
+ '[' softokn == softokn ']'
+ source /build/reproducible-path/pkcs11-provider-1.0/tests/softokn-init.sh
++ title SECTION 'Setup NSS Softokn'
++ case "$1" in
++ shift 1
++ echo '########################################'
++ echo '## Setup NSS Softokn'
++ echo ''
++ command -v certutil
++ echo 'NSS'\''s certutil command is required'
++ exit 0
########################################
## Setup NSS Softokn

NSS's certutil command is required
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
 1/92 pkcs11-provider:softokn / setup          OK              0.17s

 2/92 pkcs11-provider:softhsm / setup          RUNNING       
>>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 SHARED_EXT=.so MALLOC_PERTURB_=31 LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softhsm
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
+ source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh
++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests
++ helper_emit=1
++ sed --version
++ grep -q 'GNU sed'
++ sed_inplace=('-i')
++ export sed_inplace
+ '[' 1 -ne 1 ']'
+ TOKENTYPE=softhsm
+ SUPPORT_ED25519=1
+ SUPPORT_ED448=1
+ SUPPORT_RSA_PKCS1_ENCRYPTION=1
+ SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1
+ SUPPORT_TLSFUZZER=1
+ SUPPORT_ALLOWED_MECHANISMS=0
++ opensc-tool -i
++ grep OpenSC
++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/'
Failed to establish context: Unable to load external module
+ OPENSC_VERSION=26
+ [[ 26 -le 25 ]]
+ [[ '' = \1 ]]
++ cat /proc/sys/crypto/fips_enabled
+ [[ 0 = \1 ]]
+ TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm
+ TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/tokens
+ '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm ']'
+ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm
+ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/tokens
+ PINVALUE=12345678
+ PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
+ echo 12345678
+ export GNUTLS_PIN=12345678
+ GNUTLS_PIN=12345678
+ '[' softhsm == softhsm ']'
+ source /build/reproducible-path/pkcs11-provider-1.0/tests/softhsm-init.sh
++ title SECTION 'Searching for SoftHSM PKCS#11 library'
++ case "$1" in
++ shift 1
++ echo '########################################'
++ echo '## Searching for SoftHSM PKCS#11 library'
++ echo ''
++ command -v softhsm2-util
########################################
## Searching for SoftHSM PKCS#11 library

+++++ type -p softhsm2-util
++++ dirname /usr/bin/softhsm2-util
+++ dirname /usr/bin
++ softhsm_prefix=/usr
++ find_softhsm /usr/lib64/softhsm/libsofthsm2.so /usr/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/local/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so
++ for _lib in "$@"
++ test -f /usr/lib64/softhsm/libsofthsm2.so
++ for _lib in "$@"
++ test -f /usr/lib/softhsm/libsofthsm2.so
++ echo 'Using softhsm path /usr/lib/softhsm/libsofthsm2.so'
++ P11LIB=/usr/lib/softhsm/libsofthsm2.so
++ return
++ export P11LIB
++ title SECTION 'Set up testing system'
++ case "$1" in
++ shift 1
++ echo '########################################'
++ echo '## Set up testing system'
++ echo ''
++ cat
Using softhsm path /usr/lib/softhsm/libsofthsm2.so
########################################
## Set up testing system

++ export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf
++ SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf
++ export 'TOKENLABEL=SoftHSM Token'
++ TOKENLABEL='SoftHSM Token'
++ export TOKENLABELURI=SoftHSM%20Token
++ TOKENLABELURI=SoftHSM%20Token
++ softhsm2-util --init-token --label 'SoftHSM Token' --free --pin 12345678 --so-pin 12345678
Slot 0 has a free/uninitialized token.
The token has been initialized and is reassigned to slot 576291950
++ export 'TOKENOPTIONS=\npkcs11-module-quirks = no-deinit no-operation-state'
++ TOKENOPTIONS='\npkcs11-module-quirks = no-deinit no-operation-state'
++ export 'TOKENCONFIGVARS=export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf'
++ TOKENCONFIGVARS='export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf'
++ export TESTPORT=32000
++ TESTPORT=32000
++ export SUPPORT_ALLOWED_MECHANISMS=1
++ SUPPORT_ALLOWED_MECHANISMS=1
+ SEEDFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/noisefile.bin
+ dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/noisefile.bin bs=2048 count=1
+ RAND64FILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/64krandom.bin
+ dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/64krandom.bin bs=2048 count=32
++ uname
+ '[' Linux == Darwin ']'
++ type -p certtool
+ certtool=/usr/bin/certtool
+ '[' -z /usr/bin/certtool ']'
+ P11DEFARGS=("--module=${P11LIB}" "--login" "--pin=${PINVALUE}" "--token-label=${TOKENLABEL}")
+ cat
+ SERIAL=1
+ title LINE 'Creating new Self Sign CA'
+ case "$1" in
+ shift 1
+ echo 'Creating new Self Sign CA'
+ KEYID=0000
+ URIKEYID=%00%00
+ CACRTN=caCert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=caCert --id=0000
Creating new Self Sign CA
Key pair generated:
Private Key Object; RSA 
  label:      caCert
  ID:         0000
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=private
Public Key Object; RSA 2048 bits
  label:      caCert
  ID:         0000
  Usage:      encrypt, verify, verifyRecover, wrap
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=public
+ crt_selfsign caCert Issuer 0000
+ LABEL=caCert
+ CN=Issuer
+ KEYID=0000
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = Issuer|g' -e 's|serial = .*|serial = 2|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg
+ /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=public' --outder
Generating a self signed certificate...
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 02
	Validity:
		Not Before: Mon Mar 23 10:50:02 UTC 2026
		Not After: Tue Mar 23 10:50:02 UTC 2027
	Subject: CN=Issuer
	Subject Public Key Algorithm: RSA
	Algorithm Security Level: Medium (2048 bits)
		Modulus (bits 2048):
			00:b1:61:4f:c5:83:05:ee:0f:de:54:5e:51:e4:a7:58
			2b:a5:26:30:39:43:13:10:f3:bc:a3:b6:84:1a:0e:c2
			79:f5:4d:ec:2d:8d:56:08:04:85:38:b6:ed:fd:6e:1d
			28:dc:0e:4d:65:2e:12:c1:9b:ff:db:83:cd:e6:d1:79
			7e:1c:ea:22:8b:05:a9:97:8a:dc:4f:24:1d:3a:75:51
			5c:ee:10:5b:0f:5b:5a:2b:c1:64:0e:5f:4a:35:6d:1a
			07:0b:b7:8a:c3:7c:aa:c5:68:99:75:71:e8:18:11:f5
			b3:15:b9:13:53:a7:62:3f:d7:2b:66:38:ce:25:d7:16
			f3:35:3e:47:19:ea:c1:74:c3:f2:dc:0c:45:19:03:ae
			32:02:63:ce:bd:0b:93:66:23:03:c3:6c:72:52:39:dd
			e6:5d:fb:f3:d8:56:e5:cb:1f:94:2c:43:3d:b3:ad:4a
			fe:ef:bd:e8:8e:59:91:2a:fc:6c:b7:ff:7d:76:a7:77
			76:c5:ff:2e:2a:65:28:73:dc:ae:22:6c:1e:8b:ea:c3
			a7:88:3c:f4:25:1e:5a:da:0f:49:68:15:a9:2e:20:b7
			b0:7d:4c:f2:87:76:c2:9e:47:c3:95:e0:e2:6b:72:8a
			e3:b0:c8:a9:d7:9f:28:b3:6d:78:f0:5f:05:a0:c2:89
			0f
		Exponent (bits 24):
			01:00:01
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): TRUE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
			Certificate signing.
		Subject Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:64e304a56ab2514967dc59f4f0d7035e89b33c89
		sha256:2114568dcf452580d1c04e30e59cf7ebee543423ee2ee382859a73ef0c792e32
	Public Key PIN:
		pin-sha256:IRRWjc9FJYDRwE4w5Zz36+5UNCPuLuOChZpz7wx5LjI=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --type=cert --id=0000 --label=caCert
Created certificate:
Certificate Object; type = X.509 cert
  label:      caCert
  subject:    DN: CN=Issuer
  serial:     02
  ID:         0000
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert
+ CACRT_PEM=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
+ CACRT=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt
+ openssl x509 -inform DER -in /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt -outform PEM -out /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
+ CABASEURIWITHPINVALUE='pkcs11:id=%00%00?pin-value=12345678'
+ CABASEURIWITHPINSOURCE='pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ CABASEURI=pkcs11:id=%00%00
+ CAPUBURI='pkcs11:type=public;id=%00%00'
+ CAPRIURI='pkcs11:type=private;id=%00%00'
+ CACRTURI='pkcs11:type=cert;object=caCert'
+ title LINE 'RSA PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'RSA PKCS11 URIS'
+ echo 'pkcs11:id=%00%00?pin-value=12345678'
+ echo 'pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%00
+ echo 'pkcs11:type=public;id=%00%00'
+ echo 'pkcs11:type=private;id=%00%00'
+ echo 'pkcs11:type=cert;object=caCert'
+ echo ''
+ cat /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg
RSA PKCS11 URIS
pkcs11:id=%00%00?pin-value=12345678
pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%00
pkcs11:type=public;id=%00%00
pkcs11:type=private;id=%00%00
pkcs11:type=cert;object=caCert

+ echo 'organization = "PKCS11 Provider"'
+ sed -e '/^cert_signing_key$/d' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ KEYID=0001
+ URIKEYID=%00%01
+ TSTCRTN=testCert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert --id=0001
Key pair generated:
Private Key Object; RSA 
  label:      testCert
  ID:         0001
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=private
Public Key Object; RSA 2048 bits
  label:      testCert
  ID:         0001
  Usage:      encrypt, verify, verifyRecover, wrap
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=public
+ ca_sign testCert 'My Test Cert' 0001
+ LABEL=testCert
+ CN='My Test Cert'
+ KEYID=0001
+ shift 3
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My Test Cert|g' -e 's|serial = .*|serial = 3|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private'
Generating a signed certificate...

Expiration time: Mon Mar 22 22:50:03 2027
CA expiration time: Mon Mar 22 22:50:02 2027
Warning: The time set exceeds the CA's expiration time
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 03
	Validity:
		Not Before: Mon Mar 23 10:50:03 UTC 2026
		Not After: Tue Mar 23 10:50:03 UTC 2027
	Subject: CN=My Test Cert,O=PKCS11 Provider
	Subject Public Key Algorithm: RSA
	Algorithm Security Level: Medium (2048 bits)
		Modulus (bits 2048):
			00:c9:a1:92:0e:78:39:ca:3d:b9:03:e5:1a:c7:a2:66
			69:32:23:e2:de:61:06:96:f7:bc:58:dd:af:e9:ae:ee
			6c:e1:0c:2b:80:26:a8:6f:ca:f4:61:c9:51:72:26:da
			79:c2:d9:e2:e8:3a:f2:1a:0a:62:eb:53:90:0c:2a:a8
			ff:a1:a2:48:92:8b:5d:48:06:ce:9f:bc:6b:ee:85:49
			8c:d5:ba:a6:5f:a0:f9:28:3d:a6:ef:17:45:38:92:32
			c1:2d:86:a7:bf:6a:0d:58:dc:5c:35:7c:94:9b:5f:a9
			d8:89:5f:86:68:e5:49:14:7d:64:76:74:8c:be:d9:c1
			03:81:a3:45:80:40:65:7c:a2:95:4c:78:38:da:e1:09
			87:6e:e0:6e:5d:cb:5e:4e:9d:24:55:07:a4:78:13:c2
			c8:e1:e1:e8:f6:fa:11:03:24:bc:d7:8a:b7:62:a2:7a
			a8:f5:40:f3:14:c9:af:f9:76:00:af:73:e1:79:49:93
			e1:8e:15:c5:e3:3a:ef:9e:8f:63:41:aa:cf:94:7f:0b
			20:79:4f:fb:01:13:62:d9:64:13:01:29:c0:52:77:1c
			5d:85:fa:24:85:ab:da:a6:74:ad:b0:5f:48:fe:03:72
			8d:ae:69:c9:da:7b:84:d1:16:ff:12:ca:11:7a:07:ae
			ab
		Exponent (bits 24):
			01:00:01
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): FALSE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
			Key encipherment.
		Subject Key Identifier (not critical):
			86eb59b538d367ebf9a5878c798f47c7d8bed8e0
		Authority Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:86eb59b538d367ebf9a5878c798f47c7d8bed8e0
		sha256:f5fde55e92f2d51d2aa8320437ede9e3301c8e6cfdd8f64b02b69a7f5dfef503
	Public Key PIN:
		pin-sha256:9f3lXpLy1R0qqDIEN+3p4zAcjmz92PZLAraaf13+9QM=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert.crt --type=cert --id=0001 --label=testCert
Created certificate:
Certificate Object; type = X.509 cert
  label:      testCert
  subject:    DN: O=PKCS11 Provider, CN=My Test Cert
  serial:     03
  ID:         0001
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert
RSA PKCS11 URIS
pkcs11:id=%00%01?pin-value=12345678
pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%01
pkcs11:type=public;id=%00%01
pkcs11:type=private;id=%00%01
pkcs11:type=cert;object=testCert

+ BASEURIWITHPINVALUE='pkcs11:id=%00%01?pin-value=12345678'
+ BASEURIWITHPINSOURCE='pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ BASEURI=pkcs11:id=%00%01
+ PUBURI='pkcs11:type=public;id=%00%01'
+ PRIURI='pkcs11:type=private;id=%00%01'
+ CRTURI='pkcs11:type=cert;object=testCert'
+ title LINE 'RSA PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'RSA PKCS11 URIS'
+ echo 'pkcs11:id=%00%01?pin-value=12345678'
+ echo 'pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%01
+ echo 'pkcs11:type=public;id=%00%01'
+ echo 'pkcs11:type=private;id=%00%01'
+ echo 'pkcs11:type=cert;object=testCert'
+ echo ''
+ KEYID=0002
+ URIKEYID=%00%02
+ ECCRTN=ecCert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecCert --id=0002
Key pair generated:
Private Key Object; EC
  label:      ecCert
  ID:         0002
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private
Public Key Object; EC  EC_POINT 256 bits
  EC_POINT:   044104305860d036925c61c5d7c1734aa021145aaa5d4562214244bff714bf32896046b5f9b6c3741eceffeb30a47fdf99a78c49a4a916ebe7a6dcd53321b0acdbbdc7
  EC_PARAMS:  06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7)
  label:      ecCert
  ID:         0002
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public
+ ca_sign ecCert 'My EC Cert' 0002
+ LABEL=ecCert
+ CN='My EC Cert'
+ KEYID=0002
+ shift 3
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My EC Cert|g' -e 's|serial = .*|serial = 4|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private'
Generating a signed certificate...

Expiration time: Mon Mar 22 22:50:03 2027
CA expiration time: Mon Mar 22 22:50:02 2027
Warning: The time set exceeds the CA's expiration time
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 04
	Validity:
		Not Before: Mon Mar 23 10:50:03 UTC 2026
		Not After: Tue Mar 23 10:50:03 UTC 2027
	Subject: CN=My EC Cert,O=PKCS11 Provider
	Subject Public Key Algorithm: EC/ECDSA
	Algorithm Security Level: High (256 bits)
		Curve:	SECP256R1
		X:
			30:58:60:d0:36:92:5c:61:c5:d7:c1:73:4a:a0:21:14
			5a:aa:5d:45:62:21:42:44:bf:f7:14:bf:32:89:60:46
		Y:
			00:b5:f9:b6:c3:74:1e:ce:ff:eb:30:a4:7f:df:99:a7
			8c:49:a4:a9:16:eb:e7:a6:dc:d5:33:21:b0:ac:db:bd
			c7
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): FALSE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
		Subject Key Identifier (not critical):
			7c933f4ef94dbbc667d06feebe48dbce2d7cae82
		Authority Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:7c933f4ef94dbbc667d06feebe48dbce2d7cae82
		sha256:b779e1f13e7e9bfc96a9693deb62eff671b003e81d626e8d777f0b9ecc026f11
	Public Key PIN:
		pin-sha256:t3nh8T5+m/yWqWk962Lv9nGwA+gdYm6Nd38LnswCbxE=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert.crt --type=cert --id=0002 --label=ecCert
Created certificate:
Certificate Object; type = X.509 cert
  label:      ecCert
  subject:    DN: O=PKCS11 Provider, CN=My EC Cert
  serial:     04
  ID:         0002
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert
+ ECBASEURIWITHPINVALUE='pkcs11:id=%00%02?pin-value=12345678'
+ ECBASEURIWITHPINSOURCE='pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ ECBASEURI=pkcs11:id=%00%02
+ ECPUBURI='pkcs11:type=public;id=%00%02'
+ ECPRIURI='pkcs11:type=private;id=%00%02'
+ ECCRTURI='pkcs11:type=cert;object=ecCert'
+ KEYID=0003
+ URIKEYID=%00%03
+ ECPEERCRTN=ecPeerCert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecPeerCert --id=0003
Key pair generated:
Private Key Object; EC
  label:      ecPeerCert
  ID:         0003
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private
Public Key Object; EC  EC_POINT 256 bits
  EC_POINT:   044104e3143bf6e8d9112ac816c42dda653429746b7dc2e41e32e8e09b9ac9cc8b6d97ff6be05e1db5be8f741c98805e58245eeb3fae3739db63614055ab60db3e22ac
  EC_PARAMS:  06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7)
  label:      ecPeerCert
  ID:         0003
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public
+ crt_selfsign ecPeerCert 'My Peer EC Cert' 0003
+ LABEL=ecPeerCert
+ CN='My Peer EC Cert'
+ KEYID=0003
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My Peer EC Cert|g' -e 's|serial = .*|serial = 5|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg
+ /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecPeerCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=public' --outder
Generating a self signed certificate...
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 05
	Validity:
		Not Before: Mon Mar 23 10:50:03 UTC 2026
		Not After: Tue Mar 23 10:50:03 UTC 2027
	Subject: CN=My Peer EC Cert
	Subject Public Key Algorithm: EC/ECDSA
	Algorithm Security Level: High (256 bits)
		Curve:	SECP256R1
		X:
			00:e3:14:3b:f6:e8:d9:11:2a:c8:16:c4:2d:da:65:34
			29:74:6b:7d:c2:e4:1e:32:e8:e0:9b:9a:c9:cc:8b:6d
			97
		Y:
			00:ff:6b:e0:5e:1d:b5:be:8f:74:1c:98:80:5e:58:24
			5e:eb:3f:ae:37:39:db:63:61:40:55:ab:60:db:3e:22
			ac
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): TRUE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
			Certificate signing.
		Subject Key Identifier (not critical):
			5d6dc27a5d71c08f9edc93fb50fceff3da070669
Other Information:
	Public Key ID:
		sha1:5d6dc27a5d71c08f9edc93fb50fceff3da070669
		sha256:eb5fc7999f2e27b798722ecdd5ea99b016ceb62fd9abef2f53a72c666d999112
	Public Key PIN:
		pin-sha256:61/HmZ8uJ7eYci7N1eqZsBbOti/Zq+8vU6csZm2ZkRI=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecPeerCert.crt --type=cert --id=0003 --label=ecPeerCert
Created certificate:
Certificate Object; type = X.509 cert
  label:      ecPeerCert
  subject:    DN: CN=My Peer EC Cert
  serial:     05
  ID:         0003
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert
+ ECPEERBASEURIWITHPINVALUE='pkcs11:id=%00%03?pin-value=12345678'
+ ECPEERBASEURIWITHPINSOURCE='pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ ECPEERBASEURI=pkcs11:id=%00%03
+ ECPEERPUBURI='pkcs11:type=public;id=%00%03'
+ ECPEERPRIURI='pkcs11:type=private;id=%00%03'
+ ECPEERCRTURI='pkcs11:type=cert;object=ecPeerCert'
+ title LINE 'EC PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'EC PKCS11 URIS'
+ echo 'pkcs11:id=%00%02?pin-value=12345678'
+ echo 'pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%02
+ echo 'pkcs11:type=public;id=%00%02'
+ echo 'pkcs11:type=private;id=%00%02'
+ echo 'pkcs11:type=cert;object=ecCert'
+ echo 'pkcs11:id=%00%03?pin-value=12345678'
+ echo 'pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%03
+ echo 'pkcs11:type=public;id=%00%03'
+ echo 'pkcs11:type=private;id=%00%03'
+ echo 'pkcs11:type=cert;object=ecPeerCert'
+ echo ''
+ '[' 1 -eq 1 ']'
+ KEYID=0004
+ URIKEYID=%00%04
+ EDCRTN=edCert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:edwards25519 --label=edCert --id=0004
EC PKCS11 URIS
pkcs11:id=%00%02?pin-value=12345678
pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%02
pkcs11:type=public;id=%00%02
pkcs11:type=private;id=%00%02
pkcs11:type=cert;object=ecCert
pkcs11:id=%00%03?pin-value=12345678
pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%03
pkcs11:type=public;id=%00%03
pkcs11:type=private;id=%00%03
pkcs11:type=cert;object=ecPeerCert

Key pair generated:
Private Key Object; EC_EDWARDS
  label:      edCert
  ID:         0004
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=private
Public Key Object; EC_EDWARDS  EC_POINT 272 bits
  EC_POINT:   042040d62083bf5aba84da330314d8c966c0243ef103f7883b3f4ea80c3deebb8a96
  EC_PARAMS:  130c656477617264733235353139 (PrintableString edwards25519)
  label:      edCert
  ID:         0004
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=public
+ ca_sign edCert 'My ED25519 Cert' 0004
+ LABEL=edCert
+ CN='My ED25519 Cert'
+ KEYID=0004
+ shift 3
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My ED25519 Cert|g' -e 's|serial = .*|serial = 6|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/edCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private'
Generating a signed certificate...

Expiration time: Mon Mar 22 22:50:03 2027
CA expiration time: Mon Mar 22 22:50:02 2027
Warning: The time set exceeds the CA's expiration time
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 06
	Validity:
		Not Before: Mon Mar 23 10:50:03 UTC 2026
		Not After: Tue Mar 23 10:50:03 UTC 2027
	Subject: CN=My ED25519 Cert,O=PKCS11 Provider
	Subject Public Key Algorithm: EdDSA (Ed25519)
	Algorithm Security Level: High (256 bits)
		Curve:	Ed25519
		X:
			40:d6:20:83:bf:5a:ba:84:da:33:03:14:d8:c9:66:c0
			24:3e:f1:03:f7:88:3b:3f:4e:a8:0c:3d:ee:bb:8a:96
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): FALSE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
		Subject Key Identifier (not critical):
			643c9c3dd50a7a4d1dcaab030d0f6202ad51f0b4
		Authority Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:643c9c3dd50a7a4d1dcaab030d0f6202ad51f0b4
		sha256:902057f8864bb92becef5eca392774ea73236becbc58ce4b165476b2389fed78
	Public Key PIN:
		pin-sha256:kCBX+IZLuSvs717KOSd06nMja+y8WM5LFlR2sjif7Xg=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/edCert.crt --type=cert --id=0004 --label=edCert
Created certificate:
Certificate Object; type = X.509 cert
  label:      edCert
  subject:    DN: O=PKCS11 Provider, CN=My ED25519 Cert
  serial:     06
  ID:         0004
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert
+ EDBASEURIWITHPINVALUE='pkcs11:id=%00%04;pin-value=12345678'
+ EDBASEURIWITHPINSOURCE='pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ EDBASEURI=pkcs11:id=%00%04
+ EDPUBURI='pkcs11:type=public;id=%00%04'
+ EDPRIURI='pkcs11:type=private;id=%00%04'
+ EDCRTURI='pkcs11:type=cert;object=edCert'
+ title LINE 'ED25519 PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'ED25519 PKCS11 URIS'
+ echo 'pkcs11:id=%00%04;pin-value=12345678'
+ echo 'pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%04
+ echo 'pkcs11:type=public;id=%00%04'
+ echo 'pkcs11:type=private;id=%00%04'
+ echo 'pkcs11:type=cert;object=edCert'
+ '[' 1 -eq 1 ']'
+ KEYID=0009
+ URIKEYID=%00%09
+ ED2CRTN=ed2Cert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:Ed448 --label=ed2Cert --id=0009
ED25519 PKCS11 URIS
pkcs11:id=%00%04;pin-value=12345678
pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%04
pkcs11:type=public;id=%00%04
pkcs11:type=private;id=%00%04
pkcs11:type=cert;object=edCert
Key pair generated:
Private Key Object; EC_EDWARDS
  label:      ed2Cert
  ID:         0009
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private
Public Key Object; EC_EDWARDS  EC_POINT 472 bits
  EC_POINT:   04393441a7d2d9d2d8562d467ca8c876381a2a48c703821afe59bf36cde5f4bbcacfac7cb9553ef741e12b308bab9e0b49ba4dbdbe2a5ea43f9000
  EC_PARAMS:  06032b6571 (OID 1.3.101.113)
  label:      ed2Cert
  ID:         0009
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public
+ ca_sign ed2Cert 'My ED448 Cert' 0009
+ LABEL=ed2Cert
+ CN='My ED448 Cert'
+ KEYID=0009
+ shift 3
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My ED448 Cert|g' -e 's|serial = .*|serial = 7|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ed2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private'
Generating a signed certificate...

Expiration time: Mon Mar 22 22:50:04 2027
CA expiration time: Mon Mar 22 22:50:02 2027
Warning: The time set exceeds the CA's expiration time
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 07
	Validity:
		Not Before: Mon Mar 23 10:50:04 UTC 2026
		Not After: Tue Mar 23 10:50:04 UTC 2027
	Subject: CN=My ED448 Cert,O=PKCS11 Provider
	Subject Public Key Algorithm: EdDSA (Ed448)
	Algorithm Security Level: Ultra (456 bits)
		Curve:	Ed448
		X:
			34:41:a7:d2:d9:d2:d8:56:2d:46:7c:a8:c8:76:38:1a
			2a:48:c7:03:82:1a:fe:59:bf:36:cd:e5:f4:bb:ca:cf
			ac:7c:b9:55:3e:f7:41:e1:2b:30:8b:ab:9e:0b:49:ba
			4d:bd:be:2a:5e:a4:3f:90:00
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): FALSE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
		Subject Key Identifier (not critical):
			9e7a85bb609d3f595404cbfff56384c4d6a4b460
		Authority Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:9e7a85bb609d3f595404cbfff56384c4d6a4b460
		sha256:ff474d7b8cef34d4d6ab51e043f079189330e26f53325133a14286b7559df64f
	Public Key PIN:
		pin-sha256:/0dNe4zvNNTWq1HgQ/B5GJMw4m9TMlEzoUKGt1Wd9k8=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ed2Cert.crt --type=cert --id=0009 --label=ed2Cert
Created certificate:
Certificate Object; type = X.509 cert
  label:      ed2Cert
  subject:    DN: O=PKCS11 Provider, CN=My ED448 Cert
  serial:     07
  ID:         0009
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert
+ ED2BASEURIWITHPINVALUE='pkcs11:id=%00%09;pin-value=12345678'
+ ED2BASEURIWITHPINSOURCE='pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ ED2BASEURI=pkcs11:id=%00%09
+ ED2PUBURI='pkcs11:type=public;id=%00%09'
+ ED2PRIURI='pkcs11:type=private;id=%00%09'
+ ED2CRTURI='pkcs11:type=cert;object=ed2Cert'
+ title LINE 'ED448 PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'ED448 PKCS11 URIS'
+ echo 'pkcs11:id=%00%09;pin-value=12345678'
+ echo 'pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%09
+ echo 'pkcs11:type=public;id=%00%09'
+ echo 'pkcs11:type=private;id=%00%09'
+ echo 'pkcs11:type=cert;object=ed2Cert'
+ title PARA 'generate RSA key pair, self-signed certificate, remove public key'
+ case "$1" in
+ shift 1
+ echo ''
+ echo '## generate RSA key pair, self-signed certificate, remove public key'
+ '[' -f '' ']'
+ KEYID=0005
+ URIKEYID=%00%05
+ TSTCRTN=testCert2
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert2 --id=0005
ED448 PKCS11 URIS
pkcs11:id=%00%09;pin-value=12345678
pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%09
pkcs11:type=public;id=%00%09
pkcs11:type=private;id=%00%09
pkcs11:type=cert;object=ed2Cert

## generate RSA key pair, self-signed certificate, remove public key
Key pair generated:
Private Key Object; RSA 
  label:      testCert2
  ID:         0005
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private
Public Key Object; RSA 2048 bits
  label:      testCert2
  ID:         0005
  Usage:      encrypt, verify, verifyRecover, wrap
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=public
+ ca_sign testCert2 'My Test Cert 2' 0005
+ LABEL=testCert2
+ CN='My Test Cert 2'
+ KEYID=0005
+ shift 3
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My Test Cert 2|g' -e 's|serial = .*|serial = 8|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private'
Generating a signed certificate...

