Fri Nov 29 11:56:05 UTC 2024 I: starting to build pkcs11-provider/trixie/armhf on jenkins on '2024-11-29 11:55' Fri Nov 29 11:56:05 UTC 2024 I: The jenkins build log is/was available at https://jenkins.debian.net/userContent/reproducible/debian/build_service/armhf_11/7061/console.log Fri Nov 29 11:56:05 UTC 2024 I: Downloading source for trixie/pkcs11-provider=0.6-1 --2024-11-29 11:56:06-- http://deb.debian.org/debian/pool/main/p/pkcs11-provider/pkcs11-provider_0.6-1.dsc Connecting to 46.16.76.132:3128... connected. Proxy request sent, awaiting response... 200 OK Length: 2212 (2.2K) [text/prs.lines.tag] Saving to: ‘pkcs11-provider_0.6-1.dsc’ 0K .. 100% 324M=0s 2024-11-29 11:56:06 (324 MB/s) - ‘pkcs11-provider_0.6-1.dsc’ saved [2212/2212] Fri Nov 29 11:56:06 UTC 2024 I: pkcs11-provider_0.6-1.dsc -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 3.0 (quilt) Source: pkcs11-provider Binary: pkcs11-provider Architecture: any Version: 0.6-1 Maintainer: Luca Boccassi Homepage: https://github.com/latchset/pkcs11-provider Standards-Version: 4.7.0 Vcs-Browser: https://salsa.debian.org/debian/pkcs11-provider Vcs-Git: https://salsa.debian.org/debian/pkcs11-provider.git Build-Depends: debhelper-compat (= 13), dh-package-notes, libssl-dev (>= 3.0.7~), meson (>= 0.57~), pkgconf, expect , gnutls-bin , libnss3-dev , libp11-kit-dev , libstoken-dev , opensc , openssl , p11-kit , p11-kit-modules , softhsm2 Package-List: pkcs11-provider deb libs optional arch=any Checksums-Sha1: 08101acd750e4232615432852feca9aeb7fdda3b 199820 pkcs11-provider_0.6.orig.tar.gz c57dd4df04319591afade9e6309c7e1091321329 2448 pkcs11-provider_0.6-1.debian.tar.xz Checksums-Sha256: f1ce4341c0e77a3b01fa0fc2fe358a07cf4d56cdad868a42edca6e29c58c4100 199820 pkcs11-provider_0.6.orig.tar.gz 38eccd91d8314e51950a25b7a308aba5c5ac6e04e07ad85a955b9f83d1b64e2a 2448 pkcs11-provider_0.6-1.debian.tar.xz Files: 5d9cd4f8948e8dad0b56e6c3a044ab87 199820 pkcs11-provider_0.6.orig.tar.gz 8d3e4ea4a51a81516fcdc0e92c6f8076 2448 pkcs11-provider_0.6-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQJFBAEBCgAvFiEErCSqx93EIPGOymuRKGv37813JB4FAmdBAoQRHGJsdWNhQGRl Ymlhbi5vcmcACgkQKGv37813JB540RAAkc/1pUW2kxmODXSYWd74gcXq9mslsXG3 YcDcJAvP345YdF9SINrfrp7lkFEUeiFwYgA71G2FUAfDxQRkrIvueGttX4QjWBvT eLop+dcEmQXvu6hx+ANGm8UxkIKVlQebvUYHiDha3OGc6JdHVlxWEK0z7yu+V2xC D0IrswCCa0Wsl6rjGqGV/8GRYW+DD2WlaHv+T3RT/ZL4T68cc938mMp/mwK7MOpD lbB34k9ahYIwxaEKsQf7qfCXufGdEI1FwQQ59T25jg6/xhdoP6ZbmbC/ochN0O+d WgZCyjlg/cN+ACAQCzRcrlbO3r4AIbAIuEZ7rOl7rYp/moc7DEOilELuk+LT51MT HNv2XYe3hmVfU2HIWzhAFJcbLiGDIX2/mCnqVH8Q8+ZrLAklBvK1GLyRB0ZZHHVM OHaA1YOBPbh0dbmZ9Vgm/hObvMzravv07MqH5qrPkuzY/KIt9TBSzsDWIXYCF37M LbZrx2T8HeKXDCN00Ymob1TdkSA+LzDkOiTp/IrZyKoui+9eYUFvL9rwaHr6Hx22 zvGFzq7axScO1qSBslJd1NJ1Uk/27WTapLBVrDtoCAvUz943KBp6udd/BlhsILDp PY97WpBTfSylkA4yIdcwToysUBl5C+C80xSZQdt0AlSmtjScRATyxsbMxQqzN0Bm sYVPflWqaUw= =a8Ak -----END PGP SIGNATURE----- Fri Nov 29 11:56:06 UTC 2024 I: Checking whether the package is not for us Fri Nov 29 11:56:06 UTC 2024 I: Starting 1st build on remote node wbq0-armhf-rb.debian.net. Fri Nov 29 11:56:06 UTC 2024 I: Preparing to do remote build '1' on wbq0-armhf-rb.debian.net. Fri Nov 29 12:01:36 UTC 2024 I: Deleting $TMPDIR on wbq0-armhf-rb.debian.net. I: pbuilder: network access will be disabled during build I: Current time: Thu Nov 28 23:56:15 -12 2024 I: pbuilder-time-stamp: 1732881375 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/trixie-reproducible-base.tgz] I: copying local configuration W: --override-config is not set; not updating apt.conf Read the manpage for details. I: mounting /proc filesystem I: mounting /sys filesystem I: creating /{dev,run}/shm I: mounting /dev/pts filesystem I: redirecting /dev/ptmx to /dev/pts/ptmx I: policy-rc.d already exists I: Copying source file I: copying [pkcs11-provider_0.6-1.dsc] I: copying [./pkcs11-provider_0.6.orig.tar.gz] I: copying [./pkcs11-provider_0.6-1.debian.tar.xz] I: Extracting source gpgv: Signature made Fri Nov 22 22:15:32 2024 gpgv: using RSA key AC24AAC7DDC420F18ECA6B91286BF7EFCD77241E gpgv: issuer "bluca@debian.org" gpgv: Can't check signature: No public key dpkg-source: warning: cannot verify inline signature for ./pkcs11-provider_0.6-1.dsc: no acceptable signature found dpkg-source: info: extracting pkcs11-provider in pkcs11-provider-0.6 dpkg-source: info: unpacking pkcs11-provider_0.6.orig.tar.gz dpkg-source: info: unpacking pkcs11-provider_0.6-1.debian.tar.xz I: Not using root during the build. I: Installing the build-deps I: user script /srv/workspace/pbuilder/16854/tmp/hooks/D02_print_environment starting I: set BUILDDIR='/build/reproducible-path' BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' BUILDUSERNAME='pbuilder1' BUILD_ARCH='armhf' DEBIAN_FRONTEND='noninteractive' DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=3 ' DISTRIBUTION='trixie' HOME='/root' HOST_ARCH='armhf' IFS=' ' INVOCATION_ID='a4f294cd9b0d42dca6f99d850d55991d' LANG='C' LANGUAGE='en_US:en' LC_ALL='C' MAIL='/var/mail/root' OPTIND='1' PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' PBCURRENTCOMMANDLINEOPERATION='build' PBUILDER_OPERATION='build' PBUILDER_PKGDATADIR='/usr/share/pbuilder' PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' PBUILDER_SYSCONFDIR='/etc' PPID='16854' PS1='# ' PS2='> ' PS4='+ ' PWD='/' SHELL='/bin/bash' SHLVL='2' SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.IY2Sulte/pbuilderrc_ynOJ --distribution trixie --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.IY2Sulte/b1 --logfile b1/build.log pkcs11-provider_0.6-1.dsc' SUDO_GID='113' SUDO_UID='107' SUDO_USER='jenkins' TERM='unknown' TZ='/usr/share/zoneinfo/Etc/GMT+12' USER='root' _='/usr/bin/systemd-run' http_proxy='http://10.0.0.15:3142/' I: uname -a Linux wbq0 6.1.0-28-armmp #1 SMP Debian 6.1.119-1 (2024-11-22) armv7l GNU/Linux I: ls -l /bin lrwxrwxrwx 1 root root 7 Aug 4 21:30 /bin -> usr/bin I: user script /srv/workspace/pbuilder/16854/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy Version: 0.invalid.0 Architecture: armhf Maintainer: Debian Pbuilder Team Description: Dummy package to satisfy dependencies with aptitude - created by pbuilder This package was created automatically by pbuilder to satisfy the build-dependencies of the package being currently built. Depends: debhelper-compat (= 13), dh-package-notes, libssl-dev (>= 3.0.7~), meson (>= 0.57~), pkgconf, expect, gnutls-bin, libnss3-dev, libp11-kit-dev, libstoken-dev, opensc, openssl, p11-kit, p11-kit-modules, softhsm2 dpkg-deb: building package 'pbuilder-satisfydepends-dummy' in '/tmp/satisfydepends-aptitude/pbuilder-satisfydepends-dummy.deb'. Selecting previously unselected package pbuilder-satisfydepends-dummy. (Reading database ... 19685 files and directories currently installed.) Preparing to unpack .../pbuilder-satisfydepends-dummy.deb ... Unpacking pbuilder-satisfydepends-dummy (0.invalid.0) ... dpkg: pbuilder-satisfydepends-dummy: dependency problems, but configuring anyway as you requested: pbuilder-satisfydepends-dummy depends on debhelper-compat (= 13); however: Package debhelper-compat is not installed. pbuilder-satisfydepends-dummy depends on dh-package-notes; however: Package dh-package-notes is not installed. pbuilder-satisfydepends-dummy depends on libssl-dev (>= 3.0.7~); however: Package libssl-dev is not installed. pbuilder-satisfydepends-dummy depends on meson (>= 0.57~); however: Package meson is not installed. pbuilder-satisfydepends-dummy depends on pkgconf; however: Package pkgconf is not installed. pbuilder-satisfydepends-dummy depends on expect; however: Package expect is not installed. pbuilder-satisfydepends-dummy depends on gnutls-bin; however: Package gnutls-bin is not installed. pbuilder-satisfydepends-dummy depends on libnss3-dev; however: Package libnss3-dev is not installed. pbuilder-satisfydepends-dummy depends on libp11-kit-dev; however: Package libp11-kit-dev is not installed. pbuilder-satisfydepends-dummy depends on libstoken-dev; however: Package libstoken-dev is not installed. pbuilder-satisfydepends-dummy depends on opensc; however: Package opensc is not installed. pbuilder-satisfydepends-dummy depends on openssl; however: Package openssl is not installed. pbuilder-satisfydepends-dummy depends on p11-kit; however: Package p11-kit is not installed. pbuilder-satisfydepends-dummy depends on p11-kit-modules; however: Package p11-kit-modules is not installed. pbuilder-satisfydepends-dummy depends on softhsm2; however: Package softhsm2 is not installed. Setting up pbuilder-satisfydepends-dummy (0.invalid.0) ... Reading package lists... Building dependency tree... Reading state information... Initializing package states... Writing extended state information... Building tag database... pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) The following NEW packages will be installed: autoconf{a} automake{a} autopoint{a} autotools-dev{a} bsdextrautils{a} debhelper{a} dh-autoreconf{a} dh-package-notes{a} dh-strip-nondeterminism{a} dwz{a} expect{a} file{a} gettext{a} gettext-base{a} gnutls-bin{a} groff-base{a} intltool-debian{a} libarchive-zip-perl{a} libcom-err2{a} libdebhelper-perl{a} libeac3{a} libelf1t64{a} libevent-2.1-7t64{a} libexpat1{a} libfile-stripnondeterminism-perl{a} libglib2.0-0t64{a} libgnutls-dane0t64{a} libgssapi-krb5-2{a} libicu72{a} libk5crypto3{a} libkeyutils1{a} libkrb5-3{a} libkrb5support0{a} libmagic-mgc{a} libmagic1t64{a} libnsl2{a} libnspr4{a} libnspr4-dev{a} libnss3{a} libnss3-dev{a} libp11-kit-dev{a} libpipeline1{a} libpkgconf3{a} libpython3-stdlib{a} libpython3.12-minimal{a} libpython3.12-stdlib{a} libreadline8t64{a} libsofthsm2{a} libssl-dev{a} libstoken-dev{a} libstoken1t64{a} libtcl8.6{a} libtirpc-common{a} libtirpc3t64{a} libtomcrypt-dev{a} libtomcrypt1{a} libtommath1{a} libtool{a} libuchardet0{a} libunbound8{a} libxml2{a} m4{a} man-db{a} media-types{a} meson{a} netbase{a} ninja-build{a} opensc{a} opensc-pkcs11{a} openssl{a} p11-kit{a} p11-kit-modules{a} pkgconf{a} pkgconf-bin{a} po-debconf{a} python3{a} python3-autocommand{a} python3-inflect{a} python3-jaraco.context{a} python3-jaraco.functools{a} python3-minimal{a} python3-more-itertools{a} python3-pkg-resources{a} python3-setuptools{a} python3-typeguard{a} python3-typing-extensions{a} python3-zipp{a} python3.12{a} python3.12-minimal{a} readline-common{a} sensible-utils{a} softhsm2{a} softhsm2-common{a} tcl-expect{a} tcl8.6{a} tzdata{a} ucf{a} The following packages are RECOMMENDED but will NOT be installed: ca-certificates curl krb5-locales libarchive-cpio-perl libglib2.0-data libltdl-dev libmail-sendmail-perl lynx pcscd shared-mime-info wget xdg-user-dirs 0 packages upgraded, 97 newly installed, 0 to remove and 0 not upgraded. Need to get 41.7 MB of archives. After unpacking 143 MB will be used. Writing extended state information... Get: 1 http://deb.debian.org/debian trixie/main armhf libpython3.12-minimal armhf 3.12.7-3 [800 kB] Get: 2 http://deb.debian.org/debian trixie/main armhf libexpat1 armhf 2.6.4-1 [83.5 kB] Get: 3 http://deb.debian.org/debian trixie/main armhf python3.12-minimal armhf 3.12.7-3 [1808 kB] Get: 4 http://deb.debian.org/debian trixie/main armhf python3-minimal armhf 3.12.6-1 [26.7 kB] Get: 5 http://deb.debian.org/debian trixie/main armhf media-types all 10.1.0 [26.9 kB] Get: 6 http://deb.debian.org/debian trixie/main armhf netbase all 6.4 [12.8 kB] Get: 7 http://deb.debian.org/debian trixie/main armhf tzdata all 2024b-3 [255 kB] Get: 8 http://deb.debian.org/debian trixie/main armhf libkrb5support0 armhf 1.21.3-3 [30.0 kB] Get: 9 http://deb.debian.org/debian trixie/main armhf libcom-err2 armhf 1.47.1-1+b1 [22.3 kB] Get: 10 http://deb.debian.org/debian trixie/main armhf libk5crypto3 armhf 1.21.3-3 [75.8 kB] Get: 11 http://deb.debian.org/debian trixie/main armhf libkeyutils1 armhf 1.6.3-4 [8096 B] Get: 12 http://deb.debian.org/debian trixie/main armhf libkrb5-3 armhf 1.21.3-3 [283 kB] Get: 13 http://deb.debian.org/debian trixie/main armhf libgssapi-krb5-2 armhf 1.21.3-3 [114 kB] Get: 14 http://deb.debian.org/debian trixie/main armhf libtirpc-common all 1.3.4+ds-1.3 [10.9 kB] Get: 15 http://deb.debian.org/debian trixie/main armhf libtirpc3t64 armhf 1.3.4+ds-1.3+b1 [71.3 kB] Get: 16 http://deb.debian.org/debian trixie/main armhf libnsl2 armhf 1.3.0-3+b3 [35.0 kB] Get: 17 http://deb.debian.org/debian trixie/main armhf readline-common all 8.2-5 [69.3 kB] Get: 18 http://deb.debian.org/debian trixie/main armhf libreadline8t64 armhf 8.2-5 [146 kB] Get: 19 http://deb.debian.org/debian trixie/main armhf libpython3.12-stdlib armhf 3.12.7-3 [1819 kB] Get: 20 http://deb.debian.org/debian trixie/main armhf python3.12 armhf 3.12.7-3 [671 kB] Get: 21 http://deb.debian.org/debian trixie/main armhf libpython3-stdlib armhf 3.12.6-1 [9692 B] Get: 22 http://deb.debian.org/debian trixie/main armhf python3 armhf 3.12.6-1 [27.8 kB] Get: 23 http://deb.debian.org/debian trixie/main armhf sensible-utils all 0.0.24 [24.8 kB] Get: 24 http://deb.debian.org/debian trixie/main armhf libmagic-mgc armhf 1:5.45-3+b1 [314 kB] Get: 25 http://deb.debian.org/debian trixie/main armhf libmagic1t64 armhf 1:5.45-3+b1 [98.5 kB] Get: 26 http://deb.debian.org/debian trixie/main armhf file armhf 1:5.45-3+b1 [42.3 kB] Get: 27 http://deb.debian.org/debian trixie/main armhf gettext-base armhf 0.22.5-2 [195 kB] Get: 28 http://deb.debian.org/debian trixie/main armhf libuchardet0 armhf 0.0.8-1+b2 [65.6 kB] Get: 29 http://deb.debian.org/debian trixie/main armhf groff-base armhf 1.23.0-5 [1091 kB] Get: 30 http://deb.debian.org/debian trixie/main armhf bsdextrautils armhf 2.40.2-11 [83.6 kB] Get: 31 http://deb.debian.org/debian trixie/main armhf libpipeline1 armhf 1.5.8-1 [35.0 kB] Get: 32 http://deb.debian.org/debian trixie/main armhf man-db armhf 2.13.0-1 [1382 kB] Get: 33 http://deb.debian.org/debian trixie/main armhf ucf all 3.0043+nmu1 [55.2 kB] Get: 34 http://deb.debian.org/debian trixie/main armhf m4 armhf 1.4.19-4 [264 kB] Get: 35 http://deb.debian.org/debian trixie/main armhf autoconf all 2.72-3 [493 kB] Get: 36 http://deb.debian.org/debian trixie/main armhf autotools-dev all 20220109.1 [51.6 kB] Get: 37 http://deb.debian.org/debian trixie/main armhf automake all 1:1.16.5-1.3 [823 kB] Get: 38 http://deb.debian.org/debian trixie/main armhf autopoint all 0.22.5-2 [723 kB] Get: 39 http://deb.debian.org/debian trixie/main armhf libdebhelper-perl all 13.20 [89.7 kB] Get: 40 http://deb.debian.org/debian trixie/main armhf libtool all 2.4.7-8 [517 kB] Get: 41 http://deb.debian.org/debian trixie/main armhf dh-autoreconf all 20 [17.1 kB] Get: 42 http://deb.debian.org/debian trixie/main armhf libarchive-zip-perl all 1.68-1 [104 kB] Get: 43 http://deb.debian.org/debian trixie/main armhf libfile-stripnondeterminism-perl all 1.14.0-1 [19.5 kB] Get: 44 http://deb.debian.org/debian trixie/main armhf dh-strip-nondeterminism all 1.14.0-1 [8448 B] Get: 45 http://deb.debian.org/debian trixie/main armhf libelf1t64 armhf 0.192-4 [184 kB] Get: 46 http://deb.debian.org/debian trixie/main armhf dwz armhf 0.15-1+b2 [106 kB] Get: 47 http://deb.debian.org/debian trixie/main armhf libicu72 armhf 72.1-5+b1 [9088 kB] Get: 48 http://deb.debian.org/debian trixie/main armhf libxml2 armhf 2.12.7+dfsg+really2.9.14-0.2+b1 [605 kB] Get: 49 http://deb.debian.org/debian trixie/main armhf gettext armhf 0.22.5-2 [1485 kB] Get: 50 http://deb.debian.org/debian trixie/main armhf intltool-debian all 0.35.0+20060710.6 [22.9 kB] Get: 51 http://deb.debian.org/debian trixie/main armhf po-debconf all 1.0.21+nmu1 [248 kB] Get: 52 http://deb.debian.org/debian trixie/main armhf debhelper all 13.20 [915 kB] Get: 53 http://deb.debian.org/debian trixie/main armhf dh-package-notes all 0.15 [6692 B] Get: 54 http://deb.debian.org/debian trixie/main armhf libtcl8.6 armhf 8.6.15+dfsg-2 [934 kB] Get: 55 http://deb.debian.org/debian trixie/main armhf tcl8.6 armhf 8.6.15+dfsg-2 [120 kB] Get: 56 http://deb.debian.org/debian trixie/main armhf tcl-expect armhf 5.45.4-3+b1 [116 kB] Get: 57 http://deb.debian.org/debian trixie/main armhf expect armhf 5.45.4-3+b1 [158 kB] Get: 58 http://deb.debian.org/debian trixie/main armhf libevent-2.1-7t64 armhf 2.1.12-stable-10+b1 [164 kB] Get: 59 http://deb.debian.org/debian trixie/main armhf libunbound8 armhf 1.22.0-1 [539 kB] Get: 60 http://deb.debian.org/debian trixie/main armhf libgnutls-dane0t64 armhf 3.8.8-2 [440 kB] Get: 61 http://deb.debian.org/debian trixie/main armhf gnutls-bin armhf 3.8.8-2 [657 kB] Get: 62 http://deb.debian.org/debian trixie/main armhf libeac3 armhf 1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3 [44.2 kB] Get: 63 http://deb.debian.org/debian trixie/main armhf libglib2.0-0t64 armhf 2.82.2-2 [1326 kB] Get: 64 http://deb.debian.org/debian trixie/main armhf libnspr4 armhf 2:4.36-1 [87.8 kB] Get: 65 http://deb.debian.org/debian trixie/main armhf libnspr4-dev armhf 2:4.36-1 [187 kB] Get: 66 http://deb.debian.org/debian trixie/main armhf libnss3 armhf 2:3.106-1 [1204 kB] Get: 67 http://deb.debian.org/debian trixie/main armhf libnss3-dev armhf 2:3.106-1 [245 kB] Get: 68 http://deb.debian.org/debian trixie/main armhf libp11-kit-dev armhf 0.25.5-2+b1 [208 kB] Get: 69 http://deb.debian.org/debian trixie/main armhf libpkgconf3 armhf 1.8.1-4 [31.8 kB] Get: 70 http://deb.debian.org/debian trixie/main armhf softhsm2-common armhf 2.6.1-2.2+b1 [12.4 kB] Get: 71 http://deb.debian.org/debian trixie/main armhf libsofthsm2 armhf 2.6.1-2.2+b1 [208 kB] Get: 72 http://deb.debian.org/debian trixie/main armhf libssl-dev armhf 3.3.2-2 [2385 kB] Get: 73 http://deb.debian.org/debian trixie/main armhf libtommath1 armhf 1.3.0-1 [54.0 kB] Get: 74 http://deb.debian.org/debian trixie/main armhf libtomcrypt1 armhf 1.18.2+dfsg-7+b2 [389 kB] Get: 75 http://deb.debian.org/debian trixie/main armhf libstoken1t64 armhf 0.92-1.1+b2 [25.3 kB] Get: 76 http://deb.debian.org/debian trixie/main armhf libtomcrypt-dev armhf 1.18.2+dfsg-7+b2 [1245 kB] Get: 77 http://deb.debian.org/debian trixie/main armhf libstoken-dev armhf 0.92-1.1+b2 [8200 B] Get: 78 http://deb.debian.org/debian trixie/main armhf ninja-build armhf 1.12.1-1 [125 kB] Get: 79 http://deb.debian.org/debian trixie/main armhf python3-autocommand all 2.2.2-3 [13.6 kB] Get: 80 http://deb.debian.org/debian trixie/main armhf python3-more-itertools all 10.5.0-1 [63.8 kB] Get: 81 http://deb.debian.org/debian trixie/main armhf python3-typing-extensions all 4.12.2-2 [73.0 kB] Get: 82 http://deb.debian.org/debian trixie/main armhf python3-typeguard all 4.4.1-1 [37.0 kB] Get: 83 http://deb.debian.org/debian trixie/main armhf python3-inflect all 7.3.1-2 [32.4 kB] Get: 84 http://deb.debian.org/debian trixie/main armhf python3-jaraco.context all 6.0.0-1 [7984 B] Get: 85 http://deb.debian.org/debian trixie/main armhf python3-jaraco.functools all 4.1.0-1 [12.0 kB] Get: 86 http://deb.debian.org/debian trixie/main armhf python3-pkg-resources all 74.1.2-2 [213 kB] Get: 87 http://deb.debian.org/debian trixie/main armhf python3-zipp all 3.21.0-1 [10.6 kB] Get: 88 http://deb.debian.org/debian trixie/main armhf python3-setuptools all 74.1.2-2 [736 kB] Get: 89 http://deb.debian.org/debian trixie/main armhf meson all 1.6.0-1 [628 kB] Get: 90 http://deb.debian.org/debian trixie/main armhf opensc-pkcs11 armhf 0.25.1-2 [822 kB] Get: 91 http://deb.debian.org/debian trixie/main armhf opensc armhf 0.25.1-2 [377 kB] Get: 92 http://deb.debian.org/debian trixie/main armhf openssl armhf 3.3.2-2 [1348 kB] Get: 93 http://deb.debian.org/debian trixie/main armhf p11-kit-modules armhf 0.25.5-2+b1 [235 kB] Get: 94 http://deb.debian.org/debian trixie/main armhf p11-kit armhf 0.25.5-2+b1 [387 kB] Get: 95 http://deb.debian.org/debian trixie/main armhf pkgconf-bin armhf 1.8.1-4 [29.2 kB] Get: 96 http://deb.debian.org/debian trixie/main armhf pkgconf armhf 1.8.1-4 [26.1 kB] Get: 97 http://deb.debian.org/debian trixie/main armhf softhsm2 armhf 2.6.1-2.2+b1 [145 kB] Fetched 41.7 MB in 4s (11.5 MB/s) debconf: delaying package configuration, since apt-utils is not installed Selecting previously unselected package libpython3.12-minimal:armhf. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19685 files and directories currently installed.) Preparing to unpack .../libpython3.12-minimal_3.12.7-3_armhf.deb ... Unpacking libpython3.12-minimal:armhf (3.12.7-3) ... Selecting previously unselected package libexpat1:armhf. Preparing to unpack .../libexpat1_2.6.4-1_armhf.deb ... Unpacking libexpat1:armhf (2.6.4-1) ... Selecting previously unselected package python3.12-minimal. Preparing to unpack .../python3.12-minimal_3.12.7-3_armhf.deb ... Unpacking python3.12-minimal (3.12.7-3) ... Setting up libpython3.12-minimal:armhf (3.12.7-3) ... Setting up libexpat1:armhf (2.6.4-1) ... Setting up python3.12-minimal (3.12.7-3) ... Selecting previously unselected package python3-minimal. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 20005 files and directories currently installed.) Preparing to unpack .../00-python3-minimal_3.12.6-1_armhf.deb ... Unpacking python3-minimal (3.12.6-1) ... Selecting previously unselected package media-types. Preparing to unpack .../01-media-types_10.1.0_all.deb ... Unpacking media-types (10.1.0) ... Selecting previously unselected package netbase. Preparing to unpack .../02-netbase_6.4_all.deb ... Unpacking netbase (6.4) ... Selecting previously unselected package tzdata. Preparing to unpack .../03-tzdata_2024b-3_all.deb ... Unpacking tzdata (2024b-3) ... Selecting previously unselected package libkrb5support0:armhf. Preparing to unpack .../04-libkrb5support0_1.21.3-3_armhf.deb ... Unpacking libkrb5support0:armhf (1.21.3-3) ... Selecting previously unselected package libcom-err2:armhf. Preparing to unpack .../05-libcom-err2_1.47.1-1+b1_armhf.deb ... Unpacking libcom-err2:armhf (1.47.1-1+b1) ... Selecting previously unselected package libk5crypto3:armhf. Preparing to unpack .../06-libk5crypto3_1.21.3-3_armhf.deb ... Unpacking libk5crypto3:armhf (1.21.3-3) ... Selecting previously unselected package libkeyutils1:armhf. Preparing to unpack .../07-libkeyutils1_1.6.3-4_armhf.deb ... Unpacking libkeyutils1:armhf (1.6.3-4) ... Selecting previously unselected package libkrb5-3:armhf. Preparing to unpack .../08-libkrb5-3_1.21.3-3_armhf.deb ... Unpacking libkrb5-3:armhf (1.21.3-3) ... Selecting previously unselected package libgssapi-krb5-2:armhf. Preparing to unpack .../09-libgssapi-krb5-2_1.21.3-3_armhf.deb ... Unpacking libgssapi-krb5-2:armhf (1.21.3-3) ... Selecting previously unselected package libtirpc-common. Preparing to unpack .../10-libtirpc-common_1.3.4+ds-1.3_all.deb ... Unpacking libtirpc-common (1.3.4+ds-1.3) ... Selecting previously unselected package libtirpc3t64:armhf. Preparing to unpack .../11-libtirpc3t64_1.3.4+ds-1.3+b1_armhf.deb ... Adding 'diversion of /lib/arm-linux-gnueabihf/libtirpc.so.3 to /lib/arm-linux-gnueabihf/libtirpc.so.3.usr-is-merged by libtirpc3t64' Adding 'diversion of /lib/arm-linux-gnueabihf/libtirpc.so.3.0.0 to /lib/arm-linux-gnueabihf/libtirpc.so.3.0.0.usr-is-merged by libtirpc3t64' Unpacking libtirpc3t64:armhf (1.3.4+ds-1.3+b1) ... Selecting previously unselected package libnsl2:armhf. Preparing to unpack .../12-libnsl2_1.3.0-3+b3_armhf.deb ... Unpacking libnsl2:armhf (1.3.0-3+b3) ... Selecting previously unselected package readline-common. Preparing to unpack .../13-readline-common_8.2-5_all.deb ... Unpacking readline-common (8.2-5) ... Selecting previously unselected package libreadline8t64:armhf. Preparing to unpack .../14-libreadline8t64_8.2-5_armhf.deb ... Adding 'diversion of /lib/arm-linux-gnueabihf/libhistory.so.8 to /lib/arm-linux-gnueabihf/libhistory.so.8.