Diff of the two buildlogs: -- --- b1/build.log 2025-02-15 02:41:07.030253769 +0000 +++ b2/build.log 2025-02-15 02:46:42.235150779 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Fri Feb 14 14:38:31 -12 2025 -I: pbuilder-time-stamp: 1739587111 +I: Current time: Sat Feb 15 16:41:19 +14 2025 +I: pbuilder-time-stamp: 1739587279 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/unstable-reproducible-base.tgz] I: copying local configuration @@ -22,52 +22,84 @@ dpkg-source: info: unpacking pkcs11-provider_1.0-1.debian.tar.xz I: Not using root during the build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/7814/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/11140/tmp/hooks/D01_modify_environment starting +debug: Running on virt32z. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Feb 15 02:41 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/11140/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/11140/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='armhf' - DEBIAN_FRONTEND='noninteractive' - DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=3 ' - DISTRIBUTION='unstable' - HOME='/root' - HOST_ARCH='armhf' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="2" [2]="37" [3]="1" [4]="release" [5]="arm-unknown-linux-gnueabihf") + BASH_VERSION='5.2.37(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=armhf + DEBIAN_FRONTEND=noninteractive + DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=4 ' + DIRSTACK=() + DISTRIBUTION=unstable + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=arm + HOST_ARCH=armhf IFS=' ' - INVOCATION_ID='54e551bffab74d25b49deba90efc456e' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='7814' - PS1='# ' - PS2='> ' + INVOCATION_ID=f8438fbf4705407ba89724d36d5abae4 + LANG=C + LANGUAGE=it_CH:it + LC_ALL=C + MACHTYPE=arm-unknown-linux-gnueabihf + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnueabihf + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=11140 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.PEXVOq4Y/pbuilderrc_kl9s --distribution unstable --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.PEXVOq4Y/b1 --logfile b1/build.log pkcs11-provider_1.0-1.dsc' - SUDO_GID='113' - SUDO_UID='107' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://10.0.0.15:3142/' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.PEXVOq4Y/pbuilderrc_sKJr --distribution unstable --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.PEXVOq4Y/b2 --logfile b2/build.log pkcs11-provider_1.0-1.dsc' + SUDO_GID=110 + SUDO_UID=103 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://10.0.0.15:3142/ I: uname -a - Linux virt64b 6.1.0-31-arm64 #1 SMP Debian 6.1.128-1 (2025-02-07) aarch64 GNU/Linux + Linux i-capture-the-hostname 6.1.0-31-armmp-lpae #1 SMP Debian 6.1.128-1 (2025-02-07) armv7l GNU/Linux I: ls -l /bin lrwxrwxrwx 1 root root 7 Nov 22 14:40 /bin -> usr/bin -I: user script /srv/workspace/pbuilder/7814/tmp/hooks/D02_print_environment finished +I: user script /srv/workspace/pbuilder/11140/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -230,7 +262,7 @@ Get: 97 http://deb.debian.org/debian unstable/main armhf pkgconf-bin armhf 1.8.1-4 [29.2 kB] Get: 98 http://deb.debian.org/debian unstable/main armhf pkgconf armhf 1.8.1-4 [26.1 kB] Get: 99 http://deb.debian.org/debian unstable/main armhf softhsm2 armhf 2.6.1-2.2+b1 [145 kB] -Fetched 44.9 MB in 1s (45.5 MB/s) +Fetched 44.9 MB in 12s (3832 kB/s) Preconfiguring packages ... Selecting previously unselected package libpython3.13-minimal:armhf. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19533 files and directories currently installed.) @@ -562,8 +594,8 @@ Setting up tzdata (2025a-2) ... Current default time zone: 'Etc/UTC' -Local time is now: Sat Feb 15 02:39:17 UTC 2025. -Universal Time is now: Sat Feb 15 02:39:17 UTC 2025. +Local time is now: Sat Feb 15 02:43:25 UTC 2025. +Universal Time is now: Sat Feb 15 02:43:25 UTC 2025. Run 'dpkg-reconfigure tzdata' if you wish to change it. Setting up autotools-dev (20220109.1) ... @@ -656,7 +688,11 @@ Building tag database... -> Finished parsing the build-deps I: Building the package -I: Running cd /build/reproducible-path/pkcs11-provider-1.0/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../pkcs11-provider_1.0-1_source.changes +I: user script /srv/workspace/pbuilder/11140/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for unstable +I: user script /srv/workspace/pbuilder/11140/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/pkcs11-provider-1.0/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../pkcs11-provider_1.0-1_source.changes dpkg-buildpackage: info: source package pkcs11-provider dpkg-buildpackage: info: source version 1.0-1 dpkg-buildpackage: info: source distribution unstable @@ -684,7 +720,7 @@ C compiler for the host machine: cc (gcc 14.2.0 "cc (Debian 14.2.0-17) 14.2.0") C linker for the host machine: cc ld.bfd 2.44 Host machine cpu family: arm -Host machine cpu: arm +Host machine cpu: armv7l Compiler for C supports arguments -Wwrite-strings: YES Compiler for C supports arguments -Wpointer-arith: YES Compiler for C supports arguments -Wno-missing-field-initializers: YES @@ -729,61 +765,61 @@ Found ninja-1.12.1 at /usr/bin/ninja dh_auto_build -O--buildsystem=meson - cd obj-arm-linux-gnueabihf && LC_ALL=C.UTF-8 ninja -j3 -v -[1/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/debug.c.o -MF src/pkcs11.so.p/debug.c.o.d -o src/pkcs11.so.p/debug.c.o -c ../src/debug.c -[2/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/asymmetric_cipher.c.o -MF src/pkcs11.so.p/asymmetric_cipher.c.o.d -o src/pkcs11.so.p/asymmetric_cipher.c.o -c ../src/asymmetric_cipher.c -[3/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/decoder.c.o -MF src/pkcs11.so.p/decoder.c.o.d -o src/pkcs11.so.p/decoder.c.o -c ../src/decoder.c + cd obj-arm-linux-gnueabihf && LC_ALL=C.UTF-8 ninja -j4 -v +[1/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/decoder.c.o -MF src/pkcs11.so.p/decoder.c.o.d -o src/pkcs11.so.p/decoder.c.o -c ../src/decoder.c +[2/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/debug.c.o -MF src/pkcs11.so.p/debug.c.o.d -o src/pkcs11.so.p/debug.c.o -c ../src/debug.c +[3/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/asymmetric_cipher.c.o -MF src/pkcs11.so.p/asymmetric_cipher.c.o.d -o src/pkcs11.so.p/asymmetric_cipher.c.o -c ../src/asymmetric_cipher.c [4/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/encoder.c.o -MF src/pkcs11.so.p/encoder.c.o.d -o src/pkcs11.so.p/encoder.c.o -c ../src/encoder.c [5/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/digests.c.o -MF src/pkcs11.so.p/digests.c.o.d -o src/pkcs11.so.p/digests.c.o -c ../src/digests.c [6/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/exchange.c.o -MF src/pkcs11.so.p/exchange.c.o.d -o src/pkcs11.so.p/exchange.c.o -c ../src/exchange.c -[7/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/kdf.c.o -MF src/pkcs11.so.p/kdf.c.o.d -o src/pkcs11.so.p/kdf.c.o -c ../src/kdf.c -[8/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/pk11_uri.c.o -MF src/pkcs11.so.p/pk11_uri.c.o.d -o src/pkcs11.so.p/pk11_uri.c.o -c ../src/pk11_uri.c +[7/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/pk11_uri.c.o -MF src/pkcs11.so.p/pk11_uri.c.o.d -o src/pkcs11.so.p/pk11_uri.c.o -c ../src/pk11_uri.c +[8/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/kdf.c.o -MF src/pkcs11.so.p/kdf.c.o.d -o src/pkcs11.so.p/kdf.c.o -c ../src/kdf.c [9/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/keymgmt.c.o -MF src/pkcs11.so.p/keymgmt.c.o.d -o src/pkcs11.so.p/keymgmt.c.o -c ../src/keymgmt.c -[10/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/interface.c.o -MF src/pkcs11.so.p/interface.c.o.d -o src/pkcs11.so.p/interface.c.o -c ../src/interface.c -[11/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/random.c.o -MF src/pkcs11.so.p/random.c.o.d -o src/pkcs11.so.p/random.c.o -c ../src/random.c +[10/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/random.c.o -MF src/pkcs11.so.p/random.c.o.d -o src/pkcs11.so.p/random.c.o -c ../src/random.c +[11/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/interface.c.o -MF src/pkcs11.so.p/interface.c.o.d -o src/pkcs11.so.p/interface.c.o -c ../src/interface.c [12/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/session.c.o -MF src/pkcs11.so.p/session.c.o.d -o src/pkcs11.so.p/session.c.o -c ../src/session.c -[13/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/objects.c.o -MF src/pkcs11.so.p/objects.c.o.d -o src/pkcs11.so.p/objects.c.o -c ../src/objects.c -[14/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/slot.c.o -MF src/pkcs11.so.p/slot.c.o.d -o src/pkcs11.so.p/slot.c.o -c ../src/slot.c -[15/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/provider.c.o -MF src/pkcs11.so.p/provider.c.o.d -o src/pkcs11.so.p/provider.c.o -c ../src/provider.c -[16/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/store.c.o -MF src/pkcs11.so.p/store.c.o.d -o src/pkcs11.so.p/store.c.o -c ../src/store.c -[17/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/tls.c.o -MF src/pkcs11.so.p/tls.c.o.d -o src/pkcs11.so.p/tls.c.o -c ../src/tls.c -[18/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/signature.c.o -MF src/pkcs11.so.p/signature.c.o.d -o src/pkcs11.so.p/signature.c.o -c ../src/signature.c +[13/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/slot.c.o -MF src/pkcs11.so.p/slot.c.o.d -o src/pkcs11.so.p/slot.c.o -c ../src/slot.c +[14/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/objects.c.o -MF src/pkcs11.so.p/objects.c.o.d -o src/pkcs11.so.p/objects.c.o -c ../src/objects.c +[15/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/signature.c.o -MF src/pkcs11.so.p/signature.c.o.d -o src/pkcs11.so.p/signature.c.o -c ../src/signature.c +[16/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/tls.c.o -MF src/pkcs11.so.p/tls.c.o.d -o src/pkcs11.so.p/tls.c.o -c ../src/tls.c +[17/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/provider.c.o -MF src/pkcs11.so.p/provider.c.o.d -o src/pkcs11.so.p/provider.c.o -c ../src/provider.c +[18/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/store.c.o -MF src/pkcs11.so.p/store.c.o.d -o src/pkcs11.so.p/store.c.o -c ../src/store.c [19/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/util.c.o -MF src/pkcs11.so.p/util.c.o.d -o src/pkcs11.so.p/util.c.o -c ../src/util.c [20/20] cc -o src/pkcs11.so src/pkcs11.so.p/asymmetric_cipher.c.o src/pkcs11.so.p/debug.c.o src/pkcs11.so.p/encoder.c.o src/pkcs11.so.p/decoder.c.o src/pkcs11.so.p/digests.c.o src/pkcs11.so.p/exchange.c.o src/pkcs11.so.p/kdf.c.o src/pkcs11.so.p/keymgmt.c.o src/pkcs11.so.p/pk11_uri.c.o src/pkcs11.so.p/interface.c.o src/pkcs11.so.p/objects.c.o src/pkcs11.so.p/provider.c.o src/pkcs11.so.p/random.c.o src/pkcs11.so.p/session.c.o src/pkcs11.so.p/signature.c.o src/pkcs11.so.p/slot.c.o src/pkcs11.so.p/store.c.o src/pkcs11.so.p/tls.c.o src/pkcs11.so.p/util.c.o -Wl,--as-needed -Wl,--allow-shlib-undefined -shared -fPIC -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--version-script,/build/reproducible-path/pkcs11-provider-1.0/src/provider.map /usr/lib/arm-linux-gnueabihf/libcrypto.so dh_auto_test -O--buildsystem=meson - cd obj-arm-linux-gnueabihf && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 MESON_TESTTHREADS=3 meson test --verbose + cd obj-arm-linux-gnueabihf && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 MESON_TESTTHREADS=4 meson test --verbose ninja: Entering directory `/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf' -[1/29] Compiling C object tests/tsession.p/tsession.c.o -[2/29] Compiling C object tests/tlsctx.p/tlsctx.c.o -[3/29] Compiling C object tests/tlsctx.p/util.c.o -[4/29] Compiling C object tests/tlssetkey.p/tlssetkey.c.o +[1/29] Compiling C object tests/tlssetkey.p/tlssetkey.c.o +[2/29] Compiling C object tests/tsession.p/tsession.c.o +[3/29] Compiling C object tests/tlsctx.p/tlsctx.c.o +[4/29] Compiling C object tests/tlsctx.p/util.c.o [5/29] Compiling C object tests/tgenkey.p/util.c.o [6/29] Compiling C object tests/tdigests.p/tdigests.c.o [7/29] Compiling C object tests/treadkeys.p/treadkeys.c.o [8/29] Compiling C object tests/tcmpkeys.p/tcmpkeys.c.o -[9/29] Compiling C object tests/tgenkey.p/tgenkey.c.o -[10/29] Compiling C object tests/tfork.p/tfork.c.o -[11/29] Compiling C object tests/tlssetkey.p/util.c.o -[12/29] Compiling C object tests/tcmpkeys.p/util.c.o +[9/29] Compiling C object tests/tlssetkey.p/util.c.o +[10/29] Compiling C object tests/tgenkey.p/tgenkey.c.o +[11/29] Compiling C object tests/tcmpkeys.p/util.c.o +[12/29] Compiling C object tests/tfork.p/tfork.c.o [13/29] Compiling C object tests/tpkey.p/tpkey.c.o -[14/29] Compiling C object tests/pincache.p/pincache.c.o -[15/29] Compiling C object tests/tfork.p/util.c.o +[14/29] Compiling C object tests/tfork.p/util.c.o +[15/29] Compiling C object tests/pincache.p/pincache.c.o [16/29] Compiling C object tests/ccerts.p/ccerts.c.o [17/29] Compiling C object tests/tpkey.p/util.c.o [18/29] Linking target tests/tsession -[19/29] Linking target tests/tdigests +[19/29] Linking target tests/tgenkey [20/29] Compiling C object tests/ccerts.p/util.c.o -[21/29] Linking target tests/tgenkey +[21/29] Linking target tests/tlssetkey [22/29] Linking target tests/tlsctx -[23/29] Linking target tests/tlssetkey -[24/29] Linking target tests/tpkey -[25/29] Linking target tests/pincache +[23/29] Linking target tests/tdigests +[24/29] Linking target tests/treadkeys +[25/29] Linking target tests/tcmpkeys [26/29] Linking target tests/tfork -[27/29] Linking target tests/tcmpkeys -[28/29] Linking target tests/treadkeys -[29/29] Linking target tests/ccerts +[27/29] Linking target tests/tpkey +[28/29] Linking target tests/ccerts +[29/29] Linking target tests/pincache 1/92 pkcs11-provider:softokn / setup RUNNING ->>> MALLOC_PERTURB_=17 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src SHARED_EXT=.so MESON_TEST_ITERATION=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softokn +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=237 SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softokn ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests @@ -801,14 +837,15 @@ + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i -++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' +++ grep OpenSC Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled -+ [[ 0 = \1 ]] +cat: /proc/sys/crypto/fips_enabled: No such file or directory ++ [[ '' = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softokn + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softokn/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softokn ']' @@ -836,10 +873,10 @@ ++ exit 0 NSS's certutil command is required ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― - 1/92 pkcs11-provider:softokn / setup OK 0.04s + 1/92 pkcs11-provider:softokn / setup OK 0.43s 2/92 pkcs11-provider:softhsm / setup RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src SHARED_EXT=.so MESON_TEST_ITERATION=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=64 /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softhsm +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=147 SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softhsm ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests @@ -864,7 +901,8 @@ + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled -+ [[ 0 = \1 ]] +cat: /proc/sys/crypto/fips_enabled: No such file or directory ++ [[ '' = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm ']' @@ -881,12 +919,12 @@ ++ case "$1" in ++ shift 1 ++ echo '########################################' -######################################## -## Searching for SoftHSM PKCS#11 library - ++ echo '## Searching for SoftHSM PKCS#11 library' ++ echo '' ++ command -v softhsm2-util +######################################## +## Searching for SoftHSM PKCS#11 library + +++++ type -p softhsm2-util ++++ dirname /usr/bin/softhsm2-util +++ dirname /usr/bin @@ -901,13 +939,13 @@ ++ return ++ export P11LIB ++ title SECTION 'Set up testing system' -Using softhsm path /usr/lib/softhsm/libsofthsm2.so ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Set up testing system' ++ echo '' ++ cat +Using softhsm path /usr/lib/softhsm/libsofthsm2.so ######################################## ## Set up testing system @@ -919,7 +957,7 @@ ++ TOKENLABELURI=SoftHSM%20Token ++ softhsm2-util --init-token --label 'SoftHSM Token' --free --pin 12345678 --so-pin 12345678 Slot 0 has a free/uninitialized token. -The token has been initialized and is reassigned to slot 2031626281 +The token has been initialized and is reassigned to slot 1580369002 ++ export 'TOKENOPTIONS=\npkcs11-module-quirks = no-deinit no-operation-state' ++ TOKENOPTIONS='\npkcs11-module-quirks = no-deinit no-operation-state' ++ export 'TOKENCONFIGVARS=export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/softhsm.conf' @@ -946,22 +984,22 @@ + echo 'Creating new Self Sign CA' + KEYID=0000 + URIKEYID=%00%00 -Creating new Self Sign CA + CACRTN=caCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=caCert --id=0000 +Creating new Self Sign CA Key pair generated: Private Key Object; RSA label: caCert ID: 0000 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0000;object=caCert;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0000;object=caCert;type=private Public Key Object; RSA 2048 bits label: caCert ID: 0000 Usage: encrypt, verify, verifyRecover, wrap Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0000;object=caCert;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0000;object=caCert;type=public + crt_selfsign caCert Issuer 0000 + LABEL=caCert + CN=Issuer @@ -974,29 +1012,29 @@ Version: 3 Serial Number (hex): 02 Validity: - Not Before: Sat Feb 15 02:40:05 UTC 2025 - Not After: Sun Feb 15 02:40:05 UTC 2026 + Not Before: Sat Feb 15 02:45:54 UTC 2025 + Not After: Sun Feb 15 02:45:54 UTC 2026 Subject: CN=Issuer Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): - 00:c3:66:1d:a9:47:bd:7a:d8:09:73:e1:05:e7:1f:92 - e9:18:fb:dd:04:46:4c:6f:f5:f1:f0:95:eb:c6:41:e0 - 0e:b1:06:01:78:a2:37:b9:b1:98:f9:b6:bb:44:4e:c1 - ef:5b:3f:7d:26:c4:f6:f7:1d:51:9c:36:6c:38:2f:9f - ca:34:b0:47:3b:52:00:c5:bc:28:72:3f:a9:65:eb:b5 - 9e:5f:5b:55:e1:ab:b0:2f:d6:26:77:eb:f4:30:b7:c2 - 90:2f:02:fc:44:bc:07:2d:1a:73:b7:41:33:16:10:06 - 7b:05:40:7b:af:85:b0:a9:af:2e:f9:9f:08:5f:b1:22 - 08:37:ad:27:71:ac:90:5c:e3:3d:b3:14:b5:b1:da:69 - 37:4f:36:c6:df:8e:38:71:5b:1d:77:76:71:a6:20:5c - c8:f2:e0:49:03:14:6b:5f:e9:00:0d:16:5e:ba:1a:4e - 83:04:7e:3f:e8:cd:d6:d9:dc:20:0c:37:cd:e0:2f:14 - ed:86:84:fa:d9:f7:f5:f7:41:a4:5b:3b:05:f8:fd:48 - ab:39:6f:f8:a3:33:85:2f:65:a1:7f:ba:7b:71:53:19 - 03:49:4d:b4:56:70:cd:a1:18:91:42:e7:84:ce:a8:13 - fc:d5:77:92:29:d7:e9:0b:a8:59:1c:e8:10:56:73:29 - 9f + 00:be:e0:e1:7f:5b:b3:74:8d:db:73:e4:88:62:42:1f + 4a:74:4f:ac:d9:71:19:33:31:60:46:03:50:8c:40:55 + be:96:4a:fd:d2:33:d4:de:c3:7d:b6:97:68:39:bc:b8 + 76:52:09:91:c4:09:d7:57:4d:01:21:11:bb:b9:3d:f2 + bf:68:9e:b0:1b:44:f6:30:eb:20:23:f9:26:e2:02:09 + be:30:bd:b7:f7:61:59:f0:0a:be:c7:fa:74:ca:44:74 + 88:96:47:e6:c9:e4:bb:ab:32:7c:7c:05:5b:36:50:00 + bc:79:96:47:d1:72:a3:c2:49:e6:c1:89:7e:47:d9:24 + 00:a3:eb:19:fd:45:f6:b5:81:e1:8d:3e:89:a2:dc:1c + 86:ed:4d:4b:dd:5b:6a:08:62:57:1c:8f:cf:2c:3f:2f + 50:2f:d6:a7:8a:ac:b4:e5:aa:f3:1d:c7:6f:8f:22:fa + e0:80:5a:c9:3b:7d:be:3f:45:09:25:d9:ee:6b:3c:32 + fb:b4:be:63:4b:34:ae:6f:db:35:bd:70:cc:db:cf:8b + c4:7f:b1:67:4c:fe:92:0b:79:56:e6:76:86:b3:66:63 + d8:4d:57:4d:ab:1f:87:36:65:79:d0:bc:4b:d3:be:f1 + 13:16:9e:9d:89:09:82:a9:61:40:e9:0a:86:3d:cb:51 + 47 Exponent (bits 24): 01:00:01 Extensions: @@ -1008,13 +1046,13 @@ Digital signature. Certificate signing. Subject Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f Other Information: Public Key ID: - sha1:e21766fe9c010ffd5b251dc0d2168bf24f28ec11 - sha256:c2d7aeb85129f5d96771c2719a6ee44223605dfe5518d655afb019c0db9dc535 + sha1:fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f + sha256:9719131a7294c1a2c66b2ccf999e3871681306fd0f99566d1bed71094391fdcb Public Key PIN: - pin-sha256:wteuuFEp9dlnccJxmm7kQiNgXf5VGNZVr7AZwNudxTU= + pin-sha256:lxkTGnKUwaLGayzPmZ44cWgTBv0PmVZtG+1xCUOR/cs= @@ -1026,7 +1064,7 @@ subject: DN: CN=Issuer serial: 02 ID: 0000 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert + CACRT_PEM=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem + CACRT=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt + openssl x509 -inform DER -in /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt -outform PEM -out /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem @@ -1043,15 +1081,15 @@ + echo 'pkcs11:id=%00%00?pin-value=12345678' + echo 'pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%00 -RSA PKCS11 URIS -pkcs11:id=%00%00?pin-value=12345678 -pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt -pkcs11:id=%00%00 + echo 'pkcs11:type=public;id=%00%00' + echo 'pkcs11:type=private;id=%00%00' + echo 'pkcs11:type=cert;object=caCert' + echo '' + cat /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cacert.cfg +RSA PKCS11 URIS +pkcs11:id=%00%00?pin-value=12345678 +pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%00 pkcs11:type=public;id=%00%00 pkcs11:type=private;id=%00%00 pkcs11:type=cert;object=caCert @@ -1068,13 +1106,13 @@ ID: 0001 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0001;object=testCert;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0001;object=testCert;type=private Public Key Object; RSA 2048 bits label: testCert ID: 0001 Usage: encrypt, verify, verifyRecover, wrap Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0001;object=testCert;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0001;object=testCert;type=public + ca_sign testCert 'My Test Cert' 0001 + LABEL=testCert + CN='My Test Cert' @@ -1085,36 +1123,36 @@ + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... -Expiration time: Sat Feb 14 14:40:06 2026 -CA expiration time: Sat Feb 14 14:40:05 2026 +Expiration time: Sun Feb 15 16:45:55 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 03 Validity: - Not Before: Sat Feb 15 02:40:06 UTC 2025 - Not After: Sun Feb 15 02:40:06 UTC 2026 + Not Before: Sat Feb 15 02:45:55 UTC 2025 + Not After: Sun Feb 15 02:45:55 UTC 2026 Subject: CN=My Test Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): - 00:dc:22:13:fb:db:a1:ec:1e:a1:6a:a6:e8:58:c5:3f - d2:ea:0b:53:1c:68:1d:0c:60:aa:98:05:ec:ca:53:5a - ac:a2:34:3e:94:dd:77:be:7f:e7:c8:56:5d:60:55:dc - a0:88:04:48:c8:bf:df:09:eb:60:19:ca:d0:f3:72:e2 - 7c:0d:0b:1c:14:1c:14:2e:5b:00:2e:08:69:47:2c:d3 - 3e:76:49:fd:68:4a:54:51:ea:6f:3d:87:f7:e7:fe:32 - 5a:26:17:95:14:17:71:40:b6:4e:6a:df:ff:dc:c3:39 - 28:39:d3:31:0b:39:f8:9f:e0:ed:a0:97:08:a1:70:fb - 61:91:2a:69:a2:2b:91:4a:1d:bb:ea:07:0d:d1:93:75 - 93:be:b9:41:41:9b:56:51:9e:16:72:45:ce:c8:9b:71 - 15:8b:48:35:17:9f:02:73:91:a6:88:cb:41:14:fc:6e - f9:42:c8:8b:13:0e:08:2e:4b:f4:a0:71:42:83:bc:b6 - 2a:df:1f:d0:86:28:7e:46:30:ee:36:c7:ba:b7:29:90 - 81:12:54:a0:3b:a3:aa:b2:72:df:7f:9d:17:4c:a5:1d - 1f:a0:12:b8:84:0b:d0:9b:85:0e:93:20:8e:5c:59:56 - 9d:82:8b:68:19:7b:6b:cb:cf:89:0c:9a:db:f9:fd:a7 - af + 00:ae:ba:78:48:32:5e:88:3a:04:59:20:e5:69:12:a1 + 47:de:4a:89:84:6f:0e:fc:9f:42:55:8b:22:b6:9b:d1 + 12:6c:3c:a7:7b:13:c2:1a:94:93:49:aa:73:33:8e:dc + b2:cb:e8:fe:f4:06:3a:a7:9d:83:13:4b:fd:c8:8f:36 + d2:06:b1:de:2f:13:0f:c6:ec:05:41:37:a1:e2:c9:ec + 69:16:75:c5:3a:1d:8a:2f:fc:37:1e:1e:3a:e8:85:9f + a6:75:bb:68:ab:32:c3:44:8c:70:cd:27:90:4d:99:97 + e8:4d:e3:09:48:f2:6c:ad:36:0d:a4:b0:1a:05:d6:03 + 5d:b9:5d:62:0b:f8:49:ee:41:10:60:63:6f:93:5d:82 + 8a:7f:a0:c1:fd:e5:74:a5:01:35:b3:9b:3c:ec:6c:65 + 56:7e:dd:c4:1a:eb:c1:3b:24:22:4f:c5:16:cd:b3:31 + 7a:81:1a:33:62:28:60:0b:53:b6:e1:2c:6f:bf:a7:9f + f3:55:c7:d3:1d:eb:c3:d6:0c:33:03:93:b3:10:63:55 + f4:cb:d6:38:da:c5:75:6e:03:e5:89:9e:0c:78:2a:02 + 78:46:c6:7d:36:9d:8b:c5:b8:4c:a7:52:46:65:40:3a + af:f3:6a:d3:9b:b9:72:72:4b:09:ae:f2:cf:52:0a:60 + 3d Exponent (bits 24): 01:00:01 Extensions: @@ -1126,15 +1164,15 @@ Digital signature. Key encipherment. Subject Key Identifier (not critical): - a4d380bf85a70a8de22b1bd2c7cecb34d70452ba + 907e49f6d951a06d669cc31f59c5c4a908f23318 Authority Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f Other Information: Public Key ID: - sha1:a4d380bf85a70a8de22b1bd2c7cecb34d70452ba - sha256:32e4e03a8b556f3d536783a99525bb85f130304cd8a9256664825ecd39932975 + sha1:907e49f6d951a06d669cc31f59c5c4a908f23318 + sha256:850f29d386c6b525b61fe762f5300702cddf4040a2a0174074d9596126ce7c96 Public Key PIN: - pin-sha256:MuTgOotVbz1TZ4OplSW7hfEwMEzYqSVmZIJezTmTKXU= + pin-sha256:hQ8p04bGtSW2H+di9TAHAs3fQECioBdAdNlZYSbOfJY= @@ -1146,7 +1184,7 @@ subject: DN: O=PKCS11 Provider, CN=My Test Cert serial: 03 ID: 0001 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert + BASEURIWITHPINVALUE='pkcs11:id=%00%01?pin-value=12345678' + BASEURIWITHPINSOURCE='pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + BASEURI=pkcs11:id=%00%01 @@ -1157,8 +1195,6 @@ + case "$1" in + shift 1 + echo 'RSA PKCS11 URIS' -RSA PKCS11 URIS -pkcs11:id=%00%01?pin-value=12345678 + echo 'pkcs11:id=%00%01?pin-value=12345678' + echo 'pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%01 @@ -1170,6 +1206,8 @@ + URIKEYID=%00%02 + ECCRTN=ecCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecCert --id=0002 +RSA PKCS11 URIS +pkcs11:id=%00%01?pin-value=12345678 pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%01 pkcs11:type=public;id=%00%01 @@ -1182,15 +1220,15 @@ ID: 0002 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private Public Key Object; EC EC_POINT 256 bits - EC_POINT: 044104e41df1894503d1ac282d3c2fc3bcd66f7165d34b5277d99863db66ea0190fdee71b1223e492c67e34ec19c9bd41744ad12250747d88426e0761f9161216a026c + EC_POINT: 044104a50c3a0692d7ffe3798fa779bb6ad6dd7021611f89872b1ff0fc27d11c646884d241e18b724bff78c12fe1075b212fd16550c0dd919cced4d07f2b9848176fc1 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecCert ID: 0002 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public + ca_sign ecCert 'My EC Cert' 0002 + LABEL=ecCert + CN='My EC Cert' @@ -1201,26 +1239,27 @@ + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... -Expiration time: Sat Feb 14 14:40:06 2026 -CA expiration time: Sat Feb 14 14:40:05 2026 +Expiration time: Sun Feb 15 16:45:56 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 04 Validity: - Not Before: Sat Feb 15 02:40:06 UTC 2025 - Not After: Sun Feb 15 02:40:06 UTC 2026 + Not Before: Sat Feb 15 02:45:56 UTC 2025 + Not After: Sun Feb 15 02:45:56 UTC 2026 Subject: CN=My EC Cert,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: - 00:e4:1d:f1:89:45:03:d1:ac:28:2d:3c:2f:c3:bc:d6 - 6f:71:65:d3:4b:52:77:d9:98:63:db:66:ea:01:90:fd - ee + 00:a5:0c:3a:06:92:d7:ff:e3:79:8f:a7:79:bb:6a:d6 + dd:70:21:61:1f:89:87:2b:1f:f0:fc:27:d1:1c:64:68 + 84 Y: - 71:b1:22:3e:49:2c:67:e3:4e:c1:9c:9b:d4:17:44:ad - 12:25:07:47:d8:84:26:e0:76:1f:91:61:21:6a:02:6c + 00:d2:41:e1:8b:72:4b:ff:78:c1:2f:e1:07:5b:21:2f + d1:65:50:c0:dd:91:9c:ce:d4:d0:7f:2b:98:48:17:6f + c1 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE @@ -1229,15 +1268,15 @@ Key Usage (critical): Digital signature. Subject Key Identifier (not critical): - bb11d983d6eb9a4dd88ebf39b959ede0c81b1674 + 153455a413ec2a20bdf3ad0dc9225fcf78c6b572 Authority Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f Other Information: Public Key ID: - sha1:bb11d983d6eb9a4dd88ebf39b959ede0c81b1674 - sha256:f60fae82db846af96590ad478c5f178c203d0979089278f80c74a02a08e97da7 + sha1:153455a413ec2a20bdf3ad0dc9225fcf78c6b572 + sha256:bbbb2472f314dbeb2f18065971da6905569041a3f0efe93034ce7265916a21db Public Key PIN: - pin-sha256:9g+ugtuEavllkK1HjF8XjCA9CXkIknj4DHSgKgjpfac= + pin-sha256:u7skcvMU2+svGAZZcdppBVaQQaPw7+kwNM5yZZFqIds= @@ -1249,7 +1288,7 @@ subject: DN: O=PKCS11 Provider, CN=My EC Cert serial: 04 ID: 0002 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert + ECBASEURIWITHPINVALUE='pkcs11:id=%00%02?pin-value=12345678' + ECBASEURIWITHPINSOURCE='pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + ECBASEURI=pkcs11:id=%00%02 @@ -1266,15 +1305,15 @@ ID: 0003 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private Public Key Object; EC EC_POINT 256 bits - EC_POINT: 0441046ee2bf412fc4385c73d08ec8cfa0c613ea5756ba4229cf96d3574a7055d25d5d7cee79c374f5b0085b8c7ae02874981114f55f7ee6ee629ca168e8a05c55b081 + EC_POINT: 04410461b0a609964f075887270fbdc7d9645fb485cbceb5359948afed3292f56a1267afcb6b5879ed74dea8e7aa31f958e430abe5121978f240799250477e17a1d4fa EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecPeerCert ID: 0003 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public + crt_selfsign ecPeerCert 'My Peer EC Cert' 0003 + LABEL=ecPeerCert + CN='My Peer EC Cert' @@ -1287,18 +1326,19 @@ Version: 3 Serial Number (hex): 05 Validity: - Not Before: Sat Feb 15 02:40:06 UTC 2025 - Not After: Sun Feb 15 02:40:06 UTC 2026 + Not Before: Sat Feb 15 02:45:57 UTC 2025 + Not After: Sun Feb 15 02:45:57 UTC 2026 Subject: CN=My Peer EC Cert Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: - 6e:e2:bf:41:2f:c4:38:5c:73:d0:8e:c8:cf:a0:c6:13 - ea:57:56:ba:42:29:cf:96:d3:57:4a:70:55:d2:5d:5d + 61:b0:a6:09:96:4f:07:58:87:27:0f:bd:c7:d9:64:5f + b4:85:cb:ce:b5:35:99:48:af:ed:32:92:f5:6a:12:67 Y: - 7c:ee:79:c3:74:f5:b0:08:5b:8c:7a:e0:28:74:98:11 - 14:f5:5f:7e:e6:ee:62:9c:a1:68:e8:a0:5c:55:b0:81 + 00:af:cb:6b:58:79:ed:74:de:a8:e7:aa:31:f9:58:e4 + 30:ab:e5:12:19:78:f2:40:79:92:50:47:7e:17:a1:d4 + fa Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE @@ -1308,13 +1348,13 @@ Digital signature. Certificate signing. Subject Key Identifier (not critical): - 7446a9c4551aa945194551b1ae74be703eace3d7 + fad05d587eb955b74c11db08cd12fdb29005c75e Other Information: Public Key ID: - sha1:7446a9c4551aa945194551b1ae74be703eace3d7 - sha256:9f738b2c2cfa9e9bbf6ffaf7c839b97767fdf7e8585b7923b0700001adf085d3 + sha1:fad05d587eb955b74c11db08cd12fdb29005c75e + sha256:147c65cd261025abe1239d327742dab111ef2a8ec7430dfd8d88ffabf3144bc9 Public Key PIN: - pin-sha256:n3OLLCz6npu/b/r3yDm5d2f99+hYW3kjsHAAAa3whdM= + pin-sha256:FHxlzSYQJavhI50yd0LasRHvKo7HQw39jYj/q/MUS8k= @@ -1326,7 +1366,7 @@ subject: DN: CN=My Peer EC Cert serial: 05 ID: 0003 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert + ECPEERBASEURIWITHPINVALUE='pkcs11:id=%00%03?pin-value=12345678' + ECPEERBASEURIWITHPINSOURCE='pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + ECPEERBASEURI=pkcs11:id=%00%03 @@ -1337,8 +1377,6 @@ + case "$1" in + shift 1 + echo 'EC PKCS11 URIS' -EC PKCS11 URIS -pkcs11:id=%00%02?pin-value=12345678 + echo 'pkcs11:id=%00%02?pin-value=12345678' + echo 'pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%02 @@ -1352,6 +1390,13 @@ + echo 'pkcs11:type=private;id=%00%03' + echo 'pkcs11:type=cert;object=ecPeerCert' + echo '' ++ '[' 1 -eq 1 ']' ++ KEYID=0004 ++ URIKEYID=%00%04 ++ EDCRTN=edCert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:edwards25519 --label=edCert --id=0004 +EC PKCS11 URIS +pkcs11:id=%00%02?pin-value=12345678 pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%02 pkcs11:type=public;id=%00%02 @@ -1364,26 +1409,21 @@ pkcs11:type=private;id=%00%03 pkcs11:type=cert;object=ecPeerCert -+ '[' 1 -eq 1 ']' -+ KEYID=0004 -+ URIKEYID=%00%04 -+ EDCRTN=edCert -+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:edwards25519 --label=edCert --id=0004 Key pair generated: Private Key Object; EC_EDWARDS label: edCert ID: 0004 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0004;object=edCert;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0004;object=edCert;type=private Public Key Object; EC_EDWARDS EC_POINT 272 bits - EC_POINT: 042066fb448714f0b7b493de935a21312950ef43c9630e57e9911a034c44511e7665 + EC_POINT: 0420da30256d983d76bb387e56b4fb8a071f1c7bb153615cd9bbc501a5868014c477 EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) label: edCert ID: 0004 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0004;object=edCert;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0004;object=edCert;type=public + ca_sign edCert 'My ED25519 Cert' 0004 + LABEL=edCert + CN='My ED25519 Cert' @@ -1394,22 +1434,22 @@ + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/edCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... -Expiration time: Sat Feb 14 14:40:07 2026 -CA expiration time: Sat Feb 14 14:40:05 2026 +Expiration time: Sun Feb 15 16:45:58 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 06 Validity: - Not Before: Sat Feb 15 02:40:07 UTC 2025 - Not After: Sun Feb 15 02:40:07 UTC 2026 + Not Before: Sat Feb 15 02:45:58 UTC 2025 + Not After: Sun Feb 15 02:45:58 UTC 2026 Subject: CN=My ED25519 Cert,O=PKCS11 Provider Subject Public Key Algorithm: EdDSA (Ed25519) Algorithm Security Level: High (256 bits) Curve: Ed25519 X: - 66:fb:44:87:14:f0:b7:b4:93:de:93:5a:21:31:29:50 - ef:43:c9:63:0e:57:e9:91:1a:03:4c:44:51:1e:76:65 + da:30:25:6d:98:3d:76:bb:38:7e:56:b4:fb:8a:07:1f + 1c:7b:b1:53:61:5c:d9:bb:c5:01:a5:86:80:14:c4:77 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE @@ -1418,15 +1458,15 @@ Key Usage (critical): Digital signature. Subject Key Identifier (not critical): - 887ead74f459a79876e6f195cd55f01dbbb02c02 + f5ba4bb0e3eef4106142c076e481394641848fba Authority Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f Other Information: Public Key ID: - sha1:887ead74f459a79876e6f195cd55f01dbbb02c02 - sha256:236715601cbe92b6899b82c49c0879422b7756e25382664b96d8fb1d1e4b65fa + sha1:f5ba4bb0e3eef4106142c076e481394641848fba + sha256:7cbb1b72297ccdc6bed571991e33cd193725f5a7dc91b87b828aab809041bf4b Public Key PIN: - pin-sha256:I2cVYBy+kraJm4LEnAh5Qit3VuJTgmZLltj7HR5LZfo= + pin-sha256:fLsbcil8zca+1XGZHjPNGTcl9afckbh7goqrgJBBv0s= @@ -1438,7 +1478,7 @@ subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert serial: 06 ID: 0004 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert + EDBASEURIWITHPINVALUE='pkcs11:id=%00%04;pin-value=12345678' + EDBASEURIWITHPINSOURCE='pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + EDBASEURI=pkcs11:id=%00%04 @@ -1449,13 +1489,6 @@ + case "$1" in + shift 1 + echo 'ED25519 PKCS11 URIS' -ED25519 PKCS11 URIS -pkcs11:id=%00%04;pin-value=12345678 -pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt -pkcs11:id=%00%04 -pkcs11:type=public;id=%00%04 -pkcs11:type=private;id=%00%04 -pkcs11:type=cert;object=edCert + echo 'pkcs11:id=%00%04;pin-value=12345678' + echo 'pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%04 @@ -1467,21 +1500,28 @@ + URIKEYID=%00%09 + ED2CRTN=ed2Cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:Ed448 --label=ed2Cert --id=0009 +ED25519 PKCS11 URIS +pkcs11:id=%00%04;pin-value=12345678 +pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%04 +pkcs11:type=public;id=%00%04 +pkcs11:type=private;id=%00%04 +pkcs11:type=cert;object=edCert Key pair generated: Private Key Object; EC_EDWARDS label: ed2Cert ID: 0009 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private Public Key Object; EC_EDWARDS EC_POINT 472 bits - EC_POINT: 0439f8eb194f27efff3c9a0c146c61da4334c33025d9a4f198311ea956c7ecd0caf716c66222fbfca484bf8b13bf8712c831c1a1c9cb311beb2000 + EC_POINT: 0439788cd4a6c27f5968ed144862ec025e40d47c229b9141e04cc725192afc5b436aefab145a9c608dd44bf245d8647cd93a7dff55a4710b627480 EC_PARAMS: 06032b6571 (OID 1.3.101.113) label: ed2Cert ID: 0009 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public + ca_sign ed2Cert 'My ED448 Cert' 0009 + LABEL=ed2Cert + CN='My ED448 Cert' @@ -1492,24 +1532,24 @@ + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ed2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... -Expiration time: Sat Feb 14 14:40:07 2026 -CA expiration time: Sat Feb 14 14:40:05 2026 +Expiration time: Sun Feb 15 16:45:59 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 07 Validity: - Not Before: Sat Feb 15 02:40:07 UTC 2025 - Not After: Sun Feb 15 02:40:07 UTC 2026 + Not Before: Sat Feb 15 02:45:59 UTC 2025 + Not After: Sun Feb 15 02:45:59 UTC 2026 Subject: CN=My ED448 Cert,O=PKCS11 Provider Subject Public Key Algorithm: EdDSA (Ed448) Algorithm Security Level: Ultra (456 bits) Curve: Ed448 X: - f8:eb:19:4f:27:ef:ff:3c:9a:0c:14:6c:61:da:43:34 - c3:30:25:d9:a4:f1:98:31:1e:a9:56:c7:ec:d0:ca:f7 - 16:c6:62:22:fb:fc:a4:84:bf:8b:13:bf:87:12:c8:31 - c1:a1:c9:cb:31:1b:eb:20:00 + 78:8c:d4:a6:c2:7f:59:68:ed:14:48:62:ec:02:5e:40 + d4:7c:22:9b:91:41:e0:4c:c7:25:19:2a:fc:5b:43:6a + ef:ab:14:5a:9c:60:8d:d4:4b:f2:45:d8:64:7c:d9:3a + 7d:ff:55:a4:71:0b:62:74:80 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE @@ -1518,15 +1558,15 @@ Key Usage (critical): Digital signature. Subject Key Identifier (not critical): - e58798341645beb7c2e69a2193fe03167263374c + 42793b4f1578716fa560c23a412d1e9765a14c30 Authority Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f Other Information: Public Key ID: - sha1:e58798341645beb7c2e69a2193fe03167263374c - sha256:ab410de3533fc1e816e50b9c4febe905c9773e62f8cee11bd09801545405ff5f + sha1:42793b4f1578716fa560c23a412d1e9765a14c30 + sha256:c40cbbeabff7837a6ba7a29fc556cd905f074ebe8b39c8b1573dfdd62eb6f1ba Public Key PIN: - pin-sha256:q0EN41M/wegW5QucT+vpBcl3PmL4zuEb0JgBVFQF/18= + pin-sha256:xAy76r/3g3prp6KfxVbNkF8HTr6LOcixVz391i628bo= @@ -1538,7 +1578,7 @@ subject: DN: O=PKCS11 Provider, CN=My ED448 Cert serial: 07 ID: 0009 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert + ED2BASEURIWITHPINVALUE='pkcs11:id=%00%09;pin-value=12345678' + ED2BASEURIWITHPINSOURCE='pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + ED2BASEURI=pkcs11:id=%00%09 @@ -1549,15 +1589,6 @@ + case "$1" in + shift 1 + echo 'ED448 PKCS11 URIS' -ED448 PKCS11 URIS -pkcs11:id=%00%09;pin-value=12345678 -pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt -pkcs11:id=%00%09 -pkcs11:type=public;id=%00%09 -pkcs11:type=private;id=%00%09 -pkcs11:type=cert;object=ed2Cert - -## generate RSA key pair, self-signed certificate, remove public key + echo 'pkcs11:id=%00%09;pin-value=12345678' + echo 'pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%09 @@ -1574,19 +1605,28 @@ + URIKEYID=%00%05 + TSTCRTN=testCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert2 --id=0005 +ED448 PKCS11 URIS +pkcs11:id=%00%09;pin-value=12345678 +pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%09 +pkcs11:type=public;id=%00%09 +pkcs11:type=private;id=%00%09 +pkcs11:type=cert;object=ed2Cert + +## generate RSA key pair, self-signed certificate, remove public key Key pair generated: Private Key Object; RSA label: testCert2 ID: 0005 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private Public Key Object; RSA 2048 bits label: testCert2 ID: 0005 Usage: encrypt, verify, verifyRecover, wrap Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0005;object=testCert2;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0005;object=testCert2;type=public + ca_sign testCert2 'My Test Cert 2' 0005 + LABEL=testCert2 + CN='My Test Cert 2' @@ -1597,36 +1637,36 @@ + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... -Expiration time: Sat Feb 14 14:40:08 2026 -CA expiration time: Sat Feb 14 14:40:05 2026 +Expiration time: Sun Feb 15 16:46:02 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 08 Validity: - Not Before: Sat Feb 15 02:40:08 UTC 2025 - Not After: Sun Feb 15 02:40:08 UTC 2026 + Not Before: Sat Feb 15 02:46:02 UTC 2025 + Not After: Sun Feb 15 02:46:02 UTC 2026 Subject: CN=My Test Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): - 00:b3:4d:51:1c:9e:4e:71:69:0d:ea:1a:4d:6e:be:79 - f6:5b:f2:dc:fc:c1:0c:fc:14:15:32:63:77:ad:a1:a4 - d3:05:cd:08:5c:73:2a:15:48:f1:33:be:6e:a4:1c:69 - 3c:66:c4:7f:b2:ba:97:3e:20:6f:f6:42:67:17:0d:d6 - 3b:7d:6e:17:18:8b:a9:7c:5d:39:db:c0:5f:d1:00:d0 - e6:b8:f1:3a:7e:72:a5:e0:c8:73:b3:d6:63:94:61:20 - 97:08:6c:0c:67:dd:bc:a4:bc:4b:a0:7b:20:38:7b:85 - 42:95:9c:53:a4:75:1d:4b:fa:21:38:24:d1:6b:11:97 - 70:33:e9:d2:09:85:4b:da:5f:50:5f:77:57:64:be:b9 - 05:69:b0:1d:a4:94:25:27:1d:90:49:e7:51:61:9f:fc - 36:89:c2:51:76:2c:0c:45:fb:30:ae:2b:48:bd:de:27 - 9c:1d:23:68:16:e2:6e:7b:3c:3a:5d:fd:89:68:03:f2 - 5c:8a:b9:c3:bf:f8:78:49:7f:37:b0:a1:2e:7d:a9:2c - 7d:f3:f3:c4:5d:12:2f:dc:47:2d:0b:6a:b1:a7:d6:85 - 7f:0d:e1:46:68:67:a7:ee:e3:df:ae:f9:f6:b4:f0:80 - c3:5e:c0:62:e1:4f:fa:8b:80:6f:0f:7d:ce:d8:b7:8e - 9f + 00:d0:88:b2:2e:7a:04:73:45:1c:1b:72:b3:2b:9d:31 + e2:50:e5:75:d3:71:97:89:ea:eb:ad:a6:82:77:f6:df + 0d:16:25:bc:3d:6b:a7:dd:78:39:1e:90:13:77:28:64 + 0a:78:06:43:91:59:6e:cc:6c:80:bb:f9:d7:22:58:42 + c7:96:b4:41:3d:52:c0:b5:e3:35:53:61:bd:c9:51:f2 + 53:13:56:cd:a1:72:1e:f0:4e:0f:93:cd:70:16:91:09 + 10:1c:fd:57:fc:09:7c:1d:a7:d7:50:0b:8b:31:cf:bc + a1:fb:8b:ee:df:cb:2d:44:62:36:98:9c:eb:79:2b:11 + b9:fa:81:e6:73:3e:12:71:c2:03:25:65:b9:7a:aa:f5 + 81:2c:58:7b:7f:18:f0:e2:4b:4f:f3:6b:ac:8a:6f:3e + 1c:e5:90:28:2b:a8:fe:a8:f0:8c:28:6f:66:6e:e0:f1 + 0b:8d:c7:cf:ee:f9:91:d6:97:78:7e:89:a8:bf:28:a5 + b3:19:a0:0a:3e:38:b4:ef:45:ac:aa:c6:67:83:3d:31 + 22:a1:b6:12:3c:af:f5:af:50:fb:7e:28:72:6a:c4:2f + 97:6f:2b:5a:5b:80:e8:1a:b5:79:31:15:a4:79:19:eb + 96:ca:32:67:78:1a:5c:3b:cd:c6:81:6b:7e:95:14:85 + 93 Exponent (bits 24): 01:00:01 Extensions: @@ -1638,15 +1678,15 @@ Digital signature. Key encipherment. Subject Key Identifier (not critical): - a2a69d087e31a4b75b0e2d603aa9a42e7ec20e70 + aa82f649b57b6028680dff688286cc2ada100ded Authority Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f Other Information: Public Key ID: - sha1:a2a69d087e31a4b75b0e2d603aa9a42e7ec20e70 - sha256:8ded9b81d721d9c12863e256700a742d411255ea25d37d3cb9936111fd017852 + sha1:aa82f649b57b6028680dff688286cc2ada100ded + sha256:4005aa451fc50e84475c46f3c84a5cbbaefb011b0d62daa208cdea41f723ec2e Public Key PIN: - pin-sha256:je2bgdch2cEoY+JWcAp0LUESVeol0308uZNhEf0BeFI= + pin-sha256:QAWqRR/FDoRHXEbzyEpcu677ARsNYtqiCM3qQfcj7C4= @@ -1658,7 +1698,7 @@ subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 serial: 08 ID: 0005 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0005 + BASE2URIWITHPINVALUE='pkcs11:id=%00%05?pin-value=12345678' + BASE2URIWITHPINSOURCE='pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' @@ -1671,13 +1711,8 @@ + echo 'RSA2 PKCS11 URIS' + echo 'pkcs11:id=%00%05?pin-value=12345678' + echo 'pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' -RSA2 PKCS11 URIS -pkcs11:id=%00%05?pin-value=12345678 -pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt + echo pkcs11:id=%00%05 + echo 'pkcs11:type=private;id=%00%05' -pkcs11:id=%00%05 -pkcs11:type=private;id=%00%05 + echo 'pkcs11:type=cert;object=testCert2' + echo '' + title PARA 'generate EC key pair, self-signed certificate, remove public key' @@ -1690,6 +1725,11 @@ + URIKEYID=%00%06 + TSTCRTN=ecCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp384r1 --label=ecCert2 --id=0006 +RSA2 PKCS11 URIS +pkcs11:id=%00%05?pin-value=12345678 +pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%05 +pkcs11:type=private;id=%00%05 pkcs11:type=cert;object=testCert2 @@ -1700,15 +1740,15 @@ ID: 0006 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private Public Key Object; EC EC_POINT 384 bits - EC_POINT: 046104a8643b10733d1442ba4b4b58426f282233e011661e69941848d48f99fd76f0b3707d354251a91fb03ec1ea40c050887bfcfa26e6078bc13b5442f44d99d561a4e6cfa762b8f979deab9631762da8c5ffbb63e2ecc3243c91a5ff9c1ebfc8ce38 + EC_POINT: 04610431a8423c545fa9dc357e9acc224766f38884a0c063573c44806025f0f9751f38b8039fb56c2e051d175ebfd16ccc2edf4448ce2eb24494214ea8c5c973e0932a193542722b32e0e51d018badc42ff42381b751f16c18d77727000fd2cb72004e EC_PARAMS: 