Expiration time: Mon Mar 22 22:50:04 2027
CA expiration time: Mon Mar 22 22:50:02 2027
Warning: The time set exceeds the CA's expiration time
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 08
	Validity:
		Not Before: Mon Mar 23 10:50:04 UTC 2026
		Not After: Tue Mar 23 10:50:04 UTC 2027
	Subject: CN=My Test Cert 2,O=PKCS11 Provider
	Subject Public Key Algorithm: RSA
	Algorithm Security Level: Medium (2048 bits)
		Modulus (bits 2048):
			00:9d:f5:79:91:1e:d0:5e:bc:b3:02:9f:d3:f5:30:58
			1a:98:8d:6d:56:59:6b:b7:85:91:b7:b4:d7:09:34:b8
			63:3d:0b:f7:fb:27:62:98:7f:c3:e7:c9:e3:2e:36:0b
			f9:30:5d:35:93:e1:54:1c:e4:0d:db:1d:f4:ca:06:96
			26:10:0a:fb:67:9d:b6:92:10:86:94:b5:52:e2:7d:3f
			16:93:ee:c7:26:b2:c1:7d:0a:4a:8b:bb:35:24:de:dd
			a7:92:c8:91:9b:f7:5f:d2:25:fd:b4:e3:f4:ce:08:d3
			36:b2:af:61:94:99:ce:14:8e:91:53:01:02:3f:8b:32
			7d:96:77:8f:af:07:b6:68:e6:1d:f4:c8:53:a4:15:7e
			6a:9e:4d:45:65:d8:db:eb:04:69:39:00:1a:fc:79:53
			ad:47:e8:5e:46:78:6a:77:b5:83:66:0c:55:0b:bf:90
			77:b6:94:97:ad:ef:a3:d3:cb:18:c3:de:dd:6a:23:41
			ed:77:25:3b:ba:a0:9e:41:47:b5:bc:ec:65:1f:b6:41
			f6:68:d6:50:e4:26:19:a2:7b:70:3e:9e:76:d1:fd:c5
			df:be:ff:f1:32:a2:b6:6f:76:ef:1c:d3:e3:59:d0:06
			ce:8a:d0:b8:ba:4e:01:2d:6f:6b:90:c0:a0:b3:9a:63
			cf
		Exponent (bits 24):
			01:00:01
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): FALSE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
			Key encipherment.
		Subject Key Identifier (not critical):
			948e3880f0e8bd37ba368ff8728232589b3c1959
		Authority Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:948e3880f0e8bd37ba368ff8728232589b3c1959
		sha256:b968bf6b3689e9ecf6600f42598a62696d182b80f41022efab0f4a5099e71e0e
	Public Key PIN:
		pin-sha256:uWi/azaJ6ez2YA9CWYpiaW0YK4D0ECLvqw9KUJnnHg4=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert2.crt --type=cert --id=0005 --label=testCert2
Created certificate:
Certificate Object; type = X.509 cert
  label:      testCert2
  subject:    DN: O=PKCS11 Provider, CN=My Test Cert 2
  serial:     08
  ID:         0005
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0005
+ BASE2URIWITHPINVALUE='pkcs11:id=%00%05?pin-value=12345678'
+ BASE2URIWITHPINSOURCE='pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ BASE2URI=pkcs11:id=%00%05
+ PRI2URI='pkcs11:type=private;id=%00%05'
+ CRT2URI='pkcs11:type=cert;object=testCert2'
+ title LINE 'RSA2 PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'RSA2 PKCS11 URIS'
+ echo 'pkcs11:id=%00%05?pin-value=12345678'
+ echo 'pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%05
+ echo 'pkcs11:type=private;id=%00%05'
+ echo 'pkcs11:type=cert;object=testCert2'
+ echo ''
+ title PARA 'generate EC key pair, self-signed certificate, remove public key'
+ case "$1" in
+ shift 1
+ echo ''
+ echo '## generate EC key pair, self-signed certificate, remove public key'
+ '[' -f '' ']'
+ KEYID=0006
+ URIKEYID=%00%06
+ TSTCRTN=ecCert2
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp384r1 --label=ecCert2 --id=0006
RSA2 PKCS11 URIS
pkcs11:id=%00%05?pin-value=12345678
pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%05
pkcs11:type=private;id=%00%05
pkcs11:type=cert;object=testCert2


## generate EC key pair, self-signed certificate, remove public key
Key pair generated:
Private Key Object; EC
  label:      ecCert2
  ID:         0006
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private
Public Key Object; EC  EC_POINT 384 bits
  EC_POINT:   0461047784d86eaeb52448ef0097e1b827b62b1e65782c369ba78119ac155ee27b06273cadee092645c5f15202cf9fb849af64dfe4251538cb723cdcbc20336e8dfc44cd5db8c826f96930daf693c9f7f7d125910d2f11fbdea4f41895ef0a63de8db2
  EC_PARAMS:  06052b81040022 (OID 1.3.132.0.34)
  label:      ecCert2
  ID:         0006
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=public
+ ca_sign ecCert2 'My EC Cert 2' 0006
+ LABEL=ecCert2
+ CN='My EC Cert 2'
+ KEYID=0006
+ shift 3
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My EC Cert 2|g' -e 's|serial = .*|serial = 9|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private'
Generating a signed certificate...

Expiration time: Mon Mar 22 22:50:05 2027
CA expiration time: Mon Mar 22 22:50:02 2027
Warning: The time set exceeds the CA's expiration time
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 09
	Validity:
		Not Before: Mon Mar 23 10:50:05 UTC 2026
		Not After: Tue Mar 23 10:50:05 UTC 2027
	Subject: CN=My EC Cert 2,O=PKCS11 Provider
	Subject Public Key Algorithm: EC/ECDSA
	Algorithm Security Level: Ultra (384 bits)
		Curve:	SECP384R1
		X:
			77:84:d8:6e:ae:b5:24:48:ef:00:97:e1:b8:27:b6:2b
			1e:65:78:2c:36:9b:a7:81:19:ac:15:5e:e2:7b:06:27
			3c:ad:ee:09:26:45:c5:f1:52:02:cf:9f:b8:49:af:64
		Y:
			00:df:e4:25:15:38:cb:72:3c:dc:bc:20:33:6e:8d:fc
			44:cd:5d:b8:c8:26:f9:69:30:da:f6:93:c9:f7:f7:d1
			25:91:0d:2f:11:fb:de:a4:f4:18:95:ef:0a:63:de:8d
			b2
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): FALSE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
		Subject Key Identifier (not critical):
			daa4c211e2bd40386b25f0ad5915b8d93e3543a1
		Authority Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:daa4c211e2bd40386b25f0ad5915b8d93e3543a1
		sha256:37d50106c0302c8694fe61a4d0ec2852960ebaaacc7c2c68386f14491c40ffe2
	Public Key PIN:
		pin-sha256:N9UBBsAwLIaU/mGk0OwoUpYOuqrMfCxoOG8USRxA/+I=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert2.crt --type=cert --id=0006 --label=ecCert2
Created certificate:
Certificate Object; type = X.509 cert
  label:      ecCert2
  subject:    DN: O=PKCS11 Provider, CN=My EC Cert 2
  serial:     09
  ID:         0006
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0006
+ ECBASE2URIWITHPINVALUE='pkcs11:id=%00%06?pin-value=12345678'
+ ECBASE2URIWITHPINSOURCE='pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ ECBASE2URI=pkcs11:id=%00%06
+ ECPRI2URI='pkcs11:type=private;id=%00%06'
+ ECCRT2URI='pkcs11:type=cert;object=ecCert2'
+ title LINE 'EC2 PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'EC2 PKCS11 URIS'
+ echo 'pkcs11:id=%00%06?pin-value=12345678'
+ echo 'pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%06
+ echo 'pkcs11:type=private;id=%00%06'
+ echo 'pkcs11:type=cert;object=ecCert2'
+ echo ''
+ '[' -z '' ']'
+ title PARA 'explicit EC unsupported'
+ case "$1" in
+ shift 1
+ echo ''
+ echo '## explicit EC unsupported'
+ '[' -f '' ']'
+ title PARA 'generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate'
+ case "$1" in
+ shift 1
+ echo ''
+ echo '## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate'
+ '[' -f '' ']'
+ KEYID=0008
+ URIKEYID=%00%08
+ TSTCRTN=ecCert3
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp521r1 --label=ecCert3 --id=0008 --always-auth
EC2 PKCS11 URIS
pkcs11:id=%00%06?pin-value=12345678
pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%06
pkcs11:type=private;id=%00%06
pkcs11:type=cert;object=ecCert2


## explicit EC unsupported

## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate
Key pair generated:
Private Key Object; EC
  label:      ecCert3
  ID:         0008
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     always authenticate, sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private
Public Key Object; EC  EC_POINT 528 bits
  EC_POINT:   0481850400fa5ae811f88d992a2dc5a8b9289cb1224233dacb601eb26715ab9538b35a19a22569397450985c78a9ee99186bfd22fc1f39c1714f152effc32b49ab75c07ca5ab0024360ed325b19e806076df0b34004b07b51d304506116072e2dc7647a725c64ccd83be3ccf0f9395530cfab0a37de89777d330cbce4c3cff5046f1f12cc83d0d3c
  EC_PARAMS:  06052b81040023 (OID 1.3.132.0.35)
  label:      ecCert3
  ID:         0008
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public
+ ca_sign ecCert3 'My EC Cert 3' 0008
+ LABEL=ecCert3
+ CN='My EC Cert 3'
+ KEYID=0008
+ shift 3
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My EC Cert 3|g' -e 's|serial = .*|serial = 10|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert3.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private'
Generating a signed certificate...

Expiration time: Mon Mar 22 22:50:05 2027
CA expiration time: Mon Mar 22 22:50:02 2027
Warning: The time set exceeds the CA's expiration time
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 0a
	Validity:
		Not Before: Mon Mar 23 10:50:05 UTC 2026
		Not After: Tue Mar 23 10:50:05 UTC 2027
	Subject: CN=My EC Cert 3,O=PKCS11 Provider
	Subject Public Key Algorithm: EC/ECDSA
	Algorithm Security Level: Future (528 bits)
		Curve:	SECP521R1
		X:
			00:fa:5a:e8:11:f8:8d:99:2a:2d:c5:a8:b9:28:9c:b1
			22:42:33:da:cb:60:1e:b2:67:15:ab:95:38:b3:5a:19
			a2:25:69:39:74:50:98:5c:78:a9:ee:99:18:6b:fd:22
			fc:1f:39:c1:71:4f:15:2e:ff:c3:2b:49:ab:75:c0:7c
			a5:ab
		Y:
			24:36:0e:d3:25:b1:9e:80:60:76:df:0b:34:00:4b:07
			b5:1d:30:45:06:11:60:72:e2:dc:76:47:a7:25:c6:4c
			cd:83:be:3c:cf:0f:93:95:53:0c:fa:b0:a3:7d:e8:97
			77:d3:30:cb:ce:4c:3c:ff:50:46:f1:f1:2c:c8:3d:0d
			3c
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): FALSE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
		Subject Key Identifier (not critical):
			bff03c43c6a852ed4114a597c946c2f05328307a
		Authority Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:bff03c43c6a852ed4114a597c946c2f05328307a
		sha256:3c70e57dfe6cfcb158129fd6683773cd9fbc009a4f9f7e217a20837a8d4cda76
	Public Key PIN:
		pin-sha256:PHDlff5s/LFYEp/WaDdzzZ+8AJpPn34heiCDeo1M2nY=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert3.crt --type=cert --id=0008 --label=ecCert3
Created certificate:
Certificate Object; type = X.509 cert
  label:      ecCert3
  subject:    DN: O=PKCS11 Provider, CN=My EC Cert 3
  serial:     0A
  ID:         0008
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert
+ ECBASE3URIWITHPINVALUE='pkcs11:id=%00%08?pin-value=12345678'
+ ECBASE3URIWITHPINSOURCE='pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ ECBASE3URI=pkcs11:id=%00%08
+ ECPUB3URI='pkcs11:type=public;id=%00%08'
+ ECPRI3URI='pkcs11:type=private;id=%00%08'
+ ECCRT3URI='pkcs11:type=cert;object=ecCert3'
+ title LINE 'EC3 PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'EC3 PKCS11 URIS'
+ echo 'pkcs11:id=%00%08?pin-value=12345678'
+ echo 'pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%08
+ echo 'pkcs11:type=public;id=%00%08'
+ echo 'pkcs11:type=private;id=%00%08'
+ echo 'pkcs11:type=cert;object=ecCert3'
+ echo ''
+ '[' 1 -eq 1 ']'
+ KEYID=0010
+ URIKEYID=%00%10
+ TSTCRTN=testRsaPssCert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testRsaPssCert --id=0010 --allowed-mechanisms RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS
EC3 PKCS11 URIS
pkcs11:id=%00%08?pin-value=12345678
pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%08
pkcs11:type=public;id=%00%08
pkcs11:type=private;id=%00%08
pkcs11:type=cert;object=ecCert3

Key pair generated:
Private Key Object; RSA 
  label:      testRsaPssCert
  ID:         0010
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private
Public Key Object; RSA 2048 bits
  label:      testRsaPssCert
  ID:         0010
  Usage:      encrypt, verify, verifyRecover, wrap
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public
+ ca_sign testRsaPssCert 'My RsaPss Cert' 0010 --sign-params=RSA-PSS
+ LABEL=testRsaPssCert
+ CN='My RsaPss Cert'
+ KEYID=0010
+ shift 3
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My RsaPss Cert|g' -e 's|serial = .*|serial = 11|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPssCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS
Generating a signed certificate...

Expiration time: Mon Mar 22 22:50:05 2027
CA expiration time: Mon Mar 22 22:50:02 2027
Warning: The time set exceeds the CA's expiration time
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 0b
	Validity:
		Not Before: Mon Mar 23 10:50:05 UTC 2026
		Not After: Tue Mar 23 10:50:05 UTC 2027
	Subject: CN=My RsaPss Cert,O=PKCS11 Provider
	Subject Public Key Algorithm: RSA
	Algorithm Security Level: Medium (2048 bits)
		Modulus (bits 2048):
			00:c0:17:ee:00:1a:07:97:62:26:b4:06:3a:ce:d6:1b
			6b:46:93:e0:49:bb:02:0a:74:a8:84:a1:da:1e:83:4b
			6a:22:19:0a:29:d8:74:ec:fd:e6:56:7a:d4:52:70:ab
			e2:46:d3:f2:82:2a:80:8e:f4:48:95:04:ad:f3:05:b9
			a3:f3:76:e8:b2:d0:67:c3:80:b8:c0:aa:de:78:66:1e
			79:05:81:77:1b:2d:38:c5:af:ce:4b:63:fd:cd:60:86
			1a:89:5e:64:48:08:f0:e0:6f:ea:2d:6c:d1:d1:40:27
			54:3b:d7:56:09:e1:18:4d:a4:d7:27:3f:c8:02:50:e8
			5b:03:6b:90:49:fb:03:e0:e2:97:5c:9c:83:8b:3b:d5
			01:33:14:8a:e8:45:0f:6e:6f:f9:ee:72:42:41:0c:d9
			60:1e:f3:32:63:e5:39:9b:f0:fa:68:53:26:2d:a1:44
			0b:39:bc:1e:ed:03:92:48:65:7b:c3:91:3c:38:43:ae
			3c:13:a6:dd:3a:ab:13:fc:7d:96:2a:52:70:ad:d6:c9
			63:85:6c:41:82:22:67:78:35:7f:93:99:9e:50:d3:04
			5c:d6:8f:cc:53:54:2b:e0:01:d5:7f:e3:dc:d1:b8:39
			11:d4:c8:3a:65:e5:bf:b5:99:a3:6f:4f:ed:40:b7:c6
			bf
		Exponent (bits 24):
			01:00:01
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): FALSE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
			Key encipherment.
		Subject Key Identifier (not critical):
			e92b35e03eae8b1a4ca9bbb428214e79fe367c8b
		Authority Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:e92b35e03eae8b1a4ca9bbb428214e79fe367c8b
		sha256:76c8169eb2c63e9ae71a0fb1f09c3d546623f20711962318141ee534fe79d97a
	Public Key PIN:
		pin-sha256:dsgWnrLGPprnGg+x8Jw9VGYj8gcRliMYFB7lNP552Xo=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPssCert.crt --type=cert --id=0010 --label=testRsaPssCert
Created certificate:
Certificate Object; type = X.509 cert
  label:      testRsaPssCert
  subject:    DN: O=PKCS11 Provider, CN=My RsaPss Cert
  serial:     0B
  ID:         0010
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert
+ RSAPSSBASEURIWITHPINVALUE='pkcs11:id=%00%10?pin-value=12345678'
+ RSAPSSBASEURIWITHPINSOURCE='pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ RSAPSSBASEURI=pkcs11:id=%00%10
+ RSAPSSPUBURI='pkcs11:type=public;id=%00%10'
+ RSAPSSPRIURI='pkcs11:type=private;id=%00%10'
+ RSAPSSCRTURI='pkcs11:type=cert;object=testRsaPssCert'
+ title LINE 'RSA-PSS PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'RSA-PSS PKCS11 URIS'
+ echo 'pkcs11:id=%00%10?pin-value=12345678'
+ echo 'pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%10
+ echo 'pkcs11:type=public;id=%00%10'
+ echo 'pkcs11:type=private;id=%00%10'
+ echo 'pkcs11:type=cert;object=testRsaPssCert'
+ echo ''
+ KEYID=0011
+ URIKEYID=%00%11
+ TSTCRTN=testRsaPss2Cert
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:3092 --label=testRsaPss2Cert --id=0011 --allowed-mechanisms SHA256-RSA-PKCS-PSS
RSA-PSS PKCS11 URIS
pkcs11:id=%00%10?pin-value=12345678
pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%10
pkcs11:type=public;id=%00%10
pkcs11:type=private;id=%00%10
pkcs11:type=cert;object=testRsaPssCert

Key pair generated:
Private Key Object; RSA 
  label:      testRsaPss2Cert
  ID:         0011
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  Allowed mechanisms: SHA256-RSA-PKCS-PSS
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private
Public Key Object; RSA 3092 bits
  label:      testRsaPss2Cert
  ID:         0011
  Usage:      encrypt, verify, verifyRecover, wrap
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public
+ ca_sign testRsaPss2Cert 'My RsaPss2 Cert' 0011 --sign-params=RSA-PSS --hash=SHA256
+ LABEL=testRsaPss2Cert
+ CN='My RsaPss2 Cert'
+ KEYID=0011
+ shift 3
+ (( SERIAL+=1 ))
+ sed -e 's|cn = .*|cn = My RsaPss2 Cert|g' -e 's|serial = .*|serial = 12|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg
+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPss2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS --hash=SHA256
Generating a signed certificate...

Expiration time: Mon Mar 22 22:50:09 2027
CA expiration time: Mon Mar 22 22:50:02 2027
Warning: The time set exceeds the CA's expiration time
X.509 Certificate Information:
	Version: 3
	Serial Number (hex): 0c
	Validity:
		Not Before: Mon Mar 23 10:50:09 UTC 2026
		Not After: Tue Mar 23 10:50:09 UTC 2027
	Subject: CN=My RsaPss2 Cert,O=PKCS11 Provider
	Subject Public Key Algorithm: RSA
	Algorithm Security Level: High (3092 bits)
		Modulus (bits 3092):
			0c:82:b6:32:43:26:81:46:d9:a4:bd:8c:8b:67:03:10
			62:2b:42:60:fa:21:42:d6:14:d3:45:ea:6b:72:b3:92
			6e:bf:1b:dd:fa:2e:2c:8e:bc:40:52:23:89:e6:84:99
			1c:06:2f:fa:79:bc:9e:4c:b2:de:c7:79:4f:06:bb:6f
			a3:1c:fd:de:f8:be:d8:62:21:81:4d:41:3a:a8:a7:c5
			71:c4:27:36:ff:11:df:2f:9e:a0:cf:a6:af:66:b1:97
			62:dd:46:ee:5f:14:b9:05:25:b7:c5:01:0c:88:63:95
			3d:4d:31:dd:85:05:19:84:65:75:83:13:d3:be:bb:29
			52:48:d8:33:e1:0d:00:57:ec:52:78:6e:ca:6f:b0:82
			5f:59:02:c0:99:01:86:9c:d1:ef:9c:ca:7d:82:87:63
			b0:18:5b:01:29:b1:5b:32:01:d1:89:57:e5:e2:77:13
			b2:a8:84:20:e1:24:8a:4a:b8:a5:41:c8:7b:b5:9f:fb
			17:d0:aa:cf:c4:ce:0b:08:ec:27:5b:2c:e2:7a:22:d2
			31:f3:4d:3a:9a:6f:57:ba:d1:53:88:c8:a5:57:3c:f2
			04:65:b9:d6:28:61:be:9a:ef:7b:01:7c:e9:53:a1:b3
			fa:12:96:bd:70:2b:7c:a2:f1:01:97:f1:ab:a1:7c:1e
			a7:32:a6:77:b2:1b:22:ca:a9:00:45:37:4e:61:03:e7
			5e:29:63:13:64:a3:05:0c:93:2a:2f:d6:d5:0e:76:a4
			56:71:2b:06:79:72:96:4c:ae:13:29:7f:1c:89:27:a7
			17:c2:c7:c3:6a:f1:af:e3:0a:36:d5:f0:ca:ef:42:3b
			76:58:92:cb:9f:29:77:af:21:e7:2e:ac:75:de:88:cc
			7a:59:40:2f:f0:55:28:e9:9e:fb:4d:f3:b3:c6:09:d6
			ec:5d:83:e6:53:7a:9e:dc:79:22:ed:64:76:15:46:4b
			c8:13:f0:34:b7:9d:f3:1e:f7:69:de:7a:14:79:4e:32
			5b:d6:8d
		Exponent (bits 24):
			01:00:01
	Extensions:
		Basic Constraints (critical):
			Certificate Authority (CA): FALSE
		Subject Alternative Name (not critical):
			RFC822Name: testcert@example.org
		Key Usage (critical):
			Digital signature.
			Key encipherment.
		Subject Key Identifier (not critical):
			50ba22eff9c95c7cae472f9e7e4a20642845c050
		Authority Key Identifier (not critical):
			64e304a56ab2514967dc59f4f0d7035e89b33c89
Other Information:
	Public Key ID:
		sha1:50ba22eff9c95c7cae472f9e7e4a20642845c050
		sha256:4a0789bf16a8a815c9294946a4596fa72072f84901e1be9c567cf1666a736d74
	Public Key PIN:
		pin-sha256:SgeJvxaoqBXJKUlGpFlvpyBy+EkB4b6cVnzxZmpzbXQ=



Signing certificate...
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPss2Cert.crt --type=cert --id=0011 --label=testRsaPss2Cert
Created certificate:
Certificate Object; type = X.509 cert
  label:      testRsaPss2Cert
  subject:    DN: O=PKCS11 Provider, CN=My RsaPss2 Cert
  serial:     0C
  ID:         0011
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert
+ RSAPSS2BASEURIWITHPINVALUE='pkcs11:id=%00%11?pin-value=12345678'
+ RSAPSS2BASEURIWITHPINSOURCE='pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ RSAPSS2BASEURI=pkcs11:id=%00%11
+ RSAPSS2PUBURI='pkcs11:type=public;id=%00%11'
+ RSAPSS2PRIURI='pkcs11:type=private;id=%00%11'
+ RSAPSS2CRTURI='pkcs11:type=cert;object=testRsaPss2Cert'
+ title LINE 'RSA-PSS 2 PKCS11 URIS'
+ case "$1" in
+ shift 1
+ echo 'RSA-PSS 2 PKCS11 URIS'
+ echo 'pkcs11:id=%00%11?pin-value=12345678'
+ echo 'pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt'
+ echo pkcs11:id=%00%11
+ echo 'pkcs11:type=public;id=%00%11'
+ echo 'pkcs11:type=private;id=%00%11'
+ echo 'pkcs11:type=cert;object=testRsaPss2Cert'
+ echo ''
+ title PARA 'Show contents of softhsm token'
+ case "$1" in
+ shift 1
+ echo ''
+ echo '## Show contents of softhsm token'
+ '[' -f '' ']'
+ echo ' ----------------------------------------------------------------------------------------------------'
+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' -O
RSA-PSS 2 PKCS11 URIS
pkcs11:id=%00%11?pin-value=12345678
pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt
pkcs11:id=%00%11
pkcs11:type=public;id=%00%11
pkcs11:type=private;id=%00%11
pkcs11:type=cert;object=testRsaPss2Cert