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/arm-linux-gnueabihf/libhistory.so.8.2 to /lib/arm-linux-gnueabihf/libhistory.so.8.2.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/arm-linux-gnueabihf/libreadline.so.8 to /lib/arm-linux-gnueabihf/libreadline.so.8.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/arm-linux-gnueabihf/libreadline.so.8.2 to /lib/arm-linux-gnueabihf/libreadline.so.8.2.usr-is-merged by libreadline8t64' Unpacking libreadline8t64:armhf (8.2-5) ... Selecting previously unselected package libpython3.12-stdlib:armhf. Preparing to unpack .../15-libpython3.12-stdlib_3.12.7-3_armhf.deb ... Unpacking libpython3.12-stdlib:armhf (3.12.7-3) ... Selecting previously unselected package python3.12. Preparing to unpack .../16-python3.12_3.12.7-3_armhf.deb ... Unpacking python3.12 (3.12.7-3) ... Selecting previously unselected package libpython3-stdlib:armhf. Preparing to unpack .../17-libpython3-stdlib_3.12.6-1_armhf.deb ... Unpacking libpython3-stdlib:armhf (3.12.6-1) ... Setting up python3-minimal (3.12.6-1) ... Selecting previously unselected package python3. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 21067 files and directories currently installed.) Preparing to unpack .../00-python3_3.12.6-1_armhf.deb ... Unpacking python3 (3.12.6-1) ... Selecting previously unselected package sensible-utils. Preparing to unpack .../01-sensible-utils_0.0.24_all.deb ... Unpacking sensible-utils (0.0.24) ... Selecting previously unselected package libmagic-mgc. Preparing to unpack .../02-libmagic-mgc_1%3a5.45-3+b1_armhf.deb ... Unpacking libmagic-mgc (1:5.45-3+b1) ... Selecting previously unselected package libmagic1t64:armhf. Preparing to unpack .../03-libmagic1t64_1%3a5.45-3+b1_armhf.deb ... Unpacking libmagic1t64:armhf (1:5.45-3+b1) ... Selecting previously unselected package file. Preparing to unpack .../04-file_1%3a5.45-3+b1_armhf.deb ... Unpacking file (1:5.45-3+b1) ... Selecting previously unselected package gettext-base. Preparing to unpack .../05-gettext-base_0.22.5-2_armhf.deb ... Unpacking gettext-base (0.22.5-2) ... Selecting previously unselected package libuchardet0:armhf. Preparing to unpack .../06-libuchardet0_0.0.8-1+b2_armhf.deb ... Unpacking libuchardet0:armhf (0.0.8-1+b2) ... Selecting previously unselected package groff-base. Preparing to unpack .../07-groff-base_1.23.0-5_armhf.deb ... Unpacking groff-base (1.23.0-5) ... Selecting previously unselected package bsdextrautils. Preparing to unpack .../08-bsdextrautils_2.40.2-11_armhf.deb ... Unpacking bsdextrautils (2.40.2-11) ... Selecting previously unselected package libpipeline1:armhf. Preparing to unpack .../09-libpipeline1_1.5.8-1_armhf.deb ... Unpacking libpipeline1:armhf (1.5.8-1) ... Selecting previously unselected package man-db. Preparing to unpack .../10-man-db_2.13.0-1_armhf.deb ... Unpacking man-db (2.13.0-1) ... Selecting previously unselected package ucf. Preparing to unpack .../11-ucf_3.0043+nmu1_all.deb ... Moving old data out of the way Unpacking ucf (3.0043+nmu1) ... Selecting previously unselected package m4. Preparing to unpack .../12-m4_1.4.19-4_armhf.deb ... Unpacking m4 (1.4.19-4) ... Selecting previously unselected package autoconf. Preparing to unpack .../13-autoconf_2.72-3_all.deb ... Unpacking autoconf (2.72-3) ... Selecting previously unselected package autotools-dev. Preparing to unpack .../14-autotools-dev_20220109.1_all.deb ... Unpacking autotools-dev (20220109.1) ... Selecting previously unselected package automake. Preparing to unpack .../15-automake_1%3a1.16.5-1.3_all.deb ... Unpacking automake (1:1.16.5-1.3) ... Selecting previously unselected package autopoint. Preparing to unpack .../16-autopoint_0.22.5-2_all.deb ... Unpacking autopoint (0.22.5-2) ... Selecting previously unselected package libdebhelper-perl. Preparing to unpack .../17-libdebhelper-perl_13.20_all.deb ... Unpacking libdebhelper-perl (13.20) ... Selecting previously unselected package libtool. Preparing to unpack .../18-libtool_2.4.7-8_all.deb ... Unpacking libtool (2.4.7-8) ... Selecting previously unselected package dh-autoreconf. Preparing to unpack .../19-dh-autoreconf_20_all.deb ... Unpacking dh-autoreconf (20) ... Selecting previously unselected package libarchive-zip-perl. Preparing to unpack .../20-libarchive-zip-perl_1.68-1_all.deb ... Unpacking libarchive-zip-perl (1.68-1) ... Selecting previously unselected package libfile-stripnondeterminism-perl. Preparing to unpack .../21-libfile-stripnondeterminism-perl_1.14.0-1_all.deb ... Unpacking libfile-stripnondeterminism-perl (1.14.0-1) ... Selecting previously unselected package dh-strip-nondeterminism. Preparing to unpack .../22-dh-strip-nondeterminism_1.14.0-1_all.deb ... Unpacking dh-strip-nondeterminism (1.14.0-1) ... Selecting previously unselected package libelf1t64:armhf. Preparing to unpack .../23-libelf1t64_0.192-4_armhf.deb ... Unpacking libelf1t64:armhf (0.192-4) ... Selecting previously unselected package dwz. Preparing to unpack .../24-dwz_0.15-1+b2_armhf.deb ... Unpacking dwz (0.15-1+b2) ... Selecting previously unselected package libicu72:armhf. Preparing to unpack .../25-libicu72_72.1-5+b1_armhf.deb ... Unpacking libicu72:armhf (72.1-5+b1) ... Selecting previously unselected package libxml2:armhf. Preparing to unpack .../26-libxml2_2.12.7+dfsg+really2.9.14-0.2+b1_armhf.deb ... Unpacking libxml2:armhf (2.12.7+dfsg+really2.9.14-0.2+b1) ... Selecting previously unselected package gettext. Preparing to unpack .../27-gettext_0.22.5-2_armhf.deb ... Unpacking gettext (0.22.5-2) ... Selecting previously unselected package intltool-debian. Preparing to unpack .../28-intltool-debian_0.35.0+20060710.6_all.deb ... Unpacking intltool-debian (0.35.0+20060710.6) ... Selecting previously unselected package po-debconf. Preparing to unpack .../29-po-debconf_1.0.21+nmu1_all.deb ... Unpacking po-debconf (1.0.21+nmu1) ... Selecting previously unselected package debhelper. Preparing to unpack .../30-debhelper_13.20_all.deb ... Unpacking debhelper (13.20) ... Selecting previously unselected package dh-package-notes. Preparing to unpack .../31-dh-package-notes_0.15_all.deb ... Unpacking dh-package-notes (0.15) ... Selecting previously unselected package libtcl8.6:armhf. Preparing to unpack .../32-libtcl8.6_8.6.15+dfsg-2_armhf.deb ... Unpacking libtcl8.6:armhf (8.6.15+dfsg-2) ... Selecting previously unselected package tcl8.6. Preparing to unpack .../33-tcl8.6_8.6.15+dfsg-2_armhf.deb ... Unpacking tcl8.6 (8.6.15+dfsg-2) ... Selecting previously unselected package tcl-expect:armhf. Preparing to unpack .../34-tcl-expect_5.45.4-3+b1_armhf.deb ... Unpacking tcl-expect:armhf (5.45.4-3+b1) ... Selecting previously unselected package expect. Preparing to unpack .../35-expect_5.45.4-3+b1_armhf.deb ... Unpacking expect (5.45.4-3+b1) ... Selecting previously unselected package libevent-2.1-7t64:armhf. Preparing to unpack .../36-libevent-2.1-7t64_2.1.12-stable-10+b1_armhf.deb ... Unpacking libevent-2.1-7t64:armhf (2.1.12-stable-10+b1) ... Selecting previously unselected package libunbound8:armhf. Preparing to unpack .../37-libunbound8_1.22.0-1_armhf.deb ... Unpacking libunbound8:armhf (1.22.0-1) ... Selecting previously unselected package libgnutls-dane0t64:armhf. Preparing to unpack .../38-libgnutls-dane0t64_3.8.8-2_armhf.deb ... Unpacking libgnutls-dane0t64:armhf (3.8.8-2) ... Selecting previously unselected package gnutls-bin. Preparing to unpack .../39-gnutls-bin_3.8.8-2_armhf.deb ... Unpacking gnutls-bin (3.8.8-2) ... Selecting previously unselected package libeac3:armhf. Preparing to unpack .../40-libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3_armhf.deb ... Unpacking libeac3:armhf (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ... Selecting previously unselected package libglib2.0-0t64:armhf. Preparing to unpack .../41-libglib2.0-0t64_2.82.2-2_armhf.deb ... Unpacking libglib2.0-0t64:armhf (2.82.2-2) ... Selecting previously unselected package libnspr4:armhf. Preparing to unpack .../42-libnspr4_2%3a4.36-1_armhf.deb ... Unpacking libnspr4:armhf (2:4.36-1) ... Selecting previously unselected package libnspr4-dev. Preparing to unpack .../43-libnspr4-dev_2%3a4.36-1_armhf.deb ... Unpacking libnspr4-dev (2:4.36-1) ... Selecting previously unselected package libnss3:armhf. Preparing to unpack .../44-libnss3_2%3a3.106-1_armhf.deb ... Unpacking libnss3:armhf (2:3.106-1) ... Selecting previously unselected package libnss3-dev:armhf. Preparing to unpack .../45-libnss3-dev_2%3a3.106-1_armhf.deb ... Unpacking libnss3-dev:armhf (2:3.106-1) ... Selecting previously unselected package libp11-kit-dev:armhf. Preparing to unpack .../46-libp11-kit-dev_0.25.5-2+b1_armhf.deb ... Unpacking libp11-kit-dev:armhf (0.25.5-2+b1) ... Selecting previously unselected package libpkgconf3:armhf. Preparing to unpack .../47-libpkgconf3_1.8.1-4_armhf.deb ... Unpacking libpkgconf3:armhf (1.8.1-4) ... Selecting previously unselected package softhsm2-common. Preparing to unpack .../48-softhsm2-common_2.6.1-2.2+b1_armhf.deb ... Unpacking softhsm2-common (2.6.1-2.2+b1) ... Selecting previously unselected package libsofthsm2. Preparing to unpack .../49-libsofthsm2_2.6.1-2.2+b1_armhf.deb ... Unpacking libsofthsm2 (2.6.1-2.2+b1) ... Selecting previously unselected package libssl-dev:armhf. Preparing to unpack .../50-libssl-dev_3.3.2-2_armhf.deb ... Unpacking libssl-dev:armhf (3.3.2-2) ... Selecting previously unselected package libtommath1:armhf. Preparing to unpack .../51-libtommath1_1.3.0-1_armhf.deb ... Unpacking libtommath1:armhf (1.3.0-1) ... Selecting previously unselected package libtomcrypt1:armhf. Preparing to unpack .../52-libtomcrypt1_1.18.2+dfsg-7+b2_armhf.deb ... Unpacking libtomcrypt1:armhf (1.18.2+dfsg-7+b2) ... Selecting previously unselected package libstoken1t64:armhf. Preparing to unpack .../53-libstoken1t64_0.92-1.1+b2_armhf.deb ... Unpacking libstoken1t64:armhf (0.92-1.1+b2) ... Selecting previously unselected package libtomcrypt-dev. Preparing to unpack .../54-libtomcrypt-dev_1.18.2+dfsg-7+b2_armhf.deb ... Unpacking libtomcrypt-dev (1.18.2+dfsg-7+b2) ... Selecting previously unselected package libstoken-dev:armhf. Preparing to unpack .../55-libstoken-dev_0.92-1.1+b2_armhf.deb ... Unpacking libstoken-dev:armhf (0.92-1.1+b2) ... Selecting previously unselected package ninja-build. Preparing to unpack .../56-ninja-build_1.12.1-1_armhf.deb ... Unpacking ninja-build (1.12.1-1) ... Selecting previously unselected package python3-autocommand. Preparing to unpack .../57-python3-autocommand_2.2.2-3_all.deb ... Unpacking python3-autocommand (2.2.2-3) ... Selecting previously unselected package python3-more-itertools. Preparing to unpack .../58-python3-more-itertools_10.5.0-1_all.deb ... Unpacking python3-more-itertools (10.5.0-1) ... Selecting previously unselected package python3-typing-extensions. Preparing to unpack .../59-python3-typing-extensions_4.12.2-2_all.deb ... Unpacking python3-typing-extensions (4.12.2-2) ... Selecting previously unselected package python3-typeguard. Preparing to unpack .../60-python3-typeguard_4.4.1-1_all.deb ... Unpacking python3-typeguard (4.4.1-1) ... Selecting previously unselected package python3-inflect. Preparing to unpack .../61-python3-inflect_7.3.1-2_all.deb ... Unpacking python3-inflect (7.3.1-2) ... Selecting previously unselected package python3-jaraco.context. Preparing to unpack .../62-python3-jaraco.context_6.0.0-1_all.deb ... Unpacking python3-jaraco.context (6.0.0-1) ... Selecting previously unselected package python3-jaraco.functools. Preparing to unpack .../63-python3-jaraco.functools_4.1.0-1_all.deb ... Unpacking python3-jaraco.functools (4.1.0-1) ... Selecting previously unselected package python3-pkg-resources. Preparing to unpack .../64-python3-pkg-resources_74.1.2-2_all.deb ... Unpacking python3-pkg-resources (74.1.2-2) ... Selecting previously unselected package python3-zipp. Preparing to unpack .../65-python3-zipp_3.21.0-1_all.deb ... Unpacking python3-zipp (3.21.0-1) ... Selecting previously unselected package python3-setuptools. Preparing to unpack .../66-python3-setuptools_74.1.2-2_all.deb ... Unpacking python3-setuptools (74.1.2-2) ... Selecting previously unselected package meson. Preparing to unpack .../67-meson_1.6.0-1_all.deb ... Unpacking meson (1.6.0-1) ... Selecting previously unselected package opensc-pkcs11:armhf. Preparing to unpack .../68-opensc-pkcs11_0.25.1-2_armhf.deb ... Unpacking opensc-pkcs11:armhf (0.25.1-2) ... Selecting previously unselected package opensc. Preparing to unpack .../69-opensc_0.25.1-2_armhf.deb ... Unpacking opensc (0.25.1-2) ... Selecting previously unselected package openssl. Preparing to unpack .../70-openssl_3.3.2-2_armhf.deb ... Unpacking openssl (3.3.2-2) ... Selecting previously unselected package p11-kit-modules:armhf. Preparing to unpack .../71-p11-kit-modules_0.25.5-2+b1_armhf.deb ... Unpacking p11-kit-modules:armhf (0.25.5-2+b1) ... Selecting previously unselected package p11-kit. Preparing to unpack .../72-p11-kit_0.25.5-2+b1_armhf.deb ... Unpacking p11-kit (0.25.5-2+b1) ... Selecting previously unselected package pkgconf-bin. Preparing to unpack .../73-pkgconf-bin_1.8.1-4_armhf.deb ... Unpacking pkgconf-bin (1.8.1-4) ... Selecting previously unselected package pkgconf:armhf. Preparing to unpack .../74-pkgconf_1.8.1-4_armhf.deb ... Unpacking pkgconf:armhf (1.8.1-4) ... Selecting previously unselected package softhsm2. Preparing to unpack .../75-softhsm2_2.6.1-2.2+b1_armhf.deb ... Unpacking softhsm2 (2.6.1-2.2+b1) ... Setting up media-types (10.1.0) ... Setting up libpipeline1:armhf (1.5.8-1) ... Setting up libkeyutils1:armhf (1.6.3-4) ... Setting up libicu72:armhf (72.1-5+b1) ... Setting up bsdextrautils (2.40.2-11) ... Setting up libmagic-mgc (1:5.45-3+b1) ... Setting up libarchive-zip-perl (1.68-1) ... Setting up libtommath1:armhf (1.3.0-1) ... Setting up libtirpc-common (1.3.4+ds-1.3) ... Setting up libdebhelper-perl (13.20) ... Setting up libmagic1t64:armhf (1:5.45-3+b1) ... Setting up gettext-base (0.22.5-2) ... Setting up m4 (1.4.19-4) ... Setting up libevent-2.1-7t64:armhf (2.1.12-stable-10+b1) ... Setting up libcom-err2:armhf (1.47.1-1+b1) ... Setting up file (1:5.45-3+b1) ... Setting up ninja-build (1.12.1-1) ... Setting up libelf1t64:armhf (0.192-4) ... Setting up libeac3:armhf (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ... Setting up libkrb5support0:armhf (1.21.3-3) ... Setting up tzdata (2024b-3) ... Current default time zone: 'Etc/UTC' Local time is now: Fri Nov 29 11:58:06 UTC 2024. Universal Time is now: Fri Nov 29 11:58:06 UTC 2024. Run 'dpkg-reconfigure tzdata' if you wish to change it. Setting up p11-kit-modules:armhf (0.25.5-2+b1) ... Setting up autotools-dev (20220109.1) ... Setting up libglib2.0-0t64:armhf (2.82.2-2) ... No schema files found: doing nothing. Setting up libunbound8:armhf (1.22.0-1) ... Setting up libpkgconf3:armhf (1.8.1-4) ... Setting up libgnutls-dane0t64:armhf (3.8.8-2) ... Setting up libnspr4:armhf (2:4.36-1) ... Setting up libssl-dev:armhf (3.3.2-2) ... Setting up libtcl8.6:armhf (8.6.15+dfsg-2) ... Setting up autopoint (0.22.5-2) ... Setting up pkgconf-bin (1.8.1-4) ... Setting up libk5crypto3:armhf (1.21.3-3) ... Setting up autoconf (2.72-3) ... Setting up dwz (0.15-1+b2) ... Setting up sensible-utils (0.0.24) ... Setting up libuchardet0:armhf (0.0.8-1+b2) ... Setting up netbase (6.4) ... Setting up libkrb5-3:armhf (1.21.3-3) ... Setting up p11-kit (0.25.5-2+b1) ... Setting up openssl (3.3.2-2) ... Setting up readline-common (8.2-5) ... Setting up libxml2:armhf (2.12.7+dfsg+really2.9.14-0.2+b1) ... Setting up libp11-kit-dev:armhf (0.25.5-2+b1) ... Setting up libtomcrypt1:armhf (1.18.2+dfsg-7+b2) ... Setting up automake (1:1.16.5-1.3) ... update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Setting up gnutls-bin (3.8.8-2) ... Setting up libfile-stripnondeterminism-perl (1.14.0-1) ... Setting up libnspr4-dev (2:4.36-1) ... Setting up tcl8.6 (8.6.15+dfsg-2) ... Setting up gettext (0.22.5-2) ... Setting up libtool (2.4.7-8) ... Setting up tcl-expect:armhf (5.45.4-3+b1) ... Setting up libnss3:armhf (2:3.106-1) ... Setting up pkgconf:armhf (1.8.1-4) ... Setting up intltool-debian (0.35.0+20060710.6) ... Setting up libstoken1t64:armhf (0.92-1.1+b2) ... Setting up dh-autoreconf (20) ... Setting up opensc-pkcs11:armhf (0.25.1-2) ... Setting up libtomcrypt-dev (1.18.2+dfsg-7+b2) ... Setting up libstoken-dev:armhf (0.92-1.1+b2) ... Setting up libgssapi-krb5-2:armhf (1.21.3-3) ... Setting up ucf (3.0043+nmu1) ... Setting up libreadline8t64:armhf (8.2-5) ... Setting up dh-strip-nondeterminism (1.14.0-1) ... Setting up libnss3-dev:armhf (2:3.106-1) ... Setting up groff-base (1.23.0-5) ... Setting up softhsm2-common (2.6.1-2.2+b1) ... Creating config file /etc/softhsm/softhsm2.conf with new version Setting up libtirpc3t64:armhf (1.3.4+ds-1.3+b1) ... Setting up po-debconf (1.0.21+nmu1) ... Setting up opensc (0.25.1-2) ... Setting up expect (5.45.4-3+b1) ... Setting up man-db (2.13.0-1) ... Not building database; man-db/auto-update is not 'true'. Setting up libnsl2:armhf (1.3.0-3+b3) ... Setting up libsofthsm2 (2.6.1-2.2+b1) ... Setting up softhsm2 (2.6.1-2.2+b1) ... Setting up libpython3.12-stdlib:armhf (3.12.7-3) ... Setting up python3.12 (3.12.7-3) ... Setting up debhelper (13.20) ... Setting up libpython3-stdlib:armhf (3.12.6-1) ... Setting up dh-package-notes (0.15) ... Setting up python3 (3.12.6-1) ... Setting up python3-zipp (3.21.0-1) ... Setting up python3-autocommand (2.2.2-3) ... Setting up python3-typing-extensions (4.12.2-2) ... Setting up python3-more-itertools (10.5.0-1) ... Setting up python3-jaraco.functools (4.1.0-1) ... Setting up python3-jaraco.context (6.0.0-1) ... Setting up python3-typeguard (4.4.1-1) ... Setting up python3-inflect (7.3.1-2) ... Setting up python3-pkg-resources (74.1.2-2) ... Setting up python3-setuptools (74.1.2-2) ... Setting up meson (1.6.0-1) ... Processing triggers for libc-bin (2.40-3) ... Reading package lists... Building dependency tree... Reading state information... Reading extended state information... Initializing package states... Writing extended state information... Building tag database... -> Finished parsing the build-deps I: Building the package I: Running cd /build/reproducible-path/pkcs11-provider-0.6/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../pkcs11-provider_0.6-1_source.changes dpkg-buildpackage: info: source package pkcs11-provider dpkg-buildpackage: info: source version 0.6-1 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Luca Boccassi dpkg-source --before-build . dpkg-buildpackage: info: host architecture armhf debian/rules clean dh clean --buildsystem=meson dh_auto_clean -O--buildsystem=meson dh_autoreconf_clean -O--buildsystem=meson dh_clean -O--buildsystem=meson debian/rules binary dh binary --buildsystem=meson dh_update_autotools_config -O--buildsystem=meson dh_autoreconf -O--buildsystem=meson dh_auto_configure -O--buildsystem=meson cd obj-arm-linux-gnueabihf && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 meson setup .. --wrap-mode=nodownload --buildtype=plain --prefix=/usr --sysconfdir=/etc --localstatedir=/var --libdir=lib/arm-linux-gnueabihf -Dpython.bytecompile=-1 The Meson build system Version: 1.6.0 Source dir: /build/reproducible-path/pkcs11-provider-0.6 Build dir: /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf Build type: native build Project name: pkcs11-provider Project version: 0.6 C compiler for the host machine: cc (gcc 14.2.0 "cc (Debian 14.2.0-8) 14.2.0") C linker for the host machine: cc ld.bfd 2.43.1 Host machine cpu family: arm Host machine cpu: armv7l Compiler for C supports arguments -Wwrite-strings: YES Compiler for C supports arguments -Wpointer-arith: YES Compiler for C supports arguments -Wno-missing-field-initializers: YES Compiler for C supports arguments -Wformat: YES Compiler for C supports arguments -Wshadow: YES Compiler for C supports arguments -Wno-unused-parameter: YES Compiler for C supports arguments -Werror=implicit-function-declaration: YES Compiler for C supports arguments -Werror=missing-prototypes: YES Compiler for C supports arguments -Werror=format-security: YES Compiler for C supports arguments -Werror=parentheses: YES Compiler for C supports arguments -Werror=implicit: YES Compiler for C supports arguments -Werror=strict-prototypes: YES Compiler for C supports arguments -fno-strict-aliasing: YES Compiler for C supports arguments -fno-delete-null-pointer-checks: YES Compiler for C supports arguments -fdiagnostics-show-option: YES Found pkg-config: YES (/usr/bin/pkg-config) 1.8.1 Run-time dependency libcrypto found: YES 3.3.2 Run-time dependency libssl found: YES 3.3.2 Run-time dependency p11-kit-1 found: YES 0.25.5 Has header "dlfcn.h" : YES Configuring config.h using configuration Compiler for C supports link arguments -Wl,--version-script,/build/reproducible-path/pkcs11-provider-0.6/src/provider.map: YES Did not find CMake 'cmake' Found CMake: NO Run-time dependency nss-softokn found: NO (tried pkgconfig and cmake) Run-time dependency nss found: YES 3.106 Program setup.sh found: YES (/build/reproducible-path/pkcs11-provider-0.6/tests/setup.sh) Program valgrind found: NO Program test-wrapper found: YES (/build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper) Build targets in project: 10 pkcs11-provider 0.6 User defined options buildtype : plain libdir : lib/arm-linux-gnueabihf localstatedir : /var prefix : /usr python.bytecompile: -1 sysconfdir : /etc wrap_mode : nodownload Found ninja-1.12.1 at /usr/bin/ninja dh_auto_build -O--buildsystem=meson cd obj-arm-linux-gnueabihf && LC_ALL=C.UTF-8 ninja -j3 -v [1/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/debug.c.o -MF src/pkcs11.so.p/debug.c.o.d -o src/pkcs11.so.p/debug.c.o -c ../src/debug.c [2/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/asymmetric_cipher.c.o -MF src/pkcs11.so.p/asymmetric_cipher.c.o.d -o src/pkcs11.so.p/asymmetric_cipher.c.o -c ../src/asymmetric_cipher.c [3/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/encoder.c.o -MF src/pkcs11.so.p/encoder.c.o.d -o src/pkcs11.so.p/encoder.c.o -c ../src/encoder.c [4/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/decoder.c.o -MF src/pkcs11.so.p/decoder.c.o.d -o src/pkcs11.so.p/decoder.c.o -c ../src/decoder.c [5/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/digests.c.o -MF src/pkcs11.so.p/digests.c.o.d -o src/pkcs11.so.p/digests.c.o -c ../src/digests.c [6/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/exchange.c.o -MF src/pkcs11.so.p/exchange.c.o.d -o src/pkcs11.so.p/exchange.c.o -c ../src/exchange.c [7/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/kdf.c.o -MF src/pkcs11.so.p/kdf.c.o.d -o src/pkcs11.so.p/kdf.c.o -c ../src/kdf.c [8/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/pk11_uri.c.o -MF src/pkcs11.so.p/pk11_uri.c.o.d -o src/pkcs11.so.p/pk11_uri.c.o -c ../src/pk11_uri.c [9/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/keymgmt.c.o -MF src/pkcs11.so.p/keymgmt.c.o.d -o src/pkcs11.so.p/keymgmt.c.o -c ../src/keymgmt.c [10/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/interface.c.o -MF src/pkcs11.so.p/interface.c.o.d -o src/pkcs11.so.p/interface.c.o -c ../src/interface.c [11/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/random.c.o -MF src/pkcs11.so.p/random.c.o.d -o src/pkcs11.so.p/random.c.o -c ../src/random.c [12/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/session.c.o -MF src/pkcs11.so.p/session.c.o.d -o src/pkcs11.so.p/session.c.o -c ../src/session.c [13/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/objects.c.o -MF src/pkcs11.so.p/objects.c.o.d -o src/pkcs11.so.p/objects.c.o -c ../src/objects.c [14/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/slot.c.o -MF src/pkcs11.so.p/slot.c.o.d -o src/pkcs11.so.p/slot.c.o -c ../src/slot.c [15/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/store.c.o -MF src/pkcs11.so.p/store.c.o.d -o src/pkcs11.so.p/store.c.o -c ../src/store.c [16/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/provider.c.o -MF src/pkcs11.so.p/provider.c.o.d -o src/pkcs11.so.p/provider.c.o -c ../src/provider.c [17/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/tls.c.o -MF src/pkcs11.so.p/tls.c.o.d -o src/pkcs11.so.p/tls.c.o -c ../src/tls.c [18/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/signature.c.o -MF src/pkcs11.so.p/signature.c.o.d -o src/pkcs11.so.p/signature.c.o -c ../src/signature.c [19/41] cc -Itests/tsession.