06052b81040022 (OID 1.3.132.0.34) label: ecCert2 ID: 0006 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=public + ca_sign ecCert2 'My EC Cert 2' 0006 + LABEL=ecCert2 + CN='My EC Cert 2' @@ -1719,29 +1759,27 @@ + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... -Expiration time: Sat Feb 14 14:40:08 2026 -CA expiration time: Sat Feb 14 14:40:05 2026 +Expiration time: Sun Feb 15 16:46:04 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 09 Validity: - Not Before: Sat Feb 15 02:40:08 UTC 2025 - Not After: Sun Feb 15 02:40:08 UTC 2026 + Not Before: Sat Feb 15 02:46:04 UTC 2025 + Not After: Sun Feb 15 02:46:04 UTC 2026 Subject: CN=My EC Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Ultra (384 bits) Curve: SECP384R1 X: - 00:a8:64:3b:10:73:3d:14:42:ba:4b:4b:58:42:6f:28 - 22:33:e0:11:66:1e:69:94:18:48:d4:8f:99:fd:76:f0 - b3:70:7d:35:42:51:a9:1f:b0:3e:c1:ea:40:c0:50:88 - 7b + 31:a8:42:3c:54:5f:a9:dc:35:7e:9a:cc:22:47:66:f3 + 88:84:a0:c0:63:57:3c:44:80:60:25:f0:f9:75:1f:38 + b8:03:9f:b5:6c:2e:05:1d:17:5e:bf:d1:6c:cc:2e:df Y: - 00:fc:fa:26:e6:07:8b:c1:3b:54:42:f4:4d:99:d5:61 - a4:e6:cf:a7:62:b8:f9:79:de:ab:96:31:76:2d:a8:c5 - ff:bb:63:e2:ec:c3:24:3c:91:a5:ff:9c:1e:bf:c8:ce - 38 + 44:48:ce:2e:b2:44:94:21:4e:a8:c5:c9:73:e0:93:2a + 19:35:42:72:2b:32:e0:e5:1d:01:8b:ad:c4:2f:f4:23 + 81:b7:51:f1:6c:18:d7:77:27:00:0f:d2:cb:72:00:4e Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE @@ -1750,15 +1788,15 @@ Key Usage (critical): Digital signature. Subject Key Identifier (not critical): - d2687fa11e8d09732875f3b2c4de85bab9e68ed0 + 30176db154f92befd1edf9a9906cce8aae552972 Authority Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f Other Information: Public Key ID: - sha1:d2687fa11e8d09732875f3b2c4de85bab9e68ed0 - sha256:1d88020e522d42aeddeb31de0c9337e60eb4fa725176fd90dda854d7c97267c2 + sha1:30176db154f92befd1edf9a9906cce8aae552972 + sha256:c4aabfba4b0addc93f6782e216f6c98e2aca7338e2bd3337f8bb8481408b72e2 Public Key PIN: - pin-sha256:HYgCDlItQq7d6zHeDJM35g60+nJRdv2Q3ahU18lyZ8I= + pin-sha256:xKq/uksK3ck/Z4LiFvbJjirKczjivTM3+LuEgUCLcuI= @@ -1770,7 +1808,7 @@ subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 serial: 09 ID: 0006 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0006 + ECBASE2URIWITHPINVALUE='pkcs11:id=%00%06?pin-value=12345678' + ECBASE2URIWITHPINSOURCE='pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' @@ -1784,16 +1822,9 @@ + echo 'pkcs11:id=%00%06?pin-value=12345678' + echo 'pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%06 -EC2 PKCS11 URIS -pkcs11:id=%00%06?pin-value=12345678 -pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt -pkcs11:id=%00%06 + echo 'pkcs11:type=private;id=%00%06' + echo 'pkcs11:type=cert;object=ecCert2' + echo '' -pkcs11:type=private;id=%00%06 -pkcs11:type=cert;object=ecCert2 - + '[' -z '' ']' + title PARA 'explicit EC unsupported' + case "$1" in @@ -1801,35 +1832,42 @@ + echo '' + echo '## explicit EC unsupported' + '[' -f '' ']' - -## explicit EC unsupported + title PARA 'generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' + case "$1" in + shift 1 + echo '' + echo '## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' - -## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate + '[' -f '' ']' + KEYID=0008 + URIKEYID=%00%08 + TSTCRTN=ecCert3 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp521r1 --label=ecCert3 --id=0008 --always-auth +EC2 PKCS11 URIS +pkcs11:id=%00%06?pin-value=12345678 +pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%06 +pkcs11:type=private;id=%00%06 +pkcs11:type=cert;object=ecCert2 + + +## explicit EC unsupported + +## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate Key pair generated: Private Key Object; EC label: ecCert3 ID: 0008 Usage: decrypt, sign, signRecover, unwrap, derive Access: always authenticate, sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private Public Key Object; EC EC_POINT 528 bits - EC_POINT: 04818504001e4f07299793fbd42f9d2ef9e94937af9b28107c320929447fcabfb71a1189ca8601c2f0850371de34f9b2cfe2c89b4b329740618ec2c42a4df5d92a73b163ace3016f71986db4fc80441be23e94bf269e605be049ff89bc656446511947a6badf2331635a8671efa6968407f0b06b50413e9e06480cc33e0e46d2b8a80ccf13fceed6 + EC_POINT: 0481850400a1ef345dba5343f7e1aceca401949946ea1c9ff0f5720b73fa941efd3bbbb18951c97068460c34a2c5574e98fa04ce810adfbcd4e613bc3952e29fbb2c5833fbd50136c8080d38a739e7f5459e23b73fb56ec175a4d28542b8f61666cd867aba98b451e3b99d0f6f4a6db4013ce908ecb20da76c83d84ff4a1348034f385c95f076242 EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) label: ecCert3 ID: 0008 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public + ca_sign ecCert3 'My EC Cert 3' 0008 + LABEL=ecCert3 + CN='My EC Cert 3' @@ -1840,31 +1878,31 @@ + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecCert3.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... -Expiration time: Sat Feb 14 14:40:09 2026 -CA expiration time: Sat Feb 14 14:40:05 2026 +Expiration time: Sun Feb 15 16:46:05 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0a Validity: - Not Before: Sat Feb 15 02:40:09 UTC 2025 - Not After: Sun Feb 15 02:40:09 UTC 2026 + Not Before: Sat Feb 15 02:46:05 UTC 2025 + Not After: Sun Feb 15 02:46:05 UTC 2026 Subject: CN=My EC Cert 3,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Future (528 bits) Curve: SECP521R1 X: - 1e:4f:07:29:97:93:fb:d4:2f:9d:2e:f9:e9:49:37:af - 9b:28:10:7c:32:09:29:44:7f:ca:bf:b7:1a:11:89:ca - 86:01:c2:f0:85:03:71:de:34:f9:b2:cf:e2:c8:9b:4b - 32:97:40:61:8e:c2:c4:2a:4d:f5:d9:2a:73:b1:63:ac - e3 + 00:a1:ef:34:5d:ba:53:43:f7:e1:ac:ec:a4:01:94:99 + 46:ea:1c:9f:f0:f5:72:0b:73:fa:94:1e:fd:3b:bb:b1 + 89:51:c9:70:68:46:0c:34:a2:c5:57:4e:98:fa:04:ce + 81:0a:df:bc:d4:e6:13:bc:39:52:e2:9f:bb:2c:58:33 + fb:d5 Y: - 01:6f:71:98:6d:b4:fc:80:44:1b:e2:3e:94:bf:26:9e - 60:5b:e0:49:ff:89:bc:65:64:46:51:19:47:a6:ba:df - 23:31:63:5a:86:71:ef:a6:96:84:07:f0:b0:6b:50:41 - 3e:9e:06:48:0c:c3:3e:0e:46:d2:b8:a8:0c:cf:13:fc - ee:d6 + 01:36:c8:08:0d:38:a7:39:e7:f5:45:9e:23:b7:3f:b5 + 6e:c1:75:a4:d2:85:42:b8:f6:16:66:cd:86:7a:ba:98 + b4:51:e3:b9:9d:0f:6f:4a:6d:b4:01:3c:e9:08:ec:b2 + 0d:a7:6c:83:d8:4f:f4:a1:34:80:34:f3:85:c9:5f:07 + 62:42 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE @@ -1873,15 +1911,15 @@ Key Usage (critical): Digital signature. Subject Key Identifier (not critical): - be040556414d74cb2f89bfa1434ad7a7827af764 + 05425a09c9bdc904c481a75e4ffc0f20a8c96b9c Authority Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f Other Information: Public Key ID: - sha1:be040556414d74cb2f89bfa1434ad7a7827af764 - sha256:e3b32d65d58b50b23849398dc872dd4286ac662c39dc67c8927be76b1ace0b1b + sha1:05425a09c9bdc904c481a75e4ffc0f20a8c96b9c + sha256:d9891dd6981d278b692a35a13f78f9215b13d89ea2f608cbee05495498f13d58 Public Key PIN: - pin-sha256:47MtZdWLULI4STmNyHLdQoasZiw53GfIknvnaxrOCxs= + pin-sha256:2Ykd1pgdJ4tpKjWhP3j5IVsT2J6i9gjL7gVJVJjxPVg= @@ -1893,7 +1931,7 @@ subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 serial: 0A ID: 0008 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert + ECBASE3URIWITHPINVALUE='pkcs11:id=%00%08?pin-value=12345678' + ECBASE3URIWITHPINSOURCE='pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + ECBASE3URI=pkcs11:id=%00%08 @@ -1911,6 +1949,11 @@ + echo 'pkcs11:type=private;id=%00%08' + echo 'pkcs11:type=cert;object=ecCert3' + echo '' ++ '[' 1 -eq 1 ']' ++ KEYID=0010 ++ URIKEYID=%00%10 ++ TSTCRTN=testRsaPssCert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testRsaPssCert --id=0010 --allowed-mechanisms RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS EC3 PKCS11 URIS pkcs11:id=%00%08?pin-value=12345678 pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt @@ -1919,11 +1962,6 @@ pkcs11:type=private;id=%00%08 pkcs11:type=cert;object=ecCert3 -+ '[' 1 -eq 1 ']' -+ KEYID=0010 -+ URIKEYID=%00%10 -+ TSTCRTN=testRsaPssCert -+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testRsaPssCert --id=0010 --allowed-mechanisms RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS Key pair generated: Private Key Object; RSA label: testRsaPssCert @@ -1931,13 +1969,13 @@ Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private Public Key Object; RSA 2048 bits label: testRsaPssCert ID: 0010 Usage: encrypt, verify, verifyRecover, wrap Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public + ca_sign testRsaPssCert 'My RsaPss Cert' 0010 --sign-params=RSA-PSS + LABEL=testRsaPssCert + CN='My RsaPss Cert' @@ -1948,36 +1986,36 @@ + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testRsaPssCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS Generating a signed certificate... -Expiration time: Sat Feb 14 14:40:10 2026 -CA expiration time: Sat Feb 14 14:40:05 2026 +Expiration time: Sun Feb 15 16:46:09 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0b Validity: - Not Before: Sat Feb 15 02:40:10 UTC 2025 - Not After: Sun Feb 15 02:40:10 UTC 2026 + Not Before: Sat Feb 15 02:46:09 UTC 2025 + Not After: Sun Feb 15 02:46:09 UTC 2026 Subject: CN=My RsaPss Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): - 00:b5:a9:99:ae:5a:2f:7d:22:d1:c9:01:a7:a9:8b:31 - 27:ec:c6:dc:42:9e:4b:26:26:20:7b:e2:52:ab:97:8b - 9f:0b:d0:8b:76:28:be:8e:5f:50:b9:ad:4a:ae:92:93 - fc:22:28:a7:31:39:3c:41:90:9c:9a:87:45:3e:c1:c4 - 45:02:dd:2d:ce:52:7b:82:46:5b:b2:6d:e9:5b:12:cb - 09:2b:62:a9:8c:ed:a3:86:2a:8b:6a:77:df:10:9e:eb - d1:b8:fe:06:1f:fc:1c:85:e1:b5:78:03:3d:eb:08:01 - 50:e4:e8:a8:cc:e1:c2:ab:68:91:57:aa:1a:d6:0a:55 - 7c:24:76:2e:f3:20:3e:32:53:30:f1:f6:69:46:d3:a8 - 75:3e:d3:bd:44:32:41:db:96:7b:9a:e3:f1:f2:f4:aa - 14:32:5d:83:44:05:05:91:a9:63:02:45:41:9f:9b:4e - 58:d2:b4:7a:ef:2a:88:99:df:ec:d0:8d:a1:bf:71:81 - 04:16:49:98:69:66:b7:bb:c5:a3:47:1b:d2:31:92:f5 - fa:d6:93:01:5c:cb:fb:2b:95:4d:ee:d4:d3:35:79:c0 - fc:17:fd:98:02:2d:84:2d:1f:4f:4c:52:97:f4:0b:50 - 06:8e:7d:dd:46:93:41:e1:c9:ba:ed:9d:85:82:49:88 - 7d + 00:b4:a8:ef:0a:42:b1:0e:3c:d9:2e:63:3c:26:1f:64 + 27:83:b0:fc:0d:6b:bf:70:d0:a9:7e:7f:bd:88:2c:50 + de:f4:96:31:1c:9e:34:c7:b8:ca:0c:b4:55:23:fb:76 + 72:f9:7a:31:6d:48:ed:e0:7e:64:a2:51:9f:2b:c9:f3 + e4:b7:3b:79:dc:bd:ab:94:e3:fa:32:8b:9f:03:3e:e2 + c3:78:96:4e:8e:af:fb:c9:92:bd:5a:cd:40:42:c9:fc + e8:5b:b6:0b:98:11:ab:5c:da:8e:33:19:38:29:14:21 + 67:f8:2c:d8:ad:b4:9c:43:34:c1:70:8c:e9:9e:f9:ba + 65:6f:ab:28:14:39:ae:da:cf:7f:f9:8a:55:45:81:ba + fd:ca:f8:13:57:6a:9d:ee:56:ca:2c:15:b8:a0:fd:86 + c9:2c:a0:1f:22:d1:73:8a:1f:c0:ee:05:c3:ba:14:21 + ae:69:84:13:b6:27:b1:09:22:89:a8:a7:1d:be:2a:ba + 96:bf:da:90:80:51:44:36:52:f0:9c:a1:9b:6f:80:35 + 61:7f:8f:51:95:d8:35:d2:e3:95:97:22:cb:d1:2e:42 + c5:b6:4d:ae:e3:99:28:e5:e8:77:05:5c:95:92:f7:10 + 96:1e:26:92:18:78:0e:7a:76:a7:42:a1:99:65:f8:b9 + df Exponent (bits 24): 01:00:01 Extensions: @@ -1989,15 +2027,15 @@ Digital signature. Key encipherment. Subject Key Identifier (not critical): - a861e44644ef0d21982efdbcf246311eddb7f5d8 + d292810ca51bf77de73accd2c344958f9d0e7923 Authority Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f Other Information: Public Key ID: - sha1:a861e44644ef0d21982efdbcf246311eddb7f5d8 - sha256:e25df3ab779d27a4a6d2e12609ebaa5a6ca56a64764a7f169189b86e3b0f6c8d + sha1:d292810ca51bf77de73accd2c344958f9d0e7923 + sha256:fe3bd9bf8ecdc7d16e3b441a119813d5ac505cd86c09ba0dfc29a3c223056cf7 Public Key PIN: - pin-sha256:4l3zq3edJ6Sm0uEmCeuqWmylamR2Sn8WkYm4bjsPbI0= + pin-sha256:/jvZv47Nx9FuO0QaEZgT1axQXNhsCboN/CmjwiMFbPc= @@ -2009,7 +2047,7 @@ subject: DN: O=PKCS11 Provider, CN=My RsaPss Cert serial: 0B ID: 0010 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert + RSAPSSBASEURIWITHPINVALUE='pkcs11:id=%00%10?pin-value=12345678' + RSAPSSBASEURIWITHPINSOURCE='pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' + RSAPSSBASEURI=pkcs11:id=%00%10 @@ -2025,397 +2063,26 @@ + echo pkcs11:id=%00%10 + echo 'pkcs11:type=public;id=%00%10' + echo 'pkcs11:type=private;id=%00%10' ++ echo 'pkcs11:type=cert;object=testRsaPssCert' ++ echo '' ++ KEYID=0011 ++ URIKEYID=%00%11 ++ TSTCRTN=testRsaPss2Cert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:3092 --label=testRsaPss2Cert --id=0011 --allowed-mechanisms SHA256-RSA-PKCS-PSS RSA-PSS PKCS11 URIS pkcs11:id=%00%10?pin-value=12345678 pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt pkcs11:id=%00%10 pkcs11:type=public;id=%00%10 pkcs11:type=private;id=%00%10 -+ echo 'pkcs11:type=cert;object=testRsaPssCert' -+ echo '' -+ KEYID=0011 -+ URIKEYID=%00%11 -+ TSTCRTN=testRsaPss2Cert pkcs11:type=cert;object=testRsaPssCert -+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:3092 --label=testRsaPss2Cert --id=0011 --allowed-mechanisms SHA256-RSA-PKCS-PSS -Key pair generated: -Private Key Object; RSA - label: testRsaPss2Cert - ID: 0011 - Usage: decrypt, sign, signRecover, unwrap - Access: sensitive, always sensitive, never extractable, local - Allowed mechanisms: SHA256-RSA-PKCS-PSS - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private -Public Key Object; RSA 3092 bits - label: testRsaPss2Cert - ID: 0011 - Usage: encrypt, verify, verifyRecover, wrap - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public -+ ca_sign testRsaPss2Cert 'My RsaPss2 Cert' 0011 --sign-params=RSA-PSS --hash=SHA256 -+ LABEL=testRsaPss2Cert -+ CN='My RsaPss2 Cert' -+ KEYID=0011 -+ shift 3 -+ (( SERIAL+=1 )) -+ sed -e 's|cn = .*|cn = My RsaPss2 Cert|g' -e 's|serial = .*|serial = 12|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg -+ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testRsaPss2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS --hash=SHA256 -Generating a signed certificate... - -Expiration time: Sat Feb 14 14:40:16 2026 -CA expiration time: Sat Feb 14 14:40:05 2026 -Warning: The time set exceeds the CA's expiration time -X.509 Certificate Information: - Version: 3 - Serial Number (hex): 0c - Validity: - Not Before: Sat Feb 15 02:40:16 UTC 2025 - Not After: Sun Feb 15 02:40:16 UTC 2026 - Subject: CN=My RsaPss2 Cert,O=PKCS11 Provider - Subject Public Key Algorithm: RSA - Algorithm Security Level: High (3092 bits) - Modulus (bits 3092): - 0f:36:05:47:87:0a:fd:8b:9f:d7:ae:75:cc:7f:38:c5 - 11:d2:8f:89:02:c8:d0:7a:72:0c:f6:6c:8f:05:98:ea - a9:71:d2:0a:9e:bb:a3:41:64:22:97:4b:74:f2:85:33 - 32:0b:5e:e6:f4:a4:9c:71:22:98:f3:92:76:c1:4d:dd - ac:e8:ac:c5:ef:00:c0:27:9f:b6:cc:ae:a2:6d:69:58 - be:ef:ee:aa:7e:07:aa:aa:d6:f1:e1:b3:82:90:e8:4a - 4a:ea:48:4a:02:60:17:32:e1:0a:8c:97:e7:c2:53:dd - 24:33:1d:05:b3:0f:7c:c9:69:1b:14:0c:8d:8a:15:e7 - 20:8a:65:b0:8b:21:b3:43:bb:90:79:28:97:61:42:98 - 48:a2:bd:8a:84:90:e2:3a:9d:bf:c9:db:f7:31:7d:8e - 62:b2:83:dc:99:19:92:81:3b:cc:f5:7e:f3:15:9d:3f - 89:02:ec:e5:18:7d:50:d2:2d:46:ee:26:14:81:88:94 - 09:76:20:53:8c:65:a5:48:e2:9f:f6:5e:88:74:74:e0 - f4:fe:2e:58:7d:da:31:bf:f4:9a:49:0f:f6:76:a2:ae - 92:e5:e4:28:3f:02:89:1f:55:e3:a5:62:66:39:5d:8f - 3e:e0:19:4f:25:08:cc:eb:fc:ab:c8:ff:63:b6:69:b3 - 9a:bd:36:f1:4e:48:35:47:df:20:fc:cf:a3:47:1d:9c - 6d:6c:88:5f:6a:37:b1:3d:44:73:7e:12:d0:14:ae:68 - 98:4e:26:93:0c:80:ad:a2:a8:5f:d5:36:cd:5a:cc:e1 - b0:2f:18:ce:39:59:b8:44:c4:b0:81:60:a4:67:9d:0e - f2:0a:3f:f7:01:4a:91:ad:c5:ba:e6:9f:68:ec:39:54 - 6b:c2:a7:3b:48:01:c9:17:b9:7e:9a:6e:cc:d0:66:cd - db:58:66:af:1a:f6:b9:1e:ae:a6:13:b7:8d:4a:3e:20 - 9c:b8:ce:77:e9:8c:e1:82:06:a9:da:62:52:db:51:9c - 84:6a:15 - Exponent (bits 24): - 01:00:01 - Extensions: - Basic Constraints (critical): - Certificate Authority (CA): FALSE - Subject Alternative Name (not critical): - RFC822Name: testcert@example.org - Key Usage (critical): - Digital signature. - Key encipherment. - Subject Key Identifier (not critical): - be854cc30ddd26ea565e16cb9c49c82c6c513f48 - Authority Key Identifier (not critical): - e21766fe9c010ffd5b251dc0d2168bf24f28ec11 -Other Information: - Public Key ID: - sha1:be854cc30ddd26ea565e16cb9c49c82c6c513f48 - sha256:791ffb8ddd2b9a517f13586f0879c1b83739426950580126b5740e0af8e9bf38 - Public Key PIN: - pin-sha256:eR/7jd0rmlF/E1hvCHnBuDc5QmlQWAEmtXQOCvjpvzg= - - - -Signing certificate... -+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testRsaPss2Cert.crt --type=cert --id=0011 --label=testRsaPss2Cert -Created certificate: -Certificate Object; type = X.509 cert - label: testRsaPss2Cert - subject: DN: O=PKCS11 Provider, CN=My RsaPss2 Cert - serial: 0C - ID: 0011 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert -+ RSAPSS2BASEURIWITHPINVALUE='pkcs11:id=%00%11?pin-value=12345678' -+ RSAPSS2BASEURIWITHPINSOURCE='pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' -+ RSAPSS2BASEURI=pkcs11:id=%00%11 -+ RSAPSS2PUBURI='pkcs11:type=public;id=%00%11' -+ RSAPSS2PRIURI='pkcs11:type=private;id=%00%11' -+ RSAPSS2CRTURI='pkcs11:type=cert;object=testRsaPss2Cert' -+ title LINE 'RSA-PSS 2 PKCS11 URIS' -+ case "$1" in -+ shift 1 -+ echo 'RSA-PSS 2 PKCS11 URIS' -+ echo 'pkcs11:id=%00%11?pin-value=12345678' -+ echo 'pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' -+ echo pkcs11:id=%00%11 -+ echo 'pkcs11:type=public;id=%00%11' -+ echo 'pkcs11:type=private;id=%00%11' -RSA-PSS 2 PKCS11 URIS -pkcs11:id=%00%11?pin-value=12345678 -pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt -pkcs11:id=%00%11 -pkcs11:type=public;id=%00%11 -pkcs11:type=private;id=%00%11 -+ echo 'pkcs11:type=cert;object=testRsaPss2Cert' -+ echo '' -+ title PARA 'Show contents of softhsm token' -+ case "$1" in -+ shift 1 -+ echo '' -+ echo '## Show contents of softhsm token' -pkcs11:type=cert;object=testRsaPss2Cert - - -## Show contents of softhsm token -+ '[' -f '' ']' -+ echo ' ----------------------------------------------------------------------------------------------------' -+ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' -O - ---------------------------------------------------------------------------------------------------- -Private Key Object; EC - label: ecPeerCert - ID: 0003 - Usage: decrypt, sign, signRecover, unwrap, derive - Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private -Private Key Object; RSA - label: testRsaPssCert - ID: 0010 - Usage: decrypt, sign, signRecover, unwrap - Access: sensitive, always sensitive, never extractable, local - Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private -Public Key Object; RSA 2048 bits - label: caCert - ID: 0000 - Usage: encrypt, verify, verifyRecover, wrap - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0000;object=caCert;type=public -Certificate Object; type = X.509 cert - label: ed2Cert - subject: DN: O=PKCS11 Provider, CN=My ED448 Cert - serial: 07 - ID: 0009 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert -Private Key Object; EC - label: ecCert2 - ID: 0006 - Usage: decrypt, sign, signRecover, unwrap, derive - Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private -Private Key Object; RSA - label: testCert - ID: 0001 - Usage: decrypt, sign, signRecover, unwrap - Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0001;object=testCert;type=private -Public Key Object; EC EC_POINT 256 bits - EC_POINT: 044104e41df1894503d1ac282d3c2fc3bcd66f7165d34b5277d99863db66ea0190fdee71b1223e492c67e34ec19c9bd41744ad12250747d88426e0761f9161216a026c - EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) - label: ecCert - ID: 0002 - Usage: encrypt, verify, verifyRecover, wrap, derive - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public -Public Key Object; EC_EDWARDS EC_POINT 272 bits - EC_POINT: 042066fb448714f0b7b493de935a21312950ef43c9630e57e9911a034c44511e7665 - EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) - label: edCert - ID: 0004 - Usage: encrypt, verify, verifyRecover, wrap, derive - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0004;object=edCert;type=public -Public Key Object; EC EC_POINT 528 bits - EC_POINT: 04818504001e4f07299793fbd42f9d2ef9e94937af9b28107c320929447fcabfb71a1189ca8601c2f0850371de34f9b2cfe2c89b4b329740618ec2c42a4df5d92a73b163ace3016f71986db4fc80441be23e94bf269e605be049ff89bc656446511947a6badf2331635a8671efa6968407f0b06b50413e9e06480cc33e0e46d2b8a80ccf13fceed6 - EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) - label: ecCert3 - ID: 0008 - Usage: encrypt, verify, verifyRecover, wrap, derive - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public -Certificate Object; type = X.509 cert - label: testCert2 - subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 - serial: 08 - ID: 0005 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert -Certificate Object; type = X.509 cert - label: ecPeerCert - subject: DN: CN=My Peer EC Cert - serial: 05 - ID: 0003 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert -Certificate Object; type = X.509 cert - label: testCert - subject: DN: O=PKCS11 Provider, CN=My Test Cert - serial: 03 - ID: 0001 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert -Certificate Object; type = X.509 cert - label: testRsaPssCert - subject: DN: O=PKCS11 Provider, CN=My RsaPss Cert - serial: 0B - ID: 0010 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert -Certificate Object; type = X.509 cert - label: ecCert3 - subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 - serial: 0A - ID: 0008 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert -Private Key Object; RSA - label: testRsaPss2Cert - ID: 0011 - Usage: decrypt, sign, signRecover, unwrap - Access: sensitive, always sensitive, never extractable, local - Allowed mechanisms: SHA256-RSA-PKCS-PSS - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private -Private Key Object; RSA - label: caCert - ID: 0000 - Usage: decrypt, sign, signRecover, unwrap - Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0000;object=caCert;type=private -Public Key Object; EC EC_POINT 256 bits - EC_POINT: 0441046ee2bf412fc4385c73d08ec8cfa0c613ea5756ba4229cf96d3574a7055d25d5d7cee79c374f5b0085b8c7ae02874981114f55f7ee6ee629ca168e8a05c55b081 - EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) - label: ecPeerCert - ID: 0003 - Usage: encrypt, verify, verifyRecover, wrap, derive - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public -Certificate Object; type = X.509 cert - label: testRsaPss2Cert - subject: DN: O=PKCS11 Provider, CN=My RsaPss2 Cert - serial: 0C - ID: 0011 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert -Certificate Object; type = X.509 cert - label: ecCert2 - subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 - serial: 09 - ID: 0006 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert -Private Key Object; EC - label: ecCert - ID: 0002 - Usage: decrypt, sign, signRecover, unwrap, derive - Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private -Public Key Object; RSA 2048 bits - label: testCert - ID: 0001 - Usage: encrypt, verify, verifyRecover, wrap - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0001;object=testCert;type=public -Private Key Object; EC - label: ecCert3 - ID: 0008 - Usage: decrypt, sign, signRecover, unwrap, derive - Access: always authenticate, sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private -Certificate Object; type = X.509 cert - label: caCert - subject: DN: CN=Issuer - serial: 02 - ID: 0000 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert -Certificate Object; type = X.509 cert - label: ecCert - subject: DN: O=PKCS11 Provider, CN=My EC Cert - serial: 04 - ID: 0002 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert -Private Key Object; EC_EDWARDS - label: ed2Cert - ID: 0009 - Usage: decrypt, sign, signRecover, unwrap, derive - Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private -Public Key Object; RSA 2048 bits - label: testRsaPssCert - ID: 0010 - Usage: encrypt, verify, verifyRecover, wrap - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public -Certificate Object; type = X.509 cert - label: edCert - subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert - serial: 06 - ID: 0004 - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert -Public Key Object; RSA 3092 bits - label: testRsaPss2Cert - ID: 0011 - Usage: encrypt, verify, verifyRecover, wrap - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public -Public Key Object; EC_EDWARDS EC_POINT 472 bits - EC_POINT: 0439f8eb194f27efff3c9a0c146c61da4334c33025d9a4f198311ea956c7ecd0caf716c66222fbfca484bf8b13bf8712c831c1a1c9cb311beb2000 - EC_PARAMS: 06032b6571 (OID 1.3.101.113) - label: ed2Cert - ID: 0009 - Usage: encrypt, verify, verifyRecover, wrap, derive - Access: local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public -Private Key Object; EC_EDWARDS - label: edCert - ID: 0004 - Usage: decrypt, sign, signRecover, unwrap, derive - Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0004;object=edCert;type=private -Private Key Object; RSA - label: testCert2 - ID: 0005 - Usage: decrypt, sign, signRecover, unwrap - Access: sensitive, always sensitive, never extractable, local - uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private -+ echo ' ----------------------------------------------------------------------------------------------------' -+ title PARA 'Output configurations' -+ case "$1" in - ---------------------------------------------------------------------------------------------------- -+ shift 1 -+ echo '' -+ echo '## Output configurations' -+ '[' -f '' ']' - -## Output configurations -+ OPENSSL_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -+ title LINE 'Generate openssl config file' -+ case "$1" in -+ shift 1 -+ echo 'Generate openssl config file' -Generate openssl config file -+ sed -e 's|@libtoollibs@|/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src|g' -e 's|@testsblddir@|/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests|g' -e 's|@testsdir@|/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm|g' -e 's|@SHARED_EXT@|.so|g' -e 's|@PINFILE@|/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt|g' -e 's|##TOKENOPTIONS|\npkcs11-module-quirks = no-deinit no-operation-state|g' /build/reproducible-path/pkcs11-provider-1.0/tests/openssl.cnf.in -+ title LINE 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testvars' -+ case "$1" in -+ shift 1 -+ echo 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testvars' -Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testvars -+ cat -+ '[' -n pkcs11:id=%00%04 ']' -+ cat -+ '[' -n pkcs11:id=%00%09 ']' -+ cat -+ '[' -n '' ']' -+ '[' -n pkcs11:id=%00%10 ']' -+ cat -+ cat -+ gen_unsetvars -+ grep '^export' /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testvars -+ sed -e s/export/unset/ -e 's/=.*$//' -+ title ENDSECTION -+ case "$1" in -+ echo '' - - ## -######################################## - -+ echo ' ##' -+ echo '########################################' -+ echo '' +pkcs11-provider:softhsm / setup time out (After 30 seconds) ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― - 2/92 pkcs11-provider:softhsm / setup OK 11.48s + 2/92 pkcs11-provider:softhsm / setup TIMEOUT 30.13s killed by signal 15 SIGTERM 3/92 pkcs11-provider:kryoptic / setup RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=238 LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src SHARED_EXT=.so MESON_TEST_ITERATION=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic +>>> MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests @@ -2432,15 +2099,16 @@ + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 +++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' ++ opensc-tool -i ++ grep OpenSC -++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled -+ [[ 0 = \1 ]] +cat: /proc/sys/crypto/fips_enabled: No such file or directory ++ [[ '' = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic ']' @@ -2461,9 +2129,6 @@ ++ echo '########################################' ++ echo '## Searching for Kryoptic module' ++ echo '' -######################################## -## Searching for Kryoptic module - ++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /target/debug/libkryoptic_pkcs11.so @@ -2479,12 +2144,15 @@ ++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ echo 'skipped: Unable to find kryoptic PKCS#11 library' ++ exit 0 +######################################## +## Searching for Kryoptic module + skipped: Unable to find kryoptic PKCS#11 library ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― - 3/92 pkcs11-provider:kryoptic / setup OK 0.04s + 3/92 pkcs11-provider:kryoptic / setup OK 0.25s 4/92 pkcs11-provider:kryoptic.nss / setup RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src SHARED_EXT=.so MALLOC_PERTURB_=167 MESON_TEST_ITERATION=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic.nss +>>> MALLOC_PERTURB_=72 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic.nss ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests @@ -2501,15 +2169,16 @@ + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 +++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' ++ opensc-tool -i ++ grep OpenSC -++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled -+ [[ 0 = \1 ]] +cat: /proc/sys/crypto/fips_enabled: No such file or directory ++ [[ '' = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss ']' @@ -2539,9 +2208,6 @@ +++ echo '########################################' +++ echo '## Searching for Kryoptic module' +++ echo '' -######################################## -## Searching for Kryoptic module - +++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /target/debug/libkryoptic_pkcs11.so @@ -2557,4881 +2223,2717 @@ +++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ echo 'skipped: Unable to find kryoptic PKCS#11 library' +++ exit 0 +######################################## +## Searching for Kryoptic module + skipped: Unable to find kryoptic PKCS#11 library ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― - 4/92 pkcs11-provider:kryoptic.nss / setup OK 0.05s + 4/92 pkcs11-provider:kryoptic.nss / setup OK 0.26s 5/92 pkcs11-provider:softokn / basic RUNNING ->>> MALLOC_PERTURB_=203 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=254 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― - 5/92 pkcs11-provider:softokn / basic SKIP 0.02s exit status 77 + 5/92 pkcs11-provider:softokn / basic SKIP 0.10s exit status 77 6/92 pkcs11-provider:softhsm / basic RUNNING ->>> MALLOC_PERTURB_=212 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=147 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tbasic - -## Raw Sign check error - openssl -pkeyutl -sign -inkey "${BASEURI}" - -pkeyopt pad-mode:none - -in ${TMPPDIR}/64Brandom.bin - -out ${TMPPDIR}/raw-sig.bin -Public Key operation error -20D0CFF7:error:0200007A:rsa routines:p11prov_sig_operate:data too small for key size:../src/signature.c:971: - - -## Sign and Verify with provided Hash and RSA - openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} - - openssl -pkeyutl -sign -inkey "${PRIURI}" - -in ${TMPPDIR}/sha256.bin - -out ${TMPPDIR}/sha256-sig.bin - - openssl -pkeyutl -verify -inkey "${PUBURI}" - -pubin - -in ${TMPPDIR}/sha256.bin - -sigfile ${TMPPDIR}/sha256-sig.bin -Signature Verified Successfully - -## Sign and Verify with provided Hash and RSA with DigestInfo struct - openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} - - openssl -pkeyutl -sign -inkey "${PRIURI}" -pkeyopt digest:sha256 - -in ${TMPPDIR}/sha256.bin - -out ${TMPPDIR}/sha256-sig.bin - - openssl -pkeyutl -verify -inkey "${PUBURI}" -pkeyopt digest:sha256 - -pubin - -in ${TMPPDIR}/sha256.bin - -sigfile ${TMPPDIR}/sha256-sig.bin -Signature Verified Successfully - -## DigestSign and DigestVerify with RSA - openssl -pkeyutl -sign -inkey "${BASEURI}" - -digest sha256 - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha256-dgstsig.bin - - openssl -pkeyutl -verify -inkey "${BASEURI}" -pubin - -digest sha256 - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha256-dgstsig.bin -Signature Verified Successfully - openssl -pkeyutl -verify -inkey "${PUBURI}" - -pubin - -digest sha256 - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha256-dgstsig.bin -Signature Verified Successfully -RSA basic encrypt and decrypt - openssl - pkeyutl -encrypt -inkey "${PUBURI}" -pubin - -in ${SECRETFILE} - -out ${SECRETFILE}.enc - - openssl - pkeyutl -decrypt -inkey "${PRIURI}" - -in ${SECRETFILE}.enc - -out ${SECRETFILE}.dec - - -## Test Disallow Public Export - openssl pkey -in $PUBURI -pubin -pubout -text - -## Test CSR generation from RSA private keys - openssl -req -new -batch -key "${PRIURI}" -out ${TMPPDIR}/rsa_csr.pem - - openssl -req -in ${TMPPDIR}/rsa_csr.pem -verify -noout -Certificate request self-signature verify OK - -## Test fetching public keys without PIN in config files - openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/rsa.pub.nopin.pem - - openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ec.pub.nopin.pem - - openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/ed.pub.nopin.pem - - -## Test fetching public keys with a PIN in URI - openssl pkey -in $BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripin.pem - - openssl pkey -in $ECBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripin.pem - - openssl pkey -in $EDBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripin.pem - - openssl pkey -in $ED2BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripin.pem - - -## Test fetching public keys with a PIN source in URI - openssl pkey -in $BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripinsource.pem - - openssl pkey -in $ECBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripinsource.pem - - openssl pkey -in $EDBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripinsource.pem - - openssl pkey -in $ED2BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripinsource.pem - - -## Test prompting without PIN in config files - -## Test EVP_PKEY_eq on public RSA key both on token - -## Test EVP_PKEY_eq on public EC key both on token - -## Test EVP_PKEY_eq on public RSA key via import - -## Match private RSA key against public key - -## Match private RSA key against public key (commutativity) - -## Test EVP_PKEY_eq on public EC key via import - -## Match private EC key against public key - -## Match private EC key against public key (commutativity) - -## Test EVP_PKEY_eq with key exporting disabled - -## Test RSA key - -## Test EC key - -## Test PIN caching -Prompt: "Enter pass phrase for PKCS#11 Token (Slot 2031626281 - SoftHSM slot ID 0x79182829):" -Returning: 12345678 -Child Done -ALL A-OK! -Prompt: "Enter pass phrase for PKCS#11 Token (Slot 2031626281 - SoftHSM slot ID 0x79182829):" -Returning: 12345678 -Child Done -ALL A-OK! - -## Test interactive Login on key without ALWAYS AUTHENTICATE -expect: spawn id exp3 not open - while executing -"expect "ALL A-OK"" - -## Test interactive Login repeated for operation on key with ALWAYS AUTHENTICATE -expect: spawn id exp3 not open - while executing -"expect "ALL A-OK"" - -## Test Key generation -Performed tests: 4 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― - 6/92 pkcs11-provider:softhsm / basic OK 12.08s + 6/92 pkcs11-provider:softhsm / basic SKIP 0.10s exit status 77 7/92 pkcs11-provider:kryoptic / basic RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=160 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=249 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― - 7/92 pkcs11-provider:kryoptic / basic SKIP 0.02s exit status 77 + 7/92 pkcs11-provider:kryoptic / basic SKIP 0.10s exit status 77 8/92 pkcs11-provider:kryoptic.nss / basic RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=166 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.nss.t +>>> MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― - 8/92 pkcs11-provider:kryoptic.nss / basic SKIP 0.02s exit status 77 + 8/92 pkcs11-provider:kryoptic.nss / basic SKIP 0.11s exit status 77 9/92 pkcs11-provider:softokn / pubkey RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=54 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softokn.t +>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=31 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― - 9/92 pkcs11-provider:softokn / pubkey SKIP 0.02s exit status 77 + 9/92 pkcs11-provider:softokn / pubkey SKIP 0.14s exit status 77 10/92 pkcs11-provider:softhsm / pubkey RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=62 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=142 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tpubkey - -## Export RSA Public key to a file - openssl pkey -in $BASEURI -pubin -pubout -out ${TMPPDIR}/baseout.pub - -Export Public key to a file (pub-uri) - openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/pubout.pub - -Print Public key from private - openssl pkey -in $PRIURI -pubout -text - -## Export Public check error - openssl pkey -in pkcs11:id=%de%ad -pubin - -pubout -out ${TMPPDIR}/pubout-invlid.pub -Could not find private key of Public Key from pkcs11:id=%de%ad - - -## Export EC Public key to a file - openssl pkey -in $ECBASEURI -pubin -pubout -out ${TMPPDIR}/baseecout.pub - -Export EC Public key to a file (pub-uri) - openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/pubecout.pub - -Print EC Public key from private - openssl pkey -in $ECPRIURI -pubout -text - -## Check we can get RSA public keys from certificate objects -Export Public key to a file (priv-uri) - openssl pkey -in $PRI2URI -pubout -out ${TMPPDIR}/priv-cert.pub - -Export Public key to a file (base-uri) - openssl pkey -in $BASE2URI -pubout -out ${TMPPDIR}/base-cert.pub - - -## Check we can get EC public keys from certificate objects -Export Public EC key to a file (priv-uri) - openssl pkey -in $ECPRI2URI -pubout -out ${TMPPDIR}/ec-priv-cert.pub - -Export Public key to a file (base-uri) - openssl pkey -in $ECBASE2URI -pubout -out ${TMPPDIR}/ec-base-cert.pub - ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -10/92 pkcs11-provider:softhsm / pubkey OK 0.69s +10/92 pkcs11-provider:softhsm / pubkey SKIP 0.12s exit status 77 11/92 pkcs11-provider:kryoptic / pubkey RUNNING ->>> MALLOC_PERTURB_=143 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.t +>>> MALLOC_PERTURB_=132 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -11/92 pkcs11-provider:kryoptic / pubkey SKIP 0.02s exit status 77 +11/92 pkcs11-provider:kryoptic / pubkey SKIP 0.14s exit status 77 12/92 pkcs11-provider:kryoptic.nss / pubkey RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=113 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=145 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -12/92 pkcs11-provider:kryoptic.nss / pubkey SKIP 0.02s exit status 77 +12/92 pkcs11-provider:kryoptic.nss / pubkey SKIP 0.14s exit status 77 13/92 pkcs11-provider:softokn / certs RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=118 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=55 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -13/92 pkcs11-provider:softokn / certs SKIP 0.02s exit status 77 +13/92 pkcs11-provider:softokn / certs SKIP 0.13s exit status 77 14/92 pkcs11-provider:softhsm / certs RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=201 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softhsm.t +>>> MALLOC_PERTURB_=24 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tcerts - -## Check we can fetch certifiatce objects - openssl -x509 -in ${CRTURI} -subject -out ${TMPPDIR}/crt-subj.txt - - openssl -x509 -in ${ECCRTURI} -subject -out ${TMPPDIR}/eccrt-subj.txt - - -## Use storeutl command to match specific certs via params - openssl -storeutl -certs -subject "${subj}" - -out ${TMPPDIR}/storeutl-crt-subj.txt - pkcs11:type=cert -0: Certificate - openssl -storeutl -certs -subject "${subj}" - -out ${TMPPDIR}/storeutl-crt-subj.txt - pkcs11:type=cert -0: Certificate - openssl -storeutl -certs -subject "${subj}" - -out ${TMPPDIR}/storeutl-crt-subj.txt - pkcs11:type=cert -0: Certificate - openssl -storeutl -certs -subject "${subj}" - -out ${TMPPDIR}/storeutl-crt-subj.txt - pkcs11:type=cert -0: Certificate - -## Test fetching certificate without PIN in config files - openssl x509 -in $CRTURI -subject -out ${TMPPDIR}/crt-subj-nopin.txt - - -## Test fetching certificate via STORE api -Cert load successfully ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -14/92 pkcs11-provider:softhsm / certs OK 0.48s +14/92 pkcs11-provider:softhsm / certs SKIP 0.11s exit status 77 15/92 pkcs11-provider:kryoptic / certs RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=217 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.t +>>> MALLOC_PERTURB_=76 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -15/92 pkcs11-provider:kryoptic / certs SKIP 0.02s exit status 77 +15/92 pkcs11-provider:kryoptic / certs SKIP 0.13s exit status 77 16/92 pkcs11-provider:kryoptic.nss / certs RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=126 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=195 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -16/92 pkcs11-provider:kryoptic.nss / certs SKIP 0.02s exit status 77 +16/92 pkcs11-provider:kryoptic.nss / certs SKIP 0.14s exit status 77 17/92 pkcs11-provider:softokn / ecc RUNNING ->>> MALLOC_PERTURB_=173 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=116 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -17/92 pkcs11-provider:softokn / ecc SKIP 0.02s exit status 77 +17/92 pkcs11-provider:softokn / ecc SKIP 0.11s exit status 77 18/92 pkcs11-provider:softhsm / ecc RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=32 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=166 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecc - -## Export EC Public key to a file - openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ecout.pub - -Print EC Public key from private - openssl pkey -in $ECPRIURI -pubout -text - -## Sign and Verify with provided Hash and EC - openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} - - openssl -pkeyutl -sign -inkey "${ECBASEURI}" - -in ${TMPPDIR}/sha256.bin - -out ${TMPPDIR}/sha256-ecsig.bin - - openssl -pkeyutl -verify -inkey "${ECBASEURI}" -pubin - -in ${TMPPDIR}/sha256.bin - -sigfile ${TMPPDIR}/sha256-ecsig.bin -Signature Verified Successfully - openssl -pkeyutl -verify -inkey "${TMPPDIR}/ecout.pub" -pubin - -in ${TMPPDIR}/sha256.bin - -sigfile ${TMPPDIR}/sha256-ecsig.bin -Signature Verified Successfully - -## DigestSign and DigestVerify with ECC (SHA-256) - openssl -pkeyutl -sign -inkey "${ECBASEURI}" - -digest sha256 - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha256-ecdgstsig.bin - - openssl -pkeyutl -verify -inkey "${ECBASEURI}" -pubin - -digest sha256 - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha256-ecdgstsig.bin -Signature Verified Successfully - -## DigestSign and DigestVerify with ECC (SHA-384) - openssl -pkeyutl -sign -inkey "${ECBASEURI}" - -digest sha384 - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha384-ecdgstsig.bin - - openssl -pkeyutl -verify -inkey "${ECBASEURI}" -pubin - -digest sha384 - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha384-ecdgstsig.bin -Signature Verified Successfully - -## DigestSign and DigestVerify with ECC (SHA-512) - openssl -pkeyutl -sign -inkey "${ECBASEURI}" - -digest sha512 - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha512-ecdgstsig.bin - - openssl -pkeyutl -verify -inkey "${ECBASEURI}" -pubin - -digest sha512 - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha512-ecdgstsig.bin -Signature Verified Successfully - -## DigestSign and DigestVerify with ECC (SHA3-256) - openssl -pkeyutl -sign -inkey "${ECBASEURI}" - -digest sha3-256 - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha3-256-ecdgstsig.bin - - openssl -pkeyutl -verify -inkey "${ECBASEURI}" -pubin - -digest sha3-256 - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha3-256-ecdgstsig.bin -Signature Verified Successfully - -## DigestSign and DigestVerify with ECC (SHA3-384) - openssl -pkeyutl -sign -inkey "${ECBASEURI}" - -digest sha3-384 - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha3-384-ecdgstsig.bin - - openssl -pkeyutl -verify -inkey "${ECBASEURI}" -pubin - -digest sha3-384 - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha3-384-ecdgstsig.bin -Signature Verified Successfully - -## DigestSign and DigestVerify with ECC (SHA3-512) - openssl -pkeyutl -sign -inkey "${ECBASEURI}" - -digest sha3-512 - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha3-512-ecdgstsig.bin - - openssl -pkeyutl -verify -inkey "${ECBASEURI}" -pubin - -digest sha3-512 - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha3-512-ecdgstsig.bin -Signature Verified Successfully - -## Test CSR generation from private ECC keys - openssl -req -new -batch -key "${ECPRIURI}" -out ${TMPPDIR}/ecdsa_csr.pem - - openssl -req -in ${TMPPDIR}/ecdsa_csr.pem -verify -noout -Certificate request self-signature verify OK ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -18/92 pkcs11-provider:softhsm / ecc OK 1.05s +18/92 pkcs11-provider:softhsm / ecc SKIP 0.15s exit status 77 19/92 pkcs11-provider:kryoptic / ecc RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=237 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=54 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -19/92 pkcs11-provider:kryoptic / ecc SKIP 0.02s exit status 77 +19/92 pkcs11-provider:kryoptic / ecc SKIP 0.12s exit status 77 20/92 pkcs11-provider:kryoptic.nss / ecc RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=18 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=198 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -20/92 pkcs11-provider:kryoptic.nss / ecc SKIP 0.02s exit status 77 +20/92 pkcs11-provider:kryoptic.nss / ecc SKIP 0.14s exit status 77 21/92 pkcs11-provider:softhsm / edwards RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=33 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=39 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tedwards - -## Export ED25519 Public key to a file - openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/edout.pub - -Print ED25519 Public key from private - openssl pkey -in $EDPRIURI -pubout -text - -## DigestSign and DigestVerify with ED25519 - openssl -pkeyutl -sign -inkey "${EDBASEURI}" - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha256-eddgstsig.bin - - openssl -pkeyutl -verify -inkey "${EDBASEURI}" -pubin - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha256-eddgstsig.bin -Signature Verified Successfully - -## Test CSR generation from private ED25519 keys - openssl -req -new -batch -key "${EDPRIURI}" -out ${TMPPDIR}/ed25519_csr.pem - - openssl -req -in ${TMPPDIR}/ed25519_csr.pem -verify -noout -Certificate request self-signature verify OK - -## Test EVP_PKEY_eq on public Edwards key both on token - -## Test EVP_PKEY_eq on public ED key via import - -## Match private ED key against public key - -## Match private ED key against public key (commutativity) - -## Test Key generation -Performed tests: 1 - -## Export ED448 Public key to a file - openssl pkey -in $ED2PUBURI -pubin -pubout -out ${TMPPDIR}/ed2out.pub - -Print ED448 Public key from private - openssl pkey -in $ED2PRIURI -pubout -text - -## DigestSign and DigestVerify with ED448 - openssl - pkeyutl -sign -inkey "${ED2BASEURI}" - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha256-eddgstsig.bin - - openssl - pkeyutl -verify -inkey "${ED2BASEURI}" -pubin - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha256-eddgstsig.bin -Signature Verified Successfully - -## Test CSR generation from private ED448 keys - openssl - req -new -batch -key "${ED2PRIURI}" -out ${TMPPDIR}/ed448_csr.pem - - openssl - req -in ${TMPPDIR}/ed448_csr.pem -verify -noout -Certificate request self-signature verify OK - -## Test EVP_PKEY_eq on public Edwards key both on token - -## Test EVP_PKEY_eq on public ED448 key via import - -## Match private ED448 key against public key - -## Match private ED448 key against public key (commutativity) - -## Test Ed448 Key generation -Performed tests: 1 - -## Test interactive Login on key without ALWAYS AUTHENTICATE -expect: spawn id exp3 not open - while executing -"expect "ALL A-OK"" ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -21/92 pkcs11-provider:softhsm / edwards OK 2.25s +21/92 pkcs11-provider:softhsm / edwards SKIP 0.15s exit status 77 22/92 pkcs11-provider:kryoptic / edwards RUNNING ->>> MALLOC_PERTURB_=141 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.t +>>> MALLOC_PERTURB_=178 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -22/92 pkcs11-provider:kryoptic / edwards SKIP 0.02s exit status 77 +22/92 pkcs11-provider:kryoptic / edwards SKIP 0.15s exit status 77 23/92 pkcs11-provider:kryoptic.nss / edwards RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=65 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=248 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -23/92 pkcs11-provider:kryoptic.nss / edwards SKIP 0.02s exit status 77 +23/92 pkcs11-provider:kryoptic.nss / edwards SKIP 0.10s exit status 77 24/92 pkcs11-provider:softokn / ecdh RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=41 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=52 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -24/92 pkcs11-provider:softokn / ecdh SKIP 0.02s exit status 77 +24/92 pkcs11-provider:softokn / ecdh SKIP 0.10s exit status 77 25/92 pkcs11-provider:kryoptic / ecdh RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=224 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.t +>>> MALLOC_PERTURB_=99 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -25/92 pkcs11-provider:kryoptic / ecdh SKIP 0.02s exit status 77 +25/92 pkcs11-provider:kryoptic / ecdh SKIP 0.10s exit status 77 26/92 pkcs11-provider:kryoptic.nss / ecdh RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=152 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=235 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -26/92 pkcs11-provider:kryoptic.nss / ecdh SKIP 0.02s exit status 77 +26/92 pkcs11-provider:kryoptic.nss / ecdh SKIP 0.16s exit status 77 27/92 pkcs11-provider:softokn / democa RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=124 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=237 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -27/92 pkcs11-provider:softokn / democa SKIP 0.02s exit status 77 +27/92 pkcs11-provider:softokn / democa SKIP 0.13s exit status 77 28/92 pkcs11-provider:softhsm / democa RUNNING ->>> MALLOC_PERTURB_=215 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softhsm.t +>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=114 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdemoca - -## Set up demoCA - -## Generating CA cert if needed - openssl req -batch -noenc -x509 -new -key ${PRIURI} -out ${DEMOCA}/cacert.pem - - -## Generating a new CSR with key in file - openssl -req -batch -noenc -newkey rsa:2048 - -subj "/CN=testing-csr-signing/O=PKCS11 Provider/C=US" - -keyout ${DEMOCA}/cert.key -out ${DEMOCA}/cert.csr -...+++++++++++++++++++++++++++++++++++++++*..+++++++++++++++++++++++++++++++++++++++*..+...+.+......+...+...........+..........+...+......+..+...+.+......+...+..+.........+..........+.....+.........+......+...+...+....+...+...+.....+.......+.....+.......+.....+...+.....................+.........+.+............+........+......+...+......+.........................+..+.......+..................+...+...........+.........+.+........+.......++++++ -...+.....+...+++++++++++++++++++++++++++++++++++++++*...+..+......+....+......+.....+......+....+..+....+...+...+..+...+....+.....+....+..+...+......+.+..+++++++++++++++++++++++++++++++++++++++*....+......+.+.....+.........+....+.....+.+..+....+........+...............+.+.....................+.....+.+...+......+...+..+.++++++ ------ - - -## Signing the new certificate - openssl -ca -batch -in ${DEMOCA}/cert.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem -Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -Check that the request matches the signature -Signature ok -The Subject's Distinguished Name is as follows -commonName :ASN.1 12:'testing-csr-signing' -organizationName :ASN.1 12:'PKCS11 Provider' -countryName :PRINTABLE:'US' -Certificate is to be certified until Feb 15 02:40:34 2026 GMT (365 days) - -Write out database with 1 new entries -Database updated - - -## Generating a new CSR with existing RSA key in token - openssl -req -batch -noenc -new -key ${PRIURI} - -subj "/CN=testing-rsa-signing/O=PKCS11 Provider/C=US" - -out ${DEMOCA}/cert-rsa.csr - - -## Signing the new RSA key certificate - openssl -ca -batch -in ${DEMOCA}/cert-rsa.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem -Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -Check that the request matches the signature -Signature ok -The Subject's Distinguished Name is as follows -commonName :ASN.1 12:'testing-rsa-signing' -organizationName :ASN.1 12:'PKCS11 Provider' -countryName :PRINTABLE:'US' -Certificate is to be certified until Feb 15 02:40:34 2026 GMT (365 days) - -Write out database with 1 new entries -Database updated - - -## Generating a new CSR with existing EC key in token - openssl -req -batch -noenc -new -key ${ECPRIURI} - -subj "/CN=testing-ec-signing/O=PKCS11 Provider/C=US" - -out ${DEMOCA}/cert-ec.csr - - -## Signing the new EC key certificate - openssl -ca -batch -in ${DEMOCA}/cert-ec.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem -Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -Check that the request matches the signature -Signature ok -The Subject's Distinguished Name is as follows -commonName :ASN.1 12:'testing-ec-signing' -organizationName :ASN.1 12:'PKCS11 Provider' -countryName :PRINTABLE:'US' -Certificate is to be certified until Feb 15 02:40:34 2026 GMT (365 days) - -Write out database with 1 new entries -Database updated - - -## Generating a new CSR with existing ED key in token - openssl - req -batch -noenc -new -key ${EDPRIURI} - -subj "/CN=testing-ed-signing/O=PKCS11 Provider/C=US" - -out ${DEMOCA}/cert-ed.csr - - -## Signing the new ED key certificate - openssl - ca -batch -in ${DEMOCA}/cert-ed.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem -Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -Check that the request matches the signature -Signature ok -The Subject's Distinguished Name is as follows -commonName :ASN.1 12:'testing-ed-signing' -organizationName :ASN.1 12:'PKCS11 Provider' -countryName :PRINTABLE:'US' -Certificate is to be certified until Feb 15 02:40:34 2026 GMT (365 days) - -Write out database with 1 new entries -Database updated - - -## Generating a new CSR with existing ED448 key in token - openssl - req -batch -noenc -new -key ${ED2PRIURI} - -subj "/CN=testing-ed2-signing/O=PKCS11 Provider/C=US" - -out ${DEMOCA}/cert-ed2.csr - - -## Signing the new ED448 key certificate - openssl - ca -batch -in ${DEMOCA}/cert-ed2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem -Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -Check that the request matches the signature -Signature ok -The Subject's Distinguished Name is as follows -commonName :ASN.1 12:'testing-ed2-signing' -organizationName :ASN.1 12:'PKCS11 Provider' -countryName :PRINTABLE:'US' -Certificate is to be certified until Feb 15 02:40:34 2026 GMT (365 days) - -Write out database with 1 new entries -Database updated - - -## Generating a new CSR with existing RSA-PSS key in token - openssl - req -batch -noenc -new -key ${RSAPSSPRIURI} -sigopt rsa_padding_mode:pss - -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US" - -sigopt rsa_padding_mode:pss - -out ${DEMOCA}/cert-rsa-pss.csr - - -## Signing the new RSA-PSS key certificate - openssl - ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem -Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -Check that the request matches the signature -Signature ok -The Subject's Distinguished Name is as follows -commonName :ASN.1 12:'testing-rsapss-signing' -organizationName :ASN.1 12:'PKCS11 Provider' -countryName :PRINTABLE:'US' -Certificate is to be certified until Feb 15 02:40:34 2026 GMT (365 days) - -Write out database with 1 new entries -Database updated - - openssl x509 -text -in ${DEMOCA}/cert.pem - -## Generating a new CSR with existing SHA256 restricted RSA-PSS key in token - openssl - req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss - -subj "/CN=testing-rsapss-sha2-signing/O=PKCS11 Provider/C=US" - -out ${DEMOCA}/cert-rsa-pss2.csr - -sigopt rsa_padding_mode:pss - -sigopt digest:sha256 - - -## Signing the new SHA256 restricted RSA-PSS key certificate - openssl - ca -batch -in ${DEMOCA}/cert-rsa-pss2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem -Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -Check that the request matches the signature -Signature ok -The Subject's Distinguished Name is as follows -commonName :ASN.1 12:'testing-rsapss-sha2-signing' -organizationName :ASN.1 12:'PKCS11 Provider' -countryName :PRINTABLE:'US' -Certificate is to be certified until Feb 15 02:40:35 2026 GMT (365 days) - -Write out database with 1 new entries -Database updated - - openssl x509 -text -in ${DEMOCA}/cert.pem - -## Generating a new CSR with existing RSA-PSS key in token - openssl - req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss - -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US" - -out ${DEMOCA}/cert-rsa-pss2.csr - -sigopt rsa_padding_mode:pss - -sigopt digest:sha256 - -sigopt rsa_pss_saltlen:-2 - - -## Signing the new RSA-PSS key certificate - openssl - ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem -Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -Check that the request matches the signature -Signature ok -The Subject's Distinguished Name is as follows -commonName :ASN.1 12:'testing-rsapss-signing' -organizationName :ASN.1 12:'PKCS11 Provider' -countryName :PRINTABLE:'US' -Certificate is to be certified until Feb 15 02:40:35 2026 GMT (365 days) - -Write out database with 1 new entries -Database updated - - -## Set up OCSP - openssl -req -batch -noenc -new -subj "/CN=OCSP/O=PKCS11 Provider/C=US" - -key ${PRIURI} -out ${DEMOCA}/ocspSigning.csr - - openssl -ca -batch -keyfile ${PRIURI} -cert ${DEMOCA}/cacert.pem - -in ${DEMOCA}/ocspSigning.csr -out ${DEMOCA}/ocspSigning.pem -Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/openssl.cnf -Check that the request matches the signature -Signature ok -The Subject's Distinguished Name is as follows -commonName :ASN.1 12:'OCSP' -organizationName :ASN.1 12:'PKCS11 Provider' -countryName :PRINTABLE:'US' -Certificate is to be certified until Feb 15 02:40:35 2026 GMT (365 days) - -Write out database with 1 new entries -Database updated - ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -28/92 pkcs11-provider:softhsm / democa OK 2.03s +28/92 pkcs11-provider:softhsm / democa SKIP 0.12s exit status 77 29/92 pkcs11-provider:kryoptic / democa RUNNING ->>> MALLOC_PERTURB_=90 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=108 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -29/92 pkcs11-provider:kryoptic / democa SKIP 0.02s exit status 77 +29/92 pkcs11-provider:kryoptic / democa SKIP 0.10s exit status 77 30/92 pkcs11-provider:kryoptic.nss / democa RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=62 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.nss.t +>>> MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -30/92 pkcs11-provider:kryoptic.nss / democa SKIP 0.02s exit status 77 +30/92 pkcs11-provider:kryoptic.nss / democa SKIP 0.10s exit status 77 31/92 pkcs11-provider:softokn / digest RUNNING ->>> MALLOC_PERTURB_=112 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=90 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -31/92 pkcs11-provider:softokn / digest SKIP 0.02s exit status 77 +31/92 pkcs11-provider:softokn / digest SKIP 0.10s exit status 77 32/92 pkcs11-provider:softhsm / digest RUNNING ->>> MALLOC_PERTURB_=195 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softhsm.t +>>> MALLOC_PERTURB_=38 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdigest - -## Test Digests support -sha512-224: Unsupported by pkcs11 token -sha512-256: Unsupported by pkcs11 token -sha3-224: Unsupported by pkcs11 token -sha3-256: Unsupported by pkcs11 token -sha3-384: Unsupported by pkcs11 token -sha3-512: Unsupported by pkcs11 token -PASSED - -## Test Digests Blocked -No digest available for testing pkcs11 provider -Digest operations failed as expected ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -32/92 pkcs11-provider:softhsm / digest OK 0.11s +32/92 pkcs11-provider:softhsm / digest SKIP 0.10s exit status 77 33/92 pkcs11-provider:kryoptic / digest RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=27 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=137 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -33/92 pkcs11-provider:kryoptic / digest SKIP 0.02s exit status 77 +33/92 pkcs11-provider:kryoptic / digest SKIP 0.12s exit status 77 34/92 pkcs11-provider:kryoptic.nss / digest RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=115 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=191 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -34/92 pkcs11-provider:kryoptic.nss / digest SKIP 0.02s exit status 77 +34/92 pkcs11-provider:kryoptic.nss / digest SKIP 0.13s exit status 77 35/92 pkcs11-provider:softokn / fork RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=117 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=54 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -35/92 pkcs11-provider:softokn / fork SKIP 0.02s exit status 77 +35/92 pkcs11-provider:softokn / fork SKIP 0.12s exit status 77 36/92 pkcs11-provider:softhsm / fork RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=30 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softhsm.t +>>> MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/tfork -Child Done -Child Done -ALL A-OK! ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -36/92 pkcs11-provider:softhsm / fork OK 1.62s +36/92 pkcs11-provider:softhsm / fork SKIP 0.12s exit status 77 37/92 pkcs11-provider:kryoptic / fork RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=46 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=195 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -37/92 pkcs11-provider:kryoptic / fork SKIP 0.02s exit status 77 +37/92 pkcs11-provider:kryoptic / fork SKIP 0.10s exit status 77 38/92 pkcs11-provider:kryoptic.nss / fork RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=31 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=211 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -38/92 pkcs11-provider:kryoptic.nss / fork SKIP 0.02s exit status 77 +38/92 pkcs11-provider:kryoptic.nss / fork SKIP 0.10s exit status 77 39/92 pkcs11-provider:softokn / oaepsha2 RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=225 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=40 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -39/92 pkcs11-provider:softokn / oaepsha2 SKIP 0.02s exit status 77 +39/92 pkcs11-provider:softokn / oaepsha2 SKIP 0.10s exit status 77 40/92 pkcs11-provider:kryoptic / oaepsha2 RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=237 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.t +>>> MALLOC_PERTURB_=173 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -40/92 pkcs11-provider:kryoptic / oaepsha2 SKIP 0.02s exit status 77 +40/92 pkcs11-provider:kryoptic / oaepsha2 SKIP 0.14s exit status 77 41/92 pkcs11-provider:kryoptic.nss / oaepsha2 RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=191 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=243 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -41/92 pkcs11-provider:kryoptic.nss / oaepsha2 SKIP 0.02s exit status 77 +41/92 pkcs11-provider:kryoptic.nss / oaepsha2 SKIP 0.15s exit status 77 42/92 pkcs11-provider:softokn / hkdf RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=127 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=58 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -42/92 pkcs11-provider:softokn / hkdf SKIP 0.02s exit status 77 +42/92 pkcs11-provider:softokn / hkdf SKIP 0.15s exit status 77 43/92 pkcs11-provider:kryoptic / hkdf RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=201 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.t +>>> MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -43/92 pkcs11-provider:kryoptic / hkdf SKIP 0.02s exit status 77 +43/92 pkcs11-provider:kryoptic / hkdf SKIP 0.15s exit status 77 44/92 pkcs11-provider:kryoptic.nss / hkdf RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=184 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=102 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -44/92 pkcs11-provider:kryoptic.nss / hkdf SKIP 0.02s exit status 77 +44/92 pkcs11-provider:kryoptic.nss / hkdf SKIP 0.12s exit status 77 45/92 pkcs11-provider:softokn / imported RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=94 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=225 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -45/92 pkcs11-provider:softokn / imported SKIP 0.02s exit status 77 +45/92 pkcs11-provider:softokn / imported SKIP 0.14s exit status 77 46/92 pkcs11-provider:kryoptic / imported RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=160 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=230 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -46/92 