## Show contents of softhsm token
 ----------------------------------------------------------------------------------------------------
Private Key Object; RSA 
  label:      caCert
  ID:         0000
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=private
Public Key Object; RSA 2048 bits
  label:      testCert
  ID:         0001
  Usage:      encrypt, verify, verifyRecover, wrap
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=public
Public Key Object; EC  EC_POINT 256 bits
  EC_POINT:   044104e3143bf6e8d9112ac816c42dda653429746b7dc2e41e32e8e09b9ac9cc8b6d97ff6be05e1db5be8f741c98805e58245eeb3fae3739db63614055ab60db3e22ac
  EC_PARAMS:  06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7)
  label:      ecPeerCert
  ID:         0003
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public
Certificate Object; type = X.509 cert
  label:      ecCert3
  subject:    DN: O=PKCS11 Provider, CN=My EC Cert 3
  serial:     0A
  ID:         0008
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert
Public Key Object; EC  EC_POINT 256 bits
  EC_POINT:   044104305860d036925c61c5d7c1734aa021145aaa5d4562214244bff714bf32896046b5f9b6c3741eceffeb30a47fdf99a78c49a4a916ebe7a6dcd53321b0acdbbdc7
  EC_PARAMS:  06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7)
  label:      ecCert
  ID:         0002
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public
Private Key Object; EC
  label:      ecCert2
  ID:         0006
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private
Certificate Object; type = X.509 cert
  label:      testCert2
  subject:    DN: O=PKCS11 Provider, CN=My Test Cert 2
  serial:     08
  ID:         0005
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert
Private Key Object; EC_EDWARDS
  label:      edCert
  ID:         0004
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=private
Certificate Object; type = X.509 cert
  label:      ecCert
  subject:    DN: O=PKCS11 Provider, CN=My EC Cert
  serial:     04
  ID:         0002
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert
Private Key Object; RSA 
  label:      testCert2
  ID:         0005
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private
Certificate Object; type = X.509 cert
  label:      ed2Cert
  subject:    DN: O=PKCS11 Provider, CN=My ED448 Cert
  serial:     07
  ID:         0009
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert
Public Key Object; EC_EDWARDS  EC_POINT 472 bits
  EC_POINT:   04393441a7d2d9d2d8562d467ca8c876381a2a48c703821afe59bf36cde5f4bbcacfac7cb9553ef741e12b308bab9e0b49ba4dbdbe2a5ea43f9000
  EC_PARAMS:  06032b6571 (OID 1.3.101.113)
  label:      ed2Cert
  ID:         0009
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public
Certificate Object; type = X.509 cert
  label:      ecCert2
  subject:    DN: O=PKCS11 Provider, CN=My EC Cert 2
  serial:     09
  ID:         0006
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert
Certificate Object; type = X.509 cert
  label:      ecPeerCert
  subject:    DN: CN=My Peer EC Cert
  serial:     05
  ID:         0003
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert
Private Key Object; RSA 
  label:      testRsaPssCert
  ID:         0010
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private
Private Key Object; EC
  label:      ecCert
  ID:         0002
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private
Private Key Object; RSA 
  label:      testRsaPss2Cert
  ID:         0011
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  Allowed mechanisms: SHA256-RSA-PKCS-PSS
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private
Certificate Object; type = X.509 cert
  label:      testCert
  subject:    DN: O=PKCS11 Provider, CN=My Test Cert
  serial:     03
  ID:         0001
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert
Private Key Object; EC
  label:      ecCert3
  ID:         0008
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     always authenticate, sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private
Public Key Object; EC_EDWARDS  EC_POINT 272 bits
  EC_POINT:   042040d62083bf5aba84da330314d8c966c0243ef103f7883b3f4ea80c3deebb8a96
  EC_PARAMS:  130c656477617264733235353139 (PrintableString edwards25519)
  label:      edCert
  ID:         0004
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=public
Private Key Object; EC_EDWARDS
  label:      ed2Cert
  ID:         0009
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private
Private Key Object; EC
  label:      ecPeerCert
  ID:         0003
  Usage:      decrypt, sign, signRecover, unwrap, derive
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private
Public Key Object; EC  EC_POINT 528 bits
  EC_POINT:   0481850400fa5ae811f88d992a2dc5a8b9289cb1224233dacb601eb26715ab9538b35a19a22569397450985c78a9ee99186bfd22fc1f39c1714f152effc32b49ab75c07ca5ab0024360ed325b19e806076df0b34004b07b51d304506116072e2dc7647a725c64ccd83be3ccf0f9395530cfab0a37de89777d330cbce4c3cff5046f1f12cc83d0d3c
  EC_PARAMS:  06052b81040023 (OID 1.3.132.0.35)
  label:      ecCert3
  ID:         0008
  Usage:      encrypt, verify, verifyRecover, wrap, derive
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public
Public Key Object; RSA 3092 bits
  label:      testRsaPss2Cert
  ID:         0011
  Usage:      encrypt, verify, verifyRecover, wrap
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public
Certificate Object; type = X.509 cert
  label:      edCert
  subject:    DN: O=PKCS11 Provider, CN=My ED25519 Cert
  serial:     06
  ID:         0004
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert
Certificate Object; type = X.509 cert
  label:      caCert
  subject:    DN: CN=Issuer
  serial:     02
  ID:         0000
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert
Public Key Object; RSA 2048 bits
  label:      caCert
  ID:         0000
  Usage:      encrypt, verify, verifyRecover, wrap
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=public
Certificate Object; type = X.509 cert
  label:      testRsaPss2Cert
  subject:    DN: O=PKCS11 Provider, CN=My RsaPss2 Cert
  serial:     0C
  ID:         0011
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert
Private Key Object; RSA 
  label:      testCert
  ID:         0001
  Usage:      decrypt, sign, signRecover, unwrap
  Access:     sensitive, always sensitive, never extractable, local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=private
Public Key Object; RSA 2048 bits
  label:      testRsaPssCert
  ID:         0010
  Usage:      encrypt, verify, verifyRecover, wrap
  Access:     local
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public
Certificate Object; type = X.509 cert
  label:      testRsaPssCert
  subject:    DN: O=PKCS11 Provider, CN=My RsaPss Cert
  serial:     0B
  ID:         0010
  uri:        pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert
+ echo ' ----------------------------------------------------------------------------------------------------'
+ title PARA 'Output configurations'
+ case "$1" in
+ shift 1
+ echo ''
+ echo '## Output configurations'
+ '[' -f '' ']'
+ OPENSSL_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
+ title LINE 'Generate openssl config file'
+ case "$1" in
+ shift 1
+ echo 'Generate openssl config file'
+ sed -e 's|@libtoollibs@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src|g' -e 's|@testsblddir@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests|g' -e 's|@testsdir@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm|g' -e 's|@SHARED_EXT@|.so|g' -e 's|@PINFILE@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt|g' -e 's|##TOKENOPTIONS|\npkcs11-module-quirks = no-deinit no-operation-state|g' /build/reproducible-path/pkcs11-provider-1.0/tests/openssl.cnf.in
 ----------------------------------------------------------------------------------------------------

## Output configurations
Generate openssl config file
+ title LINE 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars'
+ case "$1" in
+ shift 1
+ echo 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars'
+ cat
Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars
+ '[' -n pkcs11:id=%00%04 ']'
+ cat
+ '[' -n pkcs11:id=%00%09 ']'
+ cat
+ '[' -n '' ']'
+ '[' -n pkcs11:id=%00%10 ']'
+ cat
+ cat
+ gen_unsetvars
+ sed -e s/export/unset/ -e 's/=.*$//'
+ grep '^export' /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars
+ title ENDSECTION
+ case "$1" in
+ echo ''
+ echo '                                      ##'
+ echo '########################################'
+ echo ''

                                      ##
########################################

――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
 2/92 pkcs11-provider:softhsm / setup          OK              7.74s

 3/92 pkcs11-provider:kryoptic / setup         RUNNING       
>>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=128 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 SHARED_EXT=.so LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
+ source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh
++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests
++ helper_emit=1
++ sed --version
++ grep -q 'GNU sed'
++ sed_inplace=('-i')
++ export sed_inplace
+ '[' 1 -ne 1 ']'
+ TOKENTYPE=kryoptic
+ SUPPORT_ED25519=1
+ SUPPORT_ED448=1
+ SUPPORT_RSA_PKCS1_ENCRYPTION=1
+ SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1
+ SUPPORT_TLSFUZZER=1
+ SUPPORT_ALLOWED_MECHANISMS=0
++ opensc-tool -i
++ grep OpenSC
++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/'
Failed to establish context: Unable to load external module
+ OPENSC_VERSION=26
+ [[ 26 -le 25 ]]
+ [[ '' = \1 ]]
++ cat /proc/sys/crypto/fips_enabled
+ [[ 0 = \1 ]]
+ TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic
+ TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic/tokens
+ '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic ']'
+ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic
+ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic/tokens
+ PINVALUE=12345678
+ PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic/pinfile.txt
+ echo 12345678
+ export GNUTLS_PIN=12345678
+ GNUTLS_PIN=12345678
+ '[' kryoptic == softhsm ']'
+ '[' kryoptic == softokn ']'
+ '[' kryoptic == kryoptic ']'
+ source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh
++ title SECTION 'Searching for Kryoptic module'
++ case "$1" in
++ shift 1
++ echo '########################################'
++ echo '## Searching for Kryoptic module'
++ echo ''
++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so
++ for _lib in "$@"
++ test -f /target/debug/libkryoptic_pkcs11.so
++ for _lib in "$@"
++ test -f /target/release/libkryoptic_pkcs11.so
++ for _lib in "$@"
++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so
++ for _lib in "$@"
++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so
++ for _lib in "$@"
++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so
++ for _lib in "$@"
++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so
++ echo 'skipped: Unable to find kryoptic PKCS#11 library'
++ exit 0
########################################
## Searching for Kryoptic module

skipped: Unable to find kryoptic PKCS#11 library
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
 3/92 pkcs11-provider:kryoptic / setup         OK              0.14s

 4/92 pkcs11-provider:kryoptic.nss / setup     RUNNING       
>>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=73 SHARED_EXT=.so LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic.nss
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
+ source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh
++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests
++ helper_emit=1
++ sed --version
++ grep -q 'GNU sed'
++ sed_inplace=('-i')
++ export sed_inplace
+ '[' 1 -ne 1 ']'
+ TOKENTYPE=kryoptic.nss
+ SUPPORT_ED25519=1
+ SUPPORT_ED448=1
+ SUPPORT_RSA_PKCS1_ENCRYPTION=1
+ SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1
+ SUPPORT_TLSFUZZER=1
+ SUPPORT_ALLOWED_MECHANISMS=0
++ grep OpenSC
++ opensc-tool -i
++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/'
Failed to establish context: Unable to load external module
+ OPENSC_VERSION=26
+ [[ 26 -le 25 ]]
+ [[ '' = \1 ]]
++ cat /proc/sys/crypto/fips_enabled
+ [[ 0 = \1 ]]
+ TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss
+ TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/tokens
+ '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss ']'
+ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss
+ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/tokens
+ PINVALUE=12345678
+ PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/pinfile.txt
+ echo 12345678
+ export GNUTLS_PIN=12345678
+ GNUTLS_PIN=12345678
+ '[' kryoptic.nss == softhsm ']'
+ '[' kryoptic.nss == softokn ']'
+ '[' kryoptic.nss == kryoptic ']'
+ '[' kryoptic.nss == kryoptic.nss ']'
+ source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic.nss-init.sh
++ export KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/kryoptic.conf
++ KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/kryoptic.conf
++ cat
++ export 'TOKENLABEL=Kryoptic Soft Token'
++ TOKENLABEL='Kryoptic Soft Token'
++ export TOKENLABELURI=Kryoptic%20Soft%20Token
++ TOKENLABELURI=Kryoptic%20Soft%20Token
++ source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh
+++ title SECTION 'Searching for Kryoptic module'
+++ case "$1" in
+++ shift 1
+++ echo '########################################'
+++ echo '## Searching for Kryoptic module'
+++ echo ''
+++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so
+++ for _lib in "$@"
+++ test -f /target/debug/libkryoptic_pkcs11.so
+++ for _lib in "$@"
+++ test -f /target/release/libkryoptic_pkcs11.so
+++ for _lib in "$@"
+++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so
+++ for _lib in "$@"
+++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so
+++ for _lib in "$@"
+++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so
+++ for _lib in "$@"
+++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so
+++ echo 'skipped: Unable to find kryoptic PKCS#11 library'
+++ exit 0
########################################
## Searching for Kryoptic module

skipped: Unable to find kryoptic PKCS#11 library
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
 4/92 pkcs11-provider:kryoptic.nss / setup     OK              0.14s

 5/92 pkcs11-provider:softokn / basic          RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
 5/92 pkcs11-provider:softokn / basic          SKIP            0.05s   exit status 77

 6/92 pkcs11-provider:softhsm / basic          RUNNING       
>>> MALLOC_PERTURB_=8 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tbasic

## Raw Sign check error
 openssl 
pkeyutl -sign -inkey "${BASEURI}"
              -pkeyopt pad-mode:none
              -in ${TMPPDIR}/64Brandom.bin
              -out ${TMPPDIR}/raw-sig.bin
Public Key operation error
40AC0296FFFF0000:error:0200007A:rsa routines:p11prov_sig_operate:data too small for key size:../src/signature.c:971:


## Sign and Verify with provided Hash and RSA
 openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE}

 openssl 
pkeyutl -sign -inkey "${PRIURI}"
              -in ${TMPPDIR}/sha256.bin
              -out ${TMPPDIR}/sha256-sig.bin

 openssl 
pkeyutl -verify -inkey "${PUBURI}"
                -pubin
                -in ${TMPPDIR}/sha256.bin
                -sigfile ${TMPPDIR}/sha256-sig.bin
Signature Verified Successfully

## Sign and Verify with provided Hash and RSA with DigestInfo struct
 openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE}

 openssl 
pkeyutl -sign -inkey "${PRIURI}" -pkeyopt digest:sha256
              -in ${TMPPDIR}/sha256.bin
              -out ${TMPPDIR}/sha256-sig.bin

 openssl 
pkeyutl -verify -inkey "${PUBURI}" -pkeyopt digest:sha256
                -pubin
                -in ${TMPPDIR}/sha256.bin
                -sigfile ${TMPPDIR}/sha256-sig.bin
Signature Verified Successfully

## DigestSign and DigestVerify with RSA
 openssl 
pkeyutl -sign -inkey "${BASEURI}"
              -digest sha256
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha256-dgstsig.bin

 openssl 
pkeyutl -verify -inkey "${BASEURI}" -pubin
                -digest sha256
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha256-dgstsig.bin
Signature Verified Successfully
 openssl 
pkeyutl -verify -inkey "${PUBURI}"
                -pubin
                -digest sha256
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha256-dgstsig.bin
Signature Verified Successfully
RSA basic encrypt and decrypt
 openssl 
    pkeyutl -encrypt -inkey "${PUBURI}" -pubin
                     -in ${SECRETFILE}
                     -out ${SECRETFILE}.enc

 openssl 
    pkeyutl -decrypt -inkey "${PRIURI}"
                     -in ${SECRETFILE}.enc
                     -out ${SECRETFILE}.dec


## Test Disallow Public Export
 openssl pkey -in $PUBURI -pubin -pubout -text

## Test CSR generation from RSA private keys
 openssl 
req -new -batch -key "${PRIURI}" -out ${TMPPDIR}/rsa_csr.pem

 openssl 
req -in ${TMPPDIR}/rsa_csr.pem -verify -noout
Certificate request self-signature verify OK

## Test fetching public keys without PIN in config files
 openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/rsa.pub.nopin.pem

 openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ec.pub.nopin.pem

 openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/ed.pub.nopin.pem


## Test fetching public keys with a PIN in URI
 openssl pkey -in $BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripin.pem

 openssl pkey -in $ECBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripin.pem

 openssl pkey -in $EDBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripin.pem

 openssl pkey -in $ED2BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripin.pem


## Test fetching public keys with a PIN source in URI
 openssl pkey -in $BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripinsource.pem

 openssl pkey -in $ECBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripinsource.pem

 openssl pkey -in $EDBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripinsource.pem

 openssl pkey -in $ED2BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripinsource.pem


## Test prompting without PIN in config files

## Test EVP_PKEY_eq on public RSA key both on token

## Test EVP_PKEY_eq on public EC key both on token

## Test EVP_PKEY_eq on public RSA key via import

## Match private RSA key against public key

## Match private RSA key against public key (commutativity)

## Test EVP_PKEY_eq on public EC key via import

## Match private EC key against public key

## Match private EC key against public key (commutativity)

## Test EVP_PKEY_eq with key exporting disabled

## Test RSA key

## Test EC key

## Test PIN caching
Prompt: "Enter pass phrase for PKCS#11 Token (Slot 576291950 - SoftHSM slot ID 0x2259846e):"
Returning: 12345678
Child Done
ALL A-OK!
Prompt: "Enter pass phrase for PKCS#11 Token (Slot 576291950 - SoftHSM slot ID 0x2259846e):"
Returning: 12345678
Child Done
ALL A-OK!

## Test interactive Login on key without ALWAYS AUTHENTICATE
expect: spawn id exp3 not open
    while executing
"expect "ALL A-OK""

## Test interactive Login repeated for operation on key with ALWAYS AUTHENTICATE
expect: spawn id exp3 not open
    while executing
"expect "ALL A-OK""

## Test Key generation
Performed tests: 4
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
 6/92 pkcs11-provider:softhsm / basic          OK              9.50s

 7/92 pkcs11-provider:kryoptic / basic         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=244 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
 7/92 pkcs11-provider:kryoptic / basic         SKIP            0.07s   exit status 77

 8/92 pkcs11-provider:kryoptic.nss / basic     RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=69 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
 8/92 pkcs11-provider:kryoptic.nss / basic     SKIP            0.06s   exit status 77

 9/92 pkcs11-provider:softokn / pubkey         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=75 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
 9/92 pkcs11-provider:softokn / pubkey         SKIP            0.05s   exit status 77

10/92 pkcs11-provider:softhsm / pubkey         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=93 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tpubkey

## Export RSA Public key to a file
 openssl pkey -in $BASEURI -pubin -pubout -out ${TMPPDIR}/baseout.pub

Export Public key to a file (pub-uri)
 openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/pubout.pub

Print Public key from private
 openssl pkey -in $PRIURI -pubout -text

## Export Public check error
 openssl pkey -in pkcs11:id=%de%ad -pubin
           -pubout -out ${TMPPDIR}/pubout-invlid.pub
Could not find private key of Public Key from pkcs11:id=%de%ad


## Export EC Public key to a file
 openssl pkey -in $ECBASEURI -pubin -pubout -out ${TMPPDIR}/baseecout.pub

Export EC Public key to a file (pub-uri)
 openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/pubecout.pub

Print EC Public key from private
 openssl pkey -in $ECPRIURI -pubout -text

## Check we can get RSA public keys from certificate objects
Export Public key to a file (priv-uri)
 openssl pkey -in $PRI2URI -pubout -out ${TMPPDIR}/priv-cert.pub

Export Public key to a file (base-uri)
 openssl pkey -in $BASE2URI -pubout -out ${TMPPDIR}/base-cert.pub


## Check we can get EC public keys from certificate objects
Export Public EC key to a file (priv-uri)
 openssl pkey -in $ECPRI2URI -pubout -out ${TMPPDIR}/ec-priv-cert.pub

Export Public key to a file (base-uri)
 openssl pkey -in $ECBASE2URI -pubout -out ${TMPPDIR}/ec-base-cert.pub

――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
10/92 pkcs11-provider:softhsm / pubkey         OK              0.92s

11/92 pkcs11-provider:kryoptic / pubkey        RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=143 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
11/92 pkcs11-provider:kryoptic / pubkey        SKIP            0.06s   exit status 77

12/92 pkcs11-provider:kryoptic.nss / pubkey    RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=233 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
12/92 pkcs11-provider:kryoptic.nss / pubkey    SKIP            0.07s   exit status 77

13/92 pkcs11-provider:softokn / certs          RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=233 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
13/92 pkcs11-provider:softokn / certs          SKIP            0.07s   exit status 77

14/92 pkcs11-provider:softhsm / certs          RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=176 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tcerts

## Check we can fetch certifiatce objects
 openssl 
x509 -in ${CRTURI} -subject -out ${TMPPDIR}/crt-subj.txt

 openssl 
x509 -in ${ECCRTURI} -subject -out ${TMPPDIR}/eccrt-subj.txt


## Use storeutl command to match specific certs via params
 openssl 
storeutl -certs -subject "${subj}"
                -out ${TMPPDIR}/storeutl-crt-subj.txt
                pkcs11:type=cert
0: Certificate
 openssl 
storeutl -certs -subject "${subj}"
                -out ${TMPPDIR}/storeutl-crt-subj.txt
                pkcs11:type=cert
0: Certificate
 openssl 
storeutl -certs -subject "${subj}"
                -out ${TMPPDIR}/storeutl-crt-subj.txt
                pkcs11:type=cert
0: Certificate
 openssl 
storeutl -certs -subject "${subj}"
                -out ${TMPPDIR}/storeutl-crt-subj.txt
                pkcs11:type=cert
0: Certificate

## Test fetching certificate without PIN in config files
 openssl x509 -in $CRTURI -subject -out ${TMPPDIR}/crt-subj-nopin.txt


## Test fetching certificate via STORE api
Cert load successfully
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
14/92 pkcs11-provider:softhsm / certs          OK              0.68s

15/92 pkcs11-provider:kryoptic / certs         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=80 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
15/92 pkcs11-provider:kryoptic / certs         SKIP            0.05s   exit status 77

16/92 pkcs11-provider:kryoptic.nss / certs     RUNNING       
>>> MALLOC_PERTURB_=216 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
16/92 pkcs11-provider:kryoptic.nss / certs     SKIP            0.07s   exit status 77

17/92 pkcs11-provider:softokn / ecc            RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=72 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
17/92 pkcs11-provider:softokn / ecc            SKIP            0.07s   exit status 77

18/92 pkcs11-provider:softhsm / ecc            RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=149 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecc

## Export EC Public key to a file
 openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ecout.pub

Print EC Public key from private
 openssl pkey -in $ECPRIURI -pubout -text

## Sign and Verify with provided Hash and EC
 openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE}

 openssl 
pkeyutl -sign -inkey "${ECBASEURI}"
              -in ${TMPPDIR}/sha256.bin
              -out ${TMPPDIR}/sha256-ecsig.bin

 openssl 
pkeyutl -verify -inkey "${ECBASEURI}" -pubin
                -in ${TMPPDIR}/sha256.bin
                -sigfile ${TMPPDIR}/sha256-ecsig.bin
Signature Verified Successfully
 openssl 
pkeyutl -verify -inkey "${TMPPDIR}/ecout.pub" -pubin
                -in ${TMPPDIR}/sha256.bin
                -sigfile ${TMPPDIR}/sha256-ecsig.bin
Signature Verified Successfully

## DigestSign and DigestVerify with ECC (SHA-256)
 openssl 
pkeyutl -sign -inkey "${ECBASEURI}"
              -digest sha256
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha256-ecdgstsig.bin

 openssl 
pkeyutl -verify -inkey "${ECBASEURI}" -pubin
                -digest sha256
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha256-ecdgstsig.bin
Signature Verified Successfully

## DigestSign and DigestVerify with ECC (SHA-384)
 openssl 
pkeyutl -sign -inkey "${ECBASEURI}"
              -digest sha384
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha384-ecdgstsig.bin

 openssl 
pkeyutl -verify -inkey "${ECBASEURI}" -pubin
                -digest sha384
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha384-ecdgstsig.bin
Signature Verified Successfully

## DigestSign and DigestVerify with ECC (SHA-512)
 openssl 
pkeyutl -sign -inkey "${ECBASEURI}"
              -digest sha512
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha512-ecdgstsig.bin

 openssl 
pkeyutl -verify -inkey "${ECBASEURI}" -pubin
                -digest sha512
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha512-ecdgstsig.bin
Signature Verified Successfully

## DigestSign and DigestVerify with ECC (SHA3-256)
 openssl 
pkeyutl -sign -inkey "${ECBASEURI}"
              -digest sha3-256
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha3-256-ecdgstsig.bin

 openssl 
pkeyutl -verify -inkey "${ECBASEURI}" -pubin
                -digest sha3-256
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha3-256-ecdgstsig.bin
Signature Verified Successfully

## DigestSign and DigestVerify with ECC (SHA3-384)
 openssl 
pkeyutl -sign -inkey "${ECBASEURI}"
              -digest sha3-384
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha3-384-ecdgstsig.bin

 openssl 
pkeyutl -verify -inkey "${ECBASEURI}" -pubin
                -digest sha3-384
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha3-384-ecdgstsig.bin
Signature Verified Successfully

## DigestSign and DigestVerify with ECC (SHA3-512)
 openssl 
pkeyutl -sign -inkey "${ECBASEURI}"
              -digest sha3-512
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha3-512-ecdgstsig.bin

 openssl 
pkeyutl -verify -inkey "${ECBASEURI}" -pubin
                -digest sha3-512
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha3-512-ecdgstsig.bin
Signature Verified Successfully

## Test CSR generation from private ECC keys
 openssl 
req -new -batch -key "${ECPRIURI}" -out ${TMPPDIR}/ecdsa_csr.pem

 openssl 
req -in ${TMPPDIR}/ecdsa_csr.pem -verify -noout
Certificate request self-signature verify OK
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
18/92 pkcs11-provider:softhsm / ecc            OK              1.33s

19/92 pkcs11-provider:kryoptic / ecc           RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=115 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
19/92 pkcs11-provider:kryoptic / ecc           SKIP            0.06s   exit status 77

20/92 pkcs11-provider:kryoptic.nss / ecc       RUNNING       
>>> MALLOC_PERTURB_=159 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
20/92 pkcs11-provider:kryoptic.nss / ecc       SKIP            0.06s   exit status 77

21/92 pkcs11-provider:softhsm / edwards        RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=127 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tedwards

## Export ED25519 Public key to a file
 openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/edout.pub

Print ED25519 Public key from private
 openssl pkey -in $EDPRIURI -pubout -text

## DigestSign and DigestVerify with ED25519
 openssl 
pkeyutl -sign -inkey "${EDBASEURI}"
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha256-eddgstsig.bin

 openssl 
pkeyutl -verify -inkey "${EDBASEURI}" -pubin
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha256-eddgstsig.bin
Signature Verified Successfully

## Test CSR generation from private ED25519 keys
 openssl 
req -new -batch -key "${EDPRIURI}" -out ${TMPPDIR}/ed25519_csr.pem

 openssl 
req -in ${TMPPDIR}/ed25519_csr.pem -verify -noout
Certificate request self-signature verify OK

## Test EVP_PKEY_eq on public Edwards key both on token

## Test EVP_PKEY_eq on public ED key via import

## Match private ED key against public key

## Match private ED key against public key (commutativity)

## Test Key generation
Performed tests: 1

## Export ED448 Public key to a file
 openssl pkey -in $ED2PUBURI -pubin -pubout -out ${TMPPDIR}/ed2out.pub

Print ED448 Public key from private
 openssl pkey -in $ED2PRIURI -pubout -text

## DigestSign and DigestVerify with ED448
 openssl 
    pkeyutl -sign -inkey "${ED2BASEURI}"
                  -in ${RAND64FILE}
                  -rawin
                  -out ${TMPPDIR}/sha256-eddgstsig.bin

 openssl 
    pkeyutl -verify -inkey "${ED2BASEURI}" -pubin
                    -in ${RAND64FILE}
                    -rawin
                    -sigfile ${TMPPDIR}/sha256-eddgstsig.bin
Signature Verified Successfully

## Test CSR generation from private ED448 keys
 openssl 
    req -new -batch -key "${ED2PRIURI}" -out ${TMPPDIR}/ed448_csr.pem

 openssl 
    req -in ${TMPPDIR}/ed448_csr.pem -verify -noout
Certificate request self-signature verify OK