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tsession.p/tsession.c.o -MF tests/tsession.p/tsession.c.o.d -o tests/tsession.p/tsession.c.o -c ../tests/tsession.c [20/41] cc -Itests/tlsctx.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tlsctx.p/tlsctx.c.o -MF tests/tlsctx.p/tlsctx.c.o.d -o tests/tlsctx.p/tlsctx.c.o -c ../tests/tlsctx.c [21/41] cc -Itests/tgenkey.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tgenkey.p/tgenkey.c.o -MF tests/tgenkey.p/tgenkey.c.o.d -o tests/tgenkey.p/tgenkey.c.o -c ../tests/tgenkey.c [22/41] cc -Itests/tlsctx.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tlsctx.p/util.c.o -MF tests/tlsctx.p/util.c.o.d -o tests/tlsctx.p/util.c.o -c ../tests/util.c [23/41] cc -Itests/tlssetkey.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tlssetkey.p/tlssetkey.c.o -MF tests/tlssetkey.p/tlssetkey.c.o.d -o tests/tlssetkey.p/tlssetkey.c.o -c ../tests/tlssetkey.c [24/41] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/util.c.o -MF src/pkcs11.so.p/util.c.o.d -o src/pkcs11.so.p/util.c.o -c ../src/util.c [25/41] cc -Itests/tlssetkey.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tlssetkey.p/util.c.o -MF tests/tlssetkey.p/util.c.o.d -o tests/tlssetkey.p/util.c.o -c ../tests/util.c [26/41] cc -Itests/tdigests.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tdigests.p/tdigests.c.o -MF tests/tdigests.p/tdigests.c.o.d -o tests/tdigests.p/tdigests.c.o -c ../tests/tdigests.c [27/41] cc -Itests/treadkeys.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/treadkeys.p/treadkeys.c.o -MF tests/treadkeys.p/treadkeys.c.o.d -o tests/treadkeys.p/treadkeys.c.o -c ../tests/treadkeys.c [28/41] cc -Itests/tcmpkeys.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tcmpkeys.p/tcmpkeys.c.o -MF tests/tcmpkeys.p/tcmpkeys.c.o.d -o tests/tcmpkeys.p/tcmpkeys.c.o -c ../tests/tcmpkeys.c [29/41] cc -Itests/tcmpkeys.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tcmpkeys.p/util.c.o -MF tests/tcmpkeys.p/util.c.o.d -o tests/tcmpkeys.p/util.c.o -c ../tests/util.c [30/41] cc -o src/pkcs11.so src/pkcs11.so.p/asymmetric_cipher.c.o src/pkcs11.so.p/debug.c.o src/pkcs11.so.p/encoder.c.o src/pkcs11.so.p/decoder.c.o src/pkcs11.so.p/digests.c.o src/pkcs11.so.p/exchange.c.o src/pkcs11.so.p/kdf.c.o src/pkcs11.so.p/keymgmt.c.o src/pkcs11.so.p/pk11_uri.c.o src/pkcs11.so.p/interface.c.o src/pkcs11.so.p/objects.c.o src/pkcs11.so.p/provider.c.o src/pkcs11.so.p/random.c.o src/pkcs11.so.p/session.c.o src/pkcs11.so.p/signature.c.o src/pkcs11.so.p/slot.c.o src/pkcs11.so.p/store.c.o src/pkcs11.so.p/tls.c.o src/pkcs11.so.p/util.c.o -Wl,--as-needed -Wl,--allow-shlib-undefined -shared -fPIC -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--version-script,/build/reproducible-path/pkcs11-provider-0.6/src/provider.map /usr/lib/arm-linux-gnueabihf/libcrypto.so [31/41] cc -Itests/tfork.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/tfork.p/tfork.c.o -MF tests/tfork.p/tfork.c.o.d -o tests/tfork.p/tfork.c.o -c ../tests/tfork.c [32/41] cc -Itests/pincache.p -Itests -I../tests -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -MD -MQ tests/pincache.p/pincache.c.o -MF tests/pincache.p/pincache.c.o.d -o tests/pincache.p/pincache.c.o -c ../tests/pincache.c [33/41] cc -o tests/tsession tests/tsession.p/tsession.c.o -Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--start-group /usr/lib/arm-linux-gnueabihf/libcrypto.so /usr/lib/arm-linux-gnueabihf/libssl.so -Wl,--end-group [34/41] cc -o tests/tgenkey tests/tgenkey.p/tgenkey.c.o -Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--start-group /usr/lib/arm-linux-gnueabihf/libcrypto.so /usr/lib/arm-linux-gnueabihf/libssl.so -Wl,--end-group [35/41] cc -o tests/tlsctx tests/tlsctx.p/tlsctx.c.o tests/tlsctx.p/util.c.o -Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--start-group /usr/lib/arm-linux-gnueabihf/libcrypto.so /usr/lib/arm-linux-gnueabihf/libssl.so -Wl,--end-group [36/41] cc -o tests/tlssetkey tests/tlssetkey.p/tlssetkey.c.o tests/tlssetkey.p/util.c.o -Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--start-group /usr/lib/arm-linux-gnueabihf/libcrypto.so /usr/lib/arm-linux-gnueabihf/libssl.so -Wl,--end-group [37/41] cc -o tests/tdigests tests/tdigests.p/tdigests.c.o -Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--start-group /usr/lib/arm-linux-gnueabihf/libcrypto.so /usr/lib/arm-linux-gnueabihf/libssl.so -Wl,--end-group [38/41] cc -o tests/treadkeys tests/treadkeys.p/treadkeys.c.o -Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--start-group /usr/lib/arm-linux-gnueabihf/libcrypto.so /usr/lib/arm-linux-gnueabihf/libssl.so -Wl,--end-group [39/41] cc -o tests/tcmpkeys tests/tcmpkeys.p/tcmpkeys.c.o tests/tcmpkeys.p/util.c.o -Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--start-group /usr/lib/arm-linux-gnueabihf/libcrypto.so /usr/lib/arm-linux-gnueabihf/libssl.so -Wl,--end-group [40/41] cc -o tests/tfork tests/tfork.p/tfork.c.o -Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--start-group /usr/lib/arm-linux-gnueabihf/libcrypto.so /usr/lib/arm-linux-gnueabihf/libssl.so -Wl,--end-group [41/41] cc -o tests/pincache tests/pincache.p/pincache.c.o -Wl,--as-needed -Wl,--no-undefined -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--start-group /usr/lib/arm-linux-gnueabihf/libcrypto.so /usr/lib/arm-linux-gnueabihf/libssl.so -Wl,--end-group dh_auto_test -O--buildsystem=meson cd obj-arm-linux-gnueabihf && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 MESON_TESTTHREADS=3 meson test ninja: Entering directory `/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf' ninja: no work to do. 1/64 pkcs11-provider:softokn / setup OK 0.07s 2/64 pkcs11-provider:softhsm / setup OK 9.30s 3/64 pkcs11-provider:kryoptic / setup OK 0.07s 4/64 pkcs11-provider:softokn / basic SKIP 0.05s exit status 77 5/64 pkcs11-provider:softhsm / basic TIMEOUT 30.11s killed by signal 15 SIGTERM >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=35 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper basic-softhsm.t 6/64 pkcs11-provider:kryoptic / basic SKIP 0.06s exit status 77 7/64 pkcs11-provider:softokn / pubkey SKIP 0.06s exit status 77 8/64 pkcs11-provider:softhsm / pubkey OK 1.87s 9/64 pkcs11-provider:kryoptic / pubkey SKIP 0.06s exit status 77 10/64 pkcs11-provider:softokn / certs SKIP 0.06s exit status 77 11/64 pkcs11-provider:softhsm / certs OK 1.07s 12/64 pkcs11-provider:kryoptic / certs SKIP 0.06s exit status 77 13/64 pkcs11-provider:softokn / ecc SKIP 0.06s exit status 77 14/64 pkcs11-provider:softhsm / ecc OK 2.86s 15/64 pkcs11-provider:kryoptic / ecc SKIP 0.09s exit status 77 16/64 pkcs11-provider:softhsm / edwards OK 2.36s 17/64 pkcs11-provider:kryoptic / edwards SKIP 0.06s exit status 77 18/64 pkcs11-provider:softokn / ecdh SKIP 0.06s exit status 77 19/64 pkcs11-provider:kryoptic / ecdh SKIP 0.05s exit status 77 20/64 pkcs11-provider:softokn / democa SKIP 0.06s exit status 77 21/64 pkcs11-provider:softhsm / democa OK 3.70s 22/64 pkcs11-provider:kryoptic / democa SKIP 0.06s exit status 77 23/64 pkcs11-provider:softokn / digest SKIP 0.06s exit status 77 24/64 pkcs11-provider:softhsm / digest OK 0.36s 25/64 pkcs11-provider:kryoptic / digest SKIP 0.08s exit status 77 26/64 pkcs11-provider:softokn / fork SKIP 0.06s exit status 77 27/64 pkcs11-provider:softhsm / fork OK 2.73s 28/64 pkcs11-provider:kryoptic / fork SKIP 0.06s exit status 77 29/64 pkcs11-provider:softokn / oaepsha2 SKIP 0.06s exit status 77 30/64 pkcs11-provider:kryoptic / oaepsha2 SKIP 0.05s exit status 77 31/64 pkcs11-provider:softokn / hkdf SKIP 0.05s exit status 77 32/64 pkcs11-provider:kryoptic / hkdf SKIP 0.05s exit status 77 33/64 pkcs11-provider:softokn / imported SKIP 0.05s exit status 77 34/64 pkcs11-provider:kryoptic / imported SKIP 0.05s exit status 77 35/64 pkcs11-provider:softokn / rsapss SKIP 0.05s exit status 77 36/64 pkcs11-provider:softhsm / rsapss OK 0.57s 37/64 pkcs11-provider:kryoptic / rsapss SKIP 0.06s exit status 77 38/64 pkcs11-provider:softhsm / rsapssam OK 2.83s 39/64 pkcs11-provider:softokn / genkey SKIP 0.06s exit status 77 40/64 pkcs11-provider:softhsm / genkey OK 0.09s 41/64 pkcs11-provider:kryoptic / genkey SKIP 0.06s exit status 77 42/64 pkcs11-provider:softokn / session SKIP 0.05s exit status 77 43/64 pkcs11-provider:softhsm / session OK 1.14s 44/64 pkcs11-provider:kryoptic / session SKIP 0.06s exit status 77 45/64 pkcs11-provider:softokn / rand SKIP 0.06s exit status 77 46/64 pkcs11-provider:softhsm / rand OK 0.30s 47/64 pkcs11-provider:kryoptic / rand SKIP 0.06s exit status 77 48/64 pkcs11-provider:softokn / readkeys SKIP 0.06s exit status 77 49/64 pkcs11-provider:softhsm / readkeys OK 0.22s 50/64 pkcs11-provider:kryoptic / readkeys SKIP 0.06s exit status 77 51/64 pkcs11-provider:softokn / tls SKIP 0.06s exit status 77 52/64 pkcs11-provider:softhsm / tls OK 8.59s 53/64 pkcs11-provider:kryoptic / tls SKIP 0.05s exit status 77 54/64 pkcs11-provider:softokn / tlsfuzzer SKIP 0.05s exit status 77 55/64 pkcs11-provider:softhsm / tlsfuzzer SKIP 0.11s exit status 77 56/64 pkcs11-provider:kryoptic / tlsfuzzer SKIP 0.06s exit status 77 57/64 pkcs11-provider:softokn / uri SKIP 0.07s exit status 77 58/64 pkcs11-provider:softhsm / uri OK 7.70s 59/64 pkcs11-provider:kryoptic / uri SKIP 0.06s exit status 77 60/64 pkcs11-provider:softhsm / ecxc OK 3.37s 61/64 pkcs11-provider:kryoptic / ecxc SKIP 0.06s exit status 77 62/64 pkcs11-provider:softokn / cms SKIP 0.06s exit status 77 63/64 pkcs11-provider:kryoptic / cms SKIP 0.05s exit status 77 64/64 pkcs11-provider:kryoptic / pinlock SKIP 0.05s exit status 77 Ok: 19 Expected Fail: 0 Fail: 0 Unexpected Pass: 0 Skipped: 44 Timeout: 1 Full log written to /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/meson-logs/testlog.txt cd obj-arm-linux-gnueabihf && tail -v -n \+0 meson-logs/testlog.txt ==> meson-logs/testlog.txt <== Log of Meson test suite run on 2024-11-29T00:00:00.352648 Inherited environment: DEB_HOST_MULTIARCH=arm-linux-gnueabihf LC_ALL=C.UTF-8 DEB_HOST_GNU_SYSTEM=linux-gnueabihf DEB_BUILD_GNU_TYPE=arm-linux-gnueabihf DEB_LDFLAGS_MAINT_APPEND=-specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs DEB_TARGET_ARCH_LIBC=gnu SUDO_UID=107 DEB_BUILD_ARCH_ENDIAN=little DEB_BUILD_GNU_SYSTEM=linux-gnueabihf DEB_BUILD_ARCH_BITS=32 DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=3 ' DEB_HOST_ARCH=armhf DEB_TARGET_ARCH_ENDIAN=little PWD=/build/reproducible-path/pkcs11-provider-0.6 SOURCE_DATE_EPOCH=1732312733 MAIL=/var/mail/root OLDPWD=/ PBUILDER_PKGDATADIR=/usr/share/pbuilder DEB_HOST_ARCH_BITS=32 LANG=C MAKEFLAGS='' DEB_TARGET_ARCH=armhf DEB_HOST_GNU_CPU=arm DEB_BUILD_ARCH_LIBC=gnu DEB_VENDOR=Debian BUILDUSERNAME=pbuilder1 MFLAGS='' DEB_TARGET_ARCH_BITS=32 DEB_BUILD_ARCH_CPU=arm LD_PRELOAD='' DEB_HOST_ARCH_OS=linux SHELL=/bin/bash SHLVL=2 DEB_HOST_ARCH_CPU=arm PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games PBCURRENTCOMMANDLINEOPERATION=build DEB_BUILD_ARCH_ABI=eabihf LANGUAGE=en_US:en PBUILDER_SYSCONFDIR=/etc DEB_SOURCE_PACKAGE_NAME=pkcs11-provider DEB_BUILD_ARCH=armhf DEB_HOST_ARCH_LIBC=gnu TZ=/usr/share/zoneinfo/Etc/GMT+12 INVOCATION_ID=867809c02f0b47a09d91b3bd36e248f8 SUDO_GID=113 SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.IY2Sulte/pbuilderrc_ynOJ --distribution trixie --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.IY2Sulte/b1 --logfile b1/build.log pkcs11-provider_0.6-1.dsc' DEB_TARGET_ARCH_CPU=arm DEB_HOST_GNU_TYPE=arm-linux-gnueabihf DEB_BUILD_ARCH_OS=linux LOGNAME=pbuilder1 BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' DEB_TARGET_MULTIARCH=arm-linux-gnueabihf DEB_BUILD_GNU_CPU=arm DEB_TARGET_ARCH_OS=linux USER=pbuilder1 DEB_HOST_ARCH_ABI=eabihf DEB_BUILD_MULTIARCH=arm-linux-gnueabihf DEBUGINFOD_URLS=https://debuginfod.debian.net DEB_TARGET_GNU_TYPE=arm-linux-gnueabihf DEB_TARGET_ARCH_ABI=eabihf _=/usr/bin/unshare SUDO_USER=jenkins PBUILDER_PKGLIBDIR=/usr/lib/pbuilder DEB_TARGET_GNU_CPU=arm DEBIAN_FRONTEND=noninteractive HOME=/build/reproducible-path/pkcs11-provider-0.6/debian/.debhelper/generated/_source/home DEB_RULES_REQUIRES_ROOT=no DEB_TARGET_GNU_SYSTEM=linux-gnueabihf DEB_HOST_ARCH_ENDIAN=little TERM=unknown DEB_SOURCE_PACKAGE_VERSION=0.6-1 DEB_BUILD_MAINT_OPTIONS=hardening=+all PBUILDER_OPERATION=build MAKELEVEL=1 DH_INTERNAL_BUILDFLAGS=1 ASFLAGS='' ASFLAGS_FOR_BUILD='' CFLAGS='-g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' CFLAGS_FOR_BUILD='-g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' CPPFLAGS='-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2' CPPFLAGS_FOR_BUILD='-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2' CXXFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' CXXFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' DFLAGS=-frelease DFLAGS_FOR_BUILD=-frelease FCFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection' FCFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection' FFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection' FFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection' LDFLAGS='-Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs' LDFLAGS_FOR_BUILD='-Wl,-z,relro -Wl,-z,now' OBJCFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' OBJCFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' OBJCXXFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' OBJCXXFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-0.6=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' XDG_RUNTIME_DIR=/tmp/dh-xdg-rundir-lg02Jx6B DEB_PYTHON_INSTALL_LAYOUT=deb MESON_TESTTHREADS=3 ==================================== 1/64 ==================================== test: pkcs11-provider:softokn / setup start time: 12:00:00 duration: 0.07s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-0.6/tests SHARED_EXT=.so MALLOC_PERTURB_=90 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/src MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/setup.sh softokn ----------------------------------- stdout ----------------------------------- ######################################## ## Setup NSS Softokn NSS's certutil command is required ----------------------------------- stderr ----------------------------------- + source /build/reproducible-path/pkcs11-provider-0.6/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=softokn + TMPPDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softokn + TOKDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softokn/tokens + '[' -d /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softokn ']' + mkdir /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softokn + mkdir /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softokn/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softokn/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' softokn == softhsm ']' + '[' softokn == softokn ']' + source /build/reproducible-path/pkcs11-provider-0.6/tests/softokn-init.sh ++ title SECTION 'Setup NSS Softokn' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Setup NSS Softokn' ++ echo '' ++ command -v certutil ++ echo 'NSS'\''s certutil command is required' ++ exit 0 ============================================================================== ==================================== 2/64 ==================================== test: pkcs11-provider:softhsm / setup start time: 12:00:00 duration: 9.30s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=85 MESON_TEST_ITERATION=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-0.6/tests SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/src MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/setup.sh softhsm ----------------------------------- stdout ----------------------------------- ######################################## ## Searching for SoftHSM PKCS#11 library Using softhsm path /usr/lib/softhsm/libsofthsm2.so ######################################## ## Set up testing system Slot 0 has a free/uninitialized token. The token has been initialized and is reassigned to slot 1271045119 Creating new Self Sign CA Key pair generated: Private Key Object; RSA label: caCert ID: 0000 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Public Key Object; RSA 2048 bits label: caCert ID: 0000 Usage: encrypt, verify, verifyRecover, wrap Access: local Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 01 Validity: Not Before: Fri Nov 29 12:00:02 UTC 2024 Not After: Sat Nov 29 12:00:02 UTC 2025 Subject: CN=Issuer Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:a0:08:b3:ca:4d:da:23:b9:d0:1f:e3:4f:65:65:5e f9:d4:4c:73:ba:b6:d6:af:dc:fc:25:ac:42:27:52:91 4f:33:43:a7:f5:c5:12:ed:09:35:99:79:21:95:f0:96 bb:d0:24:12:99:b1:a0:cc:e0:cb:37:77:6d:d5:bb:ce 11:35:44:3a:15:ac:23:f6:cf:dc:23:54:35:c9:82:32 31:19:0d:d3:eb:6a:dd:cb:0b:a4:18:12:36:13:17:bf f0:2e:72:6d:6e:d1:cd:64:ad:b1:df:53:1f:93:bd:16 92:e2:5c:30:bc:74:d2:28:b3:35:9c:bd:7f:aa:e8:72 74:3b:fd:5e:fd:b6:5b:4b:cc:e6:83:6c:72:8d:fd:b7 f7:36:37:48:fb:ac:eb:bf:59:1e:8b:e6:80:c2:a2:6f fb:32:4d:20:fd:3d:fa:f4:b8:84:24:f2:56:0f:d0:f8 32:ba:fc:80:21:e7:9a:00:49:0a:7f:f9:72:2a:9d:f1 3c:dd:a0:0e:43:9c:40:56:9b:be:c6:03:4c:bf:d0:e2 1f:53:77:8c:5d:33:7b:4d:15:b2:3e:1e:6f:14:10:96 54:22:9f:7d:8b:a2:a2:04:d1:6c:ad:ed:dc:20:11:aa 74:60:4d:cc:aa:0e:87:be:17:30:bc:11:3d:cc:1e:d6 e9 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Certificate signing. Subject Key Identifier (not critical): c2fd5a3ac609aa7a2c2b68692a0d41aee084780c Other Information: Public Key ID: sha1:c2fd5a3ac609aa7a2c2b68692a0d41aee084780c sha256:ec0011e577182ac0f458f8127342e07b1c63ac38f81b2de3acaf99d8b91e805c Public Key PIN: pin-sha256:7AAR5XcYKsD0WPgSc0LgexxjrDj4Gy3jrK+Z2LkegFw= Signing certificate... Created certificate: Certificate Object; type = X.509 cert label: caCert subject: DN: CN=Issuer serial: 01 ID: 0000 Key pair generated: Private Key Object; RSA label: testCert ID: 0001 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Public Key Object; RSA 2048 bits label: testCert ID: 0001 Usage: encrypt, verify, verifyRecover, wrap Access: local Created certificate: Certificate Object; type = X.509 cert label: testCert subject: DN: O=PKCS11 Provider, CN=My Test Cert serial: 03 ID: 0001 RSA PKCS11 URIS pkcs11:id=%00%01?pin-value=12345678 pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%01 pkcs11:type=public;id=%00%01 pkcs11:type=private;id=%00%01 pkcs11:type=cert;object=testCert Key pair generated: Private Key Object; EC label: ecCert ID: 0002 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441041323b9ae1824911c907f83fb0ba11e76988eb22c5b23f5217df7681cd08879e93e717a7687a9eeba5b272b6f1098701f95695bbe53e761a0751095528da2cf15 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecCert ID: 0002 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local Created certificate: Certificate Object; type = X.509 cert label: ecCert subject: DN: O=PKCS11 Provider, CN=My EC Cert serial: 04 ID: 0002 Key pair generated: Private Key Object; EC label: ecPeerCert ID: 0003 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local Public Key Object; EC EC_POINT 256 bits EC_POINT: 044104ad1ea8931a8acf9ed46f2507a3af0c62cdf498ef040bb5b36f55a5ee280a0445613c85d4ff37e047df7c69e71b3d825021235df6fcb09d041eece35bf0ce9018 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecPeerCert ID: 0003 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local Created certificate: Certificate Object; type = X.509 cert label: ecPeerCert subject: DN: O=PKCS11 Provider, CN=My Peer EC Cert serial: 05 ID: 0003 EC PKCS11 URIS pkcs11:id=%00%02?pin-value=12345678 pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%02 pkcs11:type=public;id=%00%02 pkcs11:type=private;id=%00%02 pkcs11:type=cert;object=ecCert pkcs11:id=%00%03?pin-value=12345678 pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%03 pkcs11:type=public;id=%00%03 pkcs11:type=private;id=%00%03 pkcs11:type=cert;object=ecPeerCert Key pair generated: Private Key Object; EC_EDWARDS label: edCert ID: 0004 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local Public Key Object; EC_EDWARDS EC_POINT 272 bits EC_POINT: 04202aba45783ab7e4b21fbd506af8c0585275710e21e4d4d42c2723e9d9269f2821 EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) label: edCert ID: 0004 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local Created certificate: Certificate Object; type = X.509 cert label: edCert subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert serial: 06 ID: 0004 ED25519 PKCS11 URIS pkcs11:id=%00%04;pin-value=12345678 pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%04 pkcs11:type=public;id=%00%04 pkcs11:type=private;id=%00%04 pkcs11:type=cert;object=edCert ## generate RSA key pair, self-signed certificate, remove public key Key pair generated: Private Key Object; RSA label: testCert2 ID: 0005 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Public Key Object; RSA 2048 bits label: testCert2 ID: 0005 Usage: encrypt, verify, verifyRecover, wrap Access: local Created certificate: Certificate Object; type = X.509 cert label: testCert2 subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 serial: 07 ID: 0005 RSA2 PKCS11 URIS pkcs11:id=%00%05?pin-value=12345678 pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%05 pkcs11:type=private;id=%00%05 pkcs11:type=cert;object=testCert2 ## generate EC key pair, self-signed certificate, remove public key Key pair generated: Private Key Object; EC label: ecCert2 ID: 0006 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local Public Key Object; EC EC_POINT 384 bits EC_POINT: 04610450b7288a3c2eab19f7ffe478e52946a5d35953b2d8d7234728e55af16128316cee773989af676fd61923ceded18509ed5e74eca30953fd58013c5ef24c0ed3ba0b69e99582ea44778163036d70a67afc1147fff0a41395197d53f4e7a4465b32 EC_PARAMS: 06052b81040022 (OID 1.3.132.0.34) label: ecCert2 ID: 0006 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local Created certificate: Certificate Object; type = X.509 cert label: ecCert2 subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 serial: 08 ID: 0006 EC2 PKCS11 URIS pkcs11:id=%00%06?pin-value=12345678 pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%06 pkcs11:type=private;id=%00%06 pkcs11:type=cert;object=ecCert2 ## generate explicit EC key pair Created private key: Private Key Object; EC label: ecExplicitCert ID: 0007 Usage: decrypt, sign, signRecover, unwrap Access: sensitive Created public key: Public Key Object; EC EC_POINT 192 bits EC_POINT: 04310410930965f1d0849c2ffa3a575f777f57a7c8c40934e4525eb1e31e689de38a3e7b136b4d3c2bd2c82de70d753ec7209a