pkcs11-provider:kryoptic / imported SKIP 0.02s exit status 77 +46/92 pkcs11-provider:kryoptic / imported SKIP 0.14s exit status 77 47/92 pkcs11-provider:kryoptic.nss / imported RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=89 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=78 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -47/92 pkcs11-provider:kryoptic.nss / imported SKIP 0.02s exit status 77 +47/92 pkcs11-provider:kryoptic.nss / imported SKIP 0.15s exit status 77 48/92 pkcs11-provider:softokn / rsapss RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=198 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softokn.t +>>> MALLOC_PERTURB_=30 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -48/92 pkcs11-provider:softokn / rsapss SKIP 0.02s exit status 77 +48/92 pkcs11-provider:softokn / rsapss SKIP 0.12s exit status 77 49/92 pkcs11-provider:softhsm / rsapss RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=106 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=223 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapss - -## DigestSign and DigestVerify with RSA PSS - openssl -pkeyutl -sign -inkey "${BASEURI}" - -digest sha256 - -pkeyopt pad-mode:pss - -pkeyopt mgf1-digest:sha256 - -pkeyopt saltlen:digest - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha256-dgstsig.bin - - openssl -pkeyutl -verify -inkey "${BASEURI}" -pubin - -digest sha256 - -pkeyopt pad-mode:pss - -pkeyopt mgf1-digest:sha256 - -pkeyopt saltlen:digest - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha256-dgstsig.bin -Signature Verified Successfully -Re-verify using OpenSSL default provider - openssl -pkeyutl -verify -inkey "${PUBURI}" - -pubin - -digest sha256 - -pkeyopt pad-mode:pss - -pkeyopt mgf1-digest:sha256 - -pkeyopt saltlen:digest - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha256-dgstsig.bin -Signature Verified Successfully - -## DigestSign and DigestVerify with RSA PSS with default params - openssl -pkeyutl -sign -inkey "${BASEURI}" - -pkeyopt pad-mode:pss - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/def-dgstsig.bin - - openssl -pkeyutl -verify -inkey "${BASEURI}" -pubin - -pkeyopt pad-mode:pss - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/def-dgstsig.bin -Signature Verified Successfully -Re-verify using OpenSSL default provider - openssl -pkeyutl -verify -inkey "${PUBURI}" - -pubin - -pkeyopt pad-mode:pss - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/def-dgstsig.bin -Signature Verified Successfully ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -49/92 pkcs11-provider:softhsm / rsapss OK 0.38s +49/92 pkcs11-provider:softhsm / rsapss SKIP 0.13s exit status 77 50/92 pkcs11-provider:kryoptic / rsapss RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=75 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=95 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -50/92 pkcs11-provider:kryoptic / rsapss SKIP 0.02s exit status 77 +50/92 pkcs11-provider:kryoptic / rsapss SKIP 0.13s exit status 77 51/92 pkcs11-provider:kryoptic.nss / rsapss RUNNING ->>> MALLOC_PERTURB_=81 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=188 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -51/92 pkcs11-provider:kryoptic.nss / rsapss SKIP 0.02s exit status 77 +51/92 pkcs11-provider:kryoptic.nss / rsapss SKIP 0.11s exit status 77 52/92 pkcs11-provider:softhsm / rsapssam RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=30 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=200 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapssam - -## DigestSign and DigestVerify with RSA PSS (SHA256 restriction) - openssl -pkeyutl -sign -inkey "${RSAPSS2PRIURI}" - -digest sha256 - -pkeyopt pad-mode:pss - -pkeyopt mgf1-digest:sha256 - -pkeyopt saltlen:digest - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin - - openssl -pkeyutl -verify -inkey "${RSAPSS2PUBURI}" -pubin - -digest sha256 - -pkeyopt pad-mode:pss - -pkeyopt mgf1-digest:sha256 - -pkeyopt saltlen:digest - -in ${RAND64FILE} - -rawin - -sigfile ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin -Signature Verified Successfully - -## Fail DigestSign with RSA PSS because of restricted Digest - openssl -pkeyutl -sign -inkey "${RSAPSS2PRIURI}" - -digest sha384 - -pkeyopt pad-mode:pss - -pkeyopt mgf1-digest:sha384 - -pkeyopt saltlen:digest - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha384-rsapps-genpkey-dgstsig.bin 2>&1 - -## Fail Signing with RSA PKCS1 mech and RSA-PSS key - openssl -pkeyutl -sign -inkey "${RSAPSSPRIURI}" - -digest sha256 - -pkeyopt rsa_padding_mode:pkcs1 - -in ${RAND64FILE} - -rawin - -out ${TMPPDIR}/sha384-rsa-not-rsapss-sig.bin 2>&1 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -52/92 pkcs11-provider:softhsm / rsapssam OK 0.33s +52/92 pkcs11-provider:softhsm / rsapssam SKIP 0.12s exit status 77 53/92 pkcs11-provider:kryoptic / rsapssam RUNNING ->>> MALLOC_PERTURB_=196 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=194 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -53/92 pkcs11-provider:kryoptic / rsapssam SKIP 0.02s exit status 77 +53/92 pkcs11-provider:kryoptic / rsapssam SKIP 0.14s exit status 77 54/92 pkcs11-provider:softokn / genkey RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=109 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softokn.t +>>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=31 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -54/92 pkcs11-provider:softokn / genkey SKIP 0.02s exit status 77 +54/92 pkcs11-provider:softokn / genkey SKIP 0.13s exit status 77 55/92 pkcs11-provider:softhsm / genkey RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=190 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softhsm.t +>>> MALLOC_PERTURB_=226 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/tgenkey -Performed tests: 0 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -55/92 pkcs11-provider:softhsm / genkey OK 0.02s +55/92 pkcs11-provider:softhsm / genkey SKIP 0.12s exit status 77 56/92 pkcs11-provider:kryoptic / genkey RUNNING ->>> MALLOC_PERTURB_=10 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=203 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -56/92 pkcs11-provider:kryoptic / genkey SKIP 0.02s exit status 77 +56/92 pkcs11-provider:kryoptic / genkey SKIP 0.13s exit status 77 57/92 pkcs11-provider:kryoptic.nss / genkey RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=11 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.nss.t +>>> MALLOC_PERTURB_=185 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -57/92 pkcs11-provider:kryoptic.nss / genkey SKIP 0.02s exit status 77 +57/92 pkcs11-provider:kryoptic.nss / genkey SKIP 0.11s exit status 77 58/92 pkcs11-provider:softokn / pkey RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=104 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softokn.t +>>> MALLOC_PERTURB_=226 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -58/92 pkcs11-provider:softokn / pkey SKIP 0.02s exit status 77 +58/92 pkcs11-provider:softokn / pkey SKIP 0.15s exit status 77 59/92 pkcs11-provider:softhsm / pkey RUNNING ->>> MALLOC_PERTURB_=173 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=251 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/tpkey -ALL A-OK! ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -59/92 pkcs11-provider:softhsm / pkey OK 0.46s +59/92 pkcs11-provider:softhsm / pkey SKIP 0.14s exit status 77 60/92 pkcs11-provider:kryoptic / pkey RUNNING ->>> MALLOC_PERTURB_=172 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=231 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -60/92 pkcs11-provider:kryoptic / pkey SKIP 0.02s exit status 77 +60/92 pkcs11-provider:kryoptic / pkey SKIP 0.14s exit status 77 61/92 pkcs11-provider:kryoptic.nss / pkey RUNNING ->>> MALLOC_PERTURB_=206 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=119 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -61/92 pkcs11-provider:kryoptic.nss / pkey SKIP 0.02s exit status 77 +61/92 pkcs11-provider:kryoptic.nss / pkey SKIP 0.13s exit status 77 62/92 pkcs11-provider:softokn / session RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=183 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=203 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -62/92 pkcs11-provider:softokn / session SKIP 0.02s exit status 77 +62/92 pkcs11-provider:softokn / session SKIP 0.15s exit status 77 63/92 pkcs11-provider:softhsm / session RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=92 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softhsm.t +>>> MALLOC_PERTURB_=190 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/tsession -ALL A-OK!―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -63/92 pkcs11-provider:softhsm / session OK 0.43s +―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― +63/92 pkcs11-provider:softhsm / session SKIP 0.14s exit status 77 64/92 pkcs11-provider:kryoptic / session RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=41 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=209 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -64/92 pkcs11-provider:kryoptic / session SKIP 0.02s exit status 77 +64/92 pkcs11-provider:kryoptic / session SKIP 0.14s exit status 77 65/92 pkcs11-provider:kryoptic.nss / session RUNNING ->>> MALLOC_PERTURB_=63 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=235 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -65/92 pkcs11-provider:kryoptic.nss / session SKIP 0.02s exit status 77 +65/92 pkcs11-provider:kryoptic.nss / session SKIP 0.12s exit status 77 66/92 pkcs11-provider:softokn / rand RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=37 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=243 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -66/92 pkcs11-provider:softokn / rand SKIP 0.02s exit status 77 +66/92 pkcs11-provider:softokn / rand SKIP 0.09s exit status 77 67/92 pkcs11-provider:softhsm / rand RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=192 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=80 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trand - -## Test PKCS11 RNG - openssl rand 1 -20E0EDF7:error:0308010C:digital envelope routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:355:Global default library context, Algorithm (PKCS11-RAND : 0), Properties () -20E0EDF7:error:12000090:random number generator:rand_new_drbg:unable to fetch drbg:../crypto/rand/rand_lib.c:660: - - openssl rand 1 -¶ ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -67/92 pkcs11-provider:softhsm / rand OK 0.09s +67/92 pkcs11-provider:softhsm / rand SKIP 0.10s exit status 77 68/92 pkcs11-provider:kryoptic / rand RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=153 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=13 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -68/92 pkcs11-provider:kryoptic / rand SKIP 0.02s exit status 77 +68/92 pkcs11-provider:kryoptic / rand SKIP 0.14s exit status 77 69/92 pkcs11-provider:kryoptic.nss / rand RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=152 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=109 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -69/92 pkcs11-provider:kryoptic.nss / rand SKIP 0.02s exit status 77 +69/92 pkcs11-provider:kryoptic.nss / rand SKIP 0.14s exit status 77 70/92 pkcs11-provider:softokn / readkeys RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=214 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=20 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -70/92 pkcs11-provider:softokn / readkeys SKIP 0.02s exit status 77 +70/92 pkcs11-provider:softokn / readkeys SKIP 0.14s exit status 77 71/92 pkcs11-provider:softhsm / readkeys RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=146 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=179 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/treadkeys ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -71/92 pkcs11-provider:softhsm / readkeys OK 0.08s +71/92 pkcs11-provider:softhsm / readkeys SKIP 0.13s exit status 77 72/92 pkcs11-provider:kryoptic / readkeys RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=140 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.t +>>> MALLOC_PERTURB_=56 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -72/92 pkcs11-provider:kryoptic / readkeys SKIP 0.02s exit status 77 +72/92 pkcs11-provider:kryoptic / readkeys SKIP 0.12s exit status 77 73/92 pkcs11-provider:kryoptic.nss / readkeys RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=204 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=143 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -73/92 pkcs11-provider:kryoptic.nss / readkeys SKIP 0.02s exit status 77 +73/92 pkcs11-provider:kryoptic.nss / readkeys SKIP 0.16s exit status 77 74/92 pkcs11-provider:softokn / tls RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=6 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softokn.t +>>> MALLOC_PERTURB_=113 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -74/92 pkcs11-provider:softokn / tls SKIP 0.02s exit status 77 +74/92 pkcs11-provider:softokn / tls SKIP 0.19s exit status 77 75/92 pkcs11-provider:softhsm / tls RUNNING ->>> MALLOC_PERTURB_=164 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softhsm.t +>>> MALLOC_PERTURB_=67 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttls - -## Test SSL_CTX creation -SSL Context works! - -## Test setting cert/keys on TLS Context -Cert and Key successfully set on TLS Context! - -## Test setting cert/keys on TLS Context w/o pub key -Cert and Key successfully set on TLS Context! - -## Test an actual TLS connection -######################################## -## TLS with key in provider - - -## Run sanity test with default values (RSA) -spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My Test Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My Test Cert - i:CN=Issuer - a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAxMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBANwiE/vboeweoWqm6FjFP9LqC1McaB0MYKqY -BezKU1qsojQ+lN13vn/nyFZdYFXcoIgESMi/3wnrYBnK0PNy4nwNCxwUHBQuWwAu -CGlHLNM+dkn9aEpUUepvPYf35/4yWiYXlRQXcUC2Tmrf/9zDOSg50zELOfif4O2g -lwihcPthkSppoiuRSh276gcN0ZN1k765QUGbVlGeFnJFzsibcRWLSDUXnwJzkaaI -y0EU/G75QsiLEw4ILkv0oHFCg7y2Kt8f0IYofkYw7jbHurcpkIESVKA7o6qyct9/ -nRdMpR0foBK4hAvQm4UOkyCOXFlWnYKLaBl7a8vPiQya2/n9p68CAwEAAaOBgTB/ -MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw -DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSk04C/hacKjeIrG9LHzss01wRSujAf -BgNVHSMEGDAWgBTiF2b+nAEP/VslHcDSFovyTyjsETANBgkqhkiG9w0BAQsFAAOC -AQEACDHuA/Jj8fYl8fAUlkHjdrQkd58d7GRu6F2htUC33lGlkd+2g7SxWKtVVZN7 -/TKnGE64j/Bvz/y4A0mBJS3llW7sMKn0h8Cgku7B3pEBkgTVp+4cT2GT+FXNGghb -gs1nSTy1FmyGjCHYKz11YOJN8cvZ0OnVO6ijnjfca5rTWY5W06+T6s2FGvXeNnC2 -b1rmIVWyQp1PrwHZSCR4MeaIflez28DKzRmma2YUfVdLzPX+sJEr4Z4UPPnB8pV+ -47ivPHGSaU4wzJ8tGIBCdMI92nSGfdFrGhW4awIJh8EER9fmUA8d/gGPhj8JNPDV -MHXudSDkWJSeL7glFsXUcJ7QaA== ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My Test Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: RSA-PSS -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 1391 bytes and written 391 bytes -Verification: OK ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 2048 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 0 (ok) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: 1BFF93CD2610EAC1B9B3B0F550E9978F90BEB14D3B479B46A9E60848F9372512 - Session-ID-ctx: - Resumption PSK: FE72448E229F30B209ADB2B105021FB098E1BD1763B96613704E3E57C807966A9A6F5DB2F9A523891CFD280C03811B76 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 1d cb b2 81 64 f5 27 c1-d8 9f 12 2f 1d 75 3f d8 ....d.'..../.u?. - 0010 - 9f a9 0a 09 1d a8 c9 a5-c5 e5 37 4e c4 46 ba e6 ..........7N.F.. - 0020 - f3 1c 3d d2 5e 05 25 c5-aa 10 9d 3c 4f b9 fe 7a ..=.^.%......._ ...8.T> - 0070 - 78 8e 53 ca 27 57 fa 4c-88 59 dd 2a 54 10 a1 21 x.S.'W.L.Y.*T..! - 0080 - b4 ca e1 bb 9d 5f ad a1-79 92 50 af 8a 3c 6a a0 ....._..y.P......U - 0050 - ac 8f 94 d0 b5 06 23 fc-a6 f7 52 d7 06 99 55 8e ......#...R...U. - 0060 - f9 06 8b 08 a6 9f b3 a1-e3 da 90 ff 90 cc 4a c5 ..............J. - 0070 - de d5 d7 f8 97 6f 53 d3-e3 b2 84 d4 4c cc c7 7a .....oS.....L..z - 0080 - fb b3 3f 25 45 2f d0 21-ae 57 1c fa a6 4c a4 8d ..?%E/.!.W...L.. - 0090 - 01 ab 0d 8b a5 b4 c5 10-2d 49 1d e3 ec a0 40 2f ........-I....@/ - 00a0 - 4b 5c cf 21 eb 8c fa 00-9c c3 5f 5e 10 bb 90 b3 K\.!......_^.... - 00b0 - 41 96 47 65 da 50 43 65-48 21 b7 37 81 23 9b 48 A.Ge.PCeH!.7.#.H - 00c0 - 1b 3d 9d 82 ef 5c e4 06-d5 a7 22 aa 72 16 9d c5 .=...\....".r... - - Start Time: 1739587240 - Timeout : 7200 (sec) - Verify return code: 18 (self-signed certificate) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: CBAA4CCFD65477F1C03226453BDED9F0B5EF9CB29841E8B8E45457503EF8B62C - Session-ID-ctx: - Resumption PSK: 2CB257BF2F34B555918EBF772AB58FC36EED368E6E50B4F0B38B83F724E2C91E90FD37E8BA7480CE64C4F46B9A7D24F6 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - bd 76 34 67 17 8c c9 37-a5 3c 8d 3a da bc c1 da .v4g...7.<.:.... - 0010 - fc 7f 1c d1 4d c4 01 6e-21 d7 2f 0f dd 7e f0 6a ....M..n!./..~.j - 0020 - 09 58 93 2f a1 c6 30 07-04 d4 07 db c2 9f e7 9e .X./..0......... - 0030 - a8 91 99 41 91 e7 9e 82-b4 d7 86 8e 82 d4 9b 2d ...A...........- - 0040 - aa 22 4f cf 8b 4f ff 67-3f 3e ef 91 6f 54 63 f3 ."O..O.g?>..oTc. - 0050 - 47 47 fd 98 88 cd b7 e7-1c 3a e3 66 a0 ff b4 25 GG.......:.f...% - 0060 - 9f 3c 3c 2a 2b 90 65 1e-d8 c3 c3 10 db 7f 35 a4 .<<*+.e.......5. - 0070 - e6 85 2d 11 12 a6 5b f7-73 3d c7 22 9d 1a 49 15 ..-...[.s=."..I. - 0080 - 6f 14 70 79 32 1a dc 71-dc 5b 44 49 e9 04 c8 6a o.py2..q.[DI...j - 0090 - d9 b2 58 ee b4 6a a5 68-11 f0 2a ec f8 a0 54 69 ..X..j.h..*...Ti - 00a0 - d6 2c 74 74 4b cb 48 8d-b2 cc 3b b5 38 14 ca 58 .,ttK.H...;.8..X - 00b0 - 05 78 53 b4 c6 2f 8e bf-8b 29 a5 14 17 0b 9d c9 .xS../...)...... - 00c0 - 58 dc 66 fa 70 18 fd 8a-7b 24 d8 98 eb 09 c0 07 X.f.p...{$...... - - Start Time: 1739587240 - Timeout : 7200 (sec) - Verify return code: 18 (self-signed certificate) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -20E0C0F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/rsapss-default.pem -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGDAgEBAgIDBAQCEwIEIP7VFbxg9pYC62VVGX/QMBJ9Lsl7OZWhFGnOQRxedSN8 -BDAssle/LzS1VZGOv3cqtY/Dbu02jm5QtPCzi4P3JOLJHpD9N+i6dIDOZMT0a5p9 -JPahBgIEZ6/+qKIEAgIcIKQGBAQBAAAArgcCBQD/2/fNswMCAR0= ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run sanity test with RSA-PSS and SHA256 - -## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11 - openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} - - -spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness -verify error:num=18:self-signed certificate -verify return:1 -depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness -verify return:1 ---- -Certificate chain - 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness - i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness - a:PKEY: RSASSA-PSS, 3092 (bit); sigalg: RSASSA-PSS - v:NotBefore: Feb 15 02:40:40 2025 GMT; NotAfter: Mar 17 02:40:40 2025 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIIFKDCCA12gAwIBAgIURiCGNnI/28PywcgIM0Mvx5RVM7swPQYJKoZIhvcNAQEK -MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC -ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO -ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 -aW5nIEhhcm5lc3MwHhcNMjUwMjE1MDI0MDQwWhcNMjUwMzE3MDI0MDQwWjBnMQsw -CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr -MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy -bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgw82BUeHCv2Ln9eudcx/ -OMUR0o+JAsjQenIM9myPBZjqqXHSCp67o0FkIpdLdPKFMzILXub0pJxxIpjzknbB -Td2s6KzF7wDAJ5+2zK6ibWlYvu/uqn4HqqrW8eGzgpDoSkrqSEoCYBcy4QqMl+fC -U90kMx0Fsw98yWkbFAyNihXnIIplsIshs0O7kHkol2FCmEiivYqEkOI6nb/J2/cx -fY5isoPcmRmSgTvM9X7zFZ0/iQLs5Rh9UNItRu4mFIGIlAl2IFOMZaVI4p/2Xoh0 -dOD0/i5Yfdoxv/SaSQ/2dqKukuXkKD8CiR9V46ViZjldjz7gGU8lCMzr/KvI/2O2 -abOavTbxTkg1R98g/M+jRx2cbWyIX2o3sT1Ec34S0BSuaJhOJpMMgK2iqF/VNs1a -zOGwLxjOOVm4RMSwgWCkZ50O8go/9wFKka3FuuafaOw5VGvCpztIAckXuX6abszQ -Zs3bWGavGva5Hq6mE7eNSj4gnLjOd+mM4YIGqdpiUttRnIRqFQIDAQABo2kwZzAd -BgNVHQ4EFgQU/WpCR8WvD5cEKPEl9W0e+Djk0S4wHwYDVR0jBBgwFoAU/WpCR8Wv -D5cEKPEl9W0e+Djk0S4wDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud -EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B -AQgwCwYJYIZIAWUDBAIBogMCASADggGEAAxBRXS47e7871GsXZsyqIVSd/fl1TeH -guJdegQeVswu9HvuMY+JehEmZh+48Y0Lxlyve661/OXrlIl2KJu3/AYYpEC25ZzE -tv8otI8WC96T+k83OLPgdlZz7tLW/HKk4wUe/tjLMqcUH1teenXtfVqm2gHBVTuQ -v/UIaTWUIfwSXfhnpT4+ZHelYGJOL3kJcr4UIwScca/5+QXlKyUjGZUSttoWotiw -AGboq5C+7sE3zr3HUF9a7kTzpLsuU2glXgh/cwEnr2hxVqsjfGTyMpeLKpe+Qj2w -EFa+eRnVzsVsw+6XReWbWDTCeTM5nt5HOoAehFG+n7fqiyvS/4smJsSYXlqIQ7I9 -REwezVyklRrisJpjshbAmBgsiyNglRcAcdimp7sI11odJZ20tV6uJBKeC6Q/YpEz -zbnyycxw4QoUNL0kgnJ8zX3hOPRe4romey2hPKtqxHQbOYZaFJcJRim3TchBV0ly -qFWKstiT+y2itBuYzuAgpwY0oxJvRyhlDVGXLA== ------END CERTIFICATE----- -subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness -issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: RSA-PSS -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 2011 bytes and written 391 bytes -Verification error: self-signed certificate ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 3092 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 18 (self-signed certificate) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: DD61F3735F15CC26173FB88AF073F58A2A6F06C5B626F8AC71144F7C689A6086 - Session-ID-ctx: - Resumption PSK: 630FE5B26D256E172D658011340256D7E4599937C5AC01E69AF3EC46ADE65BF7A95FE793FCC46AAD0948798FD7D672AF - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 76 ad 6d 48 b2 4a 5b 30-a6 04 2b 47 90 95 f0 63 v.mH.J[0..