## Test EVP_PKEY_eq on public Edwards key both on token

## Test EVP_PKEY_eq on public ED448 key via import

## Match private ED448 key against public key

## Match private ED448 key against public key (commutativity)

## Test Ed448 Key generation
Performed tests: 1

## Test interactive Login on key without ALWAYS AUTHENTICATE
expect: spawn id exp3 not open
    while executing
"expect "ALL A-OK""
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
21/92 pkcs11-provider:softhsm / edwards        OK              2.02s

22/92 pkcs11-provider:kryoptic / edwards       RUNNING       
>>> MALLOC_PERTURB_=8 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
22/92 pkcs11-provider:kryoptic / edwards       SKIP            0.06s   exit status 77

23/92 pkcs11-provider:kryoptic.nss / edwards   RUNNING       
>>> MALLOC_PERTURB_=144 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
23/92 pkcs11-provider:kryoptic.nss / edwards   SKIP            0.07s   exit status 77

24/92 pkcs11-provider:softokn / ecdh           RUNNING       
>>> MALLOC_PERTURB_=210 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
24/92 pkcs11-provider:softokn / ecdh           SKIP            0.06s   exit status 77

25/92 pkcs11-provider:kryoptic / ecdh          RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=98 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
25/92 pkcs11-provider:kryoptic / ecdh          SKIP            0.06s   exit status 77

26/92 pkcs11-provider:kryoptic.nss / ecdh      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=19 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
26/92 pkcs11-provider:kryoptic.nss / ecdh      SKIP            0.06s   exit status 77

27/92 pkcs11-provider:softokn / democa         RUNNING       
>>> MALLOC_PERTURB_=237 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
27/92 pkcs11-provider:softokn / democa         SKIP            0.07s   exit status 77

28/92 pkcs11-provider:softhsm / democa         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=114 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdemoca

## Set up demoCA

## Generating CA cert if needed
 openssl req -batch -noenc -x509 -new -key ${PRIURI} -out ${DEMOCA}/cacert.pem


## Generating a new CSR with key in file
 openssl 
req -batch -noenc -newkey rsa:2048
    -subj "/CN=testing-csr-signing/O=PKCS11 Provider/C=US"
    -keyout ${DEMOCA}/cert.key -out ${DEMOCA}/cert.csr
....+.......+++++++++++++++++++++++++++++++++++++++*......+.+...........+++++++++++++++++++++++++++++++++++++++*.+.................+......+.++++++
.................+.+......+.....+....+..+.......+.....+......+.+...+......+.....+.......+++++++++++++++++++++++++++++++++++++++*...+..+...+.+...+..+..........+.....+....+............+..+...+.......+...........+......+++++++++++++++++++++++++++++++++++++++*.....+..+.+........+.+........+......+......+.+.....+...+......+.+.....+.......+......+..+.........+.........+.+...+.....+......................+.....+.+...+..+....+...+..+..........+.........+............+..+..........+......+............+..+...+..........+...+.....+.........+...+...+....+..+.+............+..................+...+......+...+......+..+.............+......+...............+.....+......+...+.+...+.....+.......+...+..+....+..+...++++++
-----


## Signing the new certificate
 openssl 
ca -batch -in ${DEMOCA}/cert.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem
Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :ASN.1 12:'testing-csr-signing'
organizationName      :ASN.1 12:'PKCS11 Provider'
countryName           :PRINTABLE:'US'
Certificate is to be certified until Mar 23 10:50:25 2027 GMT (365 days)

Write out database with 1 new entries
Database updated


## Generating a new CSR with existing RSA key in token
 openssl 
req -batch -noenc -new -key ${PRIURI}
    -subj "/CN=testing-rsa-signing/O=PKCS11 Provider/C=US"
    -out ${DEMOCA}/cert-rsa.csr


## Signing the new RSA key certificate
 openssl 
ca -batch -in ${DEMOCA}/cert-rsa.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem
Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :ASN.1 12:'testing-rsa-signing'
organizationName      :ASN.1 12:'PKCS11 Provider'
countryName           :PRINTABLE:'US'
Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days)

Write out database with 1 new entries
Database updated


## Generating a new CSR with existing EC key in token
 openssl 
req -batch -noenc -new -key ${ECPRIURI}
    -subj "/CN=testing-ec-signing/O=PKCS11 Provider/C=US"
    -out ${DEMOCA}/cert-ec.csr


## Signing the new EC key certificate
 openssl 
ca -batch -in ${DEMOCA}/cert-ec.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem
Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :ASN.1 12:'testing-ec-signing'
organizationName      :ASN.1 12:'PKCS11 Provider'
countryName           :PRINTABLE:'US'
Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days)

Write out database with 1 new entries
Database updated


## Generating a new CSR with existing ED key in token
 openssl 
    req -batch -noenc -new -key ${EDPRIURI}
        -subj "/CN=testing-ed-signing/O=PKCS11 Provider/C=US"
        -out ${DEMOCA}/cert-ed.csr


## Signing the new ED key certificate
 openssl 
    ca -batch -in ${DEMOCA}/cert-ed.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem
Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :ASN.1 12:'testing-ed-signing'
organizationName      :ASN.1 12:'PKCS11 Provider'
countryName           :PRINTABLE:'US'
Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days)

Write out database with 1 new entries
Database updated


## Generating a new CSR with existing ED448 key in token
 openssl 
    req -batch -noenc -new -key ${ED2PRIURI}
        -subj "/CN=testing-ed2-signing/O=PKCS11 Provider/C=US"
        -out ${DEMOCA}/cert-ed2.csr


## Signing the new ED448 key certificate
 openssl 
    ca -batch -in ${DEMOCA}/cert-ed2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem
Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :ASN.1 12:'testing-ed2-signing'
organizationName      :ASN.1 12:'PKCS11 Provider'
countryName           :PRINTABLE:'US'
Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days)

Write out database with 1 new entries
Database updated


## Generating a new CSR with existing RSA-PSS key in token
 openssl 
    req -batch -noenc -new -key ${RSAPSSPRIURI} -sigopt rsa_padding_mode:pss
        -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US"
        -sigopt rsa_padding_mode:pss
        -out ${DEMOCA}/cert-rsa-pss.csr


## Signing the new RSA-PSS key certificate
 openssl 
    ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem
Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :ASN.1 12:'testing-rsapss-signing'
organizationName      :ASN.1 12:'PKCS11 Provider'
countryName           :PRINTABLE:'US'
Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days)

Write out database with 1 new entries
Database updated

 openssl x509 -text -in ${DEMOCA}/cert.pem

## Generating a new CSR with existing SHA256 restricted RSA-PSS key in token
 openssl 
    req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss
        -subj "/CN=testing-rsapss-sha2-signing/O=PKCS11 Provider/C=US"
        -out ${DEMOCA}/cert-rsa-pss2.csr
        -sigopt rsa_padding_mode:pss
        -sigopt digest:sha256


## Signing the new SHA256 restricted RSA-PSS key certificate
 openssl 
    ca -batch -in ${DEMOCA}/cert-rsa-pss2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem
Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :ASN.1 12:'testing-rsapss-sha2-signing'
organizationName      :ASN.1 12:'PKCS11 Provider'
countryName           :PRINTABLE:'US'
Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days)

Write out database with 1 new entries
Database updated

 openssl x509 -text -in ${DEMOCA}/cert.pem

## Generating a new CSR with existing RSA-PSS key in token
 openssl 
    req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss
        -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US"
        -out ${DEMOCA}/cert-rsa-pss2.csr
        -sigopt rsa_padding_mode:pss
        -sigopt digest:sha256
        -sigopt rsa_pss_saltlen:-2


## Signing the new RSA-PSS key certificate
 openssl 
    ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem
Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :ASN.1 12:'testing-rsapss-signing'
organizationName      :ASN.1 12:'PKCS11 Provider'
countryName           :PRINTABLE:'US'
Certificate is to be certified until Mar 23 10:50:27 2027 GMT (365 days)

Write out database with 1 new entries
Database updated


## Set up OCSP
 openssl 
req -batch -noenc -new -subj "/CN=OCSP/O=PKCS11 Provider/C=US"
    -key ${PRIURI} -out ${DEMOCA}/ocspSigning.csr

 openssl 
ca -batch -keyfile ${PRIURI} -cert ${DEMOCA}/cacert.pem
   -in ${DEMOCA}/ocspSigning.csr -out ${DEMOCA}/ocspSigning.pem
Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName            :ASN.1 12:'OCSP'
organizationName      :ASN.1 12:'PKCS11 Provider'
countryName           :PRINTABLE:'US'
Certificate is to be certified until Mar 23 10:50:27 2027 GMT (365 days)

Write out database with 1 new entries
Database updated

――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
28/92 pkcs11-provider:softhsm / democa         OK              1.78s

29/92 pkcs11-provider:kryoptic / democa        RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=123 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
29/92 pkcs11-provider:kryoptic / democa        SKIP            0.04s   exit status 77

30/92 pkcs11-provider:kryoptic.nss / democa    RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=243 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
30/92 pkcs11-provider:kryoptic.nss / democa    SKIP            0.05s   exit status 77

31/92 pkcs11-provider:softokn / digest         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=56 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
31/92 pkcs11-provider:softokn / digest         SKIP            0.06s   exit status 77

32/92 pkcs11-provider:softhsm / digest         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=6 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdigest

## Test Digests support
sha512-224: Unsupported by pkcs11 token
sha512-256: Unsupported by pkcs11 token
sha3-224: Unsupported by pkcs11 token
sha3-256: Unsupported by pkcs11 token
sha3-384: Unsupported by pkcs11 token
sha3-512: Unsupported by pkcs11 token
PASSED

## Test Digests Blocked
No digest available for testing pkcs11 provider
Digest operations failed as expected
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
32/92 pkcs11-provider:softhsm / digest         OK              0.23s

33/92 pkcs11-provider:kryoptic / digest        RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=182 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
33/92 pkcs11-provider:kryoptic / digest        SKIP            0.06s   exit status 77

34/92 pkcs11-provider:kryoptic.nss / digest    RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=20 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
34/92 pkcs11-provider:kryoptic.nss / digest    SKIP            0.06s   exit status 77

35/92 pkcs11-provider:softokn / fork           RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=178 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
35/92 pkcs11-provider:softokn / fork           SKIP            0.05s   exit status 77

36/92 pkcs11-provider:softhsm / fork           RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=15 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing  /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tfork
Child Done
Child Done
ALL A-OK!
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
36/92 pkcs11-provider:softhsm / fork           OK              1.58s

37/92 pkcs11-provider:kryoptic / fork          RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=27 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
37/92 pkcs11-provider:kryoptic / fork          SKIP            0.06s   exit status 77

38/92 pkcs11-provider:kryoptic.nss / fork      RUNNING       
>>> MALLOC_PERTURB_=78 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
38/92 pkcs11-provider:kryoptic.nss / fork      SKIP            0.07s   exit status 77

39/92 pkcs11-provider:softokn / oaepsha2       RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=41 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
39/92 pkcs11-provider:softokn / oaepsha2       SKIP            0.06s   exit status 77

40/92 pkcs11-provider:kryoptic / oaepsha2      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=134 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
40/92 pkcs11-provider:kryoptic / oaepsha2      SKIP            0.07s   exit status 77

41/92 pkcs11-provider:kryoptic.nss / oaepsha2  RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=2 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
41/92 pkcs11-provider:kryoptic.nss / oaepsha2  SKIP            0.07s   exit status 77

42/92 pkcs11-provider:softokn / hkdf           RUNNING       
>>> MALLOC_PERTURB_=225 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
42/92 pkcs11-provider:softokn / hkdf           SKIP            0.07s   exit status 77

43/92 pkcs11-provider:kryoptic / hkdf          RUNNING       
>>> MALLOC_PERTURB_=79 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
43/92 pkcs11-provider:kryoptic / hkdf          SKIP            0.05s   exit status 77

44/92 pkcs11-provider:kryoptic.nss / hkdf      RUNNING       
>>> MALLOC_PERTURB_=36 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
44/92 pkcs11-provider:kryoptic.nss / hkdf      SKIP            0.07s   exit status 77

45/92 pkcs11-provider:softokn / imported       RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=96 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
45/92 pkcs11-provider:softokn / imported       SKIP            0.05s   exit status 77

46/92 pkcs11-provider:kryoptic / imported      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=220 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
46/92 pkcs11-provider:kryoptic / imported      SKIP            0.06s   exit status 77

47/92 pkcs11-provider:kryoptic.nss / imported  RUNNING       
>>> MALLOC_PERTURB_=225 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
47/92 pkcs11-provider:kryoptic.nss / imported  SKIP            0.05s   exit status 77

48/92 pkcs11-provider:softokn / rsapss         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=134 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
48/92 pkcs11-provider:softokn / rsapss         SKIP            0.07s   exit status 77

49/92 pkcs11-provider:softhsm / rsapss         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MESON_TEST_ITERATION=1 MALLOC_PERTURB_=43 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapss

## DigestSign and DigestVerify with RSA PSS
 openssl 
pkeyutl -sign -inkey "${BASEURI}"
              -digest sha256
              -pkeyopt pad-mode:pss
              -pkeyopt mgf1-digest:sha256
              -pkeyopt saltlen:digest
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha256-dgstsig.bin

 openssl 
pkeyutl -verify -inkey "${BASEURI}" -pubin
                -digest sha256
                -pkeyopt pad-mode:pss
                -pkeyopt mgf1-digest:sha256
                -pkeyopt saltlen:digest
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha256-dgstsig.bin
Signature Verified Successfully
Re-verify using OpenSSL default provider
 openssl 
pkeyutl -verify -inkey "${PUBURI}"
                -pubin
                -digest sha256
                -pkeyopt pad-mode:pss
                -pkeyopt mgf1-digest:sha256
                -pkeyopt saltlen:digest
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha256-dgstsig.bin
Signature Verified Successfully

## DigestSign and DigestVerify with RSA PSS with default params
 openssl 
pkeyutl -sign -inkey "${BASEURI}"
              -pkeyopt pad-mode:pss
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/def-dgstsig.bin

 openssl 
pkeyutl -verify -inkey "${BASEURI}" -pubin
                -pkeyopt pad-mode:pss
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/def-dgstsig.bin
Signature Verified Successfully
Re-verify using OpenSSL default provider
 openssl 
pkeyutl -verify -inkey "${PUBURI}"
                -pubin
                -pkeyopt pad-mode:pss
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/def-dgstsig.bin
Signature Verified Successfully
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
49/92 pkcs11-provider:softhsm / rsapss         OK              0.54s

50/92 pkcs11-provider:kryoptic / rsapss        RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=86 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
50/92 pkcs11-provider:kryoptic / rsapss        SKIP            0.07s   exit status 77

51/92 pkcs11-provider:kryoptic.nss / rsapss    RUNNING       
>>> MALLOC_PERTURB_=79 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
51/92 pkcs11-provider:kryoptic.nss / rsapss    SKIP            0.06s   exit status 77

52/92 pkcs11-provider:softhsm / rsapssam       RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=156 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapssam

## DigestSign and DigestVerify with RSA PSS (SHA256 restriction)
 openssl 
pkeyutl -sign -inkey "${RSAPSS2PRIURI}"
              -digest sha256
              -pkeyopt pad-mode:pss
              -pkeyopt mgf1-digest:sha256
              -pkeyopt saltlen:digest
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin

 openssl 
pkeyutl -verify -inkey "${RSAPSS2PUBURI}" -pubin
                -digest sha256
                -pkeyopt pad-mode:pss
                -pkeyopt mgf1-digest:sha256
                -pkeyopt saltlen:digest
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin
Signature Verified Successfully

## Fail DigestSign with RSA PSS because of restricted Digest
 openssl 
pkeyutl -sign -inkey "${RSAPSS2PRIURI}"
              -digest sha384
              -pkeyopt pad-mode:pss
              -pkeyopt mgf1-digest:sha384
              -pkeyopt saltlen:digest
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha384-rsapps-genpkey-dgstsig.bin 2>&1

## Fail Signing with RSA PKCS1 mech and RSA-PSS key
 openssl 
pkeyutl -sign -inkey "${RSAPSSPRIURI}"
              -digest sha256
              -pkeyopt rsa_padding_mode:pkcs1
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha384-rsa-not-rsapss-sig.bin 2>&1
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
52/92 pkcs11-provider:softhsm / rsapssam       OK              0.51s

53/92 pkcs11-provider:kryoptic / rsapssam      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=254 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
53/92 pkcs11-provider:kryoptic / rsapssam      SKIP            0.07s   exit status 77

54/92 pkcs11-provider:softokn / genkey         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=107 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
54/92 pkcs11-provider:softokn / genkey         SKIP            0.08s   exit status 77

55/92 pkcs11-provider:softhsm / genkey         RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=206 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing  /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tgenkey
Performed tests: 0
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
55/92 pkcs11-provider:softhsm / genkey         OK              0.11s

56/92 pkcs11-provider:kryoptic / genkey        RUNNING       
>>> MALLOC_PERTURB_=136 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
56/92 pkcs11-provider:kryoptic / genkey        SKIP            0.06s   exit status 77

57/92 pkcs11-provider:kryoptic.nss / genkey    RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=248 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
57/92 pkcs11-provider:kryoptic.nss / genkey    SKIP            0.06s   exit status 77

58/92 pkcs11-provider:softokn / pkey           RUNNING       
>>> MALLOC_PERTURB_=145 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
58/92 pkcs11-provider:softokn / pkey           SKIP            0.07s   exit status 77

59/92 pkcs11-provider:softhsm / pkey           RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=39 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing  /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tpkey
ALL A-OK!
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
59/92 pkcs11-provider:softhsm / pkey           OK              0.35s

60/92 pkcs11-provider:kryoptic / pkey          RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=41 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
60/92 pkcs11-provider:kryoptic / pkey          SKIP            0.06s   exit status 77

61/92 pkcs11-provider:kryoptic.nss / pkey      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=101 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
61/92 pkcs11-provider:kryoptic.nss / pkey      SKIP            0.07s   exit status 77

62/92 pkcs11-provider:softokn / session        RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=89 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
62/92 pkcs11-provider:softokn / session        SKIP            0.07s   exit status 77

63/92 pkcs11-provider:softhsm / session        RUNNING       
>>> MALLOC_PERTURB_=122 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing  /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tsession
ALL A-OK!――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
63/92 pkcs11-provider:softhsm / session        OK              0.52s

64/92 pkcs11-provider:kryoptic / session       RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=147 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
64/92 pkcs11-provider:kryoptic / session       SKIP            0.07s   exit status 77

65/92 pkcs11-provider:kryoptic.nss / session   RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=212 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
65/92 pkcs11-provider:kryoptic.nss / session   SKIP            0.07s   exit status 77

66/92 pkcs11-provider:softokn / rand           RUNNING       
>>> MALLOC_PERTURB_=225 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
66/92 pkcs11-provider:softokn / rand           SKIP            0.07s   exit status 77

67/92 pkcs11-provider:softhsm / rand           RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=226 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trand

## Test PKCS11 RNG
 openssl rand 1
40DCBE8DFFFF0000:error:0308010C:digital envelope routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:355:Global default library context, Algorithm (PKCS11-RAND : 0), Properties (<null>)
40DCBE8DFFFF0000:error:12000090:random number generator:rand_new_drbg:unable to fetch drbg:../crypto/rand/rand_lib.c:660:

 openssl rand 1
ì
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
67/92 pkcs11-provider:softhsm / rand           OK              0.29s

68/92 pkcs11-provider:kryoptic / rand          RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=228 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
68/92 pkcs11-provider:kryoptic / rand          SKIP            0.07s   exit status 77

69/92 pkcs11-provider:kryoptic.nss / rand      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=70 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
69/92 pkcs11-provider:kryoptic.nss / rand      SKIP            0.07s   exit status 77

70/92 pkcs11-provider:softokn / readkeys       RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=57 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
70/92 pkcs11-provider:softokn / readkeys       SKIP            0.07s   exit status 77

71/92 pkcs11-provider:softhsm / readkeys       RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=114 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing  /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/treadkeys
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
71/92 pkcs11-provider:softhsm / readkeys       OK              0.14s

72/92 pkcs11-provider:kryoptic / readkeys      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=4 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
72/92 pkcs11-provider:kryoptic / readkeys      SKIP            0.08s   exit status 77

73/92 pkcs11-provider:kryoptic.nss / readkeys  RUNNING       
>>> MALLOC_PERTURB_=32 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
73/92 pkcs11-provider:kryoptic.nss / readkeys  SKIP            0.06s   exit status 77

74/92 pkcs11-provider:softokn / tls            RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=174 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
74/92 pkcs11-provider:softokn / tls            SKIP            0.06s   exit status 77

75/92 pkcs11-provider:softhsm / tls            RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=94 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttls

## Test SSL_CTX creation
SSL Context works!

## Test setting cert/keys on TLS Context
Cert and Key successfully set on TLS Context!

## Test setting cert/keys on TLS Context w/o pub key
Cert and Key successfully set on TLS Context!

## Test an actual TLS connection
########################################
## TLS with key in provider


## Run sanity test with default values (RSA)
spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My Test Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My Test Cert
   i:CN=Issuer
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My Test Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1391 bytes and written 391 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 2048 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: D81C518D845E674E1E0EED4ACD47935F52C9A66A808F5CFDB35EDF5E12743C46
    Session-ID-ctx: 
    Resumption PSK: CDFD6D28B0204B7C223C78F2A9F7DF7E188CFF1355C682D338FA2486BE956162EA3A051515576B1F62E98F637E301F04
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - b0 53 ae 8d a2 a6 4f 11-a2 f8 2d 53 a9 f1 c7 39   .S....O...-S...9
    0010 - 88 f2 22 36 5c 2b b3 05-4c 5b f1 03 61 05 a4 14   .."6\+..L[..a...
    0020 - 7f 4d f8 b5 c7 76 64 ba-a3 fe d9 91 ff 35 9a 42   .M...vd......5.B
    0030 - 97 d1 8f f0 55 b2 7a 1b-d4 87 fa 5f 53 80 14 f4   ....U.z...._S...
    0040 - 66 7a c3 a8 02 c6 90 da-cc dc b2 10 c2 dc 8f 15   fz..............
    0050 - c7 2d 68 88 4c 99 a5 d5-56 72 a1 84 4c 27 18 c2   .-h.L...Vr..L'..
    0060 - 85 98 28 eb 75 8e 0e 51-4d 36 f0 c4 51 85 c0 0f   ..(.u..QM6..Q...
    0070 - 42 83 36 ac 68 13 5f 68-de d0 0a c7 51 a8 b6 44   B.6.h._h....Q..D
    0080 - d0 28 d5 06 9b b9 c0 69-89 50 67 8f ce 27 18 8f   .(.....i.Pg..'..
    0090 - ac c2 71 eb 5f 86 de b8-b6 2f 1a bf 9a 6b 78 63   ..q._..../...kxc
    00a0 - 95 8b 33 ce d9 d7 74 6e-69 d2 53 4e 78 64 99 e4   ..3...tni.SNxd..
    00b0 - 42 8d c5 2d 06 d0 55 49-2c c1 8d e1 e6 27 51 77   B..-..UI,....'Qw
    00c0 - 5b ea 2e b4 bf 6d ba de-57 7a b4 57 d4 99 48 f7   [....m..Wz.W..H.

    Start Time: 1774263034
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 2626141E3E3B894CC0222037587514A9C3F3F85E4E7C6A0D8F27988603407DF0
    Session-ID-ctx: 
    Resumption PSK: 530BEB79DDE68A01D35BA155BA6C94B9D7BFDD01BB71868B83F5EFAE36BBD338A042C54C844AD792D744571136354A41
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - b0 53 ae 8d a2 a6 4f 11-a2 f8 2d 53 a9 f1 c7 39   .S....O...-S...9
    0010 - eb b3 9c a2 38 43 3f 65-20 80 e9 71 0d 8a 0a 85   ....8C?e ..q....
    0020 - 75 c5 9e b0 f2 57 67 6d-e5 50 de 43 9a 70 e3 05   u....Wgm.P.C.p..
    0030 - f2 31 f5 ab 79 e7 32 85-ac f8 a7 a6 e5 f5 bc ea   .1..y.2.........
    0040 - fb 39 f3 41 78 93 0e 12-d3 6d 6c c0 18 63 32 fc   .9.Ax....ml..c2.
    0050 - 3e 6d 01 d0 fe 9b 3a db-2b df e2 a3 e8 92 41 ac   >m....:.+.....A.
    0060 - eb 4d 63 0d ef fa e8 4c-eb 19 ed 8d de 9c 51 54   .Mc....L......QT
    0070 - fd c7 56 66 ff 02 51 b8-58 ab 4c 49 91 ab 7f d2   ..Vf..Q.X.LI....
    0080 - 95 0e 53 39 f5 68 f5 af-6a 79 b0 a1 7e 35 93 11   ..S9.h..jy..~5..
    0090 - 6d 60 cb 8c 90 09 d4 3d-c5 2e 62 36 53 66 ab 23   m`.....=..b6Sf.#
    00a0 - 66 57 8e 39 82 6a c2 0f-31 68 07 16 2f fc d0 20   fW.9.j..1h../.. 
    00b0 - c9 5b f6 f7 19 91 17 1f-1e 23 ca e5 be 46 1e aa   .[.......#...F..
    00c0 - 05 c2 31 a0 e7 2d 27 09-c4 25 1f 5e 84 e5 90 45   ..1..-'..%.^...E

    Start Time: 1774263034
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
405CF6BAFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEIBWejOI5RUGnObP8XZSH5NZlBYUZqKMYKPrDFK/RGMcs
BDBTC+t53eaKAdNboVW6bJS517/dAbtxhouD9e+uNrvTOKBCxUyESteS10RXETY1
SkGhBgIEacEa+qIEAgIcIKQGBAQBAAAArgcCBQDasdsNswMCAR0=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with default values (RSA-PSS)

## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%10
 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT}


spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
verify error:num=18:self-signed certificate
verify return:1
depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
verify return:1
---
Certificate chain
 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
   i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
   a:PKEY: RSASSA-PSS, 2048 (bit); sigalg: RSASSA-PSS
   v:NotBefore: Mar 23 10:50:34 2026 GMT; NotAfter: Apr 22 10:50:34 2026 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1619 bytes and written 391 bytes
Verification error: self-signed certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 2048 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 18 (self-signed certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 6ACC3896E07AC3071BFE88F219D9AF2B7D61F73525E7A5B23D88039CE2423D55
    Session-ID-ctx: 
    Resumption PSK: DD6BF83F05D1CE4B9AA3B2F3E75F841785C66B9B764A86516C56854D147F9DE3B06491DE62D55F7647DA817143CBE619
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 3c e6 e6 02 e6 19 63 23-d5 cd dc ac cc ad 99 0d   <.....c#........
    0010 - d6 77 23 db f0 96 fa cb-12 d8 68 c3 38 5b 6a f8   .w#.......h.8[j.
    0020 - a0 37 b9 da 1d 83 11 9c-cf 33 e9 d4 4e 6a 25 a9   .7.......3..Nj%.
    0030 - 38 44 e1 ca a0 ca f1 1b-a2 ac b8 b6 58 eb 02 11   8D..........X...
    0040 - 07 5b 95 a1 25 b5 fa 86-5d 31 4d ff cf 06 d7 a9   .[..%...]1M.....
    0050 - 0c ab 2b a4 d3 19 da cb-24 57 68 8a e2 47 80 c9   ..+.....$Wh..G..
    0060 - 2b 88 29 0f b1 f8 88 1a-c3 96 01 ce d2 62 cc f0   +.)..........b..
    0070 - 86 3c d0 e1 4f ca 9f de-d9 e3 14 30 81 53 ea af   .<..O......0.S..
    0080 - 61 49 f0 ce a4 1b c5 07-b6 f9 de 0f 73 e3 d7 e2   aI..........s...
    0090 - 88 48 87 69 ac ac 85 de-50 9c 7a 5a b4 34 f5 7f   .H.i....P.zZ.4..
    00a0 - 88 12 d6 05 8e 47 47 72-e3 86 b9 4f 2f c2 32 cf   .....GGr...O/.2.
    00b0 - a3 38 48 13 aa 70 d9 d9-66 fb 55 ab 1b 0e 63 47   .8H..p..f.U...cG
    00c0 - 6e 87 bd b3 a3 9e 15 8f-b8 55 f3 ea 91 65 20 68   n........U...e h