EC_PARAMS: 3081af020101302406072a8648ce3d0101021900befa5d6fd594a058d22f2bc4c22009a83685639a85a54d7d303404186f54e1bd75f76fb5d11bec084bd18f94e68e9e02db73852a0418657510e059c61603405486c8a7550ca6530aed3c98a517630431043981fb5d14d3808971275dea9831573301cba0117bea9ab25ef767e188fb4a659d4693e1d27edb94bead8c345db5179902182fbe975bf5652816348bcaf164dc6772e88e010fa5c95c21020104 label: ecExplicitCert ID: 0007 Usage: encrypt, verify, verifyRecover, wrap Access: none EXPLICIT EC PKCS11 URIS pkcs11:id=%00%07 pkcs11:type=public;id=%00%07 pkcs11:type=private;id=%00%07 ## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate Key pair generated: Private Key Object; EC label: ecCert3 ID: 0008 Usage: decrypt, sign, signRecover, unwrap, derive Access: always authenticate, sensitive, always sensitive, never extractable, local Public Key Object; EC EC_POINT 528 bits EC_POINT: 0481850401012f77f9928926fa4989758a04b6e81e2d1a0bc49c5ab73fc9f59982fe8e885d1ef9da4eb4fc5f2d7aabd7dfedb55b0580ab4075044c0bd065bd9498e8642e52a20133f38826f718e36f16554235c7198494d27f47d64ec3b1109ecea7f7fe15186889f906f5d496c5a733436c8f9193795647663654f680efb3f5c9e5935f0cf77496 EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) label: ecCert3 ID: 0008 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local Created certificate: Certificate Object; type = X.509 cert label: ecCert3 subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 serial: 09 ID: 0008 EC3 PKCS11 URIS pkcs11:id=%00%08?pin-value=12345678 pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%08 pkcs11:type=public;id=%00%08 pkcs11:type=private;id=%00%08 pkcs11:type=cert;object=ecCert3 ## Show contents of softhsm token ---------------------------------------------------------------------------------------------------- Certificate Object; type = X.509 cert label: edCert subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert serial: 06 ID: 0004 Private Key Object; RSA label: testCert ID: 0001 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Certificate Object; type = X.509 cert label: ecPeerCert subject: DN: O=PKCS11 Provider, CN=My Peer EC Cert serial: 05 ID: 0003 Public Key Object; EC EC_POINT 528 bits EC_POINT: 0481850401012f77f9928926fa4989758a04b6e81e2d1a0bc49c5ab73fc9f59982fe8e885d1ef9da4eb4fc5f2d7aabd7dfedb55b0580ab4075044c0bd065bd9498e8642e52a20133f38826f718e36f16554235c7198494d27f47d64ec3b1109ecea7f7fe15186889f906f5d496c5a733436c8f9193795647663654f680efb3f5c9e5935f0cf77496 EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) label: ecCert3 ID: 0008 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local Private Key Object; EC label: ecCert ID: 0002 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local Private Key Object; RSA label: testCert2 ID: 0005 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Private Key Object; EC label: ecPeerCert ID: 0003 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local Certificate Object; type = X.509 cert label: caCert subject: DN: CN=Issuer serial: 01 ID: 0000 Public Key Object; EC_EDWARDS EC_POINT 272 bits EC_POINT: 04202aba45783ab7e4b21fbd506af8c0585275710e21e4d4d42c2723e9d9269f2821 EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) label: edCert ID: 0004 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local Private Key Object; RSA label: caCert ID: 0000 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441041323b9ae1824911c907f83fb0ba11e76988eb22c5b23f5217df7681cd08879e93e717a7687a9eeba5b272b6f1098701f95695bbe53e761a0751095528da2cf15 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecCert ID: 0002 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local Private Key Object; EC label: ecCert2 ID: 0006 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local Private Key Object; EC label: ecCert3 ID: 0008 Usage: decrypt, sign, signRecover, unwrap, derive Access: always authenticate, sensitive, always sensitive, never extractable, local Private Key Object; EC_EDWARDS label: edCert ID: 0004 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local Public Key Object; RSA 2048 bits label: caCert ID: 0000 Usage: encrypt, verify, verifyRecover, wrap Access: local Public Key Object; EC EC_POINT 192 bits EC_POINT: 04310410930965f1d0849c2ffa3a575f777f57a7c8c40934e4525eb1e31e689de38a3e7b136b4d3c2bd2c82de70d753ec7209a EC_PARAMS: 3081af020101302406072a8648ce3d0101021900befa5d6fd594a058d22f2bc4c22009a83685639a85a54d7d303404186f54e1bd75f76fb5d11bec084bd18f94e68e9e02db73852a0418657510e059c61603405486c8a7550ca6530aed3c98a517630431043981fb5d14d3808971275dea9831573301cba0117bea9ab25ef767e188fb4a659d4693e1d27edb94bead8c345db5179902182fbe975bf5652816348bcaf164dc6772e88e010fa5c95c21020104 label: ecExplicitCert ID: 0007 Usage: encrypt, verify, verifyRecover, wrap Access: none Private Key Object; EC label: ecExplicitCert ID: 0007 Usage: decrypt, sign, signRecover, unwrap Access: sensitive Certificate Object; type = X.509 cert label: testCert subject: DN: O=PKCS11 Provider, CN=My Test Cert serial: 03 ID: 0001 Public Key Object; RSA 2048 bits label: testCert ID: 0001 Usage: encrypt, verify, verifyRecover, wrap Access: local Certificate Object; type = X.509 cert label: ecCert3 subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 serial: 09 ID: 0008 Public Key Object; EC EC_POINT 256 bits EC_POINT: 044104ad1ea8931a8acf9ed46f2507a3af0c62cdf498ef040bb5b36f55a5ee280a0445613c85d4ff37e047df7c69e71b3d825021235df6fcb09d041eece35bf0ce9018 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecPeerCert ID: 0003 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local Certificate Object; type = X.509 cert label: ecCert2 subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 serial: 08 ID: 0006 Certificate Object; type = X.509 cert label: testCert2 subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 serial: 07 ID: 0005 Certificate Object; type = X.509 cert label: ecCert subject: DN: O=PKCS11 Provider, CN=My EC Cert serial: 04 ID: 0002 ---------------------------------------------------------------------------------------------------- ## Output configurations Generate openssl config file Export test variables to /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testvars ## ######################################## ----------------------------------- stderr ----------------------------------- + source /build/reproducible-path/pkcs11-provider-0.6/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=softhsm + TMPPDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm + TOKDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/tokens + '[' -d /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm ']' + mkdir /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm + mkdir /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' softhsm == softhsm ']' + source /build/reproducible-path/pkcs11-provider-0.6/tests/softhsm-init.sh ++ title SECTION 'Searching for SoftHSM PKCS#11 library' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Searching for SoftHSM PKCS#11 library' ++ echo '' ++ command -v softhsm2-util +++++ type -p softhsm2-util ++++ dirname /usr/bin/softhsm2-util +++ dirname /usr/bin ++ softhsm_prefix=/usr ++ find_softhsm /usr/lib64/softhsm/libsofthsm2.so /usr/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/local/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ++ for _lib in "$@" ++ test -f /usr/lib64/softhsm/libsofthsm2.so ++ for _lib in "$@" ++ test -f /usr/lib/softhsm/libsofthsm2.so ++ echo 'Using softhsm path /usr/lib/softhsm/libsofthsm2.so' ++ P11LIB=/usr/lib/softhsm/libsofthsm2.so ++ return ++ export P11LIB ++ title SECTION 'Set up testing system' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Set up testing system' ++ echo '' ++ cat ++ export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/softhsm.conf ++ SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/softhsm.conf ++ export 'TOKENLABEL=SoftHSM Token' ++ TOKENLABEL='SoftHSM Token' ++ export TOKENLABELURI=SoftHSM%20Token ++ TOKENLABELURI=SoftHSM%20Token ++ softhsm2-util --init-token --label 'SoftHSM Token' --free --pin 12345678 --so-pin 12345678 ++ export 'TOKENOPTIONS=pkcs11-module-quirks = no-deinit no-operation-state' ++ TOKENOPTIONS='pkcs11-module-quirks = no-deinit no-operation-state' ++ export 'TOKENCONFIGVARS=export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/softhsm.conf' ++ TOKENCONFIGVARS='export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/softhsm.conf' ++ export TESTPORT=32000 ++ TESTPORT=32000 + SEEDFILE=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/noisefile.bin + dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/noisefile.bin bs=2048 count=1 + RAND64FILE=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/64krandom.bin + dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/64krandom.bin bs=2048 count=32 ++ uname + '[' Linux == Darwin ']' ++ type -p certtool + certtool=/usr/bin/certtool + '[' -z /usr/bin/certtool ']' + P11DEFARGS=("--module=${P11LIB}" "--login" "--pin=${PINVALUE}" "--token-label=${TOKENLABEL}") + cat + title LINE 'Creating new Self Sign CA' + case "$1" in + shift 1 + echo 'Creating new Self Sign CA' + KEYID=0000 + URIKEYID=%00%00 + CACRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt + CACRT_PEM=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem + CACRTN=caCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=caCert --id=0000 + /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt --template=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=public' --outder + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt --type=cert --id=0000 --label=caCert + SERIAL=2 + openssl x509 -inform DER -in /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt -outform PEM -out /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem + echo 'organization = "PKCS11 Provider"' + sed -e '/^cert_signing_key$/d' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg + KEYID=0001 + URIKEYID=%00%01 + TSTCRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert + TSTCRTN=testCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert --id=0001 + ca_sign /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert testCert 'My Test Cert' 0001 + CRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert + LABEL=testCert + CN='My Test Cert' + KEYID=0001 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Test Cert|g' -e 's|serial = .*|serial = 3|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert.crt --template=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat Nov 29 00:00:03 2025 CA expiration time: Sat Nov 29 00:00:02 2025 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 03 Validity: Not Before: Fri Nov 29 12:00:03 UTC 2024 Not After: Sat Nov 29 12:00:03 UTC 2025 Subject: CN=My Test Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:b6:03:1b:07:a3:0e:22:a3:f0:1c:ba:23:ba:e2:2a b5:8b:34:3e:bc:ff:fd:a7:76:a4:f3:37:33:ab:1f:2f 4e:0a:68:d1:d4:14:37:d4:1e:76:69:24:96:06:a9:21 35:65:fe:06:5a:c9:fd:ff:9f:72:8b:9e:14:4e:27:d5 d8:e2:89:53:43:39:80:06:53:db:f8:8a:8a:ab:a3:21 48:0c:94:1e:4b:65:a7:a6:f5:52:81:80:cb:07:68:2a 1e:2d:76:ce:df:cf:3a:2c:09:aa:e3:91:b7:39:3e:7c 8f:f7:57:80:a0:24:e0:28:67:5f:28:de:e6:03:ee:f2 c8:23:0b:1f:19:42:02:a8:84:de:4e:72:19:3a:34:d0 8e:31:17:0c:c3:0a:18:d5:b8:f4:2d:96:9a:a2:b5:d3 b6:45:c9:71:bd:17:c8:c0:d4:eb:7e:8a:cb:a0:92:46 b0:43:f2:03:0e:fa:0a:99:30:32:0a:45:ea:72:9e:32 14:cb:fe:04:3e:b1:e1:25:ec:97:67:30:99:be:97:44 bf:f3:66:0f:dc:65:ea:37:cc:ad:b7:d2:97:53:f5:4a 38:5c:98:a2:6b:8a:29:07:fb:58:04:01:ef:24:d6:6e 3a:2d:9a:df:6a:36:c4:ad:3f:69:ba:74:58:dd:8a:f4 b1 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): f3df19a97a65680668cad367342456cf40764bb7 Authority Key Identifier (not critical): c2fd5a3ac609aa7a2c2b68692a0d41aee084780c Other Information: Public Key ID: sha1:f3df19a97a65680668cad367342456cf40764bb7 sha256:172f4945ac8138f1eb1404fd6e239250e238783f486162fbc76369ccd52e8659 Public Key PIN: pin-sha256:Fy9JRayBOPHrFAT9biOSUOI4eD9IYWL7x2NpzNUuhlk= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert.crt --type=cert --id=0001 --label=testCert + BASEURIWITHPINVALUE='pkcs11:id=%00%01?pin-value=12345678' + BASEURIWITHPINSOURCE='pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + BASEURI=pkcs11:id=%00%01 + PUBURI='pkcs11:type=public;id=%00%01' + PRIURI='pkcs11:type=private;id=%00%01' + CRTURI='pkcs11:type=cert;object=testCert' + title LINE 'RSA PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA PKCS11 URIS' + echo 'pkcs11:id=%00%01?pin-value=12345678' + echo 'pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%01 + echo 'pkcs11:type=public;id=%00%01' + echo 'pkcs11:type=private;id=%00%01' + echo 'pkcs11:type=cert;object=testCert' + echo '' + KEYID=0002 + URIKEYID=%00%02 + ECCRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert + ECCRTN=ecCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecCert --id=0002 + ca_sign /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert ecCert 'My EC Cert' 0002 + CRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert + LABEL=ecCert + CN='My EC Cert' + KEYID=0002 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert|g' -e 's|serial = .*|serial = 4|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert.crt --template=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat Nov 29 00:00:04 2025 CA expiration time: Sat Nov 29 00:00:02 2025 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 04 Validity: Not Before: Fri Nov 29 12:00:04 UTC 2024 Not After: Sat Nov 29 12:00:04 UTC 2025 Subject: CN=My EC Cert,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: 13:23:b9:ae:18:24:91:1c:90:7f:83:fb:0b:a1:1e:76 98:8e:b2:2c:5b:23:f5:21:7d:f7:68:1c:d0:88:79:e9 Y: 3e:71:7a:76:87:a9:ee:ba:5b:27:2b:6f:10:98:70:1f 95:69:5b:be:53:e7:61:a0:75:10:95:52:8d:a2:cf:15 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): a7ee233aadd2aa338ac8ede12264b0cce81bda3a Authority Key Identifier (not critical): c2fd5a3ac609aa7a2c2b68692a0d41aee084780c Other Information: Public Key ID: sha1:a7ee233aadd2aa338ac8ede12264b0cce81bda3a sha256:5442aa4e85adad85d88bf7251be9fed307ed4cbb5909e57a17fb7851e8cbbf2d Public Key PIN: pin-sha256:VEKqToWtrYXYi/clG+n+0wftTLtZCeV6F/t4UejLvy0= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert.crt --type=cert --id=0002 --label=ecCert + ECBASEURIWITHPINVALUE='pkcs11:id=%00%02?pin-value=12345678' + ECBASEURIWITHPINSOURCE='pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + ECBASEURI=pkcs11:id=%00%02 + ECPUBURI='pkcs11:type=public;id=%00%02' + ECPRIURI='pkcs11:type=private;id=%00%02' + ECCRTURI='pkcs11:type=cert;object=ecCert' + KEYID=0003 + URIKEYID=%00%03 + ECPEERCRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/ecpeercert + ECPEERCRTN=ecPeerCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecPeerCert --id=0003 + ca_sign /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/ecpeercert ecPeerCert 'My Peer EC Cert' 0003 + CRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/ecpeercert + LABEL=ecPeerCert + CN='My Peer EC Cert' + KEYID=0003 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Peer EC Cert|g' -e 's|serial = .*|serial = 5|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/ecpeercert.crt --template=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat Nov 29 00:00:05 2025 CA expiration time: Sat Nov 29 00:00:02 2025 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 05 Validity: Not Before: Fri Nov 29 12:00:05 UTC 2024 Not After: Sat Nov 29 12:00:05 UTC 2025 Subject: CN=My Peer EC Cert,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: 00:ad:1e:a8:93:1a:8a:cf:9e:d4:6f:25:07:a3:af:0c 62:cd:f4:98:ef:04:0b:b5:b3:6f:55:a5:ee:28:0a:04 45 Y: 61:3c:85:d4:ff:37:e0:47:df:7c:69:e7:1b:3d:82:50 21:23:5d:f6:fc:b0:9d:04:1e:ec:e3:5b:f0:ce:90:18 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 2332f7f6a61a5b881ad50df8817d65f0a29208b3 Authority Key Identifier (not critical): c2fd5a3ac609aa7a2c2b68692a0d41aee084780c Other Information: Public Key ID: sha1:2332f7f6a61a5b881ad50df8817d65f0a29208b3 sha256:244f9fa894c8036e7db07fccf55ec9d0a76cf7dc27b5bc2f8e0fe4b7e7c0f77c Public Key PIN: pin-sha256:JE+fqJTIA259sH/M9V7J0Kds99wntbwvjg/kt+fA93w= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/ecpeercert.crt --type=cert --id=0003 --label=ecPeerCert + ECPEERBASEURIWITHPINVALUE='pkcs11:id=%00%03?pin-value=12345678' + ECPEERBASEURIWITHPINSOURCE='pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + ECPEERBASEURI=pkcs11:id=%00%03 + ECPEERPUBURI='pkcs11:type=public;id=%00%03' + ECPEERPRIURI='pkcs11:type=private;id=%00%03' + ECPEERCRTURI='pkcs11:type=cert;object=ecPeerCert' + title LINE 'EC PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC PKCS11 URIS' + echo 'pkcs11:id=%00%02?pin-value=12345678' + echo 'pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%02 + echo 'pkcs11:type=public;id=%00%02' + echo 'pkcs11:type=private;id=%00%02' + echo 'pkcs11:type=cert;object=ecCert' + echo 'pkcs11:id=%00%03?pin-value=12345678' + echo 'pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%03 + echo 'pkcs11:type=public;id=%00%03' + echo 'pkcs11:type=private;id=%00%03' + echo 'pkcs11:type=cert;object=ecPeerCert' + echo '' + '[' softhsm '!=' softokn ']' + KEYID=0004 + URIKEYID=%00%04 + EDCRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/edcert + EDCRTN=edCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:edwards25519 --label=edCert --id=0004 + ca_sign /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/edcert edCert 'My ED25519 Cert' 0004 + CRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/edcert + LABEL=edCert + CN='My ED25519 Cert' + KEYID=0004 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My ED25519 Cert|g' -e 's|serial = .*|serial = 6|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/edcert.crt --template=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat Nov 29 00:00:05 2025 CA expiration time: Sat Nov 29 00:00:02 2025 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 06 Validity: Not Before: Fri Nov 29 12:00:05 UTC 2024 Not After: Sat Nov 29 12:00:05 UTC 2025 Subject: CN=My ED25519 Cert,O=PKCS11 Provider Subject Public Key Algorithm: EdDSA (Ed25519) Algorithm Security Level: High (256 bits) Curve: Ed25519 X: 2a:ba:45:78:3a:b7:e4:b2:1f:bd:50:6a:f8:c0:58:52 75:71:0e:21:e4:d4:d4:2c:27:23:e9:d9:26:9f:28:21 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 46c28d01a8ed43e31e4ea67322d3f49453c8d12e Authority Key Identifier (not critical): c2fd5a3ac609aa7a2c2b68692a0d41aee084780c Other Information: Public Key ID: sha1:46c28d01a8ed43e31e4ea67322d3f49453c8d12e sha256:6e366e1eec09fad5d33b8d30a63a7c1377c45e59770e74a1199ce81385412401 Public Key PIN: pin-sha256:bjZuHuwJ+tXTO40wpjp8E3fEXll3DnShGZzoE4VBJAE= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/edcert.crt --type=cert --id=0004 --label=edCert + EDBASEURIWITHPINVALUE='pkcs11:id=%00%04;pin-value=12345678' + EDBASEURIWITHPINSOURCE='pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + EDBASEURI=pkcs11:id=%00%04 + EDPUBURI='pkcs11:type=public;id=%00%04' + EDPRIURI='pkcs11:type=private;id=%00%04' + EDCRTURI='pkcs11:type=cert;object=edCert' + title LINE 'ED25519 PKCS11 URIS' + case "$1" in + shift 1 + echo 'ED25519 PKCS11 URIS' + echo 'pkcs11:id=%00%04;pin-value=12345678' + echo 'pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%04 + echo 'pkcs11:type=public;id=%00%04' + echo 'pkcs11:type=private;id=%00%04' + echo 'pkcs11:type=cert;object=edCert' + title PARA 'generate RSA key pair, self-signed certificate, remove public key' + case "$1" in + shift 1 + echo '' + echo '## generate RSA key pair, self-signed certificate, remove public key' + '[' -f '' ']' + KEYID=0005 + URIKEYID=%00%05 + TSTCRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert2 + TSTCRTN=testCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert2 --id=0005 + ca_sign /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert2 testCert2 'My Test Cert 2' 0005 + CRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert2 + LABEL=testCert2 + CN='My Test Cert 2' + KEYID=0005 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Test Cert 2|g' -e 's|serial = .*|serial = 7|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert2.crt --template=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat Nov 29 00:00:07 2025 CA expiration time: Sat Nov 29 00:00:02 2025 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 07 Validity: Not Before: Fri Nov 29 12:00:07 UTC 2024 Not After: Sat Nov 29 12:00:07 UTC 2025 Subject: CN=My Test Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:c2:c8:58:db:55:b7:37:e4:af:df:eb:49:48:e6:b2 d3:55:04:8a:3c:8c:11:06:95:ef:d1:59:fb:7b:05:4b 56:65:6a:89:33:91:0a:43:b1:7a:50:d5:05:e5:e8:38 41:fa:da:b9:f9:7e:19:41:15:62:31:d3:56:e2:3f:c9 88:07:e2:7c:ff:1a:2b:61:fd:61:38:20:fe:49:68:df e2:36:00:13:55:9a:04:b3:00:1c:1b:cb:34:48:ad:5e 35:83:67:fb:87:04:da:9f:bd:5d:d4:2a:d3:d7:f5:2a 94:d2:83:dc:c5:7a:8a:98:83:8c:a1:a1:36:6e:c3:8c f5:46:13:1e:af:59:3e:1e:b9:ee:f8:56:5a:43:b1:8e 66:ea:6f:d9:53:0a:cc:35:eb:8d:ac:07:d8:e2:2a:75 9c:b3:66:87:8c:c4:17:dd:30:ad:81:b9:f3:6a:cb:6e 10:07:ca:27:8a:ba:0d:3c:2a:04:de:58:6b:2d:2a:0e ce:9a:6d:a7:b8:ac:11:e7:43:06:c8:da:9c:df:9a:de 79:cf:58:bd:cd:9f:c6:c6:85:01:c3:ef:11:37:bc:65 cc:15:89:00:34:ee:94:4f:da:66:ce:24:5e:0d:11:56 f4:fa:f3:04:2a:de:32:d2:2f:06:4f:f6:bc:f2:f2:71 7f Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): 51af3dffda2c7cd7a5958f3dc2a56a46f8370b45 Authority Key Identifier (not critical): c2fd5a3ac609aa7a2c2b68692a0d41aee084780c Other Information: Public Key ID: sha1:51af3dffda2c7cd7a5958f3dc2a56a46f8370b45 sha256:c95faeb2f70b26e02943cb3f0bcf71a8e9a15df6c7b2162eb5cfb3dca10155d6 Public Key PIN: pin-sha256:yV+usvcLJuApQ8s/C89xqOmhXfbHshYutc+z3KEBVdY= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testcert2.crt --type=cert --id=0005 --label=testCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0005 + BASE2URIWITHPINVALUE='pkcs11:id=%00%05?pin-value=12345678' + BASE2URIWITHPINSOURCE='pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + BASE2URI=pkcs11:id=%00%05 + PRI2URI='pkcs11:type=private;id=%00%05' + CRT2URI='pkcs11:type=cert;object=testCert2' + title LINE 'RSA2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA2 PKCS11 URIS' + echo 'pkcs11:id=%00%05?pin-value=12345678' + echo 'pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%05 + echo 'pkcs11:type=private;id=%00%05' + echo 'pkcs11:type=cert;object=testCert2' + echo '' + title PARA 'generate EC key pair, self-signed certificate, remove public key' + case "$1" in + shift 1 + echo '' + echo '## generate EC key pair, self-signed certificate, remove public key' + '[' -f '' ']' + KEYID=0006 + URIKEYID=%00%06 + TSTCRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert2 + TSTCRTN=ecCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp384r1 --label=ecCert2 --id=0006 + ca_sign /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert2 ecCert2 'My EC Cert 2' 0006 + CRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert2 + LABEL=ecCert2 + CN='My EC Cert 2' + KEYID=0006 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert 2|g' -e 's|serial = .