+G...c - 0010 - 81 b3 ce 63 cb ba f5 d0-78 7a 74 2d 80 77 33 65 ...c....xzt-.w3e - 0020 - c7 27 2c 2b 97 49 c7 a7-b2 20 4f f7 23 7f 98 46 .',+.I... O.#..F - 0030 - b8 da b9 5d ba c6 b6 8e-a6 81 08 59 31 44 c3 9f ...].......Y1D.. - 0040 - c1 d0 a9 b9 4c 72 a6 79-5d af 57 68 4b 51 90 47 ....Lr.y].WhKQ.G - 0050 - b0 83 fd 6a 99 ef ed dd-18 fe c6 15 62 87 96 3d ...j........b..= - 0060 - 3e 61 26 72 b7 4b 97 1b-75 9b ce b0 50 e7 8e 4e >a&r.K..u...P..N - 0070 - 9b 33 d5 ea e1 e1 4a 41-cf ae e6 99 b2 00 71 0c .3....JA......q. - 0080 - 8f 70 f3 8b 2a f6 4f 71-3b 27 5d f0 de 17 ad 79 .p..*.Oq;']....y - 0090 - 45 7f ce 2a 0e a6 85 b5-b9 65 9c 21 24 42 e8 99 E..*.....e.!$B.. - 00a0 - 43 e2 bf de 95 2d 62 a2-e1 ea b0 5b ab ed 10 20 C....-b....[... - 00b0 - b5 bc bb a7 b6 aa 79 57-95 4d 15 f7 9e e6 3e bf ......yW.M....>. - 00c0 - 0f da 05 6b 13 ee e6 7c-70 13 91 08 d5 2a 42 6b ...k...|p....*Bk - - Start Time: 1739587240 - Timeout : 7200 (sec) - Verify return code: 18 (self-signed certificate) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: 95CC008EFF44F351A47E22075902FB62B8981798B814CB83812F0AD2538B4B2B - Session-ID-ctx: - Resumption PSK: B7D74871EE5C2CDF3CD3BC2FC0B368B58AB855631D7234BFF7E1035AD8A4B958D4030FA76966F28719413C5A5B6509F4 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 76 ad 6d 48 b2 4a 5b 30-a6 04 2b 47 90 95 f0 63 v.mH.J[0..+G...c - 0010 - e5 b7 06 05 cc 1a 86 8a-12 16 cf 0e ab 9d 86 05 ................ - 0020 - 6e df 48 96 93 04 f9 5f-60 45 e4 6c 98 02 26 b4 n.H...._`E.l..&. - 0030 - bd b4 e2 bc 5a 64 67 0c-77 ee 9c 5b 71 b1 99 54 ....Zdg.w..[q..T - 0040 - b7 c3 9a a6 04 cc 05 5f-0f 66 eb 90 44 f0 aa 38 ......._.f..D..8 - 0050 - db da cb de c6 b1 7a bf-7b 7d c3 d8 4d fd 9a 36 ......z.{}..M..6 - 0060 - 0d 10 a6 2e 54 98 47 d9-f1 f7 d6 d1 41 80 66 3b ....T.G.....A.f; - 0070 - 7c a9 7a 74 12 1e 51 45-9d 44 bb 1b 74 82 96 29 |.zt..QE.D..t..) - 0080 - 04 92 fd db 8a a2 4e d6-26 de 0a f9 4f c9 2f 0c ......N.&...O./. - 0090 - ba fe c5 0b c7 b9 da 85-79 ca 39 90 c7 02 a3 44 ........y.9....D - 00a0 - fb a9 e8 f4 48 46 68 6d-81 42 51 de 13 e7 85 fb ....HFhm.BQ..... - 00b0 - 7c 3c a6 af 4d 15 ce 10-28 8c e2 09 b5 2f 2a 13 |<..M...(..../*. - 00c0 - 4b 02 af aa e0 5e c2 4e-91 db c0 c0 55 95 1d 95 K....^.N....U... - - Start Time: 1739587240 - Timeout : 7200 (sec) - Verify return code: 18 (self-signed certificate) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -20408AF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/rsapss-sha256.pem -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGCAgEBAgIDBAQCEwIEICad4Q/NoXHgEneVt16QNiuPd/c0ZBm697tSW0Tq66C2 -BDC310hx7lws3zzTvC/As2i1irhVYx1yNL/34QNa2KS5WNQDD6dpZvKHGUE8Wltl -CfShBgIEZ6/+qKIEAgIcIKQGBAQBAAAArgYCBG+TkQWzAwIBHQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run sanity test with default values (ECDSA) -spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My EC Cert - i:CN=Issuer - a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAvMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB -BggqhkjOPQMBBwNCAATkHfGJRQPRrCgtPC/DvNZvcWXTS1J32Zhj22bqAZD97nGx -Ij5JLGfjTsGcm9QXRK0SJQdH2IQm4HYfkWEhagJso4GBMH8wDAYDVR0TAQH/BAIw -ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC -B4AwHQYDVR0OBBYEFLsR2YPW65pN2I6/OblZ7eDIGxZ0MB8GA1UdIwQYMBaAFOIX -Zv6cAQ/9WyUdwNIWi/JPKOwRMA0GCSqGSIb3DQEBCwUAA4IBAQAalvvlkL8dypF6 -0F/mFHfC4yOLUcUrqj2IBGTnHN5RY2V51L0PZXk26NdfK10mORq7eGwjl6ZBurIZ -DeqSsHgPDrTINRsjy70sbFCfVARKbl/a7hox8k0WII6mYj95SPrVe4ayS5gOytPL -bIfamHkpOItXheyvRgJ6kansVGebIOgiJIN2lV6Ku0XTZT9v9bmXuKdOA2UJF7M0 -b665nds6iKDB/Vf/MRi7Vg8zdelTEXrFqj7TfOXYjqDjNh6lCsOEkDdnWzsEDeGy -fgzqQa8uW/EhgExT47sKw6Qb4FMwJhj25s6/zukAG+c6hZgKUiOiWuO6E6UdsBN5 -w/bnJlJg ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My EC Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: ECDSA -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 1001 bytes and written 391 bytes -Verification: OK ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 256 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 0 (ok) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: CC76F0C288A530102D764226A879A8D20B604A316465A318ED983567961E3C01 - Session-ID-ctx: - Resumption PSK: 56DCE0832834E9DA30459BD7980A825CD39BB5E38F4B06D91B408235E50D1529E8B69A432B808EDC1C968C32B759CF14 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 51 b6 68 3f 95 ab d9 d9-ee b3 fd 41 2b 7e ae 6e Q.h?.......A+~.n - 0010 - 10 37 93 ac 6d 6b 74 37-33 f2 28 74 15 c9 64 b7 .7..mkt73.(t..d. - 0020 - 84 1b 3a e8 9d d5 87 4c-dd 8a 69 d0 cd 71 1b 99 ..:....L..i..q.. - 0030 - d7 6d 0b 12 84 77 1d 61-7b cc 8d 12 0c c7 59 5e .m...w.a{.....Y^ - 0040 - d2 fb 0e d9 4b e7 59 7e-c2 60 6b 73 a3 ce a0 ea ....K.Y~.`ks.... - 0050 - 79 a1 ed d7 8a 0f 48 48-96 6b f8 a2 64 5e 93 5a y.....HH.k..d^.Z - 0060 - ff 1e a4 bb 90 86 e1 c0-0e c8 c6 e4 65 2f 99 55 ............e/.U - 0070 - 01 a3 59 76 61 0d a2 d7-a4 bf 25 e6 51 c8 7a 48 ..Yva.....%.Q.zH - 0080 - 27 8d ae 77 e5 62 01 29-bb d9 e3 be d0 25 ac 6c '..w.b.).....%.l - 0090 - d9 18 48 65 6b de 60 2b-d1 f4 7b 43 29 7b 64 01 ..Hek.`+..{C){d. - 00a0 - d0 33 16 53 b3 78 d4 a1-1c bc e5 b4 bb b5 5e b9 .3.S.x........^. - 00b0 - f8 6c ea 46 d0 5e d3 30-49 26 8c 27 01 9a ca 7a .l.F.^.0I&.'...z - 00c0 - f8 55 f6 91 e5 55 6c b9-a6 85 20 79 94 62 8a db .U...Ul... y.b.. - - Start Time: 1739587240 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: 2A35C173BA859003A02EE920DBE62AAAA11FB6092D013D18DADF8876BA0E10FC - Session-ID-ctx: - Resumption PSK: 3293EEE698FE5876A701B28974ABB483662362C8940D4429F97140C1319D9613EF0A6D7A4B2CBF29E64A341DBA296332 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 51 b6 68 3f 95 ab d9 d9-ee b3 fd 41 2b 7e ae 6e Q.h?.......A+~.n - 0010 - cc 43 04 6f 28 07 c9 b5-0a 91 99 1e a1 4f ef 34 .C.o(........O.4 - 0020 - 60 aa 3e a4 1d ff 0a 53-d2 71 d2 e4 4d 27 5b 59 `.>....S.q..M'[Y - 0030 - 63 3c 34 28 46 3e 3b 5c-f7 a0 59 4e ff 6c 84 cb c<4(F>;\..YN.l.. - 0040 - e9 75 ff 5d ce 7d 48 60-fb 66 c1 53 ac ee f9 b2 .u.].}H`.f.S.... - 0050 - 7c 06 7a 16 a6 79 b1 e0-db f8 06 0f 42 39 6e c9 |.z..y......B9n. - 0060 - 47 7c e8 e0 de e6 a3 b2-87 52 c2 49 9f 43 44 29 G|.......R.I.CD) - 0070 - 12 dc 1c 2f 83 cd a5 eb-2d b7 20 33 07 8e ba 71 .../....-. 3...q - 0080 - 78 d3 0f 69 66 27 87 1d-42 d3 a8 ba 0a 92 c1 d9 x..if'..B....... - 0090 - 2f 4c f6 2b 6c ea 2b f8-13 f0 80 1f 70 e5 4b 78 /L.+l.+.....p.Kx - 00a0 - fc d7 f3 19 77 1a a0 c0-68 3c 82 0e a0 19 59 b1 ....w...h<....Y. - 00b0 - b5 5c 4e d4 1c ee 5f 49-f9 fc 55 4c 25 12 27 72 .\N..._I..UL%.'r - 00c0 - 6c ad 8d 7f b7 89 96 07-15 fc cc 43 98 cf b0 66 l..........C...f - - Start Time: 1739587240 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -20E0E1F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGCAgEBAgIDBAQCEwIEIH3VcQx1V1413UoYBE0QycRKTuZotnqlRvtbSqpdKsPc -BDAyk+7mmP5YdqcBsol0q7SDZiNiyJQNRCn5cUDBMZ2WE+8KbXpLLL8p5ko0Hbop -YzKhBgIEZ6/+qKIEAgIcIKQGBAQBAAAArgYCBEVIaiOzAwIBHQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run sanity test with default values (Ed25519) -spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My ED25519 Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My ED25519 Cert - i:CN=Issuer - a:PKEY: ED25519, 256 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:07 2025 GMT; NotAfter: Feb 15 02:40:07 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIICSDCCATCgAwIBAgIBBjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA3WhcNMjYwMjE1MDI0MDA3WjA0MRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxGDAWBgNVBAMTD015IEVEMjU1MTkgQ2VydDAqMAUGAytl -cAMhAGb7RIcU8Le0k96TWiExKVDvQ8ljDlfpkRoDTERRHnZlo4GBMH8wDAYDVR0T -AQH/BAIwADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8B -Af8EBAMCB4AwHQYDVR0OBBYEFIh+rXT0WaeYdubxlc1V8B27sCwCMB8GA1UdIwQY -MBaAFOIXZv6cAQ/9WyUdwNIWi/JPKOwRMA0GCSqGSIb3DQEBCwUAA4IBAQC6W2Vo -5SgpMuBGKOuYKn65kiyN7jwfD1v/VMb6a7pJIuJCwJdfcZuMaPI2Y0fHzsxcORLz -dCjYUjyeIXhnJsCy32nakCtOJHbIv1R/5/794zf0YPpgLKAvRUCjSiHj5DhZkk8a -drPuEyfkr3s11uu8gpahcIBcFqBS1PSOTuqsG+1VAJqr94PFFM9sfF23tmqyi27c -hsaS10FcyJltnt3LImzVY5Z7Yvqnk6u/QIVg7OGy+PqLmcvEF5z2hDkG3hItopD0 -Kxwf+cgF4uR4qHyvyqHISYMJvUaHV3Q7o2+5hhWmHmXgHmfsodo+clpV0JTatRpE -w1WMkGBiUnmEu/iQ ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My ED25519 Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signature type: ed25519 -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 952 bytes and written 391 bytes -Verification: OK ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 256 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 0 (ok) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: 091B267016BB5F81EDCCEFF7696E9CADBC654B0E3F8E245522FAA282C10546D0 - Session-ID-ctx: - Resumption PSK: AA9FF462B72F889C8E5296696AD24EF5EC3119D3ECCB8158A3103341BC32ADE9BE8BD60540090EF9C641FDAFEF611929 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 63 76 58 91 86 1f 8d 94-19 fe 2d f1 4a 2a da b9 cvX.......-.J*.. - 0010 - ab 9c 0d 3e d9 8b 9d c5-52 44 d4 37 f9 dc f1 48 ...>....RD.7...H - 0020 - 00 95 ab 2a 10 41 b4 0d-40 a0 e0 b0 0a be f2 b6 ...*.A..@....... - 0030 - 18 32 d0 73 bc 82 8f 70-df db 4c 1e 33 3b de 47 .2.s...p..L.3;.G - 0040 - d7 3d 03 3f 99 60 f1 14-ba 6a 78 24 a8 a5 5c 15 .=.?.`...jx$..\. - 0050 - 9a bd 18 fe d0 a4 48 78-af 6c 96 96 b0 e2 49 f1 ......Hx.l....I. - 0060 - 61 c3 20 cd 7e a7 82 d0-f9 27 63 6f f0 62 9c 1c a. .~....'co.b.. - 0070 - 01 f0 fc 31 de 30 4b 16-82 8d f3 ff db 57 8d 80 ...1.0K......W.. - 0080 - 9a 02 ad 48 f2 b1 63 8a-49 81 54 a2 43 42 50 30 ...H..c.I.T.CBP0 - 0090 - 36 20 73 13 e3 92 03 a3-fb 85 7a 2c ae 30 a7 40 6 s.......z,.0.@ - 00a0 - 67 59 4b 66 6c 2d 0f c5-61 af 14 ee 25 5b cf 21 gYKfl-..a...%[.! - 00b0 - d7 d1 b7 b2 59 ee ed 46-b2 77 3a 94 92 93 dc dd ....Y..F.w:..... - 00c0 - d3 3a c0 50 6e 1e 86 d2-04 fb 00 fb ff 31 5b 9b .:.Pn........1[. - - Start Time: 1739587240 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: 14099F97BB4F40BBD65F5F6D126071D574488672A50811C82DBD27E9EBEDBCF3 - Session-ID-ctx: - Resumption PSK: B6CA63D4FB55B74D6666BD4D11E06E82CC08A5C8375C5FBD18DAE392FA26F825945F10E5F29F3AF21D7191885A947B2B - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 63 76 58 91 86 1f 8d 94-19 fe 2d f1 4a 2a da b9 cvX.......-.J*.. - 0010 - 4a de df 87 67 57 ad b0-db 29 d1 95 04 ea 91 dc J...gW...)...... - 0020 - 2d fa 03 29 c5 03 66 1e-80 59 bf aa a2 5c 63 40 -..)..f..Y...\c@ - 0030 - 24 22 4c 65 a7 c0 b2 65-c6 03 c8 7d bc 86 12 38 $"Le...e...}...8 - 0040 - b1 7b 7d 43 eb 44 6b 32-d3 79 ed 11 02 40 47 ca .{}C.Dk2.y...@G. - 0050 - 82 81 d3 ea 72 22 8b 92-98 f9 37 42 bf 26 8d 4f ....r"....7B.&.O - 0060 - ff 5b ff 47 c4 7f de 2c-45 01 b8 a0 0f 60 6e e6 .[.G...,E....`n. - 0070 - 40 fb 27 ca 75 d1 21 09-62 f7 78 f7 3a 90 be 90 @.'.u.!.b.x.:... - 0080 - 31 94 cc 00 a5 16 7a da-c4 86 0b 18 7a 3b 95 a3 1.....z.....z;.. - 0090 - a1 f9 fb 55 88 e0 1c 1e-6c cb 15 a6 94 5f a7 00 ...U....l...._.. - 00a0 - 84 8d 05 93 0f 16 9b 02-71 ed bd e6 db 54 eb b3 ........q....T.. - 00b0 - f3 19 f7 b3 6d fc 34 1a-a6 61 dd ba 8f 41 c0 c5 ....m.4..a...A.. - 00c0 - fb b5 08 33 16 46 72 d7-f9 12 14 cf 28 05 60 b7 ...3.Fr.....(.`. - - Start Time: 1739587240 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -20C0E2F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGCAgEBAgIDBAQCEwIEIEOgs5W2MmTivkQvmeXMbV1vNXvnCWON1TCiyLtWszWS -BDC2ymPU+1W3TWZmvU0R4G6CzAilyDdcX70Y2uOS+ib4JZRfEOXynzryHXGRiFqU -eyuhBgIEZ6/+qKIEAgIcIKQGBAQBAAAArgYCBCXr6tOzAwIBHQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 TLS SUCCESSFUL -Q - -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run sanity test with default values (Ed448) -spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My ED448 Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My ED448 Cert - i:CN=Issuer - a:PKEY: ED448, 456 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:07 2025 GMT; NotAfter: Feb 15 02:40:07 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIICXzCCAUegAwIBAgIBBzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA3WhcNMjYwMjE1MDI0MDA3WjAyMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxFjAUBgNVBAMTDU15IEVENDQ4IENlcnQwQzAFBgMrZXED -OgD46xlPJ+//PJoMFGxh2kM0wzAl2aTxmDEeqVbH7NDK9xbGYiL7/KSEv4sTv4cS -yDHBocnLMRvrIACjgYEwfzAMBgNVHRMBAf8EAjAAMB8GA1UdEQQYMBaBFHRlc3Rj -ZXJ0QGV4YW1wbGUub3JnMA4GA1UdDwEB/wQEAwIHgDAdBgNVHQ4EFgQU5YeYNBZF -vrfC5pohk/4DFnJjN0wwHwYDVR0jBBgwFoAU4hdm/pwBD/1bJR3A0haL8k8o7BEw -DQYJKoZIhvcNAQELBQADggEBAFKIf2gLnFrHiWTL4aNQqVYx7YbJm3OeYg8Wrb3P -jFTiIkvhtCV0QDfKOJzzy6gvEyVxjpIfx2S+yJA34bQx6oNz3OGDPIG8x3I+EV4c -plZJMabPE2Jv6MmIO8yjuqKTVuxrJW0FUVmsgENnVXHcu8KHzf3bwTfKfSgiSiej -Pajrk2a+FvONTU7O+XNxmSXst2ZZF+i8HcxQKRh5natnMVk9PjB3r3h0Git4rBgS -b7NRVZfvFxgAVh9TW7BxRWOjWRaZqFZRbegGVeMhwmf30bbgL7/CICli3Pa3fsV/ -4HNeD+ms4u8Gyx5I0ZDqjoSgKP9n5mwEpKHfk0m5Zf/+5dI= ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My ED448 Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signature type: ed448 -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 1025 bytes and written 391 bytes -Verification: OK ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 456 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 0 (ok) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: 22D9C4BD56013D3970E98AFBB4352DA0133E9FC0FF0CE767EA9DD4BDCBC9CFBA - Session-ID-ctx: - Resumption PSK: D89FFECBE7E072E8B7AC3AD83CFB33E3224539D06F5D1E7ED7FACB66CE17D5976D8A83C13D37E4A28E5B862693CE05A8 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 77 55 12 9a 66 05 50 25-9a 6e a1 a8 21 54 d9 31 wU..f.P%.n..!T.1 - 0010 - 57 07 db ee 22 eb 4b e5-e7 db 05 c9 9c 96 6c 83 W...".K.......l. - 0020 - 2a 18 fe c8 2f 5b 98 99-43 24 a9 8e 41 8a 1d 01 *.../[..C$..A... - 0030 - fa 73 d6 b0 d1 3d fd 09-d7 37 06 fd 5f 04 01 0d .s...=...7.._... - 0040 - fb 4a 9a b0 8f af 68 28-c8 7b e9 de 28 86 f4 51 .J....h(.{..(..Q - 0050 - 57 71 1c 11 e2 1a 85 e3-a5 49 7c 93 47 44 6d 3f Wq.......I|.GDm? - 0060 - 86 de 96 c3 ca 03 b8 31-1e 1b 63 d1 0a 0f 19 bc .......1..c..... - 0070 - 79 c6 d0 83 78 b3 bd e4-07 ff 09 84 10 46 91 ee y...x........F.. - 0080 - f4 0f ca 25 87 99 e8 c8-3b d2 88 f1 5e 87 51 63 ...%....;...^.Qc - 0090 - 35 27 7c d6 a1 23 a3 58-6a cf dc 5d b1 59 18 19 5'|..#.Xj..].Y.. - 00a0 - 6b 3e c3 c5 ad f0 a3 a7-b8 e4 c3 27 f1 59 07 6e k>.........'.Y.n - 00b0 - 92 61 ef ae 13 7c f8 7c-db 46 f8 10 61 52 c7 c2 .a...|.|.F..aR.. - 00c0 - f4 e1 d0 f3 eb eb 70 cd-99 1a 7e 9e 99 fc 8a 55 ......p...~....U - - Start Time: 1739587241 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: DECF0717458DFE8F9BB43AAEC5459272C9B9F857C56F86F79D9F973F58F7A2A1 - Session-ID-ctx: - Resumption PSK: 5E7313000F29382F4A0152810792E96414161A08EE14A1934605E13542AEF04F746F32946CC698D4EDF68E45E1B49643 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 77 55 12 9a 66 05 50 25-9a 6e a1 a8 21 54 d9 31 wU..f.P%.n..!T.1 - 0010 - ea 89 dc 9c 36 90 9a 30-00 56 bc 60 6e 33 0c a7 ....6..0.V.`n3.. - 0020 - 72 ea 4e 34 e9 7e cf 4d-3c 1b 57 10 4a d6 82 7f r.N4.~.M<.W.J... - 0030 - 24 c1 1e e4 82 92 91 5b-a4 be a4 7b f8 f1 d2 c8 $......[...{.... - 0040 - af 4d a2 5c aa 22 8d 50-b0 09 56 44 3b 66 5b 44 .M.\.".P..VD;f[D - 0050 - a3 f9 b7 a0 c4 35 15 ea-24 b6 a7 32 bd 27 79 71 .....5..$..2.'yq - 0060 - 02 75 55 53 1f c6 69 1f-ec d2 e5 b8 c5 f5 d5 f6 .uUS..i......... - 0070 - 15 e7 f8 2c 00 04 f2 fa-71 04 84 20 39 5e 9c 93 ...,....q.. 9^.. - 0080 - a7 ce d8 b1 f6 03 eb 03-e9 9b f8 99 0a ae 0c 4e ...............N - 0090 - e8 18 3e 50 bb fe d2 89-08 c9 1d a0 8b b7 7b 78 ..>P..........{x - 00a0 - 08 d5 f2 e8 c4 45 b3 24-58 f7 95 9e 16 00 40 eb .....E.$X.....@. - 00b0 - e5 c9 db ca cb 1f c2 8c-1d 05 8e 55 67 d5 e0 ec ...........Ug... - 00c0 - 21 2b 3e 02 aa a2 6a 47-10 f0 77 88 d1 d2 d8 90 !+>...jG..w..... - - Start Time: 1739587241 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -20A0B7F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%09 -cert pkcs11:type=cert;object=ed2Cert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGCAgEBAgIDBAQCEwIEIFhGmuz1sbJYKgaT4Kl32mEtX41XgBx8Smv6EHwrefGA -BDBecxMADyk4L0oBUoEHkulkFBYaCO4UoZNGBeE1Qq7wT3RvMpRsxpjU7faOReG0 -lkOhBgIEZ6/+qaIEAgIcIKQGBAQBAAAArgYCBHsT0PqzAwIBHQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run test with TLS 1.2 -spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -tls1_2 -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My Test Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My Test Cert - i:CN=Issuer - a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAxMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBANwiE/vboeweoWqm6FjFP9LqC1McaB0MYKqY -BezKU1qsojQ+lN13vn/nyFZdYFXcoIgESMi/3wnrYBnK0PNy4nwNCxwUHBQuWwAu -CGlHLNM+dkn9aEpUUepvPYf35/4yWiYXlRQXcUC2Tmrf/9zDOSg50zELOfif4O2g -lwihcPthkSppoiuRSh276gcN0ZN1k765QUGbVlGeFnJFzsibcRWLSDUXnwJzkaaI -y0EU/G75QsiLEw4ILkv0oHFCg7y2Kt8f0IYofkYw7jbHurcpkIESVKA7o6qyct9/ -nRdMpR0foBK4hAvQm4UOkyCOXFlWnYKLaBl7a8vPiQya2/n9p68CAwEAAaOBgTB/ -MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw -DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSk04C/hacKjeIrG9LHzss01wRSujAf -BgNVHSMEGDAWgBTiF2b+nAEP/VslHcDSFovyTyjsETANBgkqhkiG9w0BAQsFAAOC -AQEACDHuA/Jj8fYl8fAUlkHjdrQkd58d7GRu6F2htUC33lGlkd+2g7SxWKtVVZN7 -/TKnGE64j/Bvz/y4A0mBJS3llW7sMKn0h8Cgku7B3pEBkgTVp+4cT2GT+FXNGghb -gs1nSTy1FmyGjCHYKz11YOJN8cvZ0OnVO6ijnjfca5rTWY5W06+T6s2FGvXeNnC2 -b1rmIVWyQp1PrwHZSCR4MeaIflez28DKzRmma2YUfVdLzPX+sJEr4Z4UPPnB8pV+ -47ivPHGSaU4wzJ8tGIBCdMI92nSGfdFrGhW4awIJh8EER9fmUA8d/gGPhj8JNPDV -MHXudSDkWJSeL7glFsXUcJ7QaA== ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My Test Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: RSA-PSS -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 1476 bytes and written 290 bytes -Verification: OK ---- -New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 -Protocol: TLSv1.2 -Server public key is 2048 bit -Secure Renegotiation IS supported -Compression: NONE -Expansion: NONE -No ALPN negotiated -SSL-Session: - Protocol : TLSv1.2 - Cipher : ECDHE-RSA-AES256-GCM-SHA384 - Session-ID: CCAA52C89D65FBCC0A48D5D44825C7B04C064F502043EE8C89E501A1915B23C6 - Session-ID-ctx: - Master-Key: EF318C469F2FAACF14A19DCE1D446074247CBE39F03B6E78761B46159B8C1D45E6BF57C207CC2065B3C8A87925B0B8A5 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - a8 81 24 f4 c9 f6 ac 02-6d 8d 43 33 53 b8 23 aa ..$.....m.C3S.#. - 0010 - ed 97 58 95 3c 36 65 1e-0f 52 6b 0d 99 e5 21 b8 ..X.<6e..Rk...!. - 0020 - 01 67 60 ac 0b f9 e5 7e-13 72 a4 24 1c c1 a4 10 .g`....~.r.$.... - 0030 - 90 56 ae 94 9f 22 05 3d-a9 5c ec ce 86 88 9c 9f .V...".=.\...... - 0040 - 48 2f a2 9a 43 84 e8 ba-ef d7 61 9a 90 6e fe 10 H/..C.....a..n.. - 0050 - 6d 18 4b dd ca e7 84 3c-4f 51 ea 66 e5 65 31 15 m.K......<......... - 0030 - bb 02 52 30 6d 05 eb 29-50 26 87 f2 39 7c 67 71 ..R0m..)P&..9|gq - 0040 - a3 75 e7 4e 89 f9 b0 97-5c 5f 6d 81 72 4f d9 26 .u.N....\_m.rO.& - 0050 - a0 29 78 cd cd 44 a8 69-29 ef bb 34 a6 56 c4 67 .)x..D.i)..4.V.g - 0060 - 1e 2e f5 17 c3 e1 c9 b4-b4 7f b9 73 90 1f 3b 89 ...........s..;. - 0070 - b2 6f a5 1a 51 49 17 d8-f3 8f f3 64 4d a7 15 de .o..QI.....dM... - 0080 - f6 79 17 4e e4 55 70 1e-54 32 c7 79 73 cc 15 73 .y.N.Up.T2.ys..s - 0090 - 3a f0 9a c9 7c 01 66 9b-e3 aa 49 d9 56 5f b3 eb :...|.f...I.V_.. - 00a0 - a8 3d c2 66 7d 31 72 41-e3 35 aa bf bc 30 98 1b .=.f}1rA.5...0.. - - Start Time: 1739587241 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: yes ---- - TLS SUCCESSFUL -20207FF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2 -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MF8CAQECAgMDBALALAQABDD85u8t8Wb0tuRtVP7Kigsgh1L8PU2SuZIA7fGmbBhu -WHYc3rzC27Eg++Utr8wB8hOhBgIEZ6/+qaIEAgIcIKQGBAQBAAAArQMCAQGzAwIB -HQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 -CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384 -Secure Renegotiation IS supported - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run test with TLS 1.2 and ECDH -spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1 -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My EC Cert - i:CN=Issuer - a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAvMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB -BggqhkjOPQMBBwNCAATkHfGJRQPRrCgtPC/DvNZvcWXTS1J32Zhj22bqAZD97nGx -Ij5JLGfjTsGcm9QXRK0SJQdH2IQm4HYfkWEhagJso4GBMH8wDAYDVR0TAQH/BAIw -ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC -B4AwHQYDVR0OBBYEFLsR2YPW65pN2I6/OblZ7eDIGxZ0MB8GA1UdIwQYMBaAFOIX -Zv6cAQ/9WyUdwNIWi/JPKOwRMA0GCSqGSIb3DQEBCwUAA4IBAQAalvvlkL8dypF6 -0F/mFHfC4yOLUcUrqj2IBGTnHN5RY2V51L0PZXk26NdfK10mORq7eGwjl6ZBurIZ -DeqSsHgPDrTINRsjy70sbFCfVARKbl/a7hox8k0WII6mYj95SPrVe4ayS5gOytPL -bIfamHkpOItXheyvRgJ6kansVGebIOgiJIN2lV6Ku0XTZT9v9bmXuKdOA2UJF7M0 -b665nds6iKDB/Vf/MRi7Vg8zdelTEXrFqj7TfOXYjqDjNh6lCsOEkDdnWzsEDeGy -fgzqQa8uW/EhgExT47sKw6Qb4FMwJhj25s6/zukAG+c6hZgKUiOiWuO6E6UdsBN5 -w/bnJlJg ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My EC Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: ECDSA -Server Temp Key: ECDH, prime256v1, 256 bits ---- -SSL handshake has read 1118 bytes and written 263 bytes -Verification: OK ---- -New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256 -Protocol: TLSv1.2 -Server public key is 256 bit -Secure Renegotiation IS supported -Compression: NONE -Expansion: NONE -No ALPN negotiated -SSL-Session: - Protocol : TLSv1.2 - Cipher : ECDHE-ECDSA-AES128-GCM-SHA256 - Session-ID: 901A255E866DFAFB9EE38ECA239F8458911157211D84FA1D0CDDF6D2CAC916E3 - Session-ID-ctx: - Master-Key: 3529AF1183FA01806359DDC54E6BD579909F39FFB6AEEDA9A21B186B60CAAC2CDDB89BFAF1AE171CB9D70BE79C8110EF - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - f4 62 a4 1a bf ac 72 de-e9 60 b7 e6 d7 b9 89 86 .b....r..