    Start Time: 1774263034
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 78F66FA2ACF3D725D7C8D5D077877DA85537A35669C90F0BC2697B9260CB5576
    Session-ID-ctx: 
    Resumption PSK: 15B423F12A52C70C53E859B079AFE7A9C3985011E895690FCA9D3EF83B348BBD10526609A3083EE052481D5CA030B77C
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 3c e6 e6 02 e6 19 63 23-d5 cd dc ac cc ad 99 0d   <.....c#........
    0010 - 4d c3 cc 96 ff e6 88 9c-45 18 76 3d 3b a5 92 d5   M.......E.v=;...
    0020 - 43 6a 7b ab 49 87 59 6d-f0 5a f4 51 c6 09 0d cb   Cj{.I.Ym.Z.Q....
    0030 - 8d 01 36 34 5b 5a 58 92-ac 98 7f 67 b4 ca c5 f8   ..64[ZX....g....
    0040 - a8 2e 94 30 b8 30 d0 c9-44 7b 40 1c 77 bf 5d 38   ...0.0..D{@.w.]8
    0050 - 26 d1 54 1b 1b ee 30 f1-20 f3 67 02 ef 90 e3 9c   &.T...0. .g.....
    0060 - 8e d9 1f 11 9a 72 aa 68-22 41 fb da ea 55 8a 6b   .....r.h"A...U.k
    0070 - f2 f4 bf d2 b6 ff 89 eb-d7 2c cf 5a 0d 7b 21 66   .........,.Z.{!f
    0080 - 33 ac df ce 6d 95 4a aa-02 20 88 b3 10 96 32 44   3...m.J.. ....2D
    0090 - a1 2b 05 7c 06 80 12 43-e6 3e 6b 4c 3d 12 e1 c4   .+.|...C.>kL=...
    00a0 - 61 c4 7d fe 2b cc 20 2e-a4 c2 bd cd 62 a0 46 8b   a.}.+. .....b.F.
    00b0 - bd 20 60 4c a8 90 04 e3-dc e9 b7 86 f0 70 26 b0   . `L.........p&.
    00c0 - b2 b2 68 3c 15 b9 ac d7-e9 fc 82 7b 3e a3 ea 2c   ..h<.......{>..,

    Start Time: 1774263034
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
40DC08AFFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-default.pem
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEII0G/z7RKfyMD+KfucZfyO2qSsp9ZTbTkxVExquqX0dB
BDAVtCPxKlLHDFPoWbB5r+epw5hQEeiVaQ/KnT74OzSLvRBSZgmjCD7gUkgdXKAw
t3yhBgIEacEa+qIEAgIcIKQGBAQBAAAArgcCBQC8dqnsswMCAR0=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with RSA-PSS and SHA256

## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11
 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT}


spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
verify error:num=18:self-signed certificate
verify return:1
depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
verify return:1
---
Certificate chain
 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
   i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
   a:PKEY: RSASSA-PSS, 3092 (bit); sigalg: RSASSA-PSS
   v:NotBefore: Mar 23 10:50:35 2026 GMT; NotAfter: Apr 22 10:50:35 2026 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIFKDCCA12gAwIBAgIUFD1ya7qiCezAMq6/fGQ3/mNzJBUwPQYJKoZIhvcNAQEK
MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC
ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO
ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0
aW5nIEhhcm5lc3MwHhcNMjYwMzIzMTA1MDM1WhcNMjYwNDIyMTA1MDM1WjBnMQsw
CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr
MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy
bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgwyCtjJDJoFG2aS9jItn
AxBiK0Jg+iFC1hTTReprcrOSbr8b3fouLI68QFIjieaEmRwGL/p5vJ5Mst7HeU8G
u2+jHP3e+L7YYiGBTUE6qKfFccQnNv8R3y+eoM+mr2axl2LdRu5fFLkFJbfFAQyI
Y5U9TTHdhQUZhGV1gxPTvrspUkjYM+ENAFfsUnhuym+wgl9ZAsCZAYac0e+cyn2C
h2OwGFsBKbFbMgHRiVfl4ncTsqiEIOEkikq4pUHIe7Wf+xfQqs/EzgsI7CdbLOJ6
ItIx8006mm9XutFTiMilVzzyBGW51ihhvprvewF86VOhs/oSlr1wK3yi8QGX8auh
fB6nMqZ3shsiyqkARTdOYQPnXiljE2SjBQyTKi/W1Q52pFZxKwZ5cpZMrhMpfxyJ
J6cXwsfDavGv4wo21fDK70I7dliSy58pd68h5y6sdd6IzHpZQC/wVSjpnvtN87PG
CdbsXYPmU3qe3Hki7WR2FUZLyBPwNLed8x73ad56FHlOMlvWjQIDAQABo2kwZzAd
BgNVHQ4EFgQUWNa4hGl5YEQfmSg+qNJBjwuQZU0wHwYDVR0jBBgwFoAUWNa4hGl5
YEQfmSg+qNJBjwuQZU0wDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud
EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B
AQgwCwYJYIZIAWUDBAIBogMCASADggGEAAQxVS0qrx38WRTd5Pl4LvXOpJ1kpOri
sviGV8LfRzcUrL8Vu31+wbakCwVB0cL76T0aA0K0NP/0jWV4XmRP6ZmchkbmECP0
V37xsMyvMrc1vcNXL8po3i3hrKL6WeLFsV/9BD9uwdX7huTbpH97GUptrhYpZAme
WCXoDJ5ZdkUnOuC4vnR4FHL6rSbJtVDsdJ401v6HpYN0HtFMwlnnCyn8ecrG3Oqj
3R0AGLb0Ef8LXhIe+dzlkmYoUcvmIAek8cIGGQp+ImDVSmx5EcAdD2iTK4/j+cc5
FrtN4HQfNjF+xbyTfnyQ1uUwGZbWGqZKIJm0Jo2z86clOvs6RkmUtn1A00TO/Q+0
sl3qxXMAZTXCBsSII1JwHoHcTT5V1RlMjrx3B0DA8E0W0w8ZLjE3/q4ixDOU9lTA
UreoMm8QJH+uAYxbK7MyThhssoqdlVx1CpifxSRqcrw9/bAIlswue5FRdWhLaHan
1cMtTgUb3DmTZ20g+jF9FGq+DmhFXO5vAiTB9A==
-----END CERTIFICATE-----
subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 2011 bytes and written 391 bytes
Verification error: self-signed certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 3092 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 18 (self-signed certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: C980536EA57325BAA6E0CE294A6D9617A7263DBAB30AF995E6D86796478B8849
    Session-ID-ctx: 
    Resumption PSK: 3A53F72943B100EA1C5851A4073915A502848826D2C2EF97C4416884110E6F49F2D03926B80A16FA6FEEEED594F92A7A
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - aa b6 ec fe 94 5d 6f 9e-b5 25 0e c9 b6 cd 47 78   .....]o..%....Gx
    0010 - 2c ad 1f 27 a2 60 67 c9-9d 6d e1 13 cf 86 ac 63   ,..'.`g..m.....c
    0020 - 70 63 a7 b2 e0 da b3 8e-66 9c 1f ea c3 de 80 58   pc......f......X
    0030 - c6 36 29 37 bc b3 73 46-b6 b3 9c 00 4f 0d a2 59   .6)7..sF....O..Y
    0040 - d1 63 97 25 88 34 a3 fe-17 16 0b cb e7 ef cf 4b   .c.%.4.........K
    0050 - 6e b9 2f a1 3b e6 c0 e6-0b 12 1a fd fb f6 ed ad   n./.;...........
    0060 - e5 2c 57 ff 23 12 bc fc-14 17 84 4a 28 c8 fc 7e   .,W.#......J(..~
    0070 - 0a 1e be 74 21 8e 29 83-6e e5 ee c2 db bf 4c cc   ...t!.).n.....L.
    0080 - 30 8b 63 71 83 8c 77 3a-a3 c5 af da b1 51 73 2f   0.cq..w:.....Qs/
    0090 - 47 5d 6c 04 9f 27 9d c3-f8 d6 3a c9 1a 8b dd 89   G]l..'....:.....
    00a0 - 8c 29 a4 55 43 32 8d 53-d1 4d 5f 06 e1 50 05 09   .).UC2.S.M_..P..
    00b0 - 35 1c 89 22 07 a8 4b bd-19 00 89 52 b8 ee 91 75   5.."..K....R...u
    00c0 - 61 b7 c9 d4 19 b5 6f d5-45 5d cd 5e 77 7e 8d 0f   a.....o.E].^w~..

    Start Time: 1774263035
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 23A44EC8F313B365E0B63EF4EFDB16540136F463CC47CB13786E8A076B60BBFA
    Session-ID-ctx: 
    Resumption PSK: 6400B17739057E245F87CF1F993D30C3F1E51D39061D20C5118B339B8745547DCFCEF7C386848E70A42B77BEC5DF5C79
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - aa b6 ec fe 94 5d 6f 9e-b5 25 0e c9 b6 cd 47 78   .....]o..%....Gx
    0010 - 99 f8 c1 5d 9a 9a 0b 1c-f1 27 00 39 25 f4 65 27   ...].....'.9%.e'
    0020 - 5e f5 f6 6b e2 c7 af 2c-4b f6 f2 0d ef 97 7c 47   ^..k...,K.....|G
    0030 - ae b3 76 d6 0e ff 51 de-b0 aa b4 d3 be 35 c3 37   ..v...Q......5.7
    0040 - 2c 51 39 43 4c 35 78 86-37 ad 19 d4 0c b5 0a 8b   ,Q9CL5x.7.......
    0050 - 58 41 2e be 1e 9e 7e b2-b2 6d e7 7d d6 90 01 40   XA....~..m.}...@
    0060 - 2f bb a6 f3 33 2c 11 56-02 5a b4 ce 4c dc 2c ce   /...3,.V.Z..L.,.
    0070 - fa e9 d7 74 4f ef 1a ed-c0 9a c4 92 b6 df 8f f2   ...tO...........
    0080 - f3 88 e4 6c 33 c8 ac 39-03 61 22 de 49 ea e9 1e   ...l3..9.a".I...
    0090 - 1d 1f f6 b5 ae 31 b0 08-f5 54 03 0c d5 5d 3f da   .....1...T...]?.
    00a0 - e1 5f 40 e1 ee 16 f5 27-43 e8 2e c2 bf b9 d3 4d   ._@....'C......M
    00b0 - e2 cd e9 1e 86 82 0e 95-14 d5 b6 39 78 18 42 14   ...........9x.B.
    00c0 - 64 62 72 da 96 9e 84 7d-ef 04 25 e1 3b cb 2a d9   dbr....}..%.;.*.

    Start Time: 1774263035
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
408CFA8CFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-sha256.pem
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEII+v24omZXsUUVa02zpZM/bP6nRmQgf3Cu4xsFjZnROx
BDBkALF3OQV+JF+Hzx+ZPTDD8eUdOQYdIMURizObh0VUfc/O98OGhI5wpCt3vsXf
XHmhBgIEacEa+6IEAgIcIKQGBAQBAAAArgcCBQCJ5+ynswMCAR0=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with default values (ECDSA)
spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My EC Cert
   i:CN=Issuer
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My EC Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1002 bytes and written 391 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 256 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 7889BA80126C5AB5AF9141F861000B473BEF5353D4FBA174BDFBCE4776CDF121
    Session-ID-ctx: 
    Resumption PSK: 4B7A5D1FC897940581956DD5A7857FA8DDEAEA99A6B711FA3306E069B922876F266BA7D3E91A5B493F5D647D2F2FD66C
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 27 70 2b 92 b7 ed de a9-02 31 00 21 cf 60 27 0f   'p+......1.!.`'.
    0010 - ab 93 94 9c ee 5b cc 4a-2e 56 11 80 58 ab 3d df   .....[.J.V..X.=.
    0020 - 9e 93 4d b2 bc 84 9a fa-bc b4 af 29 45 4a 2a 6d   ..M........)EJ*m
    0030 - fd fb c1 d9 58 16 42 1c-12 73 c8 73 9b 52 fe 8a   ....X.B..s.s.R..
    0040 - 1d c3 bb 63 40 01 91 ff-f4 96 29 e8 29 17 47 1e   ...c@.....).).G.
    0050 - bd fa 18 0e 2e 86 25 01-d4 fb 11 7a 27 bf 48 61   ......%....z'.Ha
    0060 - 35 6d e3 54 19 54 d2 cd-e2 d5 3a 8a 05 35 55 44   5m.T.T....:..5UD
    0070 - 6f 75 57 76 6e 35 b8 9d-e9 ac 7e 0d 9a 43 65 6a   ouWvn5....~..Cej
    0080 - 83 40 ea 8d 41 1f 71 b3-fb 75 d8 c8 7b 26 c3 b3   .@..A.q..u..{&..
    0090 - 29 21 2d a3 7e 3d cd 9b-40 de af af 06 c0 fa 8b   )!-.~=..@.......
    00a0 - 9d cc af 24 99 51 76 99-cd ee c5 ab 81 6a 80 91   ...$.Qv......j..
    00b0 - 66 23 97 89 6c da 7c 48-be ba 73 a7 50 13 7d 7e   f#..l.|H..s.P.}~
    00c0 - 2c d9 1e 90 1f a9 ff d3-44 fd 6e d2 45 53 2f 03   ,.......D.n.ES/.

    Start Time: 1774263035
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 69EEFCA4454E58210209C427816FAF8A807D1B0A8832E6C8E917CA0244DEFA1A
    Session-ID-ctx: 
    Resumption PSK: 98445460CABA1255454DD60432D277F6803631A2126BC8D19CEBE91CA516E9A31A18C638944603F035F7D1908B906DDC
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 27 70 2b 92 b7 ed de a9-02 31 00 21 cf 60 27 0f   'p+......1.!.`'.
    0010 - ed dc 91 30 56 04 1e fd-ad 9b 69 e7 86 94 e9 15   ...0V.....i.....
    0020 - 07 d9 4b f8 fb 28 88 4f-ab 9e 6f 2e 96 aa 86 a1   ..K..(.O..o.....
    0030 - d2 14 81 35 a3 6e 3d 41-fc 6b 40 06 9a ac 48 3c   ...5.n=A.k@...H<
    0040 - 1f a8 f9 1a ea b1 69 5f-7a 5d 28 4f 7a fb bb 5d   ......i_z](Oz..]
    0050 - 64 79 1e 64 56 f9 f2 21-60 47 ba e9 ba 5d de 77   dy.dV..!`G...].w
    0060 - 9e 29 6d dc fc a0 21 33-55 98 dc 4d 5e 12 34 c2   .)m...!3U..M^.4.
    0070 - e0 22 82 ed ee fb 7d 32-ca 60 41 5c 17 0e e1 f9   ."....}2.`A\....
    0080 - 5b 3b c9 f2 3c 17 c0 b2-a3 4e e8 bf 98 3e 03 4d   [;..<....N...>.M
    0090 - c5 b7 f8 8c 8c 9d 5e d4-94 d8 02 d5 a8 5a 81 cb   ......^......Z..
    00a0 - 2c 40 48 91 1a e0 f4 ce-6c 3e 24 23 5a 68 8e 8a   ,@H.....l>$#Zh..
    00b0 - f8 e3 2b d4 65 0d 7b 7f-09 6d f5 1a 20 73 fb 53   ..+.e.{..m.. s.S
    00c0 - 91 03 59 cd 32 12 4f b9-d6 ed 0a 59 c6 b0 95 e3   ..Y.2.O....Y....

    Start Time: 1774263035
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
40DC1495FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGCAgEBAgIDBAQCEwIEIIONiLE3D7DHCUsr3pEZBDbzp29Ei+XRktRsHkWliMzG
BDCYRFRgyroSVUVN1gQy0nf2gDYxohJryNGc6+kcpRbpoxoYxjiURgPwNffRkIuQ
bdyhBgIEacEa+6IEAgIcIKQGBAQBAAAArgYCBEp45Y2zAwIBHQ==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with default values (Ed25519)
spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My ED25519 Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My ED25519 Cert
   i:CN=Issuer
   a:PKEY: ED25519, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My ED25519 Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signature type: Ed25519
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 952 bytes and written 391 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 256 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 800D55AF5E080E74E02ADBFE67ABEE6A717B48FC2B59EE3786B91080D6647A7D
    Session-ID-ctx: 
    Resumption PSK: 1B03A03C5DC32258551E66AEE1195BBB228AFB4B9D14CCDB5D8537C5F64E5FB0678F193D7B75FEBEE61F7B5C01590D91
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - cd 93 cf 47 e7 69 10 fd-b8 1a 71 0d 09 27 a7 04   ...G.i....q..'..
    0010 - 5b a4 38 85 31 89 d4 5d-2f 82 8a fa a1 d6 4f ec   [.8.1..]/.....O.
    0020 - b4 a2 30 8e 8b b2 85 07-84 52 6b 06 e4 44 22 28   ..0......Rk..D"(
    0030 - 97 5b 14 62 cb 5c 7f 75-e9 ee 2b b2 0f 98 b1 87   .[.b.\.u..+.....
    0040 - 92 b7 e2 ac c4 9d 94 80-b9 d7 7f af 0c a8 1b 44   ...............D
    0050 - de aa 92 34 2d 50 43 70-47 82 d9 c8 e6 7f a1 2e   ...4-PCpG.......
    0060 - 84 a7 df be 93 9f 7c ba-10 58 4a b4 af 23 87 8d   ......|..XJ..#..
    0070 - fa e9 26 23 28 c6 bc 0b-78 6a fa 62 b7 80 5c c5   ..&#(...xj.b..\.
    0080 - 34 57 a0 47 a0 a9 34 83-9f 6d f9 dd b9 9d 9a 8b   4W.G..4..m......
    0090 - 6f 0b ab 81 bd 29 16 53-f3 56 38 32 b8 02 60 52   o....).S.V82..`R
    00a0 - 54 04 44 9b 39 88 29 f4-dd e0 73 86 50 f2 46 23   T.D.9.)...s.P.F#
    00b0 - d2 01 b7 96 26 57 d3 8f-9f 37 c1 8b f8 f5 3a dd   ....&W...7....:.
    00c0 - d0 af 7f 01 ec 5c ca dc-7f 8e 74 4c 83 59 6d f5   .....\....tL.Ym.

    Start Time: 1774263035
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 3411B0ED199DA07D9B79F6B7C11A8BAA4784B89249A5B32842E00901EFD3636D
    Session-ID-ctx: 
    Resumption PSK: 372697034CD7917549241095FF0BE379C6D34FBD7BE92E3C8C4E425C1906088A46E536B3E84415262FB6C5BD113EE423
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - cd 93 cf 47 e7 69 10 fd-b8 1a 71 0d 09 27 a7 04   ...G.i....q..'..
    0010 - f3 ab 72 a8 0d 66 96 ef-b2 3f 8c 86 9d 33 40 90   ..r..f...?...3@.
    0020 - 94 30 88 47 2a 42 3c 02-a1 4d f9 10 47 1b ff 54   .0.G*B<..M..G..T
    0030 - 41 2f f2 74 50 6f e6 dc-0a 3e 56 87 03 60 f5 d0   A/.tPo...>V..`..
    0040 - 5a 68 8a fc 55 00 32 ef-02 0e 99 99 45 56 9d 12   Zh..U.2.....EV..
    0050 - 9c 32 c6 f1 7f 18 eb f8-d7 b3 2c 74 26 3a 08 2d   .2........,t&:.-
    0060 - 96 1d 86 6d aa 23 b3 4f-14 ca e9 f1 da 03 b9 7b   ...m.#.O.......{
    0070 - 52 14 87 d1 5e c9 80 de-58 b6 32 26 e8 78 9c 64   R...^...X.2&.x.d
    0080 - 81 0c e3 d8 b2 60 f6 73-9b b8 19 02 a0 d0 f4 1a   .....`.s........
    0090 - 83 d7 72 29 79 79 49 40-de fb 03 d2 24 5a 8c ec   ..r)yyI@....$Z..
    00a0 - 68 79 be 8c fc ec 05 78-39 c0 a9 c3 95 7c f7 3a   hy.....x9....|.:
    00b0 - a2 34 1a 05 a9 63 7d 5a-45 22 19 aa 25 20 1a c5   .4...c}ZE"..% ..
    00c0 - c8 03 90 69 c1 88 96 01-e2 ac c4 af 0f c5 d2 04   ...i............

    Start Time: 1774263035
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
402C0AA9FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEIPlMCfEu/+ExkdVUcwC+hf6ffFuSFdbHd9RpPrwLwp9Z
BDA3JpcDTNeRdUkkEJX/C+N5xtNPvXvpLjyMTkJcGQYIikblNrPoRBUmL7bFvRE+
5COhBgIEacEa+6IEAgIcIKQGBAQBAAAArgcCBQDoF6jZswMCAR0=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with default values (Ed448)
spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My ED448 Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My ED448 Cert
   i:CN=Issuer
   a:PKEY: ED448, 456 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:04 2026 GMT; NotAfter: Mar 23 10:50:04 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My ED448 Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signature type: Ed448
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1025 bytes and written 391 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 456 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 9605322B3EF53A934F8D9294DE7BE987C26612EF2F2E423A63FEF5A5E6B922D3
    Session-ID-ctx: 
    Resumption PSK: 8F34E0CCAD8C25EACF3F7E793C0741CF704E3A163F57D46D90960E09CE02130E286DF770CA67DEC89A261561E9DD7894
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 41 32 bd 41 ff b4 12 17-24 02 d3 13 8a 4b 96 69   A2.A....$....K.i
    0010 - 59 8c 61 4d 79 e0 dc 02-3a 69 62 53 59 f6 8e 8f   Y.aMy...:ibSY...
    0020 - f0 4a d0 b0 27 40 a9 b8-4e 2f 92 17 61 2c 5a 1b   .J..'@..N/..a,Z.
    0030 - 87 44 10 01 82 79 a0 ff-67 68 20 33 34 24 7b f5   .D...y..gh 34${.
    0040 - aa b7 2f 19 d6 e6 8a ff-6f 8e b8 3e 1b 62 d0 3b   ../.....o..>.b.;
    0050 - 2b e7 74 47 ae 9a 9b ea-0e ff 35 6d 4e b9 ef 56   +.tG......5mN..V
    0060 - 5b 14 d5 71 36 13 ef 83-60 0f 83 44 c6 ad cc 90   [..q6...`..D....
    0070 - 1b b2 dc af 63 97 1f e9-d9 5a 21 c1 d5 c4 17 04   ....c....Z!.....
    0080 - b4 35 16 bc 8c 50 d9 fb-db 5b e1 94 73 a6 72 db   .5...P...[..s.r.
    0090 - 15 79 9e 22 9c be 6c 98-9f 5e 5f 40 68 21 d3 ca   .y."..l..^_@h!..
    00a0 - 71 31 ff 54 92 41 58 38-57 0a 8b ed 57 a9 d4 de   q1.T.AX8W...W...
    00b0 - d4 0c 7b 41 2c 8a cf 28-d3 58 f1 6b 00 a7 e4 1f   ..{A,..(.X.k....
    00c0 - 40 d0 88 71 22 f4 57 5e-b0 99 9f 69 a9 4d 8e 8a   @..q".W^...i.M..

    Start Time: 1774263036
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 9D18F39343CE3158FCDD6FC9F8EFF3AFE174E7E41832E12F14DA4404A0309D03
    Session-ID-ctx: 
    Resumption PSK: 546512EAC4C95CC75F3C95824EEA25F6C134B1FE3E51FD43D6F8DACC250DC9CAAA58F3AD13FB54CB710DDBE51B7705ED
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 41 32 bd 41 ff b4 12 17-24 02 d3 13 8a 4b 96 69   A2.A....$....K.i
    0010 - 52 29 a7 4c 91 75 7e 9b-84 ac d4 87 e7 11 30 5c   R).L.u~.......0\
    0020 - ef ab db fc 50 bc 56 f7-17 2e 25 96 11 59 47 28   ....P.V...%..YG(
    0030 - a2 21 b8 a3 a5 e4 42 12-f5 22 79 a0 b0 7f a0 8e   .!....B.."y.....
    0040 - 8a d4 41 65 25 a1 71 f7-c6 f7 e3 69 12 cf 62 e5   ..Ae%.q....i..b.
    0050 - dc 05 f6 c7 14 d8 39 e0-12 4f ec ac 19 24 32 e8   ......9..O...$2.
    0060 - 55 b2 2e e4 db fb 02 32-ac d1 9c 69 a5 03 4e 13   U......2...i..N.
    0070 - dd d1 27 f7 fb 47 cb 39-18 0d bc 1c 25 c8 06 88   ..'..G.9....%...
    0080 - e1 ba c3 e4 9e 1d dc eb-df 93 34 6f 12 32 02 7e   ..........4o.2.~
    0090 - b7 c0 df 58 0d 9e 1a 75-d5 64 95 75 da 89 0d 58   ...X...u.d.u...X
    00a0 - 0e a0 a6 74 46 33 ee 87-69 70 f5 a2 90 36 71 57   ...tF3..ip...6qW
    00b0 - 9e c6 fe 7d 8e 74 7f 97-09 d8 9e 9e c4 a5 39 32   ...}.t........92
    00c0 - 54 2f 4d f2 66 50 2c f0-7e 26 4b c8 83 b6 3b c2   T/M.fP,.~&K...;.