*|serial = 8|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert2.crt --template=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat Nov 29 00:00:07 2025 CA expiration time: Sat Nov 29 00:00:02 2025 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 08 Validity: Not Before: Fri Nov 29 12:00:07 UTC 2024 Not After: Sat Nov 29 12:00:07 UTC 2025 Subject: CN=My EC Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Ultra (384 bits) Curve: SECP384R1 X: 50:b7:28:8a:3c:2e:ab:19:f7:ff:e4:78:e5:29:46:a5 d3:59:53:b2:d8:d7:23:47:28:e5:5a:f1:61:28:31:6c ee:77:39:89:af:67:6f:d6:19:23:ce:de:d1:85:09:ed Y: 5e:74:ec:a3:09:53:fd:58:01:3c:5e:f2:4c:0e:d3:ba 0b:69:e9:95:82:ea:44:77:81:63:03:6d:70:a6:7a:fc 11:47:ff:f0:a4:13:95:19:7d:53:f4:e7:a4:46:5b:32 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): c2794651d2e4452e491ecd79a8cdc8835af5be04 Authority Key Identifier (not critical): c2fd5a3ac609aa7a2c2b68692a0d41aee084780c Other Information: Public Key ID: sha1:c2794651d2e4452e491ecd79a8cdc8835af5be04 sha256:ae962f76f2219764309a5eb07430200d53a09162d5de30918f23517dac8e9450 Public Key PIN: pin-sha256:rpYvdvIhl2Qwml6wdDAgDVOgkWLV3jCRjyNRfayOlFA= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert2.crt --type=cert --id=0006 --label=ecCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0006 + ECBASE2URIWITHPINVALUE='pkcs11:id=%00%06?pin-value=12345678' + ECBASE2URIWITHPINSOURCE='pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + ECBASE2URI=pkcs11:id=%00%06 + ECPRI2URI='pkcs11:type=private;id=%00%06' + ECCRT2URI='pkcs11:type=cert;object=ecCert2' + title LINE 'EC2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC2 PKCS11 URIS' + echo 'pkcs11:id=%00%06?pin-value=12345678' + echo 'pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%06 + echo 'pkcs11:type=private;id=%00%06' + echo 'pkcs11:type=cert;object=ecCert2' + echo '' + '[' -f /etc/redhat-release ']' + '[' softhsm == softokn ']' + title PARA 'generate explicit EC key pair' + case "$1" in + shift 1 + echo '' + echo '## generate explicit EC key pair' + '[' -f '' ']' + KEYID=0007 + URIKEYID=%00%07 + ECXCRTN=ecExplicitCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object=/build/reproducible-path/pkcs11-provider-0.6/tests/explicit_ec.key.der --type=privkey --label=ecExplicitCert --id=0007 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object=/build/reproducible-path/pkcs11-provider-0.6/tests/explicit_ec.pub.der --type=pubkey --label=ecExplicitCert --id=0007 + ECXBASEURIWITHPINVALUE='pkcs11:id=%00%07?pin-value=12345678' + ECXBASEURIWITHPINSOURCE='pkcs11:id=%00%07?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + ECXBASEURI=pkcs11:id=%00%07 + ECXPUBURI='pkcs11:type=public;id=%00%07' + ECXPRIURI='pkcs11:type=private;id=%00%07' + title LINE 'EXPLICIT EC PKCS11 URIS' + case "$1" in + shift 1 + echo 'EXPLICIT EC PKCS11 URIS' + echo pkcs11:id=%00%07 + echo 'pkcs11:type=public;id=%00%07' + echo 'pkcs11:type=private;id=%00%07' + echo '' + title PARA 'generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' + case "$1" in + shift 1 + echo '' + echo '## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' + '[' -f '' ']' + KEYID=0008 + URIKEYID=%00%08 + TSTCRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert3 + TSTCRTN=ecCert3 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp521r1 --label=ecCert3 --id=0008 --always-auth + ca_sign /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert3 ecCert3 'My EC Cert 3' 0008 + CRT=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert3 + LABEL=ecCert3 + CN='My EC Cert 3' + KEYID=0008 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert 3|g' -e 's|serial = .*|serial = 9|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert3.crt --template=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat Nov 29 00:00:09 2025 CA expiration time: Sat Nov 29 00:00:02 2025 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 09 Validity: Not Before: Fri Nov 29 12:00:09 UTC 2024 Not After: Sat Nov 29 12:00:09 UTC 2025 Subject: CN=My EC Cert 3,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Future (528 bits) Curve: SECP521R1 X: 01:01:2f:77:f9:92:89:26:fa:49:89:75:8a:04:b6:e8 1e:2d:1a:0b:c4:9c:5a:b7:3f:c9:f5:99:82:fe:8e:88 5d:1e:f9:da:4e:b4:fc:5f:2d:7a:ab:d7:df:ed:b5:5b 05:80:ab:40:75:04:4c:0b:d0:65:bd:94:98:e8:64:2e 52:a2 Y: 01:33:f3:88:26:f7:18:e3:6f:16:55:42:35:c7:19:84 94:d2:7f:47:d6:4e:c3:b1:10:9e:ce:a7:f7:fe:15:18 68:89:f9:06:f5:d4:96:c5:a7:33:43:6c:8f:91:93:79 56:47:66:36:54:f6:80:ef:b3:f5:c9:e5:93:5f:0c:f7 74:96 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): fc3c372a6e03d6ca7b586fe7ab713e8d6b852c90 Authority Key Identifier (not critical): c2fd5a3ac609aa7a2c2b68692a0d41aee084780c Other Information: Public Key ID: sha1:fc3c372a6e03d6ca7b586fe7ab713e8d6b852c90 sha256:de71faf48207fb761cb813b98cc58d52a4edd04cf750160dff64435e525df308 Public Key PIN: pin-sha256:3nH69IIH+3YcuBO5jMWNUqTt0Ez3UBYN/2RDXlJd8wg= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/eccert3.crt --type=cert --id=0008 --label=ecCert3 + ECBASE3URIWITHPINVALUE='pkcs11:id=%00%08?pin-value=12345678' + ECBASE3URIWITHPINSOURCE='pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + ECBASE3URI=pkcs11:id=%00%08 + ECPUB3URI='pkcs11:type=public;id=%00%08' + ECPRI3URI='pkcs11:type=private;id=%00%08' + ECCRT3URI='pkcs11:type=cert;object=ecCert3' + title LINE 'EC3 PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC3 PKCS11 URIS' + echo 'pkcs11:id=%00%08?pin-value=12345678' + echo 'pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%08 + echo 'pkcs11:type=public;id=%00%08' + echo 'pkcs11:type=private;id=%00%08' + echo 'pkcs11:type=cert;object=ecCert3' + echo '' + title PARA 'Show contents of softhsm token' + case "$1" in + shift 1 + echo '' + echo '## Show contents of softhsm token' + '[' -f '' ']' + echo ' ----------------------------------------------------------------------------------------------------' + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' -O + echo ' ----------------------------------------------------------------------------------------------------' + title PARA 'Output configurations' + case "$1" in + shift 1 + echo '' + echo '## Output configurations' + '[' -f '' ']' + OPENSSL_CONF=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf + title LINE 'Generate openssl config file' + case "$1" in + shift 1 + echo 'Generate openssl config file' + sed -e 's|@libtoollibs@|/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/src|g' -e 's|@testsblddir@|/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests|g' -e 's|@testsdir@|/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm|g' -e 's|@SHARED_EXT@|.so|g' -e 's|@PINFILE@|/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt|g' -e 's|##TOKENOPTIONS|pkcs11-module-quirks = no-deinit no-operation-state|g' /build/reproducible-path/pkcs11-provider-0.6/tests/openssl.cnf.in + title LINE 'Export test variables to /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testvars' + case "$1" in + shift 1 + echo 'Export test variables to /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testvars' + cat + '[' -n pkcs11:id=%00%04 ']' + cat + '[' -n pkcs11:id=%00%07 ']' + cat + cat + gen_unsetvars + grep '^export' /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/testvars + sed -e s/export/unset/ -e 's/=.*$//' + title ENDSECTION + case "$1" in + echo '' + echo ' ##' + echo '########################################' + echo '' ============================================================================== ==================================== 3/64 ==================================== test: pkcs11-provider:kryoptic / setup start time: 12:00:09 duration: 0.07s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=250 MESON_TEST_ITERATION=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-0.6/tests SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/src MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/setup.sh kryoptic ----------------------------------- stdout ----------------------------------- ######################################## ## Searching for Kryoptic module skipped: Unable to find kryoptic PKCS#11 library ----------------------------------- stderr ----------------------------------- + source /build/reproducible-path/pkcs11-provider-0.6/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=kryoptic + TMPPDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/kryoptic + TOKDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/kryoptic/tokens + '[' -d /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/kryoptic ']' + mkdir /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/kryoptic + mkdir /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/kryoptic/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/kryoptic/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' kryoptic == softhsm ']' + '[' kryoptic == softokn ']' + '[' kryoptic == kryoptic ']' + source /build/reproducible-path/pkcs11-provider-0.6/tests/kryoptic-init.sh ++ title SECTION 'Searching for Kryoptic module' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Searching for Kryoptic module' ++ echo '' ++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /target/debug/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /target/release/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so ++ for _lib in "$@" ++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ echo 'skipped: Unable to find kryoptic PKCS#11 library' ++ exit 0 ============================================================================== ==================================== 4/64 ==================================== test: pkcs11-provider:softokn / basic start time: 12:00:09 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=75 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper basic-softokn.t ============================================================================== ==================================== 5/64 ==================================== test: pkcs11-provider:softhsm / basic start time: 12:00:09 duration: 30.11s result: killed by signal 15 SIGTERM command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=35 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper basic-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/tbasic ## Raw Sign check error openssl pkeyutl -sign -inkey "${BASEURI}" -pkeyopt pad-mode:none -in ${TMPPDIR}/64Brandom.bin -out ${TMPPDIR}/raw-sig.bin Public Key operation error 2060A4B6:error:0200007A:rsa routines:p11prov_sig_operate:data too small for key size:../src/signature.c:908: ## Sign and Verify with provided Hash and RSA openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## Sign and Verify with provided Hash and RSA with DigestInfo struct openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -pkeyopt digest:sha256 -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pkeyopt digest:sha256 -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## DigestSign and DigestVerify with RSA openssl pkeyutl -sign -inkey "${BASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully RSA basic encrypt and decrypt openssl pkeyutl -encrypt -inkey "${PUBURI}" -pubin -in ${SECRETFILE} -out ${SECRETFILE}.enc openssl pkeyutl -decrypt -inkey "${PRIURI}" -in ${SECRETFILE}.enc -out ${SECRETFILE}.dec ## Test Disallow Public Export openssl pkey -in $PUBURI -pubin -pubout -text ## Test CSR generation from RSA private keys openssl req -new -batch -key "${PRIURI}" -out ${TMPPDIR}/rsa_csr.pem openssl req -in ${TMPPDIR}/rsa_csr.pem -verify -noout Certificate request self-signature verify OK ## Test fetching public keys without PIN in config files openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/rsa.pub.nopin.pem openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ec.pub.nopin.pem openssl pkey -in $ECXPUBURI -pubin -pubout -out ${TMPPDIR}/ecx.pub.nopin.pem openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/ed.pub.nopin.pem ## Test fetching public keys with a PIN in URI openssl pkey -in $BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripin.pem openssl pkey -in $ECBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripin.pem openssl pkey -in $ECXBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ecx.pub.uripin.pem openssl pkey -in $EDBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripin.pem ## Test fetching public keys with a PIN source in URI openssl pkey -in $BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripinsource.pem openssl pkey -in $ECBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripinsource.pem openssl pkey -in $ECXBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ecx.pub.uripinsource.pem openssl pkey -in $EDBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripinsource.pem ## Test prompting without PIN in config files ## Test EVP_PKEY_eq on public RSA key both on token ## Test EVP_PKEY_eq on public EC key both on token ## Test EVP_PKEY_eq on public explicit EC key both on token ## Test EVP_PKEY_eq on public RSA key via import ## Match private RSA key against public key ## Match private RSA key against public key (commutativity) ## Test EVP_PKEY_eq on public EC key via import ## Match private EC key against public key ## Match private EC key against public key (commutativity) ECXPUBURI is pkcs11:type=public;id=%00%07 ## Test EVP_PKEY_eq on public explicit EC key via import ## Match private explicit EC key against public key ## Match private explicit EC key against public key (commutativity) ## Test EVP_PKEY_eq with key exporting disabled ## Test RSA key ## Test EC key ## Test explicit EC key ## Test PIN caching Prompt: "Enter pass phrase for PKCS#11 Token (Slot 1271045119 - SoftHSM slot ID 0x4bc29bff):" Returning: 12345678 Child Done ALL A-OK! Prompt: "Enter pass phrase for PKCS#11 Token (Slot 1271045119 - SoftHSM slot ID 0x4bc29bff):" Returning: 12345678 Child Done ALL A-OK! ## Test interactive Login on key without ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ## Test interactive Login repeated for operation on key with ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ## Test Key generation ============================================================================== ==================================== 6/64 ==================================== test: pkcs11-provider:kryoptic / basic start time: 12:00:40 duration: 0.06s result: exit status 77 command: MALLOC_PERTURB_=212 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper basic-kryoptic.t ============================================================================== ==================================== 7/64 ==================================== test: pkcs11-provider:softokn / pubkey start time: 12:00:40 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=126 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper pubkey-softokn.t ============================================================================== ==================================== 8/64 ==================================== test: pkcs11-provider:softhsm / pubkey start time: 12:00:40 duration: 1.87s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=247 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper pubkey-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/tpubkey ## Export RSA Public key to a file openssl pkey -in $BASEURI -pubin -pubout -out ${TMPPDIR}/baseout.pub Export Public key to a file (pub-uri) openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/pubout.pub Print Public key from private openssl pkey -in $PRIURI -pubout -text ## Export Public check error openssl pkey -in pkcs11:id=%de%ad -pubin -pubout -out ${TMPPDIR}/pubout-invlid.pub Could not find private key of Public Key from pkcs11:id=%de%ad ## Export EC Public key to a file openssl pkey -in $ECBASEURI -pubin -pubout -out ${TMPPDIR}/baseecout.pub Export EC Public key to a file (pub-uri) openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/pubecout.pub Print EC Public key from private openssl pkey -in $ECPRIURI -pubout -text ## Check we can get RSA public keys from certificate objects Export Public key to a file (priv-uri) openssl pkey -in $PRI2URI -pubout -out ${TMPPDIR}/priv-cert.pub Export Public key to a file (base-uri) openssl pkey -in $BASE2URI -pubout -out ${TMPPDIR}/base-cert.pub ## Check we can get EC public keys from certificate objects Export Public EC key to a file (priv-uri) openssl pkey -in $ECPRI2URI -pubout -out ${TMPPDIR}/ec-priv-cert.pub Export Public key to a file (base-uri) openssl pkey -in $ECBASE2URI -pubout -out ${TMPPDIR}/ec-base-cert.pub ============================================================================== ==================================== 9/64 ==================================== test: pkcs11-provider:kryoptic / pubkey start time: 12:00:42 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests MALLOC_PERTURB_=244 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper pubkey-kryoptic.t ============================================================================== =================================== 10/64 ==================================== test: pkcs11-provider:softokn / certs start time: 12:00:42 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=223 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper certs-softokn.t ============================================================================== =================================== 11/64 ==================================== test: pkcs11-provider:softhsm / certs start time: 12:00:42 duration: 1.07s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=140 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper certs-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/tcerts ## Check we can fetch certifiatce objects openssl x509 -in ${CRTURI} -subject -out ${TMPPDIR}/crt-subj.txt openssl x509 -in ${ECCRTURI} -subject -out ${TMPPDIR}/eccrt-subj.txt ## Use storeutl command to match specific certs via params openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate ============================================================================== =================================== 12/64 ==================================== test: pkcs11-provider:kryoptic / certs start time: 12:00:43 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=140 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper certs-kryoptic.t ============================================================================== =================================== 13/64 ==================================== test: pkcs11-provider:softokn / ecc start time: 12:00:43 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests MALLOC_PERTURB_=200 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper ecc-softokn.t ============================================================================== =================================== 14/64 ==================================== test: pkcs11-provider:softhsm / ecc start time: 12:00:43 duration: 2.86s result: exit status 0 command: MALLOC_PERTURB_=133 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper ecc-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/tecc ## Export EC Public key to a file openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ecout.pub Print EC Public key from private openssl pkey -in $ECPRIURI -pubout -text ## Sign and Verify with provided Hash and EC openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${ECBASEURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-ecsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${TMPPDIR}/ecout.pub" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-256) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-384) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-512) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha512-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-256) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-384) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-512) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-512-ecdgstsig.bin Signature Verified Successfully ## Test CSR generation from private ECC keys openssl req -new -batch -key "${ECPRIURI}" -out ${TMPPDIR}/ecdsa_csr.pem openssl req -in ${TMPPDIR}/ecdsa_csr.pem -verify -noout Certificate request self-signature verify OK ============================================================================== =================================== 15/64 ==================================== test: pkcs11-provider:kryoptic / ecc start time: 12:00:46 duration: 0.09s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=201 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper ecc-kryoptic.t ============================================================================== =================================== 16/64 ==================================== test: pkcs11-provider:softhsm / edwards start time: 12:00:46 duration: 2.36s result: exit status 0 command: MALLOC_PERTURB_=103 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper edwards-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/tedwards ## Export ED25519 Public key to a file openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/edout.pub Print ED25519 Public key from private openssl pkey -in $EDPRIURI -pubout -text ## DigestSign and DigestVerify with ED25519 openssl pkeyutl -sign -inkey "${EDBASEURI}" -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-eddgstsig.bin openssl pkeyutl -verify -inkey "${EDBASEURI}" -pubin -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-eddgstsig.bin Signature Verified Successfully ## Test CSR generation from private ED25519 keys openssl req -new -batch -key "${EDPRIURI}" -out ${TMPPDIR}/ed25519_csr.pem openssl req -in ${TMPPDIR}/ed25519_csr.pem -verify -noout Certificate request self-signature verify OK ## Test EVP_PKEY_eq on public Edwards key both on token ## Test EVP_PKEY_eq on public ED key via import ## Match private ED key against public key ## Match private ED key against public key (commutativity) ## Test Key generation Performed tests: 1 ## Test Ed448 Key generation Performed tests: 1 ============================================================================== =================================== 17/64 ==================================== test: pkcs11-provider:kryoptic / edwards start time: 12:00:48 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=227 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper edwards-kryoptic.t ============================================================================== =================================== 18/64 ==================================== test: pkcs11-provider:softokn / ecdh start time: 12:00:48 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=227 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper ecdh-softokn.t ============================================================================== =================================== 19/64 ==================================== test: pkcs11-provider:kryoptic / ecdh start time: 12:00:48 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=110 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper ecdh-kryoptic.t ============================================================================== =================================== 20/64 ==================================== test: pkcs11-provider:softokn / democa start time: 12:00:48 duration: 0.06s result: exit status 77 command: MALLOC_PERTURB_=241 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper democa-softokn.t ============================================================================== =================================== 21/64 ==================================== test: pkcs11-provider:softhsm / democa start time: 12:00:49 duration: 3.70s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=39 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper democa-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/tdemoca ## Set up demoCA ## Generating CA cert if needed openssl req -batch -noenc -x509 -new -key ${PRIURI} -out ${DEMOCA}/cacert.pem ## Generating a new CSR with key in file openssl req -batch -noenc -newkey rsa:2048 -subj "/CN=testing-csr-signing/O=PKCS11 Provider/C=US" -keyout ${DEMOCA}/cert.key -out ${DEMOCA}/cert.csr .+..+....+...+......+++++++++++++++++++++++++++++++++++++++*....+++++++++++++++++++++++++++++++++++++++*..........+.......+.....+.+..+....+.........+..+...............+....+...+..+...+.....................+.+.....+.+..+..............................+.+...........+..........+........+.+..+...................+........+.+..+...+.+...+...+.........+...+..................+..+..........+..+..........+...+........+...+.......+..+.+...........+.+..+...+...+.........+...+...+.+......+...+..............+.....................+.+......+...+.....+.+......+........+.......+.................+..........+..+.++++++ ...+..+++++++++++++++++++++++++++++++++++++++*....+.+..+....+...+...+++++++++++++++++++++++++++++++++++++++*..+............+..+......+..........+...+.........+...........+.......+..+.+.....+....+...+..+.......+......+.........+...+...+..+...+...+....+...........+.......+...+..+...............+.............+..+....+.....++++++ ----- ## Signing the new certificate openssl ca -batch -in ${DEMOCA}/cert.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-csr-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Nov 29 12:00:51 2025 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing RSA key in token openssl req -batch -noenc -new -key ${PRIURI} -subj "/CN=testing-rsa-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa.csr ## Signing the new RSA key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsa-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Nov 29 12:00:51 2025 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing EC key in token openssl req -batch -noenc -new -key ${ECPRIURI} -subj "/CN=testing-ec-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ec.csr ## Signing the new EC key certificate openssl ca -batch -in ${DEMOCA}/cert-ec.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ec-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Nov 29 12:00:51 2025 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing ED key in token openssl req -batch -noenc -new -key ${EDPRIURI} -subj "/CN=testing-ed-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ed.csr ## Signing the new ED key certificate openssl ca -batch -in ${DEMOCA}/cert-ed.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ed-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Nov 29 12:00:52 2025 GMT (365 days) Write out database with 1 new entries Database updated ## Set up OCSP openssl req -batch -noenc -new -subj "/CN=OCSP/O=PKCS11 Provider/C=US" -key ${PRIURI} -out ${DEMOCA}/ocspSigning.csr openssl ca -batch -keyfile ${PRIURI} -cert ${DEMOCA}/cacert.pem -in ${DEMOCA}/ocspSigning.csr -out ${DEMOCA}/ocspSigning.pem Using configuration from /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'OCSP' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Nov 29 12:00:52 2025 GMT (365 days) Write out database with 1 new entries Database updated ============================================================================== =================================== 22/64 ==================================== test: pkcs11-provider:kryoptic / democa start time: 12:00:52 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=32 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper democa-kryoptic.t ============================================================================== =================================== 23/64 ==================================== test: pkcs11-provider:softokn / digest start time: 12:00:52 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=254 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper digest-softokn.t ============================================================================== =================================== 24/64 ==================================== test: pkcs11-provider:softhsm / digest start time: 12:00:52 duration: 0.36s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=167 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper digest-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/tdigest ## Test Digests support sha512-224: Unsupported by pkcs11 token sha512-256: Unsupported by pkcs11 token sha3-224: Unsupported by pkcs11 token sha3-256: Unsupported by pkcs11 token sha3-384: Unsupported by pkcs11 token sha3-512: Unsupported by pkcs11 token PASSED ## Test Digests Blocked No digest available for testing pkcs11 provider Digest operations failed as expected ============================================================================== =================================== 25/64 ==================================== test: pkcs11-provider:kryoptic / digest start time: 12:00:53 duration: 0.08s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=223 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper digest-kryoptic.t ============================================================================== =================================== 26/64 ==================================== test: pkcs11-provider:softokn / fork start time: 12:00:53 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=185 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper fork-softokn.t ============================================================================== =================================== 27/64 ==================================== test: pkcs11-provider:softhsm / fork start time: 12:00:53 duration: 2.73s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=184 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper fork-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/tfork Child Done Child Done ALL A-OK! ============================================================================== =================================== 28/64 ==================================== test: pkcs11-provider:kryoptic / fork start time: 12:00:56 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=94 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper fork-kryoptic.t ============================================================================== =================================== 29/64 ==================================== test: pkcs11-provider:softokn / oaepsha2 start time: 12:00:56 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=27 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper oaepsha2-softokn.t ============================================================================== =================================== 30/64 ==================================== test: pkcs11-provider:kryoptic / oaepsha2 start time: 12:00:56 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=209 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper oaepsha2-kryoptic.t ============================================================================== =================================== 31/64 ==================================== test: pkcs11-provider:softokn / hkdf start time: 12:00:56 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=240 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper hkdf-softokn.t ============================================================================== =================================== 32/64 ==================================== test: pkcs11-provider:kryoptic / hkdf start time: 12:00:56 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=93 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper hkdf-kryoptic.t ============================================================================== =================================== 33/64 ==================================== test: pkcs11-provider:softokn / imported start time: 12:00:56 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=157 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper imported-softokn.t ============================================================================== =================================== 34/64 ==================================== test: pkcs11-provider:kryoptic / imported start time: 12:00:56 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=183 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper imported-kryoptic.t ============================================================================== =================================== 35/64 ==================================== test: pkcs11-provider:softokn / rsapss start time: 12:00:56 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=156 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper rsapss-softokn.t ============================================================================== =================================== 36/64 ==================================== test: pkcs11-provider:softhsm / rsapss start time: 12:00:56 duration: 0.57s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=7 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper rsapss-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/trsapss ## DigestSign and DigestVerify with RSA PSS openssl pkeyutl -sign -inkey "${BASEURI}" -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully Re-verify using OpenSSL default provider openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully ============================================================================== =================================== 37/64 ==================================== test: pkcs11-provider:kryoptic / rsapss start time: 12:00:57 duration: 0.06s result: exit status 77 command: MALLOC_PERTURB_=103 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper rsapss-kryoptic.t ============================================================================== =================================== 38/64 ==================================== test: pkcs11-provider:softhsm / rsapssam start time: 12:00:57 duration: 2.83s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=90 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper rsapssam-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/trsapssam ## Generate RSA PSS key restricted to SHA256 openssl genpkey -propquery "?provider=pkcs11" -algorithm "RSA-PSS" -pkeyopt "rsa_pss_keygen_md:SHA256" -pkeyopt "pkcs11_uri:pkcs11:object=Test-RSA-PSS-Restrictions" -----BEGIN PKCS#11 PROVIDER URI----- MIHmGhlQS0NTIzExIFByb3ZpZGVyIFVSSSB2MS4wDIHIcGtjczExOm1vZGVsPVNv ZnRIU00lMjB2MjttYW51ZmFjdHVyZXI9U29mdEhTTSUyMHByb2plY3Q7c2VyaWFs PTgwY2JiZTAyY2JjMjliZmY7dG9rZW49U29mdEhTTSUyMFRva2VuO2lkPSU1MSU5 OCU1NiU0OSUxNyU0RSVERiU4OSUzQSVCMiUxMSUwNSU2RCUxOCU1RiUyMjtvYmpl Y3Q9VGVzdC1SU0EtUFNTLVJlc3RyaWN0aW9uczt0eXBlPXByaXZhdGU= -----END PKCS#11 PROVIDER URI----- ## DigestSign and DigestVerify with RSA PSS openssl pkeyutl -sign -inkey "pkcs11:object=Test-RSA-PSS-Restrictions;type=private" -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin openssl pkeyutl -verify -inkey "pkcs11:object=Test-RSA-PSS-Restrictions;type=public" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin Signature Verified Successfully ## Fail DigestSign with RSA PSS because of restricted Digest openssl pkeyutl -sign -inkey "pkcs11:object=Test-RSA-PSS-Restrictions;type=private" -digest sha384 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha384 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-rsapps-genpkey-dgstsig.bin 2>&1 ## Generate RSA PSS key openssl genpkey -propquery "?provider=pkcs11" -algorithm "RSA-PSS" -pkeyopt "pkcs11_uri:pkcs11:object=Test-RSA-PSS-Only" -----BEGIN PKCS#11 PROVIDER URI----- MIHeGhlQS0NTIzExIFByb3ZpZGVyIFVSSSB2MS4wDIHAcGtjczExOm1vZGVsPVNv ZnRIU00lMjB2MjttYW51ZmFjdHVyZXI9U29mdEhTTSUyMHByb2plY3Q7c2VyaWFs PTgwY2JiZTAyY2JjMjliZmY7dG9rZW49U29mdEhTTSUyMFRva2VuO2lkPSU2RiU0 QyU4NSVFNSUwRCVEMiVDMiVCMSVFMSU3QiU3MyU3NyU0NyUyQyUyNCU2RjtvYmpl Y3Q9VGVzdC1SU0EtUFNTLU9ubHk7dHlwZT1wcml2YXRl -----END PKCS#11 PROVIDER URI----- ## Fail Signing with RSA PKCS1 mech and RSA-PSS key openssl pkeyutl -sign -inkey "pkcs11:object=Test-RSA-PSS-Only;type=private" -digest sha256 -pkeyopt rsa_padding_mode:pkcs1 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-rsa-not-rsapss-sig.bin 2>&1 ============================================================================== =================================== 39/64 ==================================== test: pkcs11-provider:softokn / genkey start time: 12:01:00 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=78 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper genkey-softokn.t ============================================================================== =================================== 40/64 ==================================== test: pkcs11-provider:softhsm / genkey start time: 12:01:00 duration: 0.09s result: exit status 0 command: MALLOC_PERTURB_=103 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper genkey-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/tgenkey Performed tests: 0 ============================================================================== =================================== 41/64 ==================================== test: pkcs11-provider:kryoptic / genkey start time: 12:01:00 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=78 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper genkey-kryoptic.t ============================================================================== =================================== 42/64 ==================================== test: pkcs11-provider:softokn / session start time: 12:01:00 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=203 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper session-softokn.t ============================================================================== =================================== 43/64 ==================================== test: pkcs11-provider:softhsm / session start time: 12:01:00 duration: 1.14s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=33 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper session-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/tsession ALL A-OK! ============================================================================== =================================== 44/64 ==================================== test: pkcs11-provider:kryoptic / session start time: 12:01:01 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests MALLOC_PERTURB_=224 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper session-kryoptic.t ============================================================================== =================================== 45/64 ==================================== test: pkcs11-provider:softokn / rand start time: 12:01:01 duration: 0.06s result: exit status 77 command: MALLOC_PERTURB_=241 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper rand-softokn.t ============================================================================== =================================== 46/64 ==================================== test: pkcs11-provider:softhsm / rand start time: 12:01:01 duration: 0.30s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests MALLOC_PERTURB_=47 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper rand-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/trand ## Test PKCS11 RNG openssl rand 1 20D09DB6:error:0308010C:digital envelope routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:355:Global default library context, Algorithm (PKCS11-RAND : 0), Properties () 20D09DB6:error:12000090:random number generator:rand_new_drbg:unable to fetch drbg:../crypto/rand/rand_lib.c:655: openssl rand 1 ý ============================================================================== =================================== 47/64 ==================================== test: pkcs11-provider:kryoptic / rand start time: 12:01:02 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=67 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper rand-kryoptic.t ============================================================================== =================================== 48/64 ==================================== test: pkcs11-provider:softokn / readkeys start time: 12:01:02 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=67 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper readkeys-softokn.t ============================================================================== =================================== 49/64 ==================================== test: pkcs11-provider:softhsm / readkeys start time: 12:01:02 duration: 0.22s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=240 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper readkeys-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/treadkeys ============================================================================== =================================== 50/64 ==================================== test: pkcs11-provider:kryoptic / readkeys start time: 12:01:02 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=96 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper readkeys-kryoptic.t ============================================================================== =================================== 51/64 ==================================== test: pkcs11-provider:softokn / tls start time: 12:01:02 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=154 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper tls-softokn.t ============================================================================== =================================== 52/64 ==================================== test: pkcs11-provider:softhsm / tls start time: 12:01:02 duration: 8.59s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=174 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper tls-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/ttls ## Test SSL_CTX creation SSL Context works! ## Test setting cert/keys on TLS Context Cert and Key successfully set on TLS Context! ## Test setting cert/keys on TLS Context w/o pub key Cert and Key successfully set on TLS Context! ## Test an actual TLS connection ######################################## ## TLS with key in provider ## Run sanity test with default values (RSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:03 2024 GMT; NotAfter: Nov 29 12:00:03 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDAzWhcNMjUxMTI5MTIwMDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBALYDGwejDiKj8By6I7riKrWLND68//2ndqTz NzOrHy9OCmjR1BQ31B52aSSWBqkhNWX+BlrJ/f+fcoueFE4n1djiiVNDOYAGU9v4 ioqroyFIDJQeS2WnpvVSgYDLB2gqHi12zt/POiwJquORtzk+fI/3V4CgJOAoZ18o 3uYD7vLIIwsfGUICqITeTnIZOjTQjjEXDMMKGNW49C2WmqK107ZFyXG9F8jA1Ot+ isugkkawQ/IDDvoKmTAyCkXqcp4yFMv+BD6x4SXsl2cwmb6XRL/zZg/cZeo3zK23 0pdT9Uo4XJiia4opB/tYBAHvJNZuOi2a32o2xK0/abp0WN2K9LECAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBTz3xmpemVoBmjK02c0JFbPQHZLtzAf BgNVHSMEGDAWgBTC/Vo6xgmqeiwraGkqDUGu4IR4DDANBgkqhkiG9w0BAQsFAAOC AQEAEEDPuOTKufxm8MPWNA2BWVcpbfBFEVVwn5HKavx3vtC4ckacVRaVGoKsSJTa xo5cA0Z+LG/f37quLRCbCA1PESnQzqwNXEIxxmEOOt9oCY/ajuL0L7lj0fuiyv6o KBcmfcHRC7F7H2s2VPLd9c8oyphX7/Jq5kGe7GGfjpfjaiJDI4khyg2Gqcw9VecD 2nWAmK39qpPYtSBvhfKopdWUxVC20zAXLoQMDHwhM9dMaENuQ1xoFr1j7cBrDeTT NFQYw6r5vUfULs0uGsdhBemXpLg1Jz7bFHx0raTPytbVtFpFYCMrd7o8wlg60vER qtm+YP0OyBqzx2joqJDN2ZpIKg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 388 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: D42745D1716187CBD403EFCF8B281ABD13723604FC5D0DDE5FEF7FA3BB2E6BB2 Session-ID-ctx: Resumption PSK: CB95C0B626A9796CF34C0F76038387D38D488077CAF86E0C8DF3AEF5A164EE96E0E52CC4A6996BCB26DD27BC53E67533 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 24 6d 60 9b 9e bc 70 0a-6f c5 2b 65 e4 1b 9d 84 $m`...p.o.+e.... 0010 - 3f 40 d6 79 ec 22 0b 89-ad d9 9a 3b 0e de b0 25 ?@.y.".....;...% 0020 - d7 b8 ab 75 7a 49 41 24-93 ea 87 ca 94 f5 81 dc ...uzIA$........ 0030 - 4e c9 1d a9 c9 5d 7c e8-97 cf 35 f8 85 be b8 6c N....]|...5....l 0040 - c2 0d cf 3c 58 c0 b3 a8-12 1c 74 da e6 35 09 02 ......A.... 0090 - 1c da 07 7b 1b 7a 46 e2-01 bd 89 ff f2 ab 41 01 ...{.zF.......A. 00a0 - 76 b5 33 3b 64 b0 ea 65-0a ef 74 e2 ac 8d 31 f1 v.3;d..e..t...1. 00b0 - e9 de c2 d7 06 e6 9b bd-1d f6 07 ec c3 31 35 c5 .............15. 00c0 - f5 d5 13 12 d1 0d 13 55-9c 3e 70 3f aa e3 62 fa .......U.>p?..b. Start Time: 1732881663 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 20309DB6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIPslmXmL4Yzer+K4/1c4GXBD7a+YEyYhb+W3M69eRH4u BDBnwqebqLsE6g1okK+glANEcoQ1m+x/oG6WNecjh5pzTVfd3ei1jBXbyfZAQ9PL 9kShBgIEZ0ms/6IEAgIcIKQGBAQBAAAArgYCBHJPKumzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (ECDSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:04 2024 GMT; NotAfter: Nov 29 12:00:04 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDA0WhcNMjUxMTI5MTIwMDA0WjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQTI7muGCSRHJB/g/sLoR52mI6yLFsj9SF992gc0Ih56T5x enaHqe66WycrbxCYcB+VaVu+U+dhoHUQlVKNos8Vo4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFKfuIzqt0qozisjt4SJksMzoG9o6MB8GA1UdIwQYMBaAFML9 WjrGCap6LCtoaSoNQa7ghHgMMA0GCSqGSIb3DQEBCwUAA4IBAQBHcyRJhNo9LdHT 7HFApRU7Xn10seFqpQUIFovJR5bzniaIJZM9HYYbwKV6tptdiEyv5bwlm87Rjb0T OyuE0UpsHuJ4VyFtiLGWQ5d1tbsqizTX3yFZL7tt8dwuIY9BxIeD2CWATLvJvFKg +LNYAq8hsPIO+jfPGhLF47eNs+RlWu3nZ6w2vb4TgsVGkSa003VhdaxwWsVX2Sng lgdvCX0J+eEcebwpaoDOU2d1WJE6/eXo28rtEZi+9IgrnVKf7j/OmynQM0PxYrJV PDRobuIUelaEsOkRNL7TfA1M+T4s4RqlCgwPqEQKwdbCUKfiwjqJz1IuH+j37YUY K6SHS0ML -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1001 bytes and written 388 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: B9DAB0934DD3538C0E435C5E1FA7FD4090B90ED882E4127014DA712BD7473184 Session-ID-ctx: Resumption PSK: CBF877647B030F52D99F80CA4B127969EF78ED240CBE4323DFB1C007A9166D2A9C68946505E4DFB3049638614C8647AA PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - a1 9d d5 08 71 b8 4a e9-75 10 c3 b4 e2 fd 84 23 ....q.J.u......# 0010 - 3b 43 81 0d b6 44 7e 80-a6 e0 aa 78 04 e3 a1 58 ;C...D~....x...X 0020 - 13 38 3b 4a b1 58 e1 a8-d4 e6 b0 09 1d b7 ae 3d .8;J.X.........= 0030 - db b4 3c b4 00 6e 12 ea-e9 ba c3 36 4b d1 ff a7 ..<..n.....6K... 0040 - 5b cb f9 83 50 71 92 93-10 2f b6 c4 8e 2e 75 dc [...Pq.../....u. 0050 - 9f 47 2e d1 f9 41 91 94-ae f2 4e 06 38 72 76 cc .G...A....N.8rv. 0060 - 22 84 d0 da 5f d4 0f e6-23 9e 0a d9 84 88 ff 68 "..._...#......h 0070 - b3 15 38 68 7b d4 e9 70-d3 c9 8b c0 e3 89 65 00 ..8h{..p......e. 0080 - 16 09 4c 5c fd 8f 6d 7d-1a 58 f6 93 25 58 6b 7b ..L\..m}.X..%Xk{ 0090 - 47 e4 d7 41 2e 13 4d 9f-ae 52 e2 32 40 b7 d2 a2 G..A..M..R.2@... 00a0 - c4 b7 e1 be 02 5c 5d 19-65 0c 17 9f 20 ad b1 ae .....\].e... ... 00b0 - eb ef f0 91 00 25 93 3f-e9 cb 6c 27 f7 e5 c6 21 .....%.?..l'...! 00c0 - 8d a4 e8 24 8a 14 82 04-fd 47 e2 ee 79 a3 df 60 ...$.....G..y..` Start Time: 1732881664 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 86A6F8702AAED47FA44ACDC8F788AD55B14481ADA0E66D545E89B91F4B4AA60D Session-ID-ctx: Resumption PSK: DAD2EB9A5C4C2D92977674E8700B45046D3F4C458A44EB717BB7DDE176022B33ADC3E69A273F916ED5E9BCD91850C2EB PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - a1 9d d5 08 71 b8 4a e9-75 10 c3 b4 e2 fd 84 23 ....q.J.u......# 0010 - 56 13 9a ee 23 3c 76 1f-a6 87 58 5a 75 3c 60 9b V...#..J.... 0080 - 1e bc 12 e9 4e 41 27 f3-6d 65 6b b4 58 df a3 01 ....NA'.mek.X... 0090 - 04 91 a1 32 11 b5 3c d7-3b 3e 11 28 1c 57 51 b4 ...2..<.;>.(.WQ. 00a0 - 3f 33 5d 27 8e 39 66 40-a5 6e 0d e0 57 a0 b4 fa ?3]'.9f@.n..W... 00b0 - cf f6 5c 24 f0 7c f7 35-a3 7c 55 fa 4b 2e bf 78 ..\$.|.5.|U.K..x 00c0 - 5b d7 f3 24 09 e3 5b a7-03 7b e5 22 d0 2f 4c 72 [..$..[..{."