    Start Time: 1774263036
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
406CF0B7FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%09 -cert pkcs11:type=cert;object=ed2Cert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEICJiAO/KZp0QtHgdzRqpXhUv3KLf74fx7ln8sjwOgL3F
BDBUZRLqxMlcx188lYJO6iX2wTSx/j5R/UPW+NrMJQ3JyqpY860T+1TLcQ3b5Rt3
Be2hBgIEacEa/KIEAgIcIKQGBAQBAAAArgcCBQCtBuN9swMCAR0=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with TLS 1.2
spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My Test Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My Test Cert
   i:CN=Issuer
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My Test Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1476 bytes and written 290 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Protocol: TLSv1.2
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-GCM-SHA384
    Session-ID: C108E226C24A8008BA5E8AE248D21C46A1E7E7AAD5407575D8200A0926865CF1
    Session-ID-ctx: 
    Master-Key: 76699832183FAF0A1AF9094CCC90981D0F8DCBC0038F377A2DB77DB5B25EF320DF8C59DB18F4DEB93AC6919D6322C6E1
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 04 41 6d dd 8e 36 94 34-84 f0 ba 0b 84 b5 60 c1   .Am..6.4......`.
    0010 - 40 71 21 a4 09 a3 b1 be-83 0e 1f 6a 92 01 64 30   @q!........j..d0
    0020 - 8d 9f 16 bd 55 dc 9a d9-fb 56 f8 41 50 1a 92 ec   ....U....V.AP...
    0030 - 15 ac b9 0b 5a 5b e3 3a-57 00 e0 a2 3d f8 63 f4   ....Z[.:W...=.c.
    0040 - 5a 9e db 7c c7 93 93 cc-bd ba 67 87 da 82 b1 90   Z..|......g.....
    0050 - 2e 40 02 5e 0a 90 6b 22-2e 3e 4c b2 68 5e ba a9   .@.^..k".>L.h^..
    0060 - 07 dd 34 29 ee 62 35 18-2f 15 87 93 3c bf 8b 0c   ..4).b5./...<...
    0070 - 6b c9 58 d8 99 6e 4a 49-c2 9e 4a 2d d6 f6 f1 71   k.X..nJI..J-...q
    0080 - 02 93 c4 81 bb 8b 8a e1-8b 0e f8 c8 26 18 08 7b   ............&..{
    0090 - c6 d2 6b 16 1f b1 3a 54-bc 65 af 94 f7 93 73 d9   ..k...:T.e....s.
    00a0 - cd 72 b0 33 cd b8 91 80-f6 92 32 03 ee d1 15 f8   .r.3......2.....

    Start Time: 1774263036
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: yes
---
 TLS SUCCESSFUL 
404C96ACFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MF8CAQECAgMDBALAMAQABDB2aZgyGD+vChr5CUzMkJgdD43LwAOPN3ott321sl7z
IN+MWdsY9N65OsaRnWMixuGhBgIEacEa/KIEAgIcIKQGBAQBAAAArQMCAQGzAwIB
HQ==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1
CIPHER is ECDHE-RSA-AES256-GCM-SHA384
Secure Renegotiation IS supported
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with explicit TLS 1.3
spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My Test Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My Test Cert
   i:CN=Issuer
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My Test Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1391 bytes and written 318 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 2048 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 44051B1DE2830920978C97C2EE685771000126C5730EF71D0FBAB9924612D1C8
    Session-ID-ctx: 
    Resumption PSK: ADC5644F873E6B30AD59144265554C762B0C837A5D5D1FF5C731C3415F3BF5888AC617E33AC0F9476704EFDB550F363C
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - a1 72 37 40 17 00 a3 ae-78 1a 05 31 05 e5 92 ea   .r7@....x..1....
    0010 - d1 10 ee 19 71 8f 18 c4-a1 a2 a1 51 fc 80 d2 c0   ....q......Q....
    0020 - 26 fe ea b6 c6 1c 11 d9-b8 b7 59 c6 51 49 a8 7b   &.........Y.QI.{
    0030 - 04 02 66 0a 89 ea 7b 52-69 15 ea 0e 16 c4 a4 ab   ..f...{Ri.......
    0040 - f2 70 55 df 56 78 8b bc-db 9f ad 71 ac 58 b2 20   .pU.Vx.....q.X. 
    0050 - e5 57 bf d2 93 29 c9 fa-53 04 1d b7 4e 56 3c d2   .W...)..S...NV<.
    0060 - 35 87 7d ba 3e 1c 39 bf-3c fa 0e d0 e4 fd e0 50   5.}.>.9.<......P
    0070 - cb 47 8e 84 4f 57 e2 06-9a 9a 40 b5 c8 1e b4 8e   .G..OW....@.....
    0080 - 0b e6 26 25 c8 b7 24 26-a4 19 08 6b b2 d0 1d 37   ..&%..$&...k...7
    0090 - f9 79 37 2e 93 f5 a9 29-62 34 a2 1e 33 f1 e3 5d   .y7....)b4..3..]
    00a0 - 7f d8 c8 02 34 dd fd b9-69 a3 1f 7d 74 5c 6c d9   ....4...i..}t\l.
    00b0 - e2 6c ab a2 de 0a 60 45-57 14 a2 4c 4a 79 a5 16   .l....`EW..LJy..
    00c0 - 6b c0 c1 f1 5b f4 e4 b6-9c c0 41 37 50 a1 c8 81   k...[.....A7P...

    Start Time: 1774263036
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: CFB943A875593D7173C451FD7ECA57F87EA67CDD003C007B42078418405C782A
    Session-ID-ctx: 
    Resumption PSK: 2C261AE7072B82B8A61A2EF36709EAC04A8B39C8679CD1C5E7D55C5E52F6903FD804E9C39ADB3B9841D56540CCD45D8E
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - a1 72 37 40 17 00 a3 ae-78 1a 05 31 05 e5 92 ea   .r7@....x..1....
    0010 - 2a 7a 9a 2a bf 64 4b 04-4f af 63 8f 9a 16 37 25   *z.*.dK.O.c...7%
    0020 - c4 da 14 45 ba 0d 0f f8-8b 6d 33 a4 78 d2 3c f8   ...E.....m3.x.<.
    0030 - b9 18 94 19 9f 49 f2 b3-eb 8c 1e 52 36 37 91 43   .....I.....R67.C
    0040 - bc 40 c7 c5 78 3e 41 71-14 b2 1d 32 15 4d 7f bc   .@..x>Aq...2.M..
    0050 - 89 3a ac ae 88 27 bc 00-04 ed 3f 82 3d f2 5d 46   .:...'....?.=.]F
    0060 - 50 1a 48 85 9e 3f f6 aa-cc 11 28 99 d5 34 5b 22   P.H..?....(..4["
    0070 - a1 e3 6e 50 80 54 9c 49-48 c0 62 e1 29 be fc 9b   ..nP.T.IH.b.)...
    0080 - 5f 45 7a fb 81 f4 c5 57-5e 85 f2 a0 56 57 4e ed   _Ez....W^...VWN.
    0090 - 6d 10 f9 64 eb 97 5c 6d-b4 39 68 17 33 32 9f d1   m..d..\m.9h.32..
    00a0 - e9 bb 2b 66 09 01 d4 66-64 24 0f 65 db de b0 54   ..+f...fd$.e...T
    00b0 - 1a c7 55 e6 22 e7 f4 d2-cc c8 54 c2 e9 04 80 36   ..U.".....T....6
    00c0 - 5f 15 de a7 f2 08 a6 10-e6 f4 15 66 89 f3 c8 a8   _..........f....

    Start Time: 1774263036
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
408C9DAFFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEIACh+5JbJdmfCLBNw628halb6ejdrZmtKL5KDb2C3av5
BDAsJhrnByuCuKYaLvNnCerASos5yGec0cXn1VxeUvaQP9gE6cOa2zuYQdVlQMzU
XY6hBgIEacEa/KIEAgIcIKQGBAQBAAAArgcCBQCNjfi6swMCAR0=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with TLS 1.2 (ECDSA)
spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My EC Cert
   i:CN=Issuer
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My EC Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1086 bytes and written 290 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384
Protocol: TLSv1.2
Server public key is 256 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-ECDSA-AES256-GCM-SHA384
    Session-ID: 6795FC7DC4A67DEA44D6D78254D681F580C2323D1A0D33E64CB4E2BA8F8687C8
    Session-ID-ctx: 
    Master-Key: ED86ACDD62283C92D03C65F87880AA211960CB397927D431DE97000D548D56BB38DD61CA45E9E7D826D345A2BC1E81B0
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 6d 04 fa 1f 2c 1f 8c 12-9c f4 a4 72 07 71 2e b5   m...,......r.q..
    0010 - 88 ef dc 09 72 f4 a9 c1-fe 20 20 f0 2d 95 31 e2   ....r....  .-.1.
    0020 - 8a 7b e5 23 1e bb 30 b5-94 b3 9d 7d 41 2e fe da   .{.#..0....}A...
    0030 - d6 62 a3 78 e7 01 67 3c-e9 ca c7 8f ad 85 41 f9   .b.x..g<......A.
    0040 - 46 56 ba 65 fa dd bb 3e-40 6e fb 86 9d b3 a2 01   FV.e...>@n......
    0050 - 8d 69 a8 30 ca 5a 47 36-15 12 bc 18 d3 75 4e cc   .i.0.ZG6.....uN.
    0060 - e9 1e 15 37 e5 63 2f e7-ee c2 f1 a5 8d cc 47 5d   ...7.c/.......G]
    0070 - 37 cb d8 69 be 60 17 ab-7d f9 67 f7 89 68 0b fd   7..i.`..}.g..h..
    0080 - 85 6c 0d a0 6b 5b 3f 8b-03 52 d1 6b 7f 56 f9 78   .l..k[?..R.k.V.x
    0090 - 5b 02 23 ec 02 14 65 16-83 d0 ab 06 56 b1 f3 71   [.#...e.....V..q
    00a0 - 88 10 f2 ec d9 02 bf 89-e4 14 64 26 c6 4c 4c e1   ..........d&.LL.

    Start Time: 1774263037
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: yes
---
 TLS SUCCESSFUL 
40FC7FB5FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MF8CAQECAgMDBALALAQABDDthqzdYig8ktA8Zfh4gKohGWDLOXkn1DHelwANVI1W
uzjdYcpF6efYJtNForwegbChBgIEacEa/KIEAgIcIKQGBAQBAAAArQMCAQGzAwIB
HQ==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1
CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384
Secure Renegotiation IS supported
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with TLS 1.2 and ECDH
spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My EC Cert
   i:CN=Issuer
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My EC Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: ECDH, prime256v1, 256 bits
---
SSL handshake has read 1119 bytes and written 263 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256
Protocol: TLSv1.2
Server public key is 256 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-ECDSA-AES128-GCM-SHA256
    Session-ID: F8071523DC9AF6F8DEC574953B62785C2F0F7612B04C7685B475941988C8C318
    Session-ID-ctx: 
    Master-Key: 058609D5F67B531E8E2ED45F0E3112FBF1CFC5C0A8E4195EF3A7FD87AAC7BC8BB05F3B1E3779C91B76A6FE94679700A0
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - eb 36 df 13 9a 1f 33 af-f5 61 9e cb 81 e2 3e c2   .6....3..a....>.
    0010 - 86 65 6e 30 00 6d c2 25-c1 c2 bd be 0f ab fc 3f   .en0.m.%.......?
    0020 - b0 55 62 18 87 ef cf 97-53 b1 71 8e b1 c0 0c a0   .Ub.....S.q.....
    0030 - fe 80 4b 7a 20 50 16 4b-27 6a 82 83 e7 56 d9 00   ..Kz P.K'j...V..
    0040 - f9 d5 17 f0 79 59 69 59-60 32 a3 1d aa 53 35 70   ....yYiY`2...S5p
    0050 - 99 2e a9 c5 03 45 3c 94-27 4f e7 db 3e be dd d3   .....E<.'O..>...
    0060 - a2 04 51 0c cb 17 9f 8c-b1 f3 28 89 39 6e 34 94   ..Q.......(.9n4.
    0070 - 30 7b a9 51 5a 7b e1 3b-b9 3c c1 d8 0c 7e a5 f0   0{.QZ{.;.<...~..
    0080 - 3e 8f 80 9c bc f4 85 de-79 c9 01 fe 6b fa 15 ef   >.......y...k...
    0090 - bf be c5 53 c5 25 17 bf-ea 15 b0 2a c7 52 20 9c   ...S.%.....*.R .
    00a0 - 29 a5 8b 89 15 d2 97 b5-c0 38 7d d2 d0 fb a5 d1   )........8}.....

    Start Time: 1774263037
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: yes
---
 TLS SUCCESSFUL 
404C1C82FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MF8CAQECAgMDBALAKwQABDAFhgnV9ntTHo4u1F8OMRL78c/FwKjkGV7zp/2Hqse8
i7BfOx43eckbdqb+lGeXAKChBgIEacEa/aIEAgIcIKQGBAQBAAAArQMCAQGzAwIB
Fw==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:ECDHE-ECDSA-AES128-GCM-SHA256
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2
Supported groups: secp256r1
Shared groups: secp256r1
CIPHER is ECDHE-ECDSA-AES128-GCM-SHA256
Secure Renegotiation IS supported
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with TLS 1.3 and specific suite
spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3 -ciphersuites TLS_AES_256_GCM_SHA384 -groups secp256r1
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My EC Cert
   i:CN=Issuer
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My EC Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: ECDH, prime256v1, 256 bits
---
SSL handshake has read 1059 bytes and written 329 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 256 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: E49F2525C1E58F20AE987044C4F5116F91B3EFD67A68611B4318B2D6A070AAF5
    Session-ID-ctx: 
    Resumption PSK: EA339FABECFBCBB92001F84C2545948B5A99EADA670A2FEC07CB46874458809BC761D9826D87D26EF997B853D42E9BF3
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 03 ac c2 e5 a2 9e 27 11-e5 f4 34 b9 98 df 08 d7   ......'...4.....
    0010 - 65 1c d8 c3 23 87 99 09-14 fc 58 f2 d5 53 5c cc   e...#.....X..S\.
    0020 - 5c eb fc 24 3f 07 60 01-7b 48 2b 4d 8f d1 ba d6   \..$?.`.{H+M....
    0030 - c3 ab 5c b8 06 89 17 10-a9 98 88 d6 46 3a eb e9   ..\.........F:..
    0040 - bf 31 a4 a9 7a 12 10 c8-c0 b9 e7 15 50 2a d3 97   .1..z.......P*..
    0050 - 3d de 11 8a 3a 7e 06 39-25 6f 44 44 15 5d 8c 8d   =...:~.9%oDD.]..
    0060 - db 65 31 75 ce f8 67 34-eb c5 9d c8 43 40 61 71   .e1u..g4....C@aq
    0070 - 48 3a f8 c8 60 1b 8f 09-70 79 02 05 52 49 ed 1d   H:..`...py..RI..
    0080 - 59 31 6d 3a 4d 15 c8 53-02 72 5c 6e 97 93 1d 3a   Y1m:M..S.r\n...:
    0090 - 11 19 03 88 0a f5 1f bc-64 a7 dc 66 4e 2f 95 3f   ........d..fN/.?
    00a0 - 7f 6f ab 0c 44 92 2d 8e-2f 30 78 82 d0 2f a8 dd   .o..D.-./0x../..
    00b0 - 59 c8 d5 32 26 69 86 e6-06 95 5c 29 0a 2f 88 cc   Y..2&i....\)./..
    00c0 - 04 82 80 c1 2b 5b a4 a4-18 de 43 1d 2b a8 a8 bb   ....+[....C.+...

    Start Time: 1774263037
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: EB1754D362744C0B1446CE32065C0D385486D424B487276849E5F8975F14A0D3
    Session-ID-ctx: 
    Resumption PSK: DE06016129FE281246F60B20A216E58B3A15259536BC1A3D46DF7CFCB9C472307077E28A6CEDA83C5FB15F77D1596FC0
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 03 ac c2 e5 a2 9e 27 11-e5 f4 34 b9 98 df 08 d7   ......'...4.....
    0010 - 97 1e 5f 00 65 b5 fd b2-b6 a4 c7 eb 6a ed 5b d8   .._.e.......j.[.
    0020 - 6a 7b 0c c3 6c 29 7e a8-a9 97 ea 57 81 fa 01 2e   j{..l)~....W....
    0030 - 84 e5 09 b9 f7 4d 9d 20-8b aa a8 ae df 17 0d a0   .....M. ........
    0040 - 52 89 99 82 53 e3 6d 2f-bd 37 9f 88 9d 47 40 e9   R...S.m/.7...G@.
    0050 - 88 27 b4 95 9d d8 e5 d5-25 df 82 99 ef 6b 17 72   .'......%....k.r
    0060 - 58 0e 62 56 50 59 f4 36-38 bc 48 42 35 dd 42 6e   X.bVPY.68.HB5.Bn
    0070 - 1d f2 b3 31 0b 81 ce ec-0e bf bf 08 46 5d ba 14   ...1........F]..
    0080 - ba 84 d6 e0 12 f3 cf b2-4a 81 cb 5e f3 09 42 5b   ........J..^..B[
    0090 - 15 c3 1f 04 8b a0 d2 48-e4 44 5b 86 94 5b d3 e3   .......H.D[..[..
    00a0 - 51 6a 24 27 08 26 75 9e-5f b0 5f 6c e5 1e 42 87   Qj$'.&u._._l..B.
    00b0 - 52 16 ef 26 18 10 ee 2d-ca 63 84 2b d7 d7 46 85   R..&...-.c.+..F.
    00c0 - 07 a4 8c ee 4b 13 be fa-1a f9 ec 69 e0 74 f2 0e   ....K......i.t..

    Start Time: 1774263037
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
40FCD09CFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEIBhzYBBbwTQDx73iRVoSlXgjKPIa9Gnnc0AsaSJcjf4y
BDDeBgFhKf4oEkb2CyCiFuWLOhUllTa8Gj1G33z8ucRyMHB34ops7ag8X7Ffd9FZ
b8ChBgIEacEa/aIEAgIcIKQGBAQBAAAArgcCBQDLD22ZswMCARc=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Supported groups: secp256r1
Shared groups: secp256r1
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

                                      ##
########################################

########################################
## Forcing the provider for all server operations


## Run sanity test with default values (RSA)
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My Test Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My Test Cert
   i:CN=Issuer
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My Test Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1391 bytes and written 391 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 2048 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: DA438A123C23CA20FB1BBAF09E78573181F758598D4280D66217AA648729AED6
    Session-ID-ctx: 
    Resumption PSK: 29C2F0627C05B00EECDEB95CBE18C6E04EE115EB74CEFE0576F8429BD187A8E22835C79462B2212C5696708FBC9E9686
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - d1 64 c4 69 10 da b1 02-b8 8c b1 05 d8 79 61 ab   .d.i.........ya.
    0010 - 70 73 bb fb 2d 69 05 b9-a1 b8 3e cb 35 d3 ff 08   ps..-i....>.5...
    0020 - 13 2e f5 12 f2 3e 6a 73-6d 17 37 e3 0d ff a1 31   .....>jsm.7....1
    0030 - c0 45 51 59 b4 71 06 c8-88 36 31 25 3f 55 a6 2e   .EQY.q...61%?U..
    0040 - 3c 05 1a 50 47 ba 59 54-72 25 ea 2a a7 b9 21 9d   <..PG.YTr%.*..!.
    0050 - 95 af 8e 9d 19 60 e1 2f-cd 99 07 f8 b5 ff ad 6c   .....`./.......l
    0060 - 98 40 76 0a 68 7c ac 54-4c 58 03 94 0c a5 0f 8e   .@v.h|.TLX......
    0070 - 20 5c 07 a1 dc e9 b8 56-09 e4 c8 62 ed ea 4c f5    \.....V...b..L.
    0080 - 3a cc 8a 87 f0 aa 7a 70-e8 15 a5 8f d9 de 96 e7   :.....zp........
    0090 - 4e 5a d3 6c ae 01 84 13-17 07 07 ce 9d 4d dc 95   NZ.l.........M..
    00a0 - 32 05 d0 8c 2d 05 6f 5a-81 0e 7a e8 9c 50 12 4c   2...-.oZ..z..P.L
    00b0 - 00 77 2f 97 06 59 d2 37-d9 8e 36 1d 1c b5 8a c9   .w/..Y.7..6.....
    00c0 - fa a0 1c 1e 0c 1e c4 1c-33 92 bf 04 7c 6f bd e7   ........3...|o..

    Start Time: 1774263037
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 6682E6B285F43BADAAC5CBDD1FE4D633DF7A4241793BAF8040B0E1D8226B14EE
    Session-ID-ctx: 
    Resumption PSK: 0864C9487E814AB730E51249AFD1795F9F77D6C6E73E5FEC06D9173624C700AE9B33B961F042064056886E8E00C0D0FB
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - d1 64 c4 69 10 da b1 02-b8 8c b1 05 d8 79 61 ab   .d.i.........ya.
    0010 - 4f 5a a8 68 42 75 45 1b-f1 9b 7b b4 6b c5 88 6d   OZ.hBuE...{.k..m
    0020 - af 4e be 22 7e dd 70 95-32 54 76 57 9e ce 14 45   .N."~.p.2TvW...E
    0030 - 39 b8 3e ae a3 27 fe 89-b2 ba 84 20 e1 8f 86 76   9.>..'..... ...v
    0040 - e4 0b b1 76 cb 61 97 be-1b b1 d9 fa 37 a1 ad 46   ...v.a......7..F
    0050 - ae 57 36 e8 88 4c e9 1d-24 db c4 47 b1 58 ec 75   .W6..L..$..G.X.u
    0060 - b1 45 d0 5b 52 f3 7b 9a-78 84 c7 96 6d 94 9d b2   .E.[R.{.x...m...
    0070 - 4e 9a 97 1c cd 2d 2a dc-4d a4 ba 4a e4 27 7e ac   N....-*.M..J.'~.
    0080 - 12 2a 0a 78 ef 45 e0 1b-56 be 07 3d d1 f1 f3 33   .*.x.E..V..=...3
    0090 - 43 93 72 b4 bb ce c4 39-cc 1d 99 14 e2 5b 39 09   C.r....9.....[9.
    00a0 - e2 30 4a 27 98 fe 5f e9-ae d4 8a b4 cd c8 d7 fb   .0J'.._.........
    00b0 - 4b 75 95 69 e0 41 94 15-0c ff e1 95 a5 3c 2a a3   Ku.i.A.......<*.
    00c0 - 6b 15 53 8b 72 37 3a 48-54 e7 d1 6e db 47 06 5d   k.S.r7:HT..n.G.]

    Start Time: 1774263037
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
40ECAA8BFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGCAgEBAgIDBAQCEwIEIFlVtdUYtyILF2/qXMAgzQHsze9oobSCK93eS4MwZQ0o
BDAIZMlIfoFKtzDlEkmv0Xlfn3fWxuc+X+wG2Rc2JMcArpszuWHwQgZAVohujgDA
0PuhBgIEacEa/aIEAgIcIKQGBAQBAAAArgYCBGZwYouzAwIBHQ==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with default values (RSA-PSS)

## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%10
 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT}


spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
verify error:num=18:self-signed certificate
verify return:1
depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
verify return:1
---
Certificate chain
 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
   i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
   a:PKEY: RSASSA-PSS, 2048 (bit); sigalg: RSASSA-PSS
   v:NotBefore: Mar 23 10:50:37 2026 GMT; NotAfter: Apr 22 10:50:37 2026 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1619 bytes and written 391 bytes
Verification error: self-signed certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 2048 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 18 (self-signed certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: E25F99E5B1AA0C72F2D8A189BD2EDC278F71A681E3E7AD428757FF54DA5D866C
    Session-ID-ctx: 
    Resumption PSK: 7809A922293842F0931FCD5EB1B478BC65C93395F9E07E0FD5F3581A0581D2A951EED8FB86213814C59D34AFEAD7EEFC
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 79 2d fc 0c 27 60 29 68-de 05 15 87 c2 ad 18 b2   y-..'`)h........
    0010 - ad 85 a0 66 26 fa 72 fd-8c f4 c7 28 37 81 08 53   ...f&.r....(7..S
    0020 - eb cb 4b 22 4e 6b 31 ee-1e 6a bb 15 55 11 b3 aa   ..K"Nk1..j..U...
    0030 - 5f 9a 09 da cd 7c f6 39-5a 83 e4 f5 1d 56 e7 56   _....|.9Z....V.V
    0040 - ba c1 1f 38 03 58 ca a5-1c 33 e1 5a a0 ea 21 9e   ...8.X...3.Z..!.
    0050 - 68 f1 54 25 6e d0 1a c5-e5 1e fa 99 26 95 2e 1e   h.T%n.......&...
    0060 - ee 72 28 8c 34 d5 09 a2-a8 cb 83 f8 5a 4b 03 44   .r(.4.......ZK.D
    0070 - d4 53 b4 31 87 d5 18 82-e8 e9 0b f0 b4 9c 17 36   .S.1...........6
    0080 - 4c 0c 25 2f 5f 67 92 5d-d7 64 a0 19 32 4b 64 0e   L.%/_g.].d..2Kd.
    0090 - 45 4c 13 24 33 23 58 bb-14 5c 2e 0d a8 66 b3 0e   EL.$3#X..\...f..
    00a0 - 66 35 11 a3 ee f1 2a 99-0c 0a 0c 30 c8 fc 50 1f   f5....*....0..P.
    00b0 - d9 5e ec 12 3e e5 27 3d-9d e5 6d 9d d1 e0 e9 74   .^..>.'=..m....t
    00c0 - c5 86 1f b5 b5 f2 5b b5-1c b4 ea 40 99 2c b6 73   ......[....@.,.s

    Start Time: 1774263038
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: FA178985B51790262B085F0BCEA1ECB5D55EE1B4F5D19B281B249C529C0EF6A1
    Session-ID-ctx: 
    Resumption PSK: E02FFE05656B3AA3F38E93612BAAE89D1DD7DE953AD8F203B83476EEC10E7001246F5274687E5DB1B8A14A45D62BFEBE
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 79 2d fc 0c 27 60 29 68-de 05 15 87 c2 ad 18 b2   y-..'`)h........
    0010 - 30 59 15 42 15 c7 5b cf-b6 27 08 e5 85 c5 7e ed   0Y.B..[..'....~.
    0020 - 03 35 22 bf 9b c1 b0 e9-bf 33 b7 dc 81 96 18 52   .5"......3.....R
    0030 - e1 b1 d8 b9 61 3a 03 1f-fb e6 5d aa 04 64 a8 ee   ....a:....]..d..
    0040 - b5 70 dd c2 58 cc 17 f6-ba 01 7e 98 19 e6 a1 11   .p..X.....~.....
    0050 - 90 af 14 22 07 96 80 d3-93 4a 99 cd 3d 08 28 3c   ...".....J..=.(<
    0060 - 50 aa 2e 83 02 40 79 e4-0d 3c ef 47 3b fd ea 11   P....@y..<.G;...
    0070 - 39 b2 b6 bf fe e9 f2 c8-87 06 7d f3 fb 47 51 10   9.........}..GQ.
    0080 - 58 17 49 fe 87 4d bd 1b-db af e4 b0 34 ed 3b 94   X.I..M......4.;.
    0090 - 85 28 f4 c4 4f 26 13 74-6c 13 de 84 cf d9 54 54   .(..O&.tl.....TT
    00a0 - 4f c0 d3 ec 44 bc 7d d1-e5 83 f5 74 09 e2 fd e1   O...D.}....t....
    00b0 - bb b9 5e 41 c8 18 07 8c-26 0b ac 0c fd 00 ad 87   ..^A....&.......
    00c0 - ae b0 8e f9 b8 4e a6 19-cb c7 80 56 8e e0 23 e2   .....N.....V..#.