./Lr Start Time: 1732881664 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 20E09DB6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEINl1fFoBkJDmWFXobxF05/koveseboQoegVO07N6IBdi BDDFKXFSiz75+CSXKRqBreFAZwLKatk454wULT+RHaxQxQ6x5JpFlXA5YsK+qusQ HS6hBgIEZ0mtAKIEAgIcIKQGBAQBAAAArgcCBQDUKmyaswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:03 2024 GMT; NotAfter: Nov 29 12:00:03 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDAzWhcNMjUxMTI5MTIwMDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBALYDGwejDiKj8By6I7riKrWLND68//2ndqTz NzOrHy9OCmjR1BQ31B52aSSWBqkhNWX+BlrJ/f+fcoueFE4n1djiiVNDOYAGU9v4 ioqroyFIDJQeS2WnpvVSgYDLB2gqHi12zt/POiwJquORtzk+fI/3V4CgJOAoZ18o 3uYD7vLIIwsfGUICqITeTnIZOjTQjjEXDMMKGNW49C2WmqK107ZFyXG9F8jA1Ot+ isugkkawQ/IDDvoKmTAyCkXqcp4yFMv+BD6x4SXsl2cwmb6XRL/zZg/cZeo3zK23 0pdT9Uo4XJiia4opB/tYBAHvJNZuOi2a32o2xK0/abp0WN2K9LECAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBTz3xmpemVoBmjK02c0JFbPQHZLtzAf BgNVHSMEGDAWgBTC/Vo6xgmqeiwraGkqDUGu4IR4DDANBgkqhkiG9w0BAQsFAAOC AQEAEEDPuOTKufxm8MPWNA2BWVcpbfBFEVVwn5HKavx3vtC4ckacVRaVGoKsSJTa xo5cA0Z+LG/f37quLRCbCA1PESnQzqwNXEIxxmEOOt9oCY/ajuL0L7lj0fuiyv6o KBcmfcHRC7F7H2s2VPLd9c8oyphX7/Jq5kGe7GGfjpfjaiJDI4khyg2Gqcw9VecD 2nWAmK39qpPYtSBvhfKopdWUxVC20zAXLoQMDHwhM9dMaENuQ1xoFr1j7cBrDeTT NFQYw6r5vUfULs0uGsdhBemXpLg1Jz7bFHx0raTPytbVtFpFYCMrd7o8wlg60vER qtm+YP0OyBqzx2joqJDN2ZpIKg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1476 bytes and written 287 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 8E34D6C45F8075CC237B1F4DAD598386C10AEA476CAF112FB2940C300DC11AAA Session-ID-ctx: Master-Key: B9748AF34847DA65D8B2152202C4882333642F0C885E130C609D1B2A8B22123A5183F824158D3720ACBDE51EE18DE0EE PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 22 2f 39 51 ec d4 71 d5-3a 4d fe 4e 26 bd d5 c6 "/9Q..q.:M.N&... 0010 - 29 6d 0b 54 84 53 67 06-48 b1 02 1b 49 ab c9 8e )m.T.Sg.H...I... 0020 - 6a 02 fe e9 3a 32 1c 42-17 a7 52 91 e7 e0 cd 54 j...:2.B..R....T 0030 - 8d 24 57 be c8 8b 66 c1-39 04 5d 07 da 88 b7 05 .$W...f.9.]..... 0040 - 9f 42 17 58 b0 e9 2a 6e-4f 7a a3 ec 5d bc 74 bc .B.X..*nOz..].t. 0050 - db fd b2 1a 7c 37 7e 96-b7 fb d3 d3 c9 f2 82 11 ....|7~......... 0060 - b1 ea 4d be a2 de 68 72-0f 78 5d f7 19 20 2e 9c ..M...hr.x].. .. 0070 - 25 14 0f 5a 01 5c d5 5d-ae fb 1a 15 33 35 ce 50 %..Z.\.]....35.P 0080 - 11 f4 5d 67 4d ba 49 83-11 3a 00 1f 26 57 9a 09 ..]gM.I..:..&W.. 0090 - 2b 08 e7 01 8f 6f 9e bb-4c d5 19 92 21 07 dc 3a +....o..L...!..: 00a0 - 8e d6 52 84 e5 0c 62 b5-41 69 28 85 15 21 a0 29 ..R...b.Ai(..!.) Start Time: 1732881665 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 2010A6B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAMAQABDC5dIrzSEfaZdiyFSICxIgjM2QvDIheEwxgnRsqiyIS OlGD+CQVjTcgrL3lHuGN4O6hBgIEZ0mtAKIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 TLS SUCCESSFUL Q Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-RSA-AES256-GCM-SHA384 Secure Renegotiation IS supported DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with explicit TLS 1.3 spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem -tls1_3 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:03 2024 GMT; NotAfter: Nov 29 12:00:03 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDAzWhcNMjUxMTI5MTIwMDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBALYDGwejDiKj8By6I7riKrWLND68//2ndqTz NzOrHy9OCmjR1BQ31B52aSSWBqkhNWX+BlrJ/f+fcoueFE4n1djiiVNDOYAGU9v4 ioqroyFIDJQeS2WnpvVSgYDLB2gqHi12zt/POiwJquORtzk+fI/3V4CgJOAoZ18o 3uYD7vLIIwsfGUICqITeTnIZOjTQjjEXDMMKGNW49C2WmqK107ZFyXG9F8jA1Ot+ isugkkawQ/IDDvoKmTAyCkXqcp4yFMv+BD6x4SXsl2cwmb6XRL/zZg/cZeo3zK23 0pdT9Uo4XJiia4opB/tYBAHvJNZuOi2a32o2xK0/abp0WN2K9LECAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBTz3xmpemVoBmjK02c0JFbPQHZLtzAf BgNVHSMEGDAWgBTC/Vo6xgmqeiwraGkqDUGu4IR4DDANBgkqhkiG9w0BAQsFAAOC AQEAEEDPuOTKufxm8MPWNA2BWVcpbfBFEVVwn5HKavx3vtC4ckacVRaVGoKsSJTa xo5cA0Z+LG/f37quLRCbCA1PESnQzqwNXEIxxmEOOt9oCY/ajuL0L7lj0fuiyv6o KBcmfcHRC7F7H2s2VPLd9c8oyphX7/Jq5kGe7GGfjpfjaiJDI4khyg2Gqcw9VecD 2nWAmK39qpPYtSBvhfKopdWUxVC20zAXLoQMDHwhM9dMaENuQ1xoFr1j7cBrDeTT NFQYw6r5vUfULs0uGsdhBemXpLg1Jz7bFHx0raTPytbVtFpFYCMrd7o8wlg60vER qtm+YP0OyBqzx2joqJDN2ZpIKg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 318 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 0FFFE77C53A7F968A33B38D0CB78BDA5AB3D451A0430FE1B9B8AD4DA0603F498 Session-ID-ctx: Resumption PSK: 6EB3284BF56BD3BC828C50746A69F57708716C3368C42FE37470D0815630C3EB236F4A62EA9D2FF58A54B3B3FE0144BB PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 1f 24 74 34 4b 6c 5a 1e-bf 0a 3c 4e cb be 7e b4 .$t4KlZ.....1I.. 00c0 - 75 32 30 32 31 ec 2e ba-77 ec fd 03 7a 24 eb 90 u2021...w...z$.. Start Time: 1732881665 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: CAC16FB885039D362719EA4CEC20373A8D8D8127F8A8C28358AE50BBE4C410B1 Session-ID-ctx: Resumption PSK: 9CFBEA958EF2AA270A7401B2BC033B0FD652417254953DF1CA90D83DB7117D7EBC0E711A71E79873BD3A8E1FBB86736E PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 1f 24 74 34 4b 6c 5a 1e-bf 0a 3c 4e cb be 7e b4 .$t4KlZ......H. 0020 - 1e 03 15 18 30 ab 09 74-c1 3e bb 68 3c 83 09 a7 ....0..t.>.h<... 0030 - bd e6 72 7a a3 05 94 13-91 99 c0 b6 e5 fc 7f c9 ..rz............ 0040 - 19 4b c3 6c 50 20 3f 52-60 ed 60 c0 f5 d3 7c 7b .K.lP ?R`.`...|{ 0050 - 6b 18 fe 15 76 e5 67 96-f9 9a 6a 8a d9 7e 6f 8e k...v.g...j..~o. 0060 - 29 77 c5 ea 3a c7 40 6b-6b e2 a8 d5 c4 d4 3e 70 )w..:.@kk.....>p 0070 - 81 74 b2 73 97 3a 28 4a-dc b4 67 13 0f 1e 7e d6 .t.s.:(J..g...~. 0080 - 66 c2 c2 02 69 f8 7a 83-1e d7 f3 93 aa 56 99 c7 f...i.z......V.. 0090 - ff 7f 13 7c 00 c2 ee 22-42 fe 76 77 4e ad 20 00 ...|..."B.vwN. . 00a0 - 8d 4f bc 19 d9 a9 a7 a3-fb c8 c3 7f 15 2d 85 7e .O...........-.~ 00b0 - f0 b5 b0 6c f8 ac 2d 12-e3 b6 de 82 ca a9 a2 1b ...l..-......... 00c0 - 01 2d 08 3d 21 5a 52 0f-6e bf 1d a6 1d 35 60 7e .-.=!ZR.n....5`~ Start Time: 1732881665 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 2090A2B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIPS9rMZjx4dcrUoT7htGg76pYpOH8RfU0N381woAkeLQ BDCc++qVjvKqJwp0AbK8AzsP1lJBclSVPfHKkNg9txF9frwOcRpx55hzvTqOH7uG c26hBgIEZ0mtAaIEAgIcIKQGBAQBAAAArgYCBDEo6CuzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 (ECDSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:04 2024 GMT; NotAfter: Nov 29 12:00:04 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDA0WhcNMjUxMTI5MTIwMDA0WjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQTI7muGCSRHJB/g/sLoR52mI6yLFsj9SF992gc0Ih56T5x enaHqe66WycrbxCYcB+VaVu+U+dhoHUQlVKNos8Vo4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFKfuIzqt0qozisjt4SJksMzoG9o6MB8GA1UdIwQYMBaAFML9 WjrGCap6LCtoaSoNQa7ghHgMMA0GCSqGSIb3DQEBCwUAA4IBAQBHcyRJhNo9LdHT 7HFApRU7Xn10seFqpQUIFovJR5bzniaIJZM9HYYbwKV6tptdiEyv5bwlm87Rjb0T OyuE0UpsHuJ4VyFtiLGWQ5d1tbsqizTX3yFZL7tt8dwuIY9BxIeD2CWATLvJvFKg +LNYAq8hsPIO+jfPGhLF47eNs+RlWu3nZ6w2vb4TgsVGkSa003VhdaxwWsVX2Sng lgdvCX0J+eEcebwpaoDOU2d1WJE6/eXo28rtEZi+9IgrnVKf7j/OmynQM0PxYrJV PDRobuIUelaEsOkRNL7TfA1M+T4s4RqlCgwPqEQKwdbCUKfiwjqJz1IuH+j37YUY K6SHS0ML -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1087 bytes and written 287 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 Session-ID: 6E2F9788A53DD9F49B3591A5ADDDB237609F8E4874BD250BFE7EAD9E870F2FA5 Session-ID-ctx: Master-Key: 25B4D4B4102AF7F4A0F8CFC33C58E43AE1257B977743D8EE306F5F23BCBF4DD622C35DFBBB4D24C9D0DCE0675C021A0A PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 56 67 17 e9 08 67 27 c5-9b a8 59 14 cd 66 95 53 Vg...g'...Y..f.S 0010 - 08 e4 12 42 5f 94 91 15-f0 0d b1 43 5d cb 06 71 ...B_......C]..q 0020 - ae 7d cb 54 6b 32 ad 94-c2 11 94 62 10 d4 6d ca .}.Tk2.....b..m. 0030 - 55 4e 1b b4 9d 99 ba 16-df 55 23 80 3f 5a 31 6a UN.......U#.?Z1j 0040 - fe 4e 1e 7b 7a e6 7e f4-e7 e1 af ac ec 82 84 a5 .N.{z.~......... 0050 - a5 46 55 e8 d6 cb 2e 19-e2 4d ef 00 38 5a 4a 7b .FU......M..8ZJ{ 0060 - 1c 51 aa b2 b1 b4 f6 db-7f dc 63 77 58 ea 1e 4c .Q........cwX..L 0070 - ee 61 dc f9 20 5b ee 82-5c 47 4c 69 88 ad b8 a5 .a.. [..\GLi.... 0080 - 91 36 23 b3 9b e5 29 dc-7b c9 e1 75 37 09 a9 70 .6#...).{..u7..p 0090 - 82 81 74 e3 07 d9 af bf-d0 b2 d6 a3 31 16 00 f0 ..t.........1... 00a0 - 65 bb 59 ff d4 db 73 93-01 5a dc f6 4f 9a 77 5c e.Y...s..Z..O.w\ Start Time: 1732881665 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 2050A4B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2 Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALALAQABDAltNS0ECr39KD4z8M8WOQ64SV7l3dD2O4wb18jvL9N 1iLDXfu7TSTJ0NzgZ1wCGgqhBgIEZ0mtAaIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 and ECDH spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:04 2024 GMT; NotAfter: Nov 29 12:00:04 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDA0WhcNMjUxMTI5MTIwMDA0WjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQTI7muGCSRHJB/g/sLoR52mI6yLFsj9SF992gc0Ih56T5x enaHqe66WycrbxCYcB+VaVu+U+dhoHUQlVKNos8Vo4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFKfuIzqt0qozisjt4SJksMzoG9o6MB8GA1UdIwQYMBaAFML9 WjrGCap6LCtoaSoNQa7ghHgMMA0GCSqGSIb3DQEBCwUAA4IBAQBHcyRJhNo9LdHT 7HFApRU7Xn10seFqpQUIFovJR5bzniaIJZM9HYYbwKV6tptdiEyv5bwlm87Rjb0T OyuE0UpsHuJ4VyFtiLGWQ5d1tbsqizTX3yFZL7tt8dwuIY9BxIeD2CWATLvJvFKg +LNYAq8hsPIO+jfPGhLF47eNs+RlWu3nZ6w2vb4TgsVGkSa003VhdaxwWsVX2Sng lgdvCX0J+eEcebwpaoDOU2d1WJE6/eXo28rtEZi+9IgrnVKf7j/OmynQM0PxYrJV PDRobuIUelaEsOkRNL7TfA1M+T4s4RqlCgwPqEQKwdbCUKfiwjqJz1IuH+j37YUY K6SHS0ML -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1119 bytes and written 260 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES128-GCM-SHA256 Session-ID: E11E9732FDFE40B4A3AE6BEAAF1AE8BFB6BEB5212BC1B0D8F0AD078AE6CD0FA6 Session-ID-ctx: Master-Key: 6AEA540DDBA77F20D05D763AFE8486B0F50DFD29504CD88D110558A87F9EA436D3812FB3ACC26C176D9AC6B3D0A21795 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 5a b5 43 08 72 77 79 87-05 6c 92 77 8c ac 52 50 Z.C.rwy..l.w..RP 0010 - d6 8d 98 1a 9d a0 3f fb-ef 9b 4a 54 2c 6b b9 ab ......?...JT,k.. 0020 - 26 70 eb 9b 85 63 60 72-37 06 34 01 4a 57 6c 00 &p...c`r7.4.JWl. 0030 - 2b ba 94 9f ba 15 ef dc-b5 05 88 b5 20 3c 98 f6 +........... <.. 0040 - 06 2f fb e4 55 1b 1e b7-58 c7 e8 09 5c 42 9f ce ./..U...X...\B.. 0050 - 73 07 9a 4f ba 1c ce 2b-ac b6 5f 7e 12 f3 7a 8e s..O...+.._~..z. 0060 - b3 4b e7 a3 f3 fe 3e 35-ed 95 74 8b c3 47 6c 0e .K....>5..t..Gl. 0070 - ca 00 2b f5 5b fc ef 9a-8b 2a 77 25 c1 6a 16 6d ..+.[....*w%.j.m 0080 - a3 ac c3 9c 9b 84 69 c9-24 6f 76 3d ee 8a f8 d4 ......i.$ov=.... 0090 - 30 eb 75 64 6b 97 6e d6-40 14 91 3d 23 82 88 00 0.udk.n.@..=#... 00a0 - ca 19 47 9b 6e 08 03 f3-f3 8a 19 2a ac 1b 3e 6c ..G.n......*..>l Start Time: 1732881666 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 2020A9B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAKwQABDBq6lQN26d/INBddjr+hIaw9Q39KVBM2I0RBViof56k NtOBL7OswmwXbZrGs9CiF5WhBgIEZ0mtAqIEAgIcIKQGBAQBAAAArQMCAQGzAwIB Fw== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES128-GCM-SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is ECDHE-ECDSA-AES128-GCM-SHA256 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.3 and specific suite spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem -tls1_3 -ciphersuites TLS_AES_256_GCM_SHA384 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:04 2024 GMT; NotAfter: Nov 29 12:00:04 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDA0WhcNMjUxMTI5MTIwMDA0WjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQTI7muGCSRHJB/g/sLoR52mI6yLFsj9SF992gc0Ih56T5x enaHqe66WycrbxCYcB+VaVu+U+dhoHUQlVKNos8Vo4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFKfuIzqt0qozisjt4SJksMzoG9o6MB8GA1UdIwQYMBaAFML9 WjrGCap6LCtoaSoNQa7ghHgMMA0GCSqGSIb3DQEBCwUAA4IBAQBHcyRJhNo9LdHT 7HFApRU7Xn10seFqpQUIFovJR5bzniaIJZM9HYYbwKV6tptdiEyv5bwlm87Rjb0T OyuE0UpsHuJ4VyFtiLGWQ5d1tbsqizTX3yFZL7tt8dwuIY9BxIeD2CWATLvJvFKg +LNYAq8hsPIO+jfPGhLF47eNs+RlWu3nZ6w2vb4TgsVGkSa003VhdaxwWsVX2Sng lgdvCX0J+eEcebwpaoDOU2d1WJE6/eXo28rtEZi+9IgrnVKf7j/OmynQM0PxYrJV PDRobuIUelaEsOkRNL7TfA1M+T4s4RqlCgwPqEQKwdbCUKfiwjqJz1IuH+j37YUY K6SHS0ML -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1060 bytes and written 329 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: DE7B52ACA08C5F66157DEBA73060D845B00C169CC4CADD05456CCD033CF23A23 Session-ID-ctx: Resumption PSK: B46220C6C048F02ED226500D6E632F0B0DD1A2EB57BF935CFDC51B444F8786D841DA8F535389043122BD91BA9FAC233E PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 00 3a cd a3 54 ce 2b c0-35 08 ed 25 ef f1 04 98 .:..T.+.5..%.... 0010 - 67 dd 23 d9 b0 22 65 ec-5c fb c5 17 44 e4 41 09 g.#.."e.\...D.A. 0020 - fc 8b b8 d6 bc 70 da 24-52 56 ab b5 2b 22 28 40 .....p.$RV..+"(@ 0030 - 3e 3f da 5c b0 bf c9 7b-13 08 56 5d 21 3d 1a df >?.\...{..V]!=.. 0040 - 37 96 0e 8a 2f 26 d2 8c-be 74 7f cf 0c b5 d4 f8 7.../&...t...... 0050 - 17 b9 08 51 00 63 38 c9-1f 5a 76 65 ff f6 e8 bb ...Q.c8..Zve.... 0060 - 45 83 fd ef 13 f8 40 c4-47 99 39 37 35 55 64 2c E.....@.G.975Ud, 0070 - 40 b3 6d 03 5f d7 ca 2a-f8 8a 90 1d c4 e4 61 d9 @.m._..*......a. 0080 - 74 eb 33 2c 54 3d 1b 6e-b7 f6 19 e0 02 94 15 8c t.3,T=.n........ 0090 - ac 52 29 20 7e 88 9b a4-28 89 78 24 ec 31 77 f2 .R) ~...(.x$.1w. 00a0 - ee b8 f9 d2 0a e6 f8 c5-e5 b4 18 97 e0 97 4f 97 ..............O. 00b0 - f0 52 0d 06 1c 79 15 dc-8f 0b fb 8a 18 ff 3c 3d .R...y........<= 00c0 - 60 74 6c 97 b9 c7 fc 19-c6 f5 17 3e 5c aa 7f 4d `tl........>\..M Start Time: 1732881666 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 186EA8988DA0FD945FA756F624EFB30C4E2507BB04AFDF05BB666A61BA177A5A Session-ID-ctx: Resumption PSK: 08BA6CD4038FFBE1C77C521548FF00644ACEA04507AD9151C2DD10F651093808FE5CFA501CB11E761AE2401AFDF942FB PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 00 3a cd a3 54 ce 2b c0-35 08 ed 25 ef f1 04 98 .:..T.+.5..%.... 0010 - 1b 8e 54 d9 82 6d 1f c4-ca 75 16 66 9a c2 46 97 ..T..m...u.f..F. 0020 - 7a f1 1f 14 5d 18 bf e5-f3 d5 f7 a0 b7 fb b5 ed z...]........... 0030 - 9a f0 2d 95 ea ad 15 f3-fa 7d 26 cb 34 e0 1f 05 ..-......}&.4... 0040 - 74 03 9b df b3 ee 50 3b-41 44 ab 67 ba 1a 50 fd t.....P;AD.g..P. 0050 - 55 82 94 3f 56 18 87 ae-b1 e1 7d 62 6e 6e ba 3d U..?V.....}bnn.= 0060 - 69 5c 6d 58 9a de 36 8b-f1 93 01 de 7e c9 9d 1b i\mX..6.....~... 0070 - df a6 98 cd 0b 9a 88 a2-e6 56 78 22 b3 1b d0 ee .........Vx".... 0080 - 77 51 55 fc bb f1 de f2-e0 76 fd 88 85 bc 97 34 wQU......v.....4 0090 - 77 81 e5 84 24 2b 22 54-f7 01 08 60 e2 25 9f d2 w...$+"T...`.%.. 00a0 - f9 34 c8 b1 a0 07 12 74-8c a9 a0 23 17 a2 b0 6d .4.....t...#...m 00b0 - 42 fe e7 d9 1d 80 a5 94-5a 5e e8 fb 12 e8 34 65 B.......Z^....4e 00c0 - 2a 32 8b 0d 37 30 3b e1-99 e1 d6 42 d0 60 6d 1d *2..70;....B.`m. Start Time: 1732881666 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 20A0A1B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIMJOTgq+NvdYit56pCwGYe9so3J2DAvtpBUV4W2DwpNw BDAIumzUA4/74cd8UhVI/wBkSs6gRQetkVHC3RD2UQk4CP5c+lAcsR52GuJAGv35 QvuhBgIEZ0mtAqIEAgIcIKQGBAQBAAAArgYCBDDvnKCzAwIBFw== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## ######################################## ######################################## ## Forcing the provider for all server operations ## Run sanity test with default values (RSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:03 2024 GMT; NotAfter: Nov 29 12:00:03 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDAzWhcNMjUxMTI5MTIwMDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBALYDGwejDiKj8By6I7riKrWLND68//2ndqTz NzOrHy9OCmjR1BQ31B52aSSWBqkhNWX+BlrJ/f+fcoueFE4n1djiiVNDOYAGU9v4 ioqroyFIDJQeS2WnpvVSgYDLB2gqHi12zt/POiwJquORtzk+fI/3V4CgJOAoZ18o 3uYD7vLIIwsfGUICqITeTnIZOjTQjjEXDMMKGNW49C2WmqK107ZFyXG9F8jA1Ot+ isugkkawQ/IDDvoKmTAyCkXqcp4yFMv+BD6x4SXsl2cwmb6XRL/zZg/cZeo3zK23 0pdT9Uo4XJiia4opB/tYBAHvJNZuOi2a32o2xK0/abp0WN2K9LECAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBTz3xmpemVoBmjK02c0JFbPQHZLtzAf BgNVHSMEGDAWgBTC/Vo6xgmqeiwraGkqDUGu4IR4DDANBgkqhkiG9w0BAQsFAAOC AQEAEEDPuOTKufxm8MPWNA2BWVcpbfBFEVVwn5HKavx3vtC4ckacVRaVGoKsSJTa xo5cA0Z+LG/f37quLRCbCA1PESnQzqwNXEIxxmEOOt9oCY/ajuL0L7lj0fuiyv6o KBcmfcHRC7F7H2s2VPLd9c8oyphX7/Jq5kGe7GGfjpfjaiJDI4khyg2Gqcw9VecD 2nWAmK39qpPYtSBvhfKopdWUxVC20zAXLoQMDHwhM9dMaENuQ1xoFr1j7cBrDeTT NFQYw6r5vUfULs0uGsdhBemXpLg1Jz7bFHx0raTPytbVtFpFYCMrd7o8wlg60vER qtm+YP0OyBqzx2joqJDN2ZpIKg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 388 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 40CEC57E9363BEEA97B02DBA1C5509CE8037AC9EF5ECE0B11FC9B0B101DE1E34 Session-ID-ctx: Resumption PSK: DB045FCC614CEE425A9CF5E99D61EBE5BE102546B7915BA9DF771D5D6AAC43AC7019515DFAD6A23B8EFF289445715581 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 01 9d c3 b1 29 83 50 31-5a 0d 52 7d 2a 3e 75 e6 ....).P1Z.R}*>u. 0010 - a5 2f 9a 30 7f 3b dd c4-f8 ce df d1 1b d9 3f c4 ./.0.;........?. 0020 - 93 a7 67 d0 e7 9f af 25-34 b3 17 f5 03 f3 8e d1 ..g....%4....... 0030 - 5b bf 16 a1 1f 39 46 3e-06 d1 ab f2 94 3b 84 1c [....9F>.....;.. 0040 - 96 49 36 64 85 f5 68 e8-c2 55 b1 3a cd de 2c 01 .I6d..h..U.:..,. 0050 - f5 74 32 49 e7 a1 e0 a6-f1 22 95 56 4b 65 a3 b6 .t2I.....".VKe.. 0060 - c1 1c a5 0c f3 c4 ef 07-84 e5 37 b9 73 38 88 17 ..........7.s8.. 0070 - 0f 1a 7b d5 5c e6 0f 41-71 c8 91 4b 1c 43 31 6e ..{.\..Aq..K.C1n 0080 - 68 37 a9 a6 df 63 c5 a4-d3 d8 4e 3d d0 db f1 a2 h7...c....N=.... 0090 - b2 bd f5 c2 6e f1 42 60-20 e2 9c 12 f8 b6 a7 72 ....n.B` ......r 00a0 - 41 65 4d 0a 8f c2 d8 b2-d8 51 ce 9f db 17 15 e1 AeM......Q...... 00b0 - 50 dd cf c9 2d d9 4f 00-cf ad 79 b1 c9 2d 40 12 P...-.O...y..-@. 00c0 - e2 75 8d c1 67 b2 5a 3c-6b fe 1c 0f 8f b4 4a 16 .u..g.Zu. 0010 - 75 15 8d f6 ab 2c 11 6f-a7 01 88 e2 b8 14 ae d8 u....,.o........ 0020 - c1 84 c9 da 9f 31 0e b2-79 96 b8 db 5a f4 69 0c .....1..y...Z.i. 0030 - 49 cc bf a1 d7 2a 61 12-d9 1e ba 95 af 62 6e e5 I....*a......bn. 0040 - 53 e5 a1 e6 ed 2e 25 d1-60 d5 0e b3 c7 54 1e 3c S.....%.`....T.< 0050 - 19 e9 e1 f3 85 66 fc eb-46 78 ec 5e f0 16 59 f9 .....f..Fx.^..Y. 0060 - 15 68 b3 df a7 66 50 6f-e4 3b 7d a7 66 d8 c6 d9 .h...fPo.;}.f... 0070 - e8 08 98 38 a4 6e 97 65-41 2c f3 b4 16 94 3c 19 ...8.n.eA,....<. 0080 - f6 09 09 b8 c7 7f ff f4-b3 42 1b 3d 9a 60 c7 01 .........B.=.`.. 0090 - be a3 b2 11 64 86 17 7c-0c dc bc 6d 19 be e0 fa ....d..|...m.... 00a0 - 2c 6a 3d 1a 8a cf 52 02-f7 06 15 32 39 85 2c 84 ,j=...R....29.,. 00b0 - de f0 55 b3 bd 4f 34 2c-1d f8 d0 cd 56 84 c7 34 ..U..O4,....V..4 00c0 - eb 5b 7c 62 76 c7 b2 cb-16 0b d7 a6 f3 ed 8e cc .[|bv........... Start Time: 1732881667 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 2010A9B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIHWh4MO5/hbKZHIFQDTvc9bZ9jp6bR101FofruDbjKR3 BDCCKiUak1VNCSLQtTvYngWQidApb07GymvDmIHofETV0zrEd4BQrNtw8mfun83/ RmChBgIEZ0mtA6IEAgIcIKQGBAQBAAAArgcCBQDmjyqbswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (ECDSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:04 2024 GMT; NotAfter: Nov 29 12:00:04 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDA0WhcNMjUxMTI5MTIwMDA0WjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQTI7muGCSRHJB/g/sLoR52mI6yLFsj9SF992gc0Ih56T5x enaHqe66WycrbxCYcB+VaVu+U+dhoHUQlVKNos8Vo4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFKfuIzqt0qozisjt4SJksMzoG9o6MB8GA1UdIwQYMBaAFML9 WjrGCap6LCtoaSoNQa7ghHgMMA0GCSqGSIb3DQEBCwUAA4IBAQBHcyRJhNo9LdHT 7HFApRU7Xn10seFqpQUIFovJR5bzniaIJZM9HYYbwKV6tptdiEyv5bwlm87Rjb0T OyuE0UpsHuJ4VyFtiLGWQ5d1tbsqizTX3yFZL7tt8dwuIY9BxIeD2CWATLvJvFKg +LNYAq8hsPIO+jfPGhLF47eNs+RlWu3nZ6w2vb4TgsVGkSa003VhdaxwWsVX2Sng lgdvCX0J+eEcebwpaoDOU2d1WJE6/eXo28rtEZi+9IgrnVKf7j/OmynQM0PxYrJV PDRobuIUelaEsOkRNL7TfA1M+T4s4RqlCgwPqEQKwdbCUKfiwjqJz1IuH+j37YUY K6SHS0ML -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1002 bytes and written 388 bytes Verification error: unspecified certificate verification error --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 1 (unspecified certificate verification error) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: AE686BFAF854709AF90B403C13087FF870FC7666B23FF1F0A2A32DAC1847465E Session-ID-ctx: Resumption PSK: 145F30D2C71768AAA23447DF39ADF8ADD5C5B64BD21102575FD0BAD3F560B695272C10D7FD37CE69AA3A9BECCF1C1E41 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - a6 ac 32 49 d0 a2 53 ee-13 d1 93 fb f4 cc 60 de ..2I..S.......`. 0010 - 39 4b 86 ff f8 83 63 21-e8 26 2a 0d ae 3d 3c 4f 9K....c!.&*..=e. 0040 - a1 cd 79 fc 7d a3 7c e2-e1 be 37 b0 20 aa 6a 32 ..y.}.|...7. .j2 0050 - f6 df 7f e0 30 a3 0c 67-2a 61 06 fd 72 e2 b1 4f ....0..g*a..r..O 0060 - 69 49 f7 9e 00 b8 39 57-d1 af c3 94 ce 1b 7d 9e iI....9W......}. 0070 - ed 7d 98 34 3e 4f 5f 7d-9c 31 2f 24 a8 2f f9 45 .}.4>O_}.1/$./.E 0080 - 14 cb 2a a9 04 9f 83 75-d1 22 6f 0d 0a 16 fd cb ..*....u."o..... 0090 - ab e5 03 82 d3 00 48 3b-51 88 ca 64 41 2f 04 ed ......H;Q..dA/.. 00a0 - 77 0e c3 77 02 d3 7a c1-46 5b f8 e7 7c 97 03 5b w..w..z.F[..|..[ 00b0 - 2d cd d2 0e fd 40 32 90-df e5 45 bd 10 90 99 fc -....@2...E..... 00c0 - cc 18 9e 6e b0 5a 5b f9-59 3f c1 59 a1 68 08 a1 ...n.Z[.Y?.Y.h.. Start Time: 1732881667 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 20E0A5B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIC/uBBZRZHU0wuVLHKjYEOO4wZwkD3UHPjSntKwyi7mJ BDBbfhZKNEn7J4ZnvWYhtQ1zwgfS9Sgak1LAtS6OPbwTQy1bZdkwj5jsf6DBVuIY bkChBgIEZ0mtA6IEAgIcIKQGBAQBAAAArgcCBQCF4VcLswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (EdDSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED25519 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED25519 Cert i:CN=Issuer a:PKEY: ED25519, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:05 2024 GMT; NotAfter: Nov 29 12:00:05 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICSDCCATCgAwIBAgIBBjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDA1WhcNMjUxMTI5MTIwMDA1WjA0MRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxGDAWBgNVBAMTD015IEVEMjU1MTkgQ2VydDAqMAUGAytl cAMhACq6RXg6t+SyH71QavjAWFJ1cQ4h5NTULCcj6dkmnygho4GBMH8wDAYDVR0T AQH/BAIwADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8B Af8EBAMCB4AwHQYDVR0OBBYEFEbCjQGo7UPjHk6mcyLT9JRTyNEuMB8GA1UdIwQY MBaAFML9WjrGCap6LCtoaSoNQa7ghHgMMA0GCSqGSIb3DQEBCwUAA4IBAQBrBCnp mKg24XxatyQN5vpNckJ6poUOCiDJzKqdqLWHtfpvi8oM4f+f9mRIn3aQb9305f1B tM6+T3MjXz8ZP4FsITLbDnuRHmPp3jGrAw/oBITXQvt7EIO15HTBU1KCdOXT9OH9 yw8/geHyf9GSoJoOdWFEjWIsH8/keSRoCid21mLZWrGWTg2U+xhNVpLcYQ5hwyxX IVmzFsRAvVxqPLMmOpPSbDQMUtKcIHf9SaeHqel2kqWzf8R9BkcvxGKB9/+tmo6H H0BgjOqPGZhnCDW1Zyih1mFXi2f5RrFlfr8tJWBAhNU/mqa85FBdh4qlzz+GCR5f mk7kXylHSexFU8L4 -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED25519 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: Ed25519 Server Temp Key: X25519, 253 bits --- SSL handshake has read 952 bytes and written 388 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 15560B0C8FED6B8B3406D0F7C7E0D2635FA5320E28B9452A72C9D3A9D5C1A430 Session-ID-ctx: Resumption PSK: 14F476821E928C68988438F02B8E830582F835E96FD740283CC2CF0F7964F6BCB994A5DF39B196D2743656B858426E20 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 96 e3 ce ff b5 aa 37 80-8e 2e 38 a3 75 30 9d fc ......7...8.u0.. 0010 - 8b c7 28 4a 5b 50 56 cb-70 84 69 eb 9a ab f0 4e ..(J[PV.p.i....N 0020 - 7d 23 59 48 e5 ae f2 5b-de 24 df 4e 6f 9b 11 ab }#YH...[.$.No... 0030 - 3f ff d2 2c 52 66 ab 14-e4 85 ff 17 49 d3 05 24 ?..,Rf......I..$ 0040 - ff 47 87 4a cd 3d c6 10-43 85 03 86 72 2b 8f 3c .G.J.=..C...r+.< 0050 - a9 29 d4 47 60 76 a7 40-46 30 e9 cb c8 4a 63 5f .).G`v.@F0...Jc_ 0060 - 5c 6a b1 10 2e 00 09 57-9d 61 9f 74 03 04 aa 02 \j.....W.a.t.... 0070 - 96 27 57 b4 85 38 3d d0-37 b3 80 69 93 bf c9 21 .'W..8=.7..i...! 0080 - 38 8e 85 40 a4 7f 76 c3-3e 53 76 f7 b9 e6 98 29 8..@..v.>Sv....) 0090 - ec 6c 1c c3 9d 66 b9 7a-21 ed c2 e7 62 76 6f 7e .l...f.z!...bvo~ 00a0 - eb c6 a4 cb 6a 2f a2 2d-7d df c0 ce a3 1f 2e 88 ....j/.