    Start Time: 1774263038
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
404C258DFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-default.pem
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGCAgEBAgIDBAQCEwIEIJ/Ew2JDTZ2wI/ddTObFCjkVdauUMtpHJYIW0TGnD1/3
BDDgL/4FZWs6o/OOk2ErquidHdfelTrY8gO4NHbuwQ5wASRvUnRofl2xuKFKRdYr
/r6hBgIEacEa/qIEAgIcIKQGBAQBAAAArgYCBHFNBsezAwIBHQ==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with RSA-PSS and SHA256

## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11
 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT}


spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
verify error:num=18:self-signed certificate
verify return:1
depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
verify return:1
---
Certificate chain
 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
   i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
   a:PKEY: RSASSA-PSS, 3096 (bit); sigalg: RSASSA-PSS
   v:NotBefore: Mar 23 10:50:38 2026 GMT; NotAfter: Apr 22 10:50:38 2026 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 2011 bytes and written 391 bytes
Verification error: self-signed certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 3096 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 18 (self-signed certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 2CC47058F60B2A939415D513ACCAFD5328EEA53ECC6C0E2C9C1C245DBF979A5D
    Session-ID-ctx: 
    Resumption PSK: 9952E6B841CD1AC9547A777EDFCB479849808BC327C440F9FDB167142E9E19DB9F7E0A538B4CBFB20A1937765BDF7624
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 14 c1 7e da 19 2a a7 54-39 df 11 bb 33 b7 f2 6e   ..~..*.T9...3..n
    0010 - aa 16 5e 73 5f 52 3d f2-34 f7 e9 f7 a4 34 21 9a   ..^s_R=.4....4!.
    0020 - 91 3d 9d 3e 46 9f d3 84-30 3f 11 64 9a 83 b5 f8   .=.>F...0?.d....
    0030 - 09 b2 1f 8e ff 0f ec 2d-e5 fd 95 2c 19 b5 43 4f   .......-...,..CO
    0040 - 96 f5 96 fb 43 00 14 47-7a aa ee 84 2b 43 40 5e   ....C..Gz...+C@^
    0050 - ec 3b 1d de 36 02 f4 1c-70 4e f7 cf ee 21 45 01   .;..6...pN...!E.
    0060 - 26 3a 71 76 fc 0c 74 49-95 d8 15 96 75 8f 34 d5   &:qv..tI....u.4.
    0070 - 16 58 16 2e d2 53 88 ff-27 f5 e9 3e 46 2f 0e 78   .X...S..'..>F/.x
    0080 - 1d a7 66 23 fb 1a 2c 65-f1 a9 f6 06 bd 2c 31 32   ..f#..,e.....,12
    0090 - ab 80 31 1d e4 ad 56 99-fe f8 97 61 2f e7 f4 f6   ..1...V....a/...
    00a0 - bf 5d 14 b5 68 ff a8 f0-36 14 62 33 99 c0 36 7d   .]..h...6.b3..6}
    00b0 - d7 12 c1 aa b5 90 7a 89-44 b0 85 2b cf 56 a6 b5   ......z.D..+.V..
    00c0 - ca f5 59 7a 1e 21 01 79-47 04 67 e6 73 eb 68 fe   ..Yz.!.yG.g.s.h.

    Start Time: 1774263038
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: CE8BF73D7033CB2E09F5B87E4B8F212AFBAA2298B0C43EF674C57F40DC61DB80
    Session-ID-ctx: 
    Resumption PSK: EB6A338DB4E50918B54D52146EB07F1505DB18C80C39B8C221D6D50FA90EC75F3F0E09BA75972F077D8F3A9E7A7821BF
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 14 c1 7e da 19 2a a7 54-39 df 11 bb 33 b7 f2 6e   ..~..*.T9...3..n
    0010 - 9f 22 85 96 bc 13 be 72-a6 56 de 70 80 d7 07 8a   .".....r.V.p....
    0020 - 07 70 91 79 27 e6 40 ef-ba b2 68 03 0f 2e 0a ce   .p.y'.@...h.....
    0030 - 84 be 07 d5 d7 fa 4f 74-1a 06 a5 35 4e 66 1a da   ......Ot...5Nf..
    0040 - a0 11 28 4a 6e d5 75 46-4e 15 23 1b 46 6f 48 6d   ..(Jn.uFN.#.FoHm
    0050 - 25 d4 ca a3 d1 77 4b 33-06 31 7b 4f ae f6 1e 4c   %....wK3.1{O...L
    0060 - 2c 4a d0 db 4c 59 37 a0-99 b5 9c 98 be 1c d9 c1   ,J..LY7.........
    0070 - 81 74 39 87 c8 57 5e 5b-ab 3a 51 ef 05 84 4a 02   .t9..W^[.:Q...J.
    0080 - 57 27 54 30 fb 8f 0e 2c-1e fc b7 61 ff d4 17 03   W'T0...,...a....
    0090 - f3 22 11 a1 d4 dd 1b 7f-e9 c4 eb a3 c5 82 1c 39   .".............9
    00a0 - 92 e3 ed 6c ed db 55 b6-80 96 9b da 70 fc 18 09   ...l..U.....p...
    00b0 - 0a 81 d7 73 a2 27 db 1b-a6 b0 d8 f5 cb 3a a0 0b   ...s.'.......:..
    00c0 - 48 24 e5 fc 76 85 d4 23-60 24 14 98 50 d0 1a 0b   H$..v..#`$..P...

    Start Time: 1774263038
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
402CA79AFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-sha256.pem
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEIDEgA58RE4tMUSmVMscaWg3L45YVajhcDCVwSQb5tNpx
BDDrajONtOUJGLVNUhRusH8VBdsYyAw5uMIh1tUPqQ7HXz8OCbp1ly8HfY86nnp4
Ib+hBgIEacEa/qIEAgIcIKQGBAQBAAAArgcCBQCANni2swMCAR0=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with default values (ECDSA)
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify error:num=1:unspecified certificate verification error
verify return:1
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My EC Cert
   i:CN=Issuer
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My EC Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1000 bytes and written 391 bytes
Verification error: unspecified certificate verification error
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 256 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 1 (unspecified certificate verification error)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 12B567C24D053E6FAA946814D92FEB558BF1792D17D31C41C26F7324BB4F335B
    Session-ID-ctx: 
    Resumption PSK: C83DCAF5C6A914A56F4532E00DB103B8E21225DD440EA235F85C3EDA6E96FE42E0757A5C67B28CA572601CAF27B7300D
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - ba 3a a9 e9 2c dc 32 f9-26 a3 52 85 86 2e 9a 98   .:..,.2.&.R.....
    0010 - 79 0b cf 59 d0 07 56 01-4b cb ec bc 8f 8d a1 de   y..Y..V.K.......
    0020 - b3 38 07 b5 9d f3 69 02-e1 26 c3 68 04 fd 42 09   .8....i..&.h..B.
    0030 - 9a 83 f1 3e 9a bb 8b 2f-6b 8a b8 65 ba a6 1e ee   ...>.../k..e....
    0040 - 2f 5a ac e5 65 a6 f9 4e-14 79 0e 12 b8 5a ce 42   /Z..e..N.y...Z.B
    0050 - 17 3b 46 66 f8 c1 e8 ed-16 70 3c d4 4b 1f 82 7f   .;Ff.....p<.K...
    0060 - 30 0c 47 5a b3 ae 95 2e-e2 e7 a9 de 70 41 f3 b5   0.GZ........pA..
    0070 - 66 42 8c 66 06 57 58 72-3c 62 c8 eb 58 17 df 52   fB.f.WXr<b..X..R
    0080 - cc af 52 24 82 7c 9f 8f-80 ae 9a 48 95 dd 4d c2   ..R$.|.....H..M.
    0090 - 08 e2 b6 15 22 9a 57 93-ea 17 77 f1 d1 bf 98 c4   ....".W...w.....
    00a0 - e6 dd 9f a7 c3 64 65 a8-b9 a1 44 db 6d 1e 92 30   .....de...D.m..0
    00b0 - ad 51 b9 0e c3 a0 9c c9-a0 af 95 e9 20 a9 a1 12   .Q.......... ...
    00c0 - da ad 36 e7 97 26 e1 e2-4b f7 7c bd 1f 1b 8f 60   ..6..&..K.|....`

    Start Time: 1774263039
    Timeout   : 7200 (sec)
    Verify return code: 1 (unspecified certificate verification error)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: CC7604687E916828A3FE40D49DFDD0A182C290AA932DC15A2D8293CA44440E5A
    Session-ID-ctx: 
    Resumption PSK: B8C433C1F19C08696E41F45AC94CB29C599CA446EB44EEEE4B0DB466174AA03AE9506AF4209EBAD31FD77E3105B8EC6E
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - ba 3a a9 e9 2c dc 32 f9-26 a3 52 85 86 2e 9a 98   .:..,.2.&.R.....
    0010 - e7 16 ba 97 56 b6 fe 99-18 77 1c 92 5c 2a 2e 23   ....V....w..\*.#
    0020 - a4 f7 3b 95 9a ef c8 49-48 6e 65 df 6b 01 bb bd   ..;....IHne.k...
    0030 - 3b 74 3d 22 b2 2b 30 48-b8 e6 2b 49 30 1d b3 41   ;t=".+0H..+I0..A
    0040 - 2d cb aa ba e8 8c c1 16-01 78 32 16 f9 79 f8 e3   -........x2..y..
    0050 - c2 f3 f1 4f 8e 94 db 35-d4 7b b1 d3 5d 00 39 44   ...O...5.{..].9D
    0060 - ff e9 1e ce a8 8f 7d 7b-d7 bf 61 b2 08 5c cc 0f   ......}{..a..\..
    0070 - 6c 8c 6f f8 38 fa 86 3b-4f da 19 d0 a0 d1 fd a1   l.o.8..;O.......
    0080 - aa f7 ed 4b 49 99 4e 91-32 68 f4 6a 60 31 1a b9   ...KI.N.2h.j`1..
    0090 - b8 34 ea 5f 04 b3 5c ae-c6 97 c6 c4 04 6b aa fa   .4._..\......k..
    00a0 - f9 81 5c ef 6b 8a 07 0b-34 6f 4f 81 8b ff 05 7c   ..\.k...4oO....|
    00b0 - c5 eb 27 f0 4d a1 6f 4e-7d 05 f1 c6 b4 a0 5b 59   ..'.M.oN}.....[Y
    00c0 - fa 4e 3d 21 61 1d d4 a5-36 78 87 b2 55 83 dd 7a   .N=!a...6x..U..z

    Start Time: 1774263039
    Timeout   : 7200 (sec)
    Verify return code: 1 (unspecified certificate verification error)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
400CDA9BFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEIPOk5znmau1PxGD2Lg6uNZYlxzcTRNvgZpVgiiLY216c
BDC4xDPB8ZwIaW5B9FrJTLKcWZykRutE7u5LDbRmF0qgOulQavQgnrrTH9d+MQW4
7G6hBgIEacEa/6IEAgIcIKQGBAQBAAAArgcCBQCpAS4LswMCAR0=
-----END SSL SESSION PARAMETERS----- TLS SUCCESSFUL 
Q

Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with default values (Ed25519)
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My ED25519 Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My ED25519 Cert
   i:CN=Issuer
   a:PKEY: ED25519, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My ED25519 Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signature type: Ed25519
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 952 bytes and written 391 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 256 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 1173D2CC3850556C2C0432B39FB661D1612D160D81B2F693D1E98AA9C2D0AB9C
    Session-ID-ctx: 
    Resumption PSK: A4C1D1CA6EC04FE0591A9B11CC5EFF5933981A5221D37BC30150967EC68F2A55E684B62E216BB26B3C21469942DE8295
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 85 e2 b9 2c 61 33 c1 64-f4 13 83 ac 28 22 79 2f   ...,a3.d....("y/
    0010 - 51 a2 95 8f 73 1a e4 d6-95 5d c5 1e 08 ab d3 08   Q...s....]......
    0020 - ac 57 0b e2 78 bc 5b 20-d3 37 94 d2 c1 80 b5 20   .W..x.[ .7..... 
    0030 - f4 80 33 93 fe 79 2f 2b-a3 56 c7 5f 30 12 a9 df   ..3..y/+.V._0...
    0040 - af 81 c9 4c bf 5f 7c 94-69 e9 56 23 89 af 2a 0d   ...L._|.i.V#..*.
    0050 - 80 fb fe 0d 1e f8 93 0c-8e 9b e2 59 60 4a 77 c4   ...........Y`Jw.
    0060 - fa 21 38 79 87 8f a9 cc-b0 23 61 d4 54 e2 1d e4   .!8y.....#a.T...
    0070 - 63 65 de 56 3e b4 9b 46-7e cb a6 14 dd 4f bf 25   ce.V>..F~....O.%
    0080 - 30 44 4f 04 e6 60 ef a6-c6 26 36 b0 e4 6e b2 30   0DO..`...&6..n.0
    0090 - 04 5f 98 c0 30 b8 07 1c-0f ec 4c ab ab cd ce c8   ._..0.....L.....
    00a0 - 19 30 1c 14 a8 2d c7 dc-6d 74 13 0e 6e 73 0a 20   .0...-..mt..ns. 
    00b0 - 7d 3a f0 c6 eb fb ee 78-76 3c 90 a2 16 43 32 9f   }:.....xv<...C2.
    00c0 - 0e 88 c5 6b d4 70 0e 08-91 b2 26 cd 73 80 74 79   ...k.p....&.s.ty

    Start Time: 1774263039
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 4DFB9B9ACD79E0C63522840CC983999281AA6EFFCF707E37D9AC6247003EC68D
    Session-ID-ctx: 
    Resumption PSK: 916DE02132B5EA433AECCBDB552568C924D973799E11068930F67E37AC1C517C8AE01A16C2EDC694204A8500CA75546B
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 85 e2 b9 2c 61 33 c1 64-f4 13 83 ac 28 22 79 2f   ...,a3.d....("y/
    0010 - f0 84 da d5 1a 5c 25 da-41 12 56 8c 24 a3 a0 b0   .....\%.A.V.$...
    0020 - 1c 6e c5 ef e6 c9 47 01-cf bd 68 72 18 21 ec 38   .n....G...hr.!.8
    0030 - 44 df e2 98 9b f6 1c a3-ee a2 0d 2c c7 57 95 f6   D..........,.W..
    0040 - 61 e7 0f 38 52 92 d0 fa-71 81 b5 c6 84 eb db 45   a..8R...q......E
    0050 - f5 c0 d9 41 fd 55 75 5d-e4 72 27 f6 26 61 28 8e   ...A.Uu].r'.&a(.
    0060 - 7e 20 23 a7 2f 43 41 6e-93 bc c6 95 df 95 b4 30   ~ #./CAn.......0
    0070 - 2d 8b 7e 64 30 4f 59 32-6d 7d 38 fa 5d 37 cf 53   -.~d0OY2m}8.]7.S
    0080 - 8e 30 8f 3c 6a 3e 55 3f-c2 81 60 d2 3d c7 f2 ce   .0.<j>U?..`.=...
    0090 - ef 47 f2 ab 8e 06 f0 0f-c6 3f 5b 23 80 e5 1c 94   .G.......?[#....
    00a0 - cd e8 fc 23 c2 d0 54 21-37 e6 53 6b b6 5a 36 5a   ...#..T!7.Sk.Z6Z
    00b0 - 9a 09 9a a9 8c c0 16 1c-66 fc d7 95 f1 06 ae 39   ........f......9
    00c0 - b0 59 1f a2 ef f6 e4 db-0a c0 21 ed 36 2e 8e ab   .Y........!.6...

    Start Time: 1774263039
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
403C84A5FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGCAgEBAgIDBAQCEwIEICOqFb8r8iPH+qGuWxYjgBRgnoKkLU2TRU2VGiP6TQsR
BDCRbeAhMrXqQzrsy9tVJWjJJNlzeZ4RBokw9n43rBxRfIrgGhbC7caUIEqFAMp1
VGuhBgIEacEa/6IEAgIcIKQGBAQBAAAArgYCBHKcLoyzAwIBHQ==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run sanity test with default values (Ed448)
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My ED448 Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My ED448 Cert
   i:CN=Issuer
   a:PKEY: ED448, 456 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:04 2026 GMT; NotAfter: Mar 23 10:50:04 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My ED448 Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signature type: Ed448
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1025 bytes and written 391 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 456 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 82F8838EB59169C8AF769FD5473B3BFC180FC3E408256F7BDB16952EA9073148
    Session-ID-ctx: 
    Resumption PSK: 41473C5C32C854CB99386E8D37C7DDE36E6DFA35BF6CC4B501C08E2E9BFE1A3B08504B8658161CFB24A79AD6E94C81AF
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 6c 13 cd 28 e7 3c 6a 19-e9 94 26 70 a8 98 ec c8   l..(.<j...&p....
    0010 - 1a cd 06 bf ae 05 f3 47-d2 00 08 35 85 2e 81 40   .......G...5...@
    0020 - 86 89 8d 3b a3 77 74 cd-28 e6 1f 57 44 3a 5c a8   ...;.wt.(..WD:\.
    0030 - 15 25 af e6 30 8f 94 3e-6e 64 c7 f2 6c ce 0e e7   .%..0..>nd..l...
    0040 - 45 e7 0b 4b 52 03 99 88-71 be 0c b1 11 fe ac 65   E..KR...q......e
    0050 - 7f 99 60 d4 e5 44 ab 67-df 82 b8 22 26 30 07 c6   ..`..D.g..."&0..
    0060 - 73 59 8e b7 90 9c f5 7b-4a 2e 89 9b df 53 7c fe   sY.....{J....S|.
    0070 - 45 7b f6 95 e8 17 a5 62-94 b2 9b e3 69 ec 2d 86   E{.....b....i.-.
    0080 - 1e 2b cb 15 00 56 19 64-3a 40 cc 96 4c fe 95 5b   .+...V.d:@..L..[
    0090 - d1 df f5 f2 3d 72 11 fd-01 a7 ea 61 39 48 19 4a   ....=r.....a9H.J
    00a0 - b1 4c b4 28 9c a7 9d 00-1f 82 80 b1 21 f0 88 f8   .L.(........!...
    00b0 - a4 50 e9 79 55 ce 5f 2f-7c 90 b4 1c e6 d0 dc d5   .P.yU._/|.......
    00c0 - 59 bf 3f 3c ec c1 68 f4-a0 c9 9c 2f c6 8c 84 df   Y.?<..h..../....

    Start Time: 1774263039
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 77E791B6AFAB93E09EA364CD9DA2966D3482C5BE1BA668B54842770703F0FA76
    Session-ID-ctx: 
    Resumption PSK: 8A83F6E944A7B1541AB9ED9D31B09FD165FFAF953F6373D90AAA3EDFC3CCE6FA07D3B961FD00793105981E768E2F0BAC
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 6c 13 cd 28 e7 3c 6a 19-e9 94 26 70 a8 98 ec c8   l..(.<j...&p....
    0010 - b5 7e e3 59 6c 4b fc 98-c0 72 15 8e a9 40 81 8b   .~.YlK...r...@..
    0020 - 19 13 09 80 90 d9 42 27-63 57 f3 bc 3e c8 10 04   ......B'cW..>...
    0030 - 6b 1a 8b 85 8b e5 a3 4e-9a 65 03 a2 46 a5 af a6   k......N.e..F...
    0040 - 74 17 13 b4 bb 13 39 4d-11 c6 c6 89 84 d6 c6 e1   t.....9M........
    0050 - 9a c4 2a b3 1c 64 ae 3b-33 22 64 3a a1 7b be 97   ..*..d.;3"d:.{..
    0060 - fa 45 8d d9 26 0c 83 5c-ef 83 58 0c 58 4f 6f 1d   .E..&..\..X.XOo.
    0070 - 16 93 4b ec bb 4f e3 11-e5 5b d9 22 e7 5b 9c 2a   ..K..O...[.".[.*
    0080 - e6 a2 90 5e 80 54 14 cf-64 19 c7 5f 9b 7f b4 13   ...^.T..d.._....
    0090 - 34 ae 04 31 d2 b9 be 61-4c 08 dd ed 50 b3 e6 a0   4..1...aL...P...
    00a0 - bb 4b 9c f9 d0 c0 cd 20-f1 cc 83 66 48 85 bf cf   .K..... ...fH...
    00b0 - 55 94 6a 48 19 a4 05 05-9a 95 c3 5a 39 ca 80 f4   U.jH.......Z9...
    00c0 - 17 47 2d b7 e6 fa 70 60-71 07 19 56 53 cd d6 24   .G-...p`q..VS..$

    Start Time: 1774263039
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
405C4D9AFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%09 -cert pkcs11:type=cert;object=ed2Cert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEIJfts4G5NB+L5uVMNAEFnZd4qSCnx9T+BnT0aZfVhP+9
BDCKg/bpRKexVBq57Z0xsJ/RZf+vlT9jc9kKqj7fw8zm+gfTuWH9AHkxBZgedo4v
C6yhBgIEacEa/6IEAgIcIKQGBAQBAAAArgcCBQDVXb3GswMCAR0=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with TLS 1.2
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My Test Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My Test Cert
   i:CN=Issuer
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My Test Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1476 bytes and written 290 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Protocol: TLSv1.2
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-GCM-SHA384
    Session-ID: 71D107B339F7F9E08CF4B90E7130CC2475D37B7E99AB500BC8D10123B38BF486
    Session-ID-ctx: 
    Master-Key: 5C379C60CB8927AC1C3B9DFD18BA729A425690A57591C24608A8BF265837E8096BEB1788C9D90DECD21B90B39B89356B
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 42 e5 87 d9 85 6c 6c 7d-7a 10 f5 1b 44 6e 89 f3   B....ll}z...Dn..
    0010 - 19 78 cf 0f bf a9 67 a8-19 e8 05 6a 4f 81 1d c5   .x....g....jO...
    0020 - 75 db 90 9b 7a 76 43 74-ae a2 6a 4c 3e ef 7e 2c   u...zvCt..jL>.~,
    0030 - 78 44 00 e6 d9 0c 7f 0e-f8 97 8e 67 8f 72 92 8b   xD.........g.r..
    0040 - bd 8b 67 08 7b 67 24 e3-ac ec 72 08 03 53 91 9d   ..g.{g$...r..S..
    0050 - 31 bb 0f 47 28 bd 7a 98-32 68 03 d2 22 ef 76 d2   1..G(.z.2h..".v.
    0060 - 16 99 53 56 86 10 70 8d-f1 9b 49 0d 31 4f 57 ff   ..SV..p...I.1OW.
    0070 - 4f 1d cd e6 ae e5 a4 ed-3c c1 f0 d8 b4 3e 17 dc   O.......<....>..
    0080 - 5b 1c e6 6a 2d 21 20 c9-dc 44 73 d1 23 b7 57 b1   [..j-! ..Ds.#.W.
    0090 - 27 a3 10 78 ca 76 32 63-06 a2 5d 9f 35 23 ba a2   '..x.v2c..].5#..
    00a0 - 67 b3 9b d6 c0 f5 28 4f-6d 0d e5 a9 f7 55 66 85   g.....(Om....Uf.

    Start Time: 1774263039
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: yes
---
 TLS SUCCESSFUL 
403C6299FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MF8CAQECAgMDBALAMAQABDBcN5xgy4knrBw7nf0YunKaQlaQpXWRwkYIqL8mWDfo
CWvrF4jJ2Q3s0huQs5uJNWuhBgIEacEa/6IEAgIcIKQGBAQBAAAArQMCAQGzAwIB
HQ==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1
CIPHER is ECDHE-RSA-AES256-GCM-SHA384
Secure Renegotiation IS supported
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with explicit TLS 1.3
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My Test Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My Test Cert
   i:CN=Issuer
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My Test Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1391 bytes and written 318 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 2048 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 22F4FB1FF2F2FB73B0C0E2D56D006DD9F010696E151005DF3502449F48987D31
    Session-ID-ctx: 
    Resumption PSK: D7E2D77AF7A2FE1BBCCAB4A8FF3DA667F5BE3EB5C46CC1FA0CF72B44AD057420234E6F08B1EBFA977D9CE3197EA9065D
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 67 65 ac f3 59 46 1e 29-0f 82 e5 65 14 fa a6 58   ge..YF.)...e...X
    0010 - 1d b2 82 79 cb 4b a8 eb-29 e2 91 5a c2 0f 19 78   ...y.K..)..Z...x
    0020 - d3 ef 40 f2 6e fe 37 c3-53 8d 15 88 93 14 60 21   ..@.n.7.S.....`!
    0030 - 43 38 59 73 5b 17 e3 83-eb b7 09 bc 6c c4 96 da   C8Ys[.......l...
    0040 - 33 b5 53 55 0d d2 55 91-7f 71 95 ab 56 27 c4 1f   3.SU..U..q..V'..
    0050 - cd 6e a5 47 82 0b f9 f5-be bb e6 12 44 b6 85 98   .n.G........D...
    0060 - de 9c bd 7f cb 80 6a 7c-c1 1c a5 18 83 aa ce 6f   ......j|.......o
    0070 - 10 a2 a6 2e 96 4a d3 0f-8d 9e 36 49 dd 7b 80 05   .....J....6I.{..
    0080 - 7a 76 ae 0e a6 16 a2 df-7c 4d 79 d9 d1 2d 96 ca   zv......|My..-..
    0090 - 2c 88 8d 67 07 41 3a 3e-01 99 af b0 e2 85 ae e8   ,..g.A:>........
    00a0 - 1f 1a ca 3f 9b d8 66 4c-a7 50 47 89 37 46 32 54   ...?..fL.PG.7F2T
    00b0 - aa 6d 7d cb 92 64 9c 4d-f3 0a 84 32 fd a3 fd cb   .m}..d.M...2....
    00c0 - 9a 4b f0 b5 52 2f 2e 1b-8d c4 84 b8 57 64 4a 57   .K..R/......WdJW

    Start Time: 1774263040
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 0545DEA2C06FB44667D86B1B29EA5DC5061A457666BEAB09E29FBFE9F3F5BEBE
    Session-ID-ctx: 
    Resumption PSK: 378A0213CA3C3D29896F74CF9288B1685D9DD872AD7039FEC21AFB44298B891DA89CCE40C54FA93278D51EEDC07C7ED7
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 67 65 ac f3 59 46 1e 29-0f 82 e5 65 14 fa a6 58   ge..YF.)...e...X
    0010 - 95 83 1f 72 b1 8c e1 27-19 90 8f e3 d6 fe f3 ab   ...r...'........
    0020 - fb 24 d0 e5 c1 b2 13 0c-85 14 dc ed 98 2e 66 18   .$............f.
    0030 - b2 bf f6 59 cc 6e 9c b0-63 7f 3d 05 b0 3b 72 e1   ...Y.n..c.=..;r.
    0040 - be 87 99 52 d6 0b d4 42-a6 44 ed 9f 73 4b 87 80   ...R...B.D..sK..
    0050 - 55 f4 96 de ad 9e 18 88-d5 fc 3b 5a 2f 21 e0 f2   U.........;Z/!..
    0060 - 21 ab ff 4f 31 8b 5f 73-df c8 7f 5c 60 00 e6 f7   !..O1._s...\`...
    0070 - 12 93 e6 21 cc 8e 94 c1-6f 28 a7 4f a3 f6 5a 75   ...!....o(.O..Zu
    0080 - 6b 8c f8 a1 b6 da 57 4c-c3 b2 60 bd 39 96 57 4a   k.....WL..`.9.WJ
    0090 - 12 e3 f8 4c 3c ff 03 38-26 0c c2 0a 8b 92 bc e4   ...L<..8&.......
    00a0 - d1 4b 0d 3e 3c 1f c5 3c-7e 6e 8e de 7f c3 3e 15   .K.><..<~n....>.
    00b0 - 2d 56 24 a7 97 3d 7a 2e-ef f5 09 38 65 60 22 79   -V$..=z....8e`"y
    00c0 - fb 08 a5 d8 be 22 4a 03-e3 5a dd 1d a0 36 17 75   ....."J..Z...6.u