-}....... 00b0 - 2b a1 e9 74 e3 31 36 32-ed 85 df d8 6b 37 84 8e +..t.162....k7.. 00c0 - 4f 1a 05 96 a3 c5 69 09-0b 4b 20 29 3a d2 b3 10 O.....i..K ):... Start Time: 1732881668 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: E348BB37EC3497FC85BB84166E5E08F96D843DD09682DC2E1E2B8E6EF80DE2C3 Session-ID-ctx: Resumption PSK: B5B1798553AA1EE1074D0CD07CD98FB83FE4BE3788C5FDE98FE514DBCA24E4012B63A006346ACEEF0E7BE55C70F3825A PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 96 e3 ce ff b5 aa 37 80-8e 2e 38 a3 75 30 9d fc ......7...8.u0.. 0010 - 6a 18 82 3e 87 c8 7d c9-0b 0f 61 7f 6a 48 cd a7 j..>..}...a.jH.. 0020 - e3 85 de bf 1b 23 22 83-53 7f f7 03 3c a7 f9 91 .....#".S...<... 0030 - 6b 86 75 b6 b3 f8 b2 7a-c1 2e ee ba ab cc 3e b4 k.u....z......>. 0040 - 94 f2 4e 97 e0 51 1b a3-60 e7 5a c6 ec 4b 31 f5 ..N..Q..`.Z..K1. 0050 - 25 06 cd 4d 62 76 ec 54-b3 af 86 3a 8e e4 9c a8 %..Mbv.T...:.... 0060 - 39 64 05 44 e4 fe 25 34-94 28 9a dd 1d 4a db a9 9d.D..%4.(...J.. 0070 - 42 e7 7a 38 d4 99 07 df-87 0b ea a9 a8 8e 21 e9 B.z8..........!. 0080 - 5a f4 91 86 f6 12 e0 c4-88 06 99 75 a5 c0 7d 1f Z..........u..}. 0090 - 25 73 25 d2 0d 03 6a 7d-0d 50 48 d8 1d 65 dc dd %s%...j}.PH..e.. 00a0 - d8 40 10 ef 52 79 2a aa-53 4f 21 ac 63 28 f8 6c .@..Ry*.SO!.c(.l 00b0 - 69 2a 86 87 f2 31 de 92-66 4d 14 d7 ee 78 30 74 i*...1..fM...x0t 00c0 - 74 0c 7f c5 5a 11 a7 9e-e7 ef 43 4f c8 b0 27 e8 t...Z.....CO..'. Start Time: 1732881668 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 20F0A1B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEINeQZ7+Ou8f2Gu7HcZgkrh/lVVNTNhdlKG7KodLdqJ1T BDC1sXmFU6oe4QdNDNB82Y+4P+S+N4jF/emP5RTbyiTkAStjoAY0as7vDnvlXHDz glqhBgIEZ0mtBKIEAgIcIKQGBAQBAAAArgYCBGUOLNqzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:03 2024 GMT; NotAfter: Nov 29 12:00:03 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDAzWhcNMjUxMTI5MTIwMDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBALYDGwejDiKj8By6I7riKrWLND68//2ndqTz NzOrHy9OCmjR1BQ31B52aSSWBqkhNWX+BlrJ/f+fcoueFE4n1djiiVNDOYAGU9v4 ioqroyFIDJQeS2WnpvVSgYDLB2gqHi12zt/POiwJquORtzk+fI/3V4CgJOAoZ18o 3uYD7vLIIwsfGUICqITeTnIZOjTQjjEXDMMKGNW49C2WmqK107ZFyXG9F8jA1Ot+ isugkkawQ/IDDvoKmTAyCkXqcp4yFMv+BD6x4SXsl2cwmb6XRL/zZg/cZeo3zK23 0pdT9Uo4XJiia4opB/tYBAHvJNZuOi2a32o2xK0/abp0WN2K9LECAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBTz3xmpemVoBmjK02c0JFbPQHZLtzAf BgNVHSMEGDAWgBTC/Vo6xgmqeiwraGkqDUGu4IR4DDANBgkqhkiG9w0BAQsFAAOC AQEAEEDPuOTKufxm8MPWNA2BWVcpbfBFEVVwn5HKavx3vtC4ckacVRaVGoKsSJTa xo5cA0Z+LG/f37quLRCbCA1PESnQzqwNXEIxxmEOOt9oCY/ajuL0L7lj0fuiyv6o KBcmfcHRC7F7H2s2VPLd9c8oyphX7/Jq5kGe7GGfjpfjaiJDI4khyg2Gqcw9VecD 2nWAmK39qpPYtSBvhfKopdWUxVC20zAXLoQMDHwhM9dMaENuQ1xoFr1j7cBrDeTT NFQYw6r5vUfULs0uGsdhBemXpLg1Jz7bFHx0raTPytbVtFpFYCMrd7o8wlg60vER qtm+YP0OyBqzx2joqJDN2ZpIKg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1476 bytes and written 287 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: B2FD5E1D416099F69ADD0083869EC7074699DE05EE8D22BBC5B84160900C4236 Session-ID-ctx: Master-Key: FA895131D0D6E45B21749B40042DD8AC6ADBAB8D7DE6867FEF277CC6D35048BA56B0A96A229C6BE8F60AEBF28A9515C1 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 3e ed 3f 4b b4 66 83 77-a0 9f fc 0f 29 36 f5 30 >.?K.f.w....)6.0 0010 - 83 46 a5 e6 3f f3 32 18-eb c0 63 27 a5 28 e7 2e .F..?.2...c'.(.. 0020 - 61 e0 b5 5c bc 7b 68 79-4a 2b e2 15 f1 3b 06 8b a..\.{hyJ+...;.. 0030 - 23 b5 dd 72 5a 4b 61 46-6d b9 ec 07 8e ce 93 2d #..rZKaFm......- 0040 - fb 4f ae a4 c3 e0 87 55-34 9e a8 50 9e 9f 93 15 .O.....U4..P.... 0050 - ff 7b 9a 8d dc 81 d6 74-b5 99 5a 64 c3 d5 ba 73 .{.....t..Zd...s 0060 - 22 e6 41 5f 84 da ec 9c-df e2 38 42 cf a7 11 71 ".A_......8B...q 0070 - 40 96 85 d9 3d 31 35 5a-1b 3d 90 8d 35 2b a0 9a @...=15Z.=..5+.. 0080 - a7 36 1e a7 4b 6e d9 f4-ee 0f 6f 7e 66 d6 21 43 .6..Kn....o~f.!C 0090 - 78 36 20 33 8c 6c 39 79-67 d0 7b bd ba 4b 58 d5 x6 3.l9yg.{..KX. 00a0 - 62 47 4d 5a 97 08 88 c2-d6 b0 86 b5 68 e9 a8 d2 bGMZ........h... Start Time: 1732881668 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 20A0A7B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAMAQABDD6iVEx0NbkWyF0m0AELdisaturjX3mhn/vJ3zG01BI ulawqWoinGvo9grr8oqVFcGhBgIEZ0mtBKIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-RSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with explicit TLS 1.3 spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem -tls1_3 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:03 2024 GMT; NotAfter: Nov 29 12:00:03 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDAzWhcNMjUxMTI5MTIwMDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBALYDGwejDiKj8By6I7riKrWLND68//2ndqTz NzOrHy9OCmjR1BQ31B52aSSWBqkhNWX+BlrJ/f+fcoueFE4n1djiiVNDOYAGU9v4 ioqroyFIDJQeS2WnpvVSgYDLB2gqHi12zt/POiwJquORtzk+fI/3V4CgJOAoZ18o 3uYD7vLIIwsfGUICqITeTnIZOjTQjjEXDMMKGNW49C2WmqK107ZFyXG9F8jA1Ot+ isugkkawQ/IDDvoKmTAyCkXqcp4yFMv+BD6x4SXsl2cwmb6XRL/zZg/cZeo3zK23 0pdT9Uo4XJiia4opB/tYBAHvJNZuOi2a32o2xK0/abp0WN2K9LECAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBTz3xmpemVoBmjK02c0JFbPQHZLtzAf BgNVHSMEGDAWgBTC/Vo6xgmqeiwraGkqDUGu4IR4DDANBgkqhkiG9w0BAQsFAAOC AQEAEEDPuOTKufxm8MPWNA2BWVcpbfBFEVVwn5HKavx3vtC4ckacVRaVGoKsSJTa xo5cA0Z+LG/f37quLRCbCA1PESnQzqwNXEIxxmEOOt9oCY/ajuL0L7lj0fuiyv6o KBcmfcHRC7F7H2s2VPLd9c8oyphX7/Jq5kGe7GGfjpfjaiJDI4khyg2Gqcw9VecD 2nWAmK39qpPYtSBvhfKopdWUxVC20zAXLoQMDHwhM9dMaENuQ1xoFr1j7cBrDeTT NFQYw6r5vUfULs0uGsdhBemXpLg1Jz7bFHx0raTPytbVtFpFYCMrd7o8wlg60vER qtm+YP0OyBqzx2joqJDN2ZpIKg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 318 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 29C147F1F105F9C790CE050D2A139CCDFD73BD5EA9997B89EB8A575742D9E4B8 Session-ID-ctx: Resumption PSK: DF957D78FC63ADC06A47F3B9587BF6A2AB2DCF069CADED253C3065EFA5D70363E8684A9C9868C90773B704BF8B0867D9 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 9a 05 8e bb cc 4c 2e 09-d8 02 5c 3d 22 e7 ff aa .....L....\="... 0010 - 37 3a 61 6f 9f 1e 99 a3-90 d6 ed f1 47 88 cc b5 7:ao........G... 0020 - 82 7d b4 f0 69 2d c4 07-38 1c d1 07 8e 4c 37 b2 .}..i-..8....L7. 0030 - cd fa c8 ef ad 9d 7c 7c-e0 8e 4f b1 53 22 dd 29 ......||..O.S".) 0040 - 07 d4 6e c2 72 35 f0 cf-79 d8 f9 36 ff a2 a0 55 ..n.r5..y..6...U 0050 - 5e 9b 76 d0 78 0b 4f a7-ef cb 23 22 70 bb 51 84 ^.v.x.O...#"p.Q. 0060 - 52 e8 b5 01 3b b7 10 38-00 83 ae d4 2a 34 91 84 R...;..8....*4.. 0070 - 6a 72 a8 18 43 7d 1d f6-93 45 6c ac 0a cd 39 e0 jr..C}...El...9. 0080 - 2d 56 59 ab de ca df 55-41 2d cd fa 63 a0 6d 7f -VY....UA-..c.m. 0090 - 91 9d bc dd 08 a1 fa 4b-8c 72 e8 32 dd 55 ca 61 .......K.r.2.U.a 00a0 - 33 3f 51 9d 95 86 4c 35-4e 81 9c ff e5 cc a8 02 3?Q...L5N....... 00b0 - aa e5 eb 2b 8f 40 30 75-65 8a fc 45 ef 58 9e cf ...+.@0ue..E.X.. 00c0 - 48 0a 4c 2b 3a 27 14 aa-6d 68 a2 9a 45 c7 f4 5c H.L+:'..mh..E..\ Start Time: 1732881669 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: E31AF4DBF127AAA04D354BF8B8DE55FAB38C537A689AB29E2722C2042B1744BD Session-ID-ctx: Resumption PSK: D8573986A90BD20E2E9EB99AEC0357961AC896EBA1E6FF0821BAC54768409F304FA3A19F7A8A606D7AAA0042D0EBBCF6 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 9a 05 8e bb cc 4c 2e 09-d8 02 5c 3d 22 e7 ff aa .....L....\="... 0010 - e2 1f 26 ea 83 a3 83 17-88 9f 7f 4b ae 30 46 32 ..&........K.0F2 0020 - 9f 94 d0 ea 57 f7 ba 5a-9a 78 7b eb 8b 55 d9 3c ....W..Z.x{..U.< 0030 - 81 ce 3c 84 f4 77 69 21-76 a2 cf c9 ad e9 4c 5b ..<..wi!v.....L[ 0040 - c3 98 c1 43 bc e6 3b d7-15 7e 04 77 d4 4e 7b ce ...C..;..~.w.N{. 0050 - 3e 10 41 6a 1a 01 c7 31-ad 73 fd 68 9b ab 0e c5 >.Aj...1.s.h.... 0060 - b9 57 e5 9f b1 8c d9 93-49 b2 9f 67 92 72 de f6 .W......I..g.r.. 0070 - b6 67 32 e5 1a de 85 61-5e f4 7d b3 d2 73 4f 48 .g2....a^.}..sOH 0080 - e9 a9 9e 86 e7 66 ed da-bd b8 15 8a af b0 a5 78 .....f.........x 0090 - 2d c4 52 04 61 f9 7d 07-cc 30 73 16 74 61 d1 c2 -.R.a.}..0s.ta.. 00a0 - be 09 38 3e 69 b7 a9 13-5f 93 38 f0 ce ae 8d b4 ..8>i..._.8..... 00b0 - d9 56 ec 1b 8b ad 84 8b-dc 21 3a 72 c7 0d eb 4e .V.......!:r...N 00c0 - 8b b4 34 b7 44 89 bf c5-60 bd 43 9a a2 ce 1b 7b ..4.D...`.C....{ Start Time: 1732881669 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 2000A0B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIHiXjcznf2l3K4x6ontp5fh0Sbczo3rmYrqqKMw04A1f BDDYVzmGqQvSDi6euZrsA1eWGsiW66Hm/wghusVHaECfME+joZ96imBteqoAQtDr vPahBgIEZ0mtBaIEAgIcIKQGBAQBAAAArgYCBB+GfwqzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 TLS SUCCESSFUL Q Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 (ECDSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests/softhsm/CAcert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Nov 29 12:00:04 2024 GMT; NotAfter: Nov 29 12:00:04 2025 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjQxMTI5MTIwMDA0WhcNMjUxMTI5MTIwMDA0WjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQTI7muGCSRHJB/g/sLoR52mI6yLFsj9SF992gc0Ih56T5x enaHqe66WycrbxCYcB+VaVu+U+dhoHUQlVKNos8Vo4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFKfuIzqt0qozisjt4SJksMzoG9o6MB8GA1UdIwQYMBaAFML9 WjrGCap6LCtoaSoNQa7ghHgMMA0GCSqGSIb3DQEBCwUAA4IBAQBHcyRJhNo9LdHT 7HFApRU7Xn10seFqpQUIFovJR5bzniaIJZM9HYYbwKV6tptdiEyv5bwlm87Rjb0T OyuE0UpsHuJ4VyFtiLGWQ5d1tbsqizTX3yFZL7tt8dwuIY9BxIeD2CWATLvJvFKg +LNYAq8hsPIO+jfPGhLF47eNs+RlWu3nZ6w2vb4TgsVGkSa003VhdaxwWsVX2Sng lgdvCX0J+eEcebwpaoDOU2d1WJE6/eXo28rtEZi+9IgrnVKf7j/OmynQM0PxYrJV PDRobuIUelaEsOkRNL7TfA1M+T4s4RqlCgwPqEQKwdbCUKfiwjqJz1IuH+j37YUY K6SHS0ML -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1086 bytes and written 287 bytes Verification error: unspecified certificate verification error --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 Session-ID: 3291881FC3E74060A76D9D50722686EEB5E225481B811630E42BD7CA24276138 Session-ID-ctx: Master-Key: F7A71E6D6B46C8360C12E35E3294FA0493582BF9D619412673F6D8F99157217A14661D5597620B945CEA91911FBD4524 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - de f9 fe ef 35 1e 24 4f-38 d4 34 93 16 60 0a 9e ....5.$O8.4..`.. 0010 - 44 cf bc 0c e6 3e 93 92-c0 49 06 2e d5 9b d0 2e D....>...I...... 0020 - bc 61 1c 93 37 df fe fe-f9 76 be c7 17 d9 d2 f8 .a..7....v...... 0030 - 09 76 44 6f 2e 61 97 2a-ed 76 19 e2 ee 6f 2c 13 .vDo.a.*.v...o,. 0040 - 44 91 f5 c4 d9 a4 39 34-63 56 9b 08 4a 35 99 b4 D.....94cV..J5.. 0050 - 0b bd 97 09 fc 62 4a 6e-74 b1 2d ea 8f 06 68 e2 .....bJnt.-...h. 0060 - 33 96 fa 17 1d a9 80 10-58 20 e9 ae 4a 89 41 0b 3.......X ..J.A. 0070 - 18 a7 c5 d4 3c 48 61 40-ce 8c e3 2c b9 aa 4d 1a ....R....Y||x.X. 0020 - 85 71 65 85 18 83 f7 fe-82 b7 0f 43 6d e5 13 f4 .qe........Cm... 0030 - 0f ee c2 bf e3 fe cc e6-d4 bf f7 60 7f d9 a2 71 ...........`...q 0040 - 5e 49 f7 5e cf a7 75 89-47 36 0e e5 c1 49 24 5d ^I.^..u.G6...I$] 0050 - 33 d4 89 7e 8d 31 de 88-8a dc f0 93 e9 45 1c 10 3..~.1.......E.. 0060 - 67 0b 8b 76 a7 c3 4b b8-e2 71 fe 34 70 c6 07 a2 g..v..K..q.4p... 0070 - 03 d6 04 f9 23 db 4c bf-a7 9a 96 c5 ca 58 fd 8f ....#.L......X.. 0080 - 42 28 9a 49 14 b5 46 bc-0d 9d 2b 82 27 a3 03 5b B(.I..F...+.'..[ 0090 - de 59 aa 1e 2d ff 64 4e-af d9 10 2b af 16 68 4a .Y..-.dN...+..hJ 00a0 - 44 cc 22 c6 4d 76 1a 1d-9e 7e 7d c4 d5 f2 7a dd D.".Mv...~}...z. 00b0 - 85 10 ec 2b c9 e2 cd 63-3d bb d5 d2 6c ad d4 ca ...+...c=...l... 00c0 - f6 ce 89 9b b6 0c 63 a1-cc 68 fb 6a 80 3c c4 35 ......c..h.j.<.5 Start Time: 1732881671 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 4AB8E8EF077F41E3BE109C3877577F27511E9EBB217CC807FD4CE5F4011DF88C Session-ID-ctx: Resumption PSK: F20C4FDB4CF50BEA2197D8841E05F87547A1ACD494583BB192DA389E4B666D8B0386CD6132F041CF712FCEB802677F5B PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - ad 51 02 e2 6c 6f 3b 7b-7d c2 e4 64 ac 0e 9c 45 .Q..lo;{}..d...E 0010 - 6b c5 1f 02 1a 12 f1 64-d0 9f 1c 74 26 fe 25 a2 k......d...t&.%. 0020 - 29 c7 5d de dc ce 52 1d-e2 3f 19 6f 8a 40 42 cd ).]...R..?.o.@B. 0030 - d5 8c 21 5a 0d bb 90 2c-4c b2 7f cd df ca c7 d8 ..!Z...,L....... 0040 - 42 4b 0c 2d 9f c0 cc 12-e0 fe 7b 0f dd 6a d7 92 BK.-......{..j.. 0050 - 24 ad 5c fc b7 a7 5c 9b-27 da 2a 56 92 c7 57 e4 $.\...\.'.*V..W. 0060 - bc 9d dc aa dc 8a 91 ff-54 4d 07 10 fa ea 46 92 ........TM....F. 0070 - 36 9d ff d4 60 51 b7 50-7c f1 61 f2 8e 89 40 da 6...`Q.P|.a...@. 0080 - 05 da de 98 c4 9a 9b 42-cb 46 0b a2 e5 33 fc f0 .......B.F...3.. 0090 - e8 9a 68 df b7 ca 1e 04-5b d5 65 53 40 80 4f 38 ..h.....[.eS@.O8 00a0 - d8 f6 9e 26 f1 5a ea 98-d9 fd d4 31 a0 05 b2 be ...&.Z.....1.... 00b0 - 7f 6a 42 11 53 d7 1d 89-73 91 03 47 59 14 58 75 .jB.S...s..GY.Xu 00c0 - a2 ea 5d 85 a7 a2 49 15-0f 3f 29 ff 27 33 eb 5c ..]...I..?).'3.\ Start Time: 1732881671 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 2000A9B6:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:687: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIEwNNSQgOhiTup2ICvxfJH193Gr5duHbX9RlJf4jM0v0 BDDyDE/bTPUL6iGX2IQeBfh1R6Gs1JRYO7GS2jieS2ZtiwOGzWEy8EHPcS/OuAJn f1uhBgIEZ0mtB6IEAgIcIKQGBAQBAAAArgYCBB+WMiazAwIBFw== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 TLS SUCCESSFUL Supported groups: secp256r1 Q Shared groups: secp256r1 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## ######################################## Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIEwNNSQgOhiTup2ICvxfJH193Gr5duHbX9RlJf4jM0v0 BDDyDE/bTPUL6iGX2IQeBfh1R6Gs1JRYO7GS2jieS2ZtiwOGzWEy8EHPcS/OuAJn f1uhBgIEZ0mtB6IEAgIcIKQGBAQBAAAArgYCBB+WMiazAwIBFw== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 TLS SUCCESSFUL Supported groups: secp256r1 Q Shared groups: secp256r1 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ============================================================================== =================================== 53/64 ==================================== test: pkcs11-provider:kryoptic / tls start time: 12:01:11 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=17 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper tls-kryoptic.t ============================================================================== =================================== 54/64 ==================================== test: pkcs11-provider:softokn / tlsfuzzer start time: 12:01:11 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=29 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper tlsfuzzer-softokn.t ============================================================================== =================================== 55/64 ==================================== test: pkcs11-provider:softhsm / tlsfuzzer start time: 12:01:11 duration: 0.11s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=94 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper tlsfuzzer-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/ttlsfuzzer TLS fuzzer is not available -- skipping ============================================================================== =================================== 56/64 ==================================== test: pkcs11-provider:kryoptic / tlsfuzzer start time: 12:01:11 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=205 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper tlsfuzzer-kryoptic.t ============================================================================== =================================== 57/64 ==================================== test: pkcs11-provider:softokn / uri start time: 12:01:11 duration: 0.07s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=139 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper uri-softokn.t ============================================================================== =================================== 58/64 ==================================== test: pkcs11-provider:softhsm / uri start time: 12:01:11 duration: 7.70s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=3 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper uri-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/turi ## Check that storeutl returns URIs openssl storeutl -text pkcs11: ## Check returned URIs work to find objects $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%00%01;object=testCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%00%02;object=ecCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%00%05;object=testCert2;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%00%03;object=ecPeerCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%0E%86%69%95%9A%26%28%65%22%BA%4B%83%64%65%81%6F;object=Test-Ed-gen-0e866995;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%13%99%5C%C4%9A%DC%43%3B%6C%91%0F%6E%39%73%E5%0B;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%51%98%56%49%17%4E%DF%89%3A%B2%11%05%6D%18%5F%22;object=Test-RSA-PSS-Restrictions;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%D5%84%1A%8D%5A%50%D1%90%38%8F%57%BB%42%20%DB%C5;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%00%00;object=caCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%00%06;object=ecCert2;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%00%08;object=ecCert3;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%50%E6%77%93%65%2C%2A%65%45%CE%97%49%B8%1B%DD%1D;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%00%04;object=edCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%6F%4C%85%E5%0D%D2%C2%B1%E1%7B%73%77%47%2C%24%6F;object=Test-RSA-PSS-Only;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%00%07;object=ecExplicitCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%EB%0C%C5%09%C3%EE%8B%B2%36%E6%01%0B%2C%9D%D0%A1;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%A8%ED%93%7C%CA%1C%67%B8%56%88%6E%8C%23%20%74%DD;object=Fork-Test-a8ed937c;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%E7%9F%A5%4F%7A%B0%B2%03%B5%34%4A%51%93%DF%90%60;object=Test-RSA-gen-e79fa54f;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=80cbbe02cbc29bff;token=SoftHSM%20Token;id=%1C%EC%0A%2E%F0%54%40%80%E6%BF%99%93%C9%8D%A8%C0;object=Test-Ed-gen-1cec0a2e;type=private openssl storeutl -text "$uri" ## Check each URI component is tested $cmp=pkcs11:model=SoftHSM%20v2 openssl storeutl -text "pkcs11:${cmp}" $cmp=manufacturer=SoftHSM%20project openssl storeutl -text "pkcs11:${cmp}" $cmp=serial=80cbbe02cbc29bff openssl storeutl -text "pkcs11:${cmp}" $cmp=token=SoftHSM%20Token openssl storeutl -text "pkcs11:${cmp}" $cmp=id=%00%01 openssl storeutl -text "pkcs11:${cmp}" $cmp=object=testCert openssl storeutl -text "pkcs11:${cmp}" $cmp=type=private openssl storeutl -text "pkcs11:${cmp}" ============================================================================== =================================== 59/64 ==================================== test: pkcs11-provider:kryoptic / uri start time: 12:01:19 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=153 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper uri-kryoptic.t ============================================================================== =================================== 60/64 ==================================== test: pkcs11-provider:softhsm / ecxc start time: 12:01:19 duration: 3.37s result: exit status 0 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=184 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper ecxc-softhsm.t ----------------------------------- stdout ----------------------------------- Executing /build/reproducible-path/pkcs11-provider-0.6/tests/tecxc ## Export EC Public key to a file openssl pkey -in $ECXPUBURI -pubin -pubout -out ${TMPPDIR}/ecout.pub Print EC Public key from private openssl pkey -in $ECXPRIURI -pubout -text ## Sign and Verify with provided Hash and EC openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${ECXBASEURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-ecsig.bin openssl pkeyutl -verify -inkey "${ECXBASEURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${TMPPDIR}/ecout.pub" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-256) openssl pkeyutl -sign -inkey "${ECXBASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECXBASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-384) openssl pkeyutl -sign -inkey "${ECXBASEURI}" -digest sha384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECXBASEURI}" -pubin -digest sha384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-512) openssl pkeyutl -sign -inkey "${ECXBASEURI}" -digest sha512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECXBASEURI}" -pubin -digest sha512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha512-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-256) openssl pkeyutl -sign -inkey "${ECXBASEURI}" -digest sha3-256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECXBASEURI}" -pubin -digest sha3-256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-384) openssl pkeyutl -sign -inkey "${ECXBASEURI}" -digest sha3-384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECXBASEURI}" -pubin -digest sha3-384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-512) openssl pkeyutl -sign -inkey "${ECXBASEURI}" -digest sha3-512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECXBASEURI}" -pubin -digest sha3-512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-512-ecdgstsig.bin Signature Verified Successfully ## Test CSR generation from private ECC keys openssl req -new -batch -key "${ECXPRIURI}" -out ${TMPPDIR}/ecdsa_csr.pem openssl req -in ${TMPPDIR}/ecdsa_csr.pem -verify -noout Certificate request self-signature verify OK ============================================================================== =================================== 61/64 ==================================== test: pkcs11-provider:kryoptic / ecxc start time: 12:01:22 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=105 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper ecxc-kryoptic.t ============================================================================== =================================== 62/64 ==================================== test: pkcs11-provider:softokn / cms start time: 12:01:22 duration: 0.06s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=155 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper cms-softokn.t ============================================================================== =================================== 63/64 ==================================== test: pkcs11-provider:kryoptic / cms start time: 12:01:23 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=31 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper cms-kryoptic.t ============================================================================== =================================== 64/64 ==================================== test: pkcs11-provider:kryoptic / pinlock start time: 12:01:23 duration: 0.05s result: exit status 77 command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-0.6/tests TESTBLDDIR=/build/reproducible-path/pkcs11-provider-0.6/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=202 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-0.6/tests/test-wrapper pinlock-kryoptic.t ============================================================================== Summary of Failures: 5/64 pkcs11-provider:softhsm / basic TIMEOUT 30.11s killed by signal 15 SIGTERM Ok: 19 Expected Fail: 0 Fail: 0 Unexpected Pass: 0 Skipped: 44 Timeout: 1 dh_auto_test: error: cd obj-arm-linux-gnueabihf && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 MESON_TESTTHREADS=3 meson test returned exit code 1 make: *** [debian/rules:9: binary] Error 25 dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 I: copying local configuration E: Failed autobuilding of package I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env I: removing directory /srv/workspace/pbuilder/16854 and its subdirectories Fri Nov 29 12:01:39 UTC 2024 W: No second build log, what happened?