    Start Time: 1774263040
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
40DC0895FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGCAgEBAgIDBAQCEwIEIEUQ+He5xFGwLfXXj3kSQAaeJBA7Gv7IYSGN9z2JeXZP
BDA3igITyjw9KYlvdM+SiLFoXZ3Ycq1wOf7CGvtEKYuJHaiczkDFT6kyeNUe7cB8
ftehBgIEacEbAKIEAgIcIKQGBAQBAAAArgYCBAmVvw6zAwIBHQ==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with TLS 1.2 (ECDSA)
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify error:num=1:unspecified certificate verification error
verify return:1
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My EC Cert
   i:CN=Issuer
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1
ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q
S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB
BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5
tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw
ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC
B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj
BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg
OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P
WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK
4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS
fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z
k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB
hS/cPUmv
-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My EC Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 1086 bytes and written 290 bytes
Verification error: unspecified certificate verification error
---
New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384
Protocol: TLSv1.2
Server public key is 256 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-ECDSA-AES256-GCM-SHA384
    Session-ID: 22E4FF1EE68AEC9D05149883B5F81FF604ADDD608E586BE741E7B46B37BADE34
    Session-ID-ctx: 
    Master-Key: 65489DF714466A50D52D9695BE5BDFCC8A31441F71238C12C3A45C5C5235DDD8FFF95C4D7D9627A4197DA356D92B1C62
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - b3 1a e1 9d a8 d1 7a cd-7e fb 28 da 59 a3 e2 76   ......z.~.(.Y..v
    0010 - e1 3d 23 04 73 6b 06 cd-8c cd d1 8d b9 59 a1 47   .=#.sk.......Y.G
    0020 - 9f 6b be 22 c5 87 4e 3b-48 a2 7e 23 44 e7 7a 42   .k."..N;H.~#D.zB
    0030 - c0 aa 12 38 1d e8 6b 26-b4 59 df b5 0e d2 00 29   ...8..k&.Y.....)
    0040 - c5 1c 09 4b 04 88 be 1a-0f eb 65 5f 3f 45 97 2c   ...K......e_?E.,
    0050 - bd 51 00 ae 9f 7a 53 5d-21 ae 4a a8 e2 6b 21 0d   .Q...zS]!.J..k!.
    0060 - eb 36 1f 76 60 72 ff 2f-bd d1 e8 b4 95 d3 be 5a   .6.v`r./.......Z
    0070 - a2 1c da 27 c0 d2 31 f3-80 25 36 6e 58 6e 9f f3   ...'..1..%6nXn..
    0080 - cb e3 e2 f4 70 fe 43 8d-37 4b 4f c4 85 c2 39 95   ....p.C.7KO...9.
    0090 - 51 87 c9 bb 84 6d e9 ec-73 ec 96 49 e8 e5 77 76   Q....m..s..I..wv
    00a0 - 88 33 e7 30 ef 7a 0f 62-24 b6 3a 21 8a 71 2d 58   .3.0.z.b$.:!.q-X

    Start Time: 1774263040
    Timeout   : 7200 (sec)
    Verify return code: 1 (unspecified certificate verification error)
    Extended master secret: yes
---
 TLS SUCCESSFUL 
408C0399FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MF8CAQECAgMDBALALAQABDBlSJ33FEZqUNUtlpW+W9/MijFEH3EjjBLDpFxcUjXd
2P/5XE19liekGX2jVtkrHGKhBgIEacEbAKIEAgIcIKQGBAQBAAAArQMCAQGzAwIB
HQ==
-----END SSL SESSION PARAMETERS-----
Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2
Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1
Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1
CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384
Secure Renegotiation IS supported
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with TLS 1.2 and ECDH
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify error:num=1:unspecified certificate verification error
verify return:1
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My EC Cert
   i:CN=Issuer
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My EC Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: ECDH, prime256v1, 256 bits
---
SSL handshake has read 1119 bytes and written 263 bytes
Verification error: unspecified certificate verification error
---
New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256
Protocol: TLSv1.2
Server public key is 256 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-ECDSA-AES128-GCM-SHA256
    Session-ID: C2AFD7E7F6A5EF833E70A0DDE6C9FB4E8BDEB8AE2A90E6ACC8AB2421E1AD8B03
    Session-ID-ctx: 
    Master-Key: B4627B6B574C5D32407E229315D39B0C14A574EB61B3F68D027335BC89F19D7698CBBEC55F975527770E18BA17123427
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 8d 64 e0 a3 47 43 92 a9-0c c7 81 81 c8 6c 94 72   .d..GC.......l.r
    0010 - ec 8e 24 29 1e f4 cc ef-59 4e 79 b7 d9 44 d9 9a   ..$)....YNy..D..
    0020 - 1c 09 6a 76 29 57 d4 5d-06 b4 b0 ee 43 f4 c0 84   ..jv)W.]....C...
    0030 - 5b bc ac 48 3b cb 86 00-ec c4 76 e7 d9 21 94 4f   [..H;.....v..!.O
    0040 - 96 6f ce 52 5f 28 0b 2a-e8 c9 c9 7d 21 7a ff aa   .o.R_(.*...}!z..
    0050 - 30 7a 71 20 f6 fe 19 d5-0d 97 b3 9a ab 0d 8f b5   0zq ............
    0060 - a2 cb 3e a7 5f 89 ee db-99 6e e8 0c 59 cf 1f b9   ..>._....n..Y...
    0070 - 5b 3d b3 20 e5 e4 b0 74-5a cc 2b 27 48 76 1a d2   [=. ...tZ.+'Hv..
    0080 - e4 95 4a d1 1a bc f5 31-bf c2 89 a0 6a 73 1d 08   ..J....1....js..
    0090 - 99 b0 e3 7c 40 ad 97 3d-12 dc 1f 92 b4 bb 64 9b   ...|@..=......d.
    00a0 - cc f3 24 04 37 a5 a0 11-ed 0a 29 99 9c 64 2e 54   ..$.7.....)..d.T

    Start Time: 1774263040
    Timeout   : 7200 (sec)
    Verify return code: 1 (unspecified certificate verification error)
    Extended master secret: yes
---
 TLS SUCCESSFUL 
408CBDB4FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MF8CAQECAgMDBALAKwQABDC0YntrV0xdMkB+IpMV05sMFKV062Gz9o0CczW8ifGd
dpjLvsVfl1Undw4YuhcSNCehBgIEacEbAKIEAgIcIKQGBAQBAAAArQMCAQGzAwIB
Fw==
-----END SSL SESSION PARAMETERS----- TLS SUCCESSFUL 
Q

Shared ciphers:ECDHE-ECDSA-AES128-GCM-SHA256
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2
Supported groups: secp256r1
Shared groups: secp256r1
CIPHER is ECDHE-ECDSA-AES128-GCM-SHA256
Secure Renegotiation IS supported
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

## Run test with TLS 1.3 and specific suite
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3 -ciphersuites TLS_AES_256_GCM_SHA384 -groups secp256r1
Connecting to 127.0.0.1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify error:num=1:unspecified certificate verification error
verify return:1
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify return:1
---
Certificate chain
 0 s:O=PKCS11 Provider, CN=My EC Cert
   i:CN=Issuer
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1
ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q
S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB
BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5
tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw
ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC
B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj
BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg
OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P
WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK
4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS
fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z
k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB
hS/cPUmv
-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My EC Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: ECDH, ?, 0 bits
---
SSL handshake has read 1061 bytes and written 329 bytes
Verification error: unspecified certificate verification error
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 256 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 1 (unspecified certificate verification error)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 6C356840B44AF27F3D00CE806275538D3A478315097EEB52F404B2E6F3690CA9
    Session-ID-ctx: 
    Resumption PSK: 39D1AAA74695DAEABE06440800F038CA0ED4C53C41C55A6B3963B1D24AC2FB0B50AB89398F046CE78B7DE63754D90870
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 2f e2 8b af e4 a5 c6 ec-fa f2 fa 20 d3 5d 71 ee   /.......... .]q.
    0010 - 1c d7 22 8c 54 a8 cd c7-49 4f a4 b5 1b 91 bd 2d   ..".T...IO.....-
    0020 - d3 87 6d d9 42 ba 0a 96-58 47 51 be 1a 35 8b 38   ..m.B...XGQ..5.8
    0030 - b2 40 31 f5 14 08 50 ff-4b ba 07 5c 25 2e 85 07   .@1...P.K..\%...
    0040 - 2c ef e1 cf 95 36 49 96-da d6 07 b9 3e 16 47 dc   ,....6I.....>.G.
    0050 - dc 58 bd e2 ef cd c4 6d-8f 6e 20 60 ff 5f 09 75   .X.....m.n `._.u
    0060 - 06 09 ca 63 c7 f0 5c 11-69 28 7b 6d ba d9 92 12   ...c..\.i({m....
    0070 - 8e f8 de 59 27 00 b5 81-21 38 5f 90 80 37 cd 1d   ...Y'...!8_..7..
    0080 - 3f 52 e7 ea f3 3a 3b 8a-a8 53 bf 6a f7 ed 44 e3   ?R...:;..S.j..D.
    0090 - 22 77 0f e3 3e a9 6b 72-b4 5c 53 72 c5 a5 0d 96   "w..>.kr.\Sr....
    00a0 - e8 11 d5 75 2a 71 28 87-7e 0f c9 27 8e d6 4c a1   ...u*q(.~..'..L.
    00b0 - d1 35 fb 8f c6 f7 ec 8a-95 92 2c 85 0c f4 d4 e5   .5........,.....
    00c0 - 20 15 1a 94 9d fb 4f fe-bc f8 11 70 99 8c 6e b7    .....O....p..n.

    Start Time: 1774263040
    Timeout   : 7200 (sec)
    Verify return code: 1 (unspecified certificate verification error)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
    Session-ID: 69ED2CA38EB7FEA598B96F28B8B1C85FE0BD58ED7A594D5E273E600C8B4F5E37
    Session-ID-ctx: 
    Resumption PSK: DC7215F214184D1337071A28581E84D804A42957C6C8D9D094AFD9ABA88140BD454DBCE72A70062F167326BD9C428468
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 2f e2 8b af e4 a5 c6 ec-fa f2 fa 20 d3 5d 71 ee   /.......... .]q.
    0010 - c2 f1 bb 0f e4 76 a8 55-ec 43 49 39 e5 9f 72 a5   .....v.U.CI9..r.
    0020 - 9a d9 e8 de 8c 00 74 5d-0d 5b fb ed 48 b1 63 61   ......t].[..H.ca
    0030 - 51 76 d6 c1 b1 d3 7c 7a-99 51 9b 44 d6 2e f7 df   Qv....|z.Q.D....
    0040 - 1a 65 a9 1c 2e 43 5e ba-94 cc 6b ac 08 a3 4f 1a   .e...C^...k...O.
    0050 - d8 e5 b0 e5 25 76 c1 1a-4a 89 92 1c 33 04 ad b0   ....%v..J...3...
    0060 - 96 01 da 05 a1 9f 4d c6-d5 ea 4d 6d 16 23 34 a5   ......M...Mm.#4.
    0070 - 0f fe 67 c1 72 a4 99 88-3a 30 0c 42 ad e7 22 a3   ..g.r...:0.B..".
    0080 - b3 bf cc 42 86 34 06 9b-2f 05 97 03 75 fa 7b b9   ...B.4../...u.{.
    0090 - 71 18 89 04 01 57 0b c2-3f d9 ea ba 56 2f f6 d9   q....W..?...V/..
    00a0 - 1f ee a0 32 77 6c 3a 0e-77 15 53 71 74 d0 4e 99   ...2wl:.w.Sqt.N.
    00b0 - 78 f4 8e 76 26 5e d6 88-a8 a7 0d c8 46 b7 e7 35   x..v&^......F..5
    00c0 - 8a 00 09 1d 46 97 3a 93-4b d6 8b 2b d8 3f 3e 50   ....F.:.K..+.?>P

    Start Time: 1774263040
    Timeout   : 7200 (sec)
    Verify return code: 1 (unspecified certificate verification error)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK
 TLS SUCCESSFUL 
404C8C9EFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEIOs1eFRVvxmirJV2PkkrLdogJJk4mZObC1sQQVHkgfpr
BDDcchXyFBhNEzcHGihYHoTYBKQpV8bI2dCUr9mrqIFAvUVNvOcqcAYvFnMmvZxC
hGihBgIEacEbAKIEAgIcIKQGBAQBAAAArgcCBQCSf8AVswMCARc=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Supported groups: secp256r1
Shared groups: secp256r1
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)

                                      ##
########################################

Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS-----
MIGDAgEBAgIDBAQCEwIEIOs1eFRVvxmirJV2PkkrLdogJJk4mZObC1sQQVHkgfpr
BDDcchXyFBhNEzcHGihYHoTYBKQpV8bI2dCUr9mrqIFAvUVNvOcqcAYvFnMmvZxC
hGihBgIEacEbAKIEAgIcIKQGBAQBAAAArgcCBQCSf8AVswMCARc=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384
Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512
Supported groups: secp256r1
Shared groups: secp256r1
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
 TLS SUCCESSFUL 
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
   1 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
   1 server accepts that finished
   0 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (128 allowed)
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
75/92 pkcs11-provider:softhsm / tls            OK              7.03s

76/92 pkcs11-provider:kryoptic / tls           RUNNING       
>>> MALLOC_PERTURB_=219 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
76/92 pkcs11-provider:kryoptic / tls           SKIP            0.07s   exit status 77

77/92 pkcs11-provider:kryoptic.nss / tls       RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=224 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
77/92 pkcs11-provider:kryoptic.nss / tls       SKIP            0.06s   exit status 77

78/92 pkcs11-provider:softokn / tlsfuzzer      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=143 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
78/92 pkcs11-provider:softokn / tlsfuzzer      SKIP            0.06s   exit status 77

79/92 pkcs11-provider:softhsm / tlsfuzzer      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=192 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttlsfuzzer
TLS fuzzer is not available -- skipping
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
79/92 pkcs11-provider:softhsm / tlsfuzzer      SKIP            0.10s   exit status 77

80/92 pkcs11-provider:kryoptic / tlsfuzzer     RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=226 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
80/92 pkcs11-provider:kryoptic / tlsfuzzer     SKIP            0.04s   exit status 77

81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=245 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer SKIP            0.05s   exit status 77

82/92 pkcs11-provider:softokn / uri            RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=181 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
82/92 pkcs11-provider:softokn / uri            SKIP            0.03s   exit status 77

83/92 pkcs11-provider:softhsm / uri            RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=45 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/turi

## Check that storeutl returns URIs
 openssl storeutl -text pkcs11:

## Check returned URIs work to find objects
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%00;object=caCert;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%B3%1B%1B%85%69%9C%67%CD%A7%01%48%57%5A%C3%85%10;object=Test-RSA-gen-b31b1b85;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%06;object=ecCert2;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%85%53%D1%39%73%B5%6E%11%2A%9C%2F%75%91%B9%1D%40;object=Fork-Test;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%04;object=edCert;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%05;object=testCert2;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%32%75%BC%A9%80%84%20%48%D6%1B%59%18%D9%13%B8%76;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%10;object=testRsaPssCert;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%02;object=ecCert;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%11;object=testRsaPss2Cert;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%5D%BB%35%17%23%FE%43%55%DF%41%AF%9F%31%4C%9A%4D;object=Test-Ed-gen-5dbb3517;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%08;object=ecCert3;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%27%83%D1%AF%3E%C9%92%E4%01%53%AB%85%93%34%40%1A;object=Test-RSA-Key-Usage-2783d1af;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%F3%A2%7E%69%A6%B1%28%34%66%85%A7%0F%45%B9%B7%7F;object=Test-RSA-PSS-gen-f3a27e69;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%09;object=ed2Cert;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%03;object=ecPeerCert;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%C6%BE%42%BE%66%5B%C8%6C%C1%B4%42%06%1F%66%42%16;object=Pkey%20sigver%20Test;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%E4%2B%A5%F6%CF%3C%B2%AE%BF%30%0A%22%7A%0C%56%18;object=Test-EC-gen-e42ba5f6;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%3F%8F%12%71%62%C8%28%92%D3%DE%77%44%3A%1B%88%C8;object=Test-Ed-gen-3f8f1271;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%5F%60%C7%EE%C1%F6%85%5C%05%B5%A8%94%D0%35%10%0F;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%01;object=testCert;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%A2%99%74%19%11%CD%A7%B2%B6%08%55%06%47%DB%1F%DD;type=private
 openssl storeutl -text "$uri"
$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%32%73%CC%E5%3F%B3%BB%0A%1D%52%D2%70%FB%BB%82%96;type=private
 openssl storeutl -text "$uri"

## Check each URI component is tested
$cmp=pkcs11:model=SoftHSM%20v2
 openssl storeutl -text "pkcs11:${cmp}"
$cmp=manufacturer=SoftHSM%20project
 openssl storeutl -text "pkcs11:${cmp}"
$cmp=serial=0cc21e7e2259846e
 openssl storeutl -text "pkcs11:${cmp}"
$cmp=token=SoftHSM%20Token
 openssl storeutl -text "pkcs11:${cmp}"
$cmp=id=%00%00
 openssl storeutl -text "pkcs11:${cmp}"
$cmp=object=caCert
 openssl storeutl -text "pkcs11:${cmp}"
$cmp=type=private
 openssl storeutl -text "pkcs11:${cmp}"
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
83/92 pkcs11-provider:softhsm / uri            OK              3.42s

84/92 pkcs11-provider:kryoptic / uri           RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=141 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
84/92 pkcs11-provider:kryoptic / uri           SKIP            0.06s   exit status 77

85/92 pkcs11-provider:kryoptic.nss / uri       RUNNING       
>>> MALLOC_PERTURB_=34 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
85/92 pkcs11-provider:kryoptic.nss / uri       SKIP            0.06s   exit status 77

86/92 pkcs11-provider:softhsm / ecxc           RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=232 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-softhsm.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecxc
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
86/92 pkcs11-provider:softhsm / ecxc           SKIP            0.08s   exit status 77

87/92 pkcs11-provider:kryoptic / ecxc          RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=52 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
87/92 pkcs11-provider:kryoptic / ecxc          SKIP            0.06s   exit status 77

88/92 pkcs11-provider:kryoptic.nss / ecxc      RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=166 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
88/92 pkcs11-provider:kryoptic.nss / ecxc      SKIP            0.05s   exit status 77

89/92 pkcs11-provider:softokn / cms            RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=248 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-softokn.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
89/92 pkcs11-provider:softokn / cms            SKIP            0.06s   exit status 77

90/92 pkcs11-provider:kryoptic / cms           RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=180 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
90/92 pkcs11-provider:kryoptic / cms           SKIP            0.06s   exit status 77

91/92 pkcs11-provider:kryoptic.nss / cms       RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=30 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.nss.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
91/92 pkcs11-provider:kryoptic.nss / cms       SKIP            0.05s   exit status 77

92/92 pkcs11-provider:kryoptic / pinlock       RUNNING       
>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=77 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pinlock-kryoptic.t
――――――――――――――――――――――――――――――――――――― ✀  ―――――――――――――――――――――――――――――――――――――
――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――
92/92 pkcs11-provider:kryoptic / pinlock       SKIP            0.02s   exit status 77


Ok:                 21  
Expected Fail:      0   
Fail:               0   
Unexpected Pass:    0   
Skipped:            71  
Timeout:            0   

Full log written to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/meson-logs/testlog.txt
   create-stamp debian/debhelper-build-stamp
   dh_testroot -O--buildsystem=meson
   dh_prep -O--buildsystem=meson
   dh_auto_install --destdir=debian/pkcs11-provider/ -O--buildsystem=meson
	cd obj-aarch64-linux-gnu && DESTDIR=/build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider LC_ALL=C.UTF-8 ninja install
[0/1] Installing files
Installing src/pkcs11.so to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/lib/aarch64-linux-gnu/ossl-modules
Installing /build/reproducible-path/pkcs11-provider-1.0/docs/provider-pkcs11.7 to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/share/man/man7
   dh_installdocs -O--buildsystem=meson
   dh_installchangelogs -O--buildsystem=meson
   dh_installman -O--buildsystem=meson
   dh_installsystemduser -O--buildsystem=meson
   dh_perl -O--buildsystem=meson
   dh_link -O--buildsystem=meson
   dh_strip_nondeterminism -O--buildsystem=meson
   dh_compress -O--buildsystem=meson
   dh_fixperms -O--buildsystem=meson
   dh_missing -O--buildsystem=meson
   dh_dwz -a -O--buildsystem=meson
   dh_strip -a -O--buildsystem=meson
   dh_makeshlibs -a -O--buildsystem=meson
   dh_shlibdeps -a -O--buildsystem=meson
dpkg-shlibdeps: warning: diversions involved - output may be incorrect
 diversion by libc6 from: /lib/ld-linux-aarch64.so.1
dpkg-shlibdeps: warning: diversions involved - output may be incorrect
 diversion by libc6 to: /lib/ld-linux-aarch64.so.1.usr-is-merged
   dh_installdeb -O--buildsystem=meson
   dh_gencontrol -O--buildsystem=meson
   dh_md5sums -O--buildsystem=meson
   dh_builddeb -O--buildsystem=meson
dpkg-deb: building package 'pkcs11-provider-dbgsym' in '../pkcs11-provider-dbgsym_1.0-1_arm64.deb'.
dpkg-deb: building package 'pkcs11-provider' in '../pkcs11-provider_1.0-1_arm64.deb'.
 dpkg-genbuildinfo --build=binary -O../pkcs11-provider_1.0-1_arm64.buildinfo
 dpkg-genchanges --build=binary -O../pkcs11-provider_1.0-1_arm64.changes
dpkg-genchanges: info: binary-only upload (no source code included)
 dpkg-source --after-build .
dpkg-buildpackage: info: binary-only upload (no source included)
dpkg-genchanges: info: including full source code in upload
I: copying local configuration
I: unmounting dev/ptmx filesystem
I: unmounting dev/pts filesystem
I: unmounting dev/shm filesystem
I: unmounting proc filesystem
I: unmounting sys filesystem
I: cleaning the build env 
I: removing directory /srv/workspace/pbuilder/1369869 and its subdirectories
I: Current time: Sun Mar 22 22:50:52 -12 2026
I: pbuilder-time-stamp: 1774263052
Tue Feb 18 04:27:55 UTC 2025  I: 1st build successful. Starting 2nd build on remote node codethink04-arm64.debian.net.
Tue Feb 18 04:27:55 UTC 2025  I: Preparing to do remote build '2' on codethink04-arm64.debian.net.
Tue Feb 18 04:29:10 UTC 2025  I: Deleting $TMPDIR on codethink04-arm64.debian.net.
Tue Feb 18 04:29:11 UTC 2025  I: pkcs11-provider_1.0-1_arm64.changes:
Format: 1.8
Date: Tue, 11 Feb 2025 19:09:10 +0000
Source: pkcs11-provider
Binary: pkcs11-provider pkcs11-provider-dbgsym
Architecture: arm64
Version: 1.0-1
Distribution: unstable
Urgency: medium
Maintainer: Luca Boccassi <bluca@debian.org>
Changed-By: Luca Boccassi <bluca@debian.org>
Description:
 pkcs11-provider - OpenSSL 3 provider for PKCS11
Changes:
 pkcs11-provider (1.0-1) unstable; urgency=medium
 .
   * Update upstream source from tag 'upstream/1.0'
Checksums-Sha1:
 64570700e29a35404723a046f82df0cb75bd1fb5 309752 pkcs11-provider-dbgsym_1.0-1_arm64.deb
 09036d62af2e321fc2bf5f76f995748f2e162c21 7236 pkcs11-provider_1.0-1_arm64.buildinfo
 07a922cf5dff1fd5e0e4a91fd3127d40d0051fd8 114052 pkcs11-provider_1.0-1_arm64.deb
Checksums-Sha256:
 f03110724e6d9dcaefc85b2b88a6ad6d55b10c646d245840136d9ec2050f133d 309752 pkcs11-provider-dbgsym_1.0-1_arm64.deb
 7ffa4a10d346dab025dda9a2156b8ca6330dbf845fa1322b8479b9e4c73f6006 7236 pkcs11-provider_1.0-1_arm64.buildinfo
 7f10de1699ad3e535ac6ec24d73092ef8a7dfed8d34c039598c5ebfcad730312 114052 pkcs11-provider_1.0-1_arm64.deb
Files:
 6ac6331fd2a57cc71c2604ce8d04a9ab 309752 debug optional pkcs11-provider-dbgsym_1.0-1_arm64.deb
 15f7991d7d92111a278d4f3b06067288 7236 libs optional pkcs11-provider_1.0-1_arm64.buildinfo
 ba1265b5038f3493c537966a1ec8e188 114052 libs optional pkcs11-provider_1.0-1_arm64.deb
Tue Feb 18 04:29:12 UTC 2025  I: diffoscope 288 will be used to compare the two builds:
Running as unit: rb-diffoscope-arm64_6-79896.service
# Profiling output for: /usr/bin/diffoscope --timeout 7200 --html /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/pkcs11-provider_1.0-1.diffoscope.html --text /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/pkcs11-provider_1.0-1.diffoscope.txt --json /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/pkcs11-provider_1.0-1.diffoscope.json --profile=- /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/b1/pkcs11-provider_1.0-1_arm64.changes /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/b2/pkcs11-provider_1.0-1_arm64.changes

## command (total time: 0.000s)
       0.000s      1 call     cmp (internal)

## has_same_content_as (total time: 0.000s)
       0.000s      1 call     diffoscope.comparators.binary.FilesystemFile

## main (total time: 0.003s)
       0.003s      2 calls    outputs
       0.000s      1 call     cleanup
Finished with result: success
Main processes terminated with: code=exited/status=0
Service runtime: 212ms
CPU time consumed: 213ms
Tue Feb 18 04:29:13 UTC 2025  I: diffoscope 288 found no differences in the changes files, and a .buildinfo file also exists.
Tue Feb 18 04:29:13 UTC 2025  I: pkcs11-provider from trixie built successfully and reproducibly on arm64.
Tue Feb 18 04:29:13 UTC 2025  I: Submitting .buildinfo files to external archives:
Tue Feb 18 04:29:13 UTC 2025  I: Submitting 8.0K	b1/pkcs11-provider_1.0-1_arm64.buildinfo.asc
Tue Feb 18 04:29:14 UTC 2025  I: Submitting 8.0K	b2/pkcs11-provider_1.0-1_arm64.buildinfo.asc
Tue Feb 18 04:29:15 UTC 2025  I: Done submitting .buildinfo files to http://buildinfo.debian.net/api/submit.
Tue Feb 18 04:29:15 UTC 2025  I: Done submitting .buildinfo files.
Tue Feb 18 04:29:15 UTC 2025  I: Removing signed pkcs11-provider_1.0-1_arm64.buildinfo.asc files:
removed './b1/pkcs11-provider_1.0-1_arm64.buildinfo.asc'
removed './b2/pkcs11-provider_1.0-1_arm64.buildinfo.asc'