`...... - 0010 - 3c 4b 72 bc 48 ef 14 24-35 c6 0b 72 cb 33 4c fd .0.......?..H.. - 0050 - 02 08 1b f5 ad a7 42 33-60 a4 e8 78 9a 20 c4 c4 ......B3`..x. .. - 0060 - 11 db 8c de 83 fe 21 52-08 22 0f 0c 33 29 88 f0 ......!R."..3).. - 0070 - a2 5d 31 6e e0 26 06 ea-2d 39 42 7f 2e 4d a8 6c .]1n.&..-9B..M.l - 0080 - 3a b5 9d 77 f2 b3 0e 7f-5b 54 dd eb 0a a2 5b 4d :..w....[T....[M - 0090 - f4 5e ba 60 b4 77 4c 69-ed 4d c0 42 f5 6f ec 0d .^.`.wLi.M.B.o.. - 00a0 - 06 62 15 00 59 b4 50 15-16 a6 79 5e 0c 67 f9 1a .b..Y.P...y^.g.. - 00b0 - 1e c3 63 b7 3d 58 88 fe-e7 b3 6f 91 e5 e0 42 c7 ..c.=X....o...B. - 00c0 - 5e 9a 22 de 09 b8 7c e0-7b 6e 8d 43 b4 34 d4 f0 ^."...|.{n.C.4.. - - Start Time: 1739587241 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: B5121029F41188CB1A1E321AAD5E900F347D729325070FC20D5349A8460CEC70 - Session-ID-ctx: - Resumption PSK: E4588D9CC9FB22B237B0C5D537ABEA7C5CFC36C746234F91AADF5AFBD63191A55364322ECAA3D8D5EA6710AA67847CC9 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 4b 32 3f 16 ac ca bd c9-e7 44 f8 10 a7 2e ca b6 K2?......D...... - 0010 - 7a df 07 18 e5 70 df 5e-26 a5 84 80 79 83 7b da z....p.^&...y.{. - 0020 - b7 b5 cd 8b f0 ac 21 94-88 b1 ae 59 f2 71 1c f8 ......!....Y.q.. - 0030 - b9 4b d1 e0 1a cf 7c 82-66 92 90 f7 11 7c 9f 48 .K....|.f....|.H - 0040 - 06 14 2c 90 26 0e 33 4a-22 fd dd d2 99 cb a4 95 ..,.&.3J"....... - 0050 - 4c e1 42 fa 62 50 c7 f6-2f 58 79 f4 f8 e9 e0 42 L.B.bP../Xy....B - 0060 - 69 fd b2 d9 5e 6f c6 7a-85 f3 c7 b8 d7 64 7d 78 i...^o.z.....d}x - 0070 - ba b4 79 f1 db 14 0c b1-f7 ec ed 34 60 55 4b c4 ..y........4`UK. - 0080 - 47 a8 c3 29 97 d3 49 08-88 7b 77 ef 24 10 3e 52 G..)..I..{w.$.>R - 0090 - 7f 55 92 92 b8 56 78 da-f4 39 0f 12 30 36 e3 5e .U...Vx..9..06.^ - 00a0 - 20 8e cf c7 eb 51 a0 5c-7f bb e9 4b b4 4e ca 02 ....Q.\...K.N.. - 00b0 - f4 50 77 f0 44 1e 3a 47-2d 2e 22 5d d6 0a d5 c1 .Pw.D.:G-."].... - 00c0 - c4 f1 3a ba 1d d0 cb 2d-fe b9 91 54 38 da b8 e8 ..:....-...T8... - - Start Time: 1739587241 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -2090F5F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGDAgEBAgIDBAQCEwIEIODBHlRcDCttnZTwXwAtFjuE1K7Mpkr70LWletNY6NcT -BDDkWI2cyfsisjewxdU3q+p8XPw2x0YjT5Gq31r71jGRpVNkMi7Ko9jV6mcQqmeE -fMmhBgIEZ6/+qaIEAgIcIKQGBAQBAAAArgcCBQDkREviswMCARc= ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384 -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 -Supported groups: secp256r1 -Shared groups: secp256r1 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - - ## -######################################## - -######################################## -## Forcing the provider for all server operations - - -## Run sanity test with default values (RSA) -spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My Test Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My Test Cert - i:CN=Issuer - a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAxMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBANwiE/vboeweoWqm6FjFP9LqC1McaB0MYKqY -BezKU1qsojQ+lN13vn/nyFZdYFXcoIgESMi/3wnrYBnK0PNy4nwNCxwUHBQuWwAu -CGlHLNM+dkn9aEpUUepvPYf35/4yWiYXlRQXcUC2Tmrf/9zDOSg50zELOfif4O2g -lwihcPthkSppoiuRSh276gcN0ZN1k765QUGbVlGeFnJFzsibcRWLSDUXnwJzkaaI -y0EU/G75QsiLEw4ILkv0oHFCg7y2Kt8f0IYofkYw7jbHurcpkIESVKA7o6qyct9/ -nRdMpR0foBK4hAvQm4UOkyCOXFlWnYKLaBl7a8vPiQya2/n9p68CAwEAAaOBgTB/ -MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw -DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSk04C/hacKjeIrG9LHzss01wRSujAf -BgNVHSMEGDAWgBTiF2b+nAEP/VslHcDSFovyTyjsETANBgkqhkiG9w0BAQsFAAOC -AQEACDHuA/Jj8fYl8fAUlkHjdrQkd58d7GRu6F2htUC33lGlkd+2g7SxWKtVVZN7 -/TKnGE64j/Bvz/y4A0mBJS3llW7sMKn0h8Cgku7B3pEBkgTVp+4cT2GT+FXNGghb -gs1nSTy1FmyGjCHYKz11YOJN8cvZ0OnVO6ijnjfca5rTWY5W06+T6s2FGvXeNnC2 -b1rmIVWyQp1PrwHZSCR4MeaIflez28DKzRmma2YUfVdLzPX+sJEr4Z4UPPnB8pV+ -47ivPHGSaU4wzJ8tGIBCdMI92nSGfdFrGhW4awIJh8EER9fmUA8d/gGPhj8JNPDV -MHXudSDkWJSeL7glFsXUcJ7QaA== ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My Test Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: RSA-PSS -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 1391 bytes and written 391 bytes -Verification: OK ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 2048 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 0 (ok) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: C7041786CC40D3E6773768F99CFD29F3BB241E4D3ABE8FB5A72FED7BF21D0B4C - Session-ID-ctx: - Resumption PSK: 333CB98240AFD752316623BD17DA61DDB4C1C1726F365F79FA3366DE2CDCEE273FE94EBE032CC314CD1F2D81E49BA943 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 89 89 7b 46 0e 0a 00 d0-32 20 da ec dc 55 98 59 ..{F....2 ...U.Y - 0010 - aa 0e a5 07 96 85 e1 c4-8e 61 32 42 3c 57 35 a2 .........a2Bw.y.J.r. - 0080 - e7 f7 89 52 ea 46 cc e7-72 b6 16 ba 9e 52 ef 16 ...R.F..r....R.. - 0090 - 06 60 54 e2 c5 8a ac 49-73 1c 49 fa f7 fe da 7f .`T....Is.I..... - 00a0 - 4e bc da 7d 64 e1 57 31-f2 70 11 ae 45 c3 eb 5a N..}d.W1.p..E..Z - 00b0 - 37 67 b2 18 8f 94 cd dc-f9 9a f5 74 c5 2a 60 e0 7g.........t.*`. - 00c0 - 87 e3 81 78 a6 cb 05 a9-f6 78 0d 7d 3b 90 e0 2c ...x.....x.};.., - - Start Time: 1739587242 - Timeout : 7200 (sec) - Verify return code: 18 (self-signed certificate) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: D7F2BEFFFCD3BCF18CA8C7F1EA3CB63D6733BA5015FA2E547AFA3397C50101F0 - Session-ID-ctx: - Resumption PSK: 8694F771C60E5047FCA03082DC84071F55D4B081252CE64164576D2158C7983960C1798AA36421209E7D05198DC823EB - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 94 92 28 f6 3f 32 a7 d4-c9 8b f3 6e 0e e1 40 e9 ..(.?2.....n..@. - 0010 - e2 20 9f 7a 1b 3c 85 8f-db 15 45 23 58 4f 1b e6 . .z.<....E#XO.. - 0020 - 1f 27 95 48 51 0a 14 49-d1 f7 25 9d 37 74 fb 2f .'.HQ..I..%.7t./ - 0030 - c4 6b 36 3c 07 fe 05 fb-cb a0 2f 54 07 39 73 30 .k6<....../T.9s0 - 0040 - 2d be e9 26 a0 64 41 2e-ad 9e a5 65 7c 40 0b ff -..&.dA....e|@.. - 0050 - bf e7 c2 25 3e dd 08 d6-5e a9 fe 51 e5 48 54 e5 ...%>...^..Q.HT. - 0060 - 92 4e 26 43 77 91 ba f4-a6 b2 42 fb f5 27 38 2f .N&Cw.....B..'8/ - 0070 - b4 d6 31 2b 57 71 60 f4-c8 d7 ea ee ac 06 9a 58 ..1+Wq`........X - 0080 - c6 ee 89 a7 6e 91 86 21-63 fc 35 82 be 81 00 d4 ....n..!c.5..... - 0090 - c6 bf 43 57 40 ab be a4-db 9e e0 43 4f 22 00 99 ..CW@......CO".. - 00a0 - 18 ac df e7 5a 60 1d 27-2f d6 7b 56 89 a5 b2 ea ....Z`.'/.{V.... - 00b0 - 79 df 0a ee ab 79 01 78-8b a7 46 ed 8d 65 75 55 y....y.x..F..euU - 00c0 - cd cb 72 70 8f f7 cd 28-5f 96 0a e6 4c bb e2 66 ..rp...(_...L..f - - Start Time: 1739587242 - Timeout : 7200 (sec) - Verify return code: 18 (self-signed certificate) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -2000BBF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/rsapss-default.pem -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGCAgEBAgIDBAQCEwIEIAh4WHpN3+pdRVd8wNYYkn2iCp21RkEKlPDn38u/+djF -BDCGlPdxxg5QR/ygMILchAcfVdSwgSUs5kFkV20hWMeYOWDBeYqjZCEgnn0FGY3I -I+uhBgIEZ6/+qqIEAgIcIKQGBAQBAAAArgYCBC5BTEizAwIBHQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run sanity test with RSA-PSS and SHA256 - -## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11 - openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} - - -spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness -verify error:num=18:self-signed certificate -verify return:1 -depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness -verify return:1 ---- -Certificate chain - 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness - i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness - a:PKEY: RSASSA-PSS, 3096 (bit); sigalg: RSASSA-PSS - v:NotBefore: Feb 15 02:40:42 2025 GMT; NotAfter: Mar 17 02:40:42 2025 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIIFKDCCA12gAwIBAgIUD+rJ5iDaR/kVzppcP19CJPPv8WUwPQYJKoZIhvcNAQEK -MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC -ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO -ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 -aW5nIEhhcm5lc3MwHhcNMjUwMjE1MDI0MDQyWhcNMjUwMzE3MDI0MDQyWjBnMQsw -CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr -MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy -bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgw82BUeHCv2Ln9eudcx/ -OMUR0o+JAsjQenIM9myPBZjqqXHSCp67o0FkIpdLdPKFMzILXub0pJxxIpjzknbB -Td2s6KzF7wDAJ5+2zK6ibWlYvu/uqn4HqqrW8eGzgpDoSkrqSEoCYBcy4QqMl+fC -U90kMx0Fsw98yWkbFAyNihXnIIplsIshs0O7kHkol2FCmEiivYqEkOI6nb/J2/cx -fY5isoPcmRmSgTvM9X7zFZ0/iQLs5Rh9UNItRu4mFIGIlAl2IFOMZaVI4p/2Xoh0 -dOD0/i5Yfdoxv/SaSQ/2dqKukuXkKD8CiR9V46ViZjldjz7gGU8lCMzr/KvI/2O2 -abOavTbxTkg1R98g/M+jRx2cbWyIX2o3sT1Ec34S0BSuaJhOJpMMgK2iqF/VNs1a -zOGwLxjOOVm4RMSwgWCkZ50O8go/9wFKka3FuuafaOw5VGvCpztIAckXuX6abszQ -Zs3bWGavGva5Hq6mE7eNSj4gnLjOd+mM4YIGqdpiUttRnIRqFQIDAQABo2kwZzAd -BgNVHQ4EFgQU/WpCR8WvD5cEKPEl9W0e+Djk0S4wHwYDVR0jBBgwFoAU/WpCR8Wv -D5cEKPEl9W0e+Djk0S4wDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud -EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B -AQgwCwYJYIZIAWUDBAIBogMCASADggGEAAV52gtc/gd9qElKnh8BosES/y1O78j5 -6TgeG1tYhOeK5Fn9NuTE0gDuEo5JAmyp57nMym9lguFl8+ZBT9i9mRXkvMpB5fEs -mhf39y3kaoCEZcsAY8Dfl0iyQO1QJk+MpglAZiPk0dTRICvNPewq3df3Nier5C3m -BFyhEnYqy4ERXvf2x06yg5mkiJsXTPrPCqe2WaSjMfreEfybxP8TAsz/NbiCuDTU -ItiVnJRsf7vHEDn7HsissbIfhti94kzchMGSt3/TLsvKAcgdKzBm/S76W8jLGIiW -wNl4KENAY9UZ30o7XkLtMNq9xULnO67G6D9lkIWBVQA4zfsv5KZVQxJsTJFQVzZk -70Xv1etFWoAsnE/MHBYYBpWwd5AjZCKc/fDjcQ5dXDRExwsinhnNb60ZI9iExodO -TUKLZMlWBsJkUfWp5OdvY4deDQzL/iSAL3tNb8QWeeDnrQT91lN/nvwbT6Y/vXek -8RM/cuFHDn41TcwEikNnvrMLHeL4cqilOG4q5g== ------END CERTIFICATE----- -subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness -issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: RSA-PSS -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 2011 bytes and written 391 bytes -Verification error: self-signed certificate ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 3096 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 18 (self-signed certificate) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: F9481F44E7E38192D11127742EB9577479957544B20E897E7C01A067B63C3DB5 - Session-ID-ctx: - Resumption PSK: 370915C6E0AC7C599B99BA2339B0C324072EB4E03B17B7C792F680D8258849D483893F946B9C98529EC73162D9A1C4F2 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 3c 4f dc 1f fc 55 e9 0a-6d a4 ca 0c 9e e5 26 e0 [ - 0080 - 9a 29 cf b4 23 53 34 25-b3 c9 ee ba b7 9c 2e b5 .)..#S4%........ - 0090 - 26 ce 7c 8b ab 65 3a b0-60 c6 37 c9 cb 4a 49 eb &.|..e:.`.7..JI. - 00a0 - a6 9a dd ea da a6 4c 4f-d6 39 dc 3a fe 12 1d ed ......LO.9.:.... - 00b0 - d8 41 96 38 f4 bc 89 94-d3 16 c6 5c a0 fd 5b 67 .A.8.......\..[g - 00c0 - c4 82 b6 bd 4c bd c7 2e-55 f8 88 1f bf 7b bc b9 ....L...U....{.. - - Start Time: 1739587242 - Timeout : 7200 (sec) - Verify return code: 18 (self-signed certificate) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -20E0F1F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/rsapss-sha256.pem -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGCAgEBAgIDBAQCEwIEIMF3+kli3C9k+//XWaEj5haGTanDtqunNmZ3msOaQ+av -BDBxWQv0bcJ1L0v/Cb7gGgSVxGnqqJGvmgIJzbtrGUzzDpqFiZk/HCEYbhtn0Pim -GsWhBgIEZ6/+qqIEAgIcIKQGBAQBAAAArgYCBClWiQuzAwIBHQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run sanity test with default values (ECDSA) -spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify error:num=1:unspecified certificate verification error -verify return:1 -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My EC Cert - i:CN=Issuer - a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAvMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB -BggqhkjOPQMBBwNCAATkHfGJRQPRrCgtPC/DvNZvcWXTS1J32Zhj22bqAZD97nGx -Ij5JLGfjTsGcm9QXRK0SJQdH2IQm4HYfkWEhagJso4GBMH8wDAYDVR0TAQH/BAIw -ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC -B4AwHQYDVR0OBBYEFLsR2YPW65pN2I6/OblZ7eDIGxZ0MB8GA1UdIwQYMBaAFOIX -Zv6cAQ/9WyUdwNIWi/JPKOwRMA0GCSqGSIb3DQEBCwUAA4IBAQAalvvlkL8dypF6 -0F/mFHfC4yOLUcUrqj2IBGTnHN5RY2V51L0PZXk26NdfK10mORq7eGwjl6ZBurIZ -DeqSsHgPDrTINRsjy70sbFCfVARKbl/a7hox8k0WII6mYj95SPrVe4ayS5gOytPL -bIfamHkpOItXheyvRgJ6kansVGebIOgiJIN2lV6Ku0XTZT9v9bmXuKdOA2UJF7M0 -b665nds6iKDB/Vf/MRi7Vg8zdelTEXrFqj7TfOXYjqDjNh6lCsOEkDdnWzsEDeGy -fgzqQa8uW/EhgExT47sKw6Qb4FMwJhj25s6/zukAG+c6hZgKUiOiWuO6E6UdsBN5 -w/bnJlJg ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My EC Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: ECDSA -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 1001 bytes and written 391 bytes -Verification error: unspecified certificate verification error ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 256 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 1 (unspecified certificate verification error) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: 05E7BE36D741FD23B7CFD7C3264EB003810063ECB6CCAC3431D31EB3D646A283 - Session-ID-ctx: - Resumption PSK: 59FC08D979E63DA8BDE2CB24D6B96E74205375E048322133200AB7B456384E6B3AA2A4801F02A806F0B7D6063E439047 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - fb fb ff e6 00 c2 49 30-6a a4 95 77 f3 d1 fe 82 ......I0j..w.... - 0010 - 61 b0 65 76 26 42 00 7b-03 73 52 39 e1 d4 5f 6b a.ev&B.{.sR9.._k - 0020 - c8 5f e1 75 ba 17 16 d3-44 8e 0c c0 dc 20 53 6d ._.u....D.... Sm - 0030 - 5e 18 0b fb 14 8f ae ca-aa 41 9d f2 1e ac 1d 60 ^........A.....` - 0040 - 7a 2d 31 56 99 48 fd 16-06 13 4b a2 fd 61 94 ab z-1V.H....K..a.. - 0050 - 6c 28 f4 7b 09 25 3c 44-66 19 78 3d 9d 7f 98 99 l(.{.%....FD.$...!?.. - 0040 - 97 ba a8 c5 6c 70 d7 14-9d 08 c1 d0 b3 4b 2c 40 ....lp.......K,@ - 0050 - db f6 01 7b 24 54 6b b4-a8 e3 74 a8 3b a6 bf 8f ...{$Tk...t.;... - 0060 - f1 22 27 dc d0 ac ce f4-9c f5 c5 55 f5 45 4b 90 ."'........U.EK. - 0070 - bb d7 1c e8 a9 2a 30 4d-bb 40 e0 6b 5c 20 80 90 .....*0M.@.k\ .. - 0080 - 2c 69 d6 83 02 d8 6e 96-9c 45 2c 13 92 89 0d ff ,i....n..E,..... - 0090 - 60 3c b9 b9 74 86 3b 4f-ad bd 5e b4 27 3e d3 10 `<..t.;O..^.'>.. - 00a0 - ba 83 0b 92 24 7b 00 32-60 be 0a 1c 48 c9 dc 70 ....${.2`...H..p - 00b0 - 47 1f 6c 5a a8 00 34 ae-29 37 70 43 67 0d 93 55 G.lZ..4.)7pCg..U - 00c0 - e5 a2 6f 93 bf 05 c8 18-50 42 14 76 64 7f e4 d7 ..o.....PB.vd... - - Start Time: 1739587243 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -2020C0F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%09 -cert pkcs11:type=cert;object=ed2Cert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGCAgEBAgIDBAQCEwIEIP+pdQuFl3Sn3j3Zu0TiBSrz9pIQqojpqZjEezlMGTKc -BDB8LObdLC27So9MYNe+V4Nis0RfVq8MC1yOEW0kcZ3tmlt1JUZ7qSsS5WxRZwpe -QzahBgIEZ6/+q6IEAgIcIKQGBAQBAAAArgYCBHSYpgCzAwIBHQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run test with TLS 1.2 -spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -tls1_2 -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My Test Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My Test Cert - i:CN=Issuer - a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAxMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBANwiE/vboeweoWqm6FjFP9LqC1McaB0MYKqY -BezKU1qsojQ+lN13vn/nyFZdYFXcoIgESMi/3wnrYBnK0PNy4nwNCxwUHBQuWwAu -CGlHLNM+dkn9aEpUUepvPYf35/4yWiYXlRQXcUC2Tmrf/9zDOSg50zELOfif4O2g -lwihcPthkSppoiuRSh276gcN0ZN1k765QUGbVlGeFnJFzsibcRWLSDUXnwJzkaaI -y0EU/G75QsiLEw4ILkv0oHFCg7y2Kt8f0IYofkYw7jbHurcpkIESVKA7o6qyct9/ -nRdMpR0foBK4hAvQm4UOkyCOXFlWnYKLaBl7a8vPiQya2/n9p68CAwEAAaOBgTB/ -MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw -DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSk04C/hacKjeIrG9LHzss01wRSujAf -BgNVHSMEGDAWgBTiF2b+nAEP/VslHcDSFovyTyjsETANBgkqhkiG9w0BAQsFAAOC -AQEACDHuA/Jj8fYl8fAUlkHjdrQkd58d7GRu6F2htUC33lGlkd+2g7SxWKtVVZN7 -/TKnGE64j/Bvz/y4A0mBJS3llW7sMKn0h8Cgku7B3pEBkgTVp+4cT2GT+FXNGghb -gs1nSTy1FmyGjCHYKz11YOJN8cvZ0OnVO6ijnjfca5rTWY5W06+T6s2FGvXeNnC2 -b1rmIVWyQp1PrwHZSCR4MeaIflez28DKzRmma2YUfVdLzPX+sJEr4Z4UPPnB8pV+ -47ivPHGSaU4wzJ8tGIBCdMI92nSGfdFrGhW4awIJh8EER9fmUA8d/gGPhj8JNPDV -MHXudSDkWJSeL7glFsXUcJ7QaA== ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My Test Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: RSA-PSS -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 1476 bytes and written 290 bytes -Verification: OK ---- -New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 -Protocol: TLSv1.2 -Server public key is 2048 bit -Secure Renegotiation IS supported -Compression: NONE -Expansion: NONE -No ALPN negotiated -SSL-Session: - Protocol : TLSv1.2 - Cipher : ECDHE-RSA-AES256-GCM-SHA384 - Session-ID: 6C861AFA6EF7465148AE4FFEE6EDF6F728E919D6550DFA0FDA94C4EEC6BDD73F - Session-ID-ctx: - Master-Key: DAEC89CE04E8A5DD7FA91544061F8A234DE18DFAE64FD5ADCB2F18E54CF7B8BE67CD381EC544977AA4F75D7E59C89DC9 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 95 28 52 d4 e2 5a e6 02-85 15 1a 11 29 de 22 b3 .(R..Z......).". - 0010 - f1 05 ec 41 8b 7e 5e ab-44 e1 b5 5e 29 4a b1 cd ...A.~^.D..^)J.. - 0020 - 67 3a d4 a8 8d 2d 52 ef-c4 51 fb 29 5c ba 4f 48 g:...-R..Q.)\.OH - 0030 - 06 28 89 4c 72 91 18 17-10 cc a4 db 80 3d 2d 29 .(.Lr........=-) - 0040 - f6 4a 11 e2 04 68 b0 f1-a9 af 18 7d 2d 9f 65 93 .J...h.....}-.e. - 0050 - c1 39 b3 36 ca 74 0d 9f-94 09 d8 18 c7 9c ac ca .9.6.t.......... - 0060 - 32 b3 ff 8b 98 b0 65 d8-f3 2c e4 94 1b d1 d7 2e 2.....e..,...... - 0070 - a9 33 ac 9c fb 38 58 14-d2 18 39 e8 05 bc 6b 8b .3...8X...9...k. - 0080 - 4f 1f d2 2c 1c 99 38 50-a8 a5 4c d0 b3 5e 80 2d O..,..8P..L..^.- - 0090 - c5 fd 33 f3 19 d8 1b 66-ef 28 91 ab d4 03 b6 08 ..3....f.(...... - 00a0 - 4f 37 27 5b 52 bd 13 57-8e a3 e4 bf a2 b9 0a 09 O7'[R..W........ - - Start Time: 1739587243 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: yes ---- - TLS SUCCESSFUL -2090CBF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MF8CAQECAgMDBALAMAQABDDa7InOBOil3X+pFUQGH4ojTeGN+uZP1a3LLxjlTPe4 -vmfNOB7FRJd6pPddflnIncmhBgIEZ6/+q6IEAgIcIKQGBAQBAAAArQMCAQGzAwIB -HQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 -CIPHER is ECDHE-RSA-AES256-GCM-SHA384 -Secure Renegotiation IS supported - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run test with explicit TLS 1.3 -spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -tls1_3 -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My Test Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My Test Cert - i:CN=Issuer - a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAxMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBANwiE/vboeweoWqm6FjFP9LqC1McaB0MYKqY -BezKU1qsojQ+lN13vn/nyFZdYFXcoIgESMi/3wnrYBnK0PNy4nwNCxwUHBQuWwAu -CGlHLNM+dkn9aEpUUepvPYf35/4yWiYXlRQXcUC2Tmrf/9zDOSg50zELOfif4O2g -lwihcPthkSppoiuRSh276gcN0ZN1k765QUGbVlGeFnJFzsibcRWLSDUXnwJzkaaI -y0EU/G75QsiLEw4ILkv0oHFCg7y2Kt8f0IYofkYw7jbHurcpkIESVKA7o6qyct9/ -nRdMpR0foBK4hAvQm4UOkyCOXFlWnYKLaBl7a8vPiQya2/n9p68CAwEAAaOBgTB/ -MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw -DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSk04C/hacKjeIrG9LHzss01wRSujAf -BgNVHSMEGDAWgBTiF2b+nAEP/VslHcDSFovyTyjsETANBgkqhkiG9w0BAQsFAAOC -AQEACDHuA/Jj8fYl8fAUlkHjdrQkd58d7GRu6F2htUC33lGlkd+2g7SxWKtVVZN7 -/TKnGE64j/Bvz/y4A0mBJS3llW7sMKn0h8Cgku7B3pEBkgTVp+4cT2GT+FXNGghb -gs1nSTy1FmyGjCHYKz11YOJN8cvZ0OnVO6ijnjfca5rTWY5W06+T6s2FGvXeNnC2 -b1rmIVWyQp1PrwHZSCR4MeaIflez28DKzRmma2YUfVdLzPX+sJEr4Z4UPPnB8pV+ -47ivPHGSaU4wzJ8tGIBCdMI92nSGfdFrGhW4awIJh8EER9fmUA8d/gGPhj8JNPDV -MHXudSDkWJSeL7glFsXUcJ7QaA== ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My Test Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: RSA-PSS -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 1391 bytes and written 318 bytes -Verification: OK ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 2048 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 0 (ok) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: E432204EE6569F2CD2EE6781EAF8DAA345DC47FA84085C7BA20BDE77846389A4 - Session-ID-ctx: - Resumption PSK: 2F23B30DA77BBD69C78F2913845AA6BE214F3BA71FEC9DE02DF554AFF01DBFE1DA9CC0F14DF7131527F216BF10091EA1 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 55 01 56 bb 78 09 42 e4-c6 ba 0b db f9 a4 91 21 U.V.x.B........! - 0010 - 8d ec 90 af 92 6a 70 3d-9e 95 54 15 96 96 c7 40 .....jp=..T....@ - 0020 - aa 02 22 1b e8 14 97 4d-59 3f b4 15 ec 66 db 45 .."....MY?...f.E - 0030 - ef aa bc cd f4 b2 b1 87-d3 67 13 82 3a aa 15 6a .........g..:..j - 0040 - 3a fa 9e 6a d1 08 74 2f-26 91 d0 f7 ee 8c 92 86 :..j..t/&....... - 0050 - a9 b3 ae 9c e7 dc 4e 13-df 74 16 d0 86 7b 49 d7 ......N..t...{I. - 0060 - 28 89 bf 9f 8f ba 8f 4b-8d aa ea 0c ee 97 7d 13 (......K......}. - 0070 - 06 9d 15 a8 6c 24 38 14-ee dd 2f 52 b6 31 5b 0d ....l$8.../R.1[. - 0080 - c1 c4 06 4c a4 be 3a 46-96 4d 7e 2c 2a 4d 7e ea ...L..:F.M~,*M~. - 0090 - 68 f1 3b 06 d2 93 ab f5-0f 15 54 b4 b0 bf df 53 h.;.......T....S - 00a0 - 44 f5 ae 3c a7 11 88 0e-6a f7 21 df 1f 14 f4 9e D..<....j.!..... - 00b0 - 94 74 18 92 fb b6 7b bc-d9 ef fd 3e 2d 30 ad 05 .t....{....>-0.. - 00c0 - 22 9e 69 30 cb 8e ed 46-2c 6d 3e 74 76 bc 66 14 ".i0...F,m>tv.f. - - Start Time: 1739587243 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: FE587C70D2EA297017B57D666C78E3A7AEEB51FF81D061EE8BA7A4DCFC8488F7 - Session-ID-ctx: - Resumption PSK: 8AF39FB7D636AB2E0DA70E0581A1D26F32B0C3EC60EC1FE19C4871BB7E49693DEF642D28638F3B2B27C92D1E2D10A5E1 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 55 01 56 bb 78 09 42 e4-c6 ba 0b db f9 a4 91 21 U.V.x.B........! - 0010 - c8 06 52 ed a7 c7 86 13-9f c8 da b6 b0 35 09 9b ..R..........5.. - 0020 - de 11 8e 9a 82 f7 a8 84-60 26 0b ca 19 9f 96 ef ........`&...... - 0030 - ba 49 d0 d9 ca 67 b7 a6-4f 1e 00 0e ca d6 c7 3d .I...g..O......= - 0040 - 00 b0 96 9f 7b 04 30 3a-c6 9a bc 87 dc cc 8b f4 ....{.0:........ - 0050 - 52 50 9e 82 87 3e f3 86-de 79 72 b0 8e 98 01 ba RP...>...yr..... - 0060 - 92 d9 6f d6 17 5a e2 41-5c a6 ae 1e 16 50 00 bd ..o..Z.A\....P.. - 0070 - 09 ee 88 e0 8d f3 03 be-08 b0 9e 54 61 f5 10 c5 ...........Ta... - 0080 - 82 4c 6d 27 65 28 76 fd-1b e5 47 40 c0 0e 4e ea .Lm'e(v...G@..N. - 0090 - 34 0f 61 2a fa f9 51 e5-df b5 38 9a 87 98 75 d8 4.a*..Q...8...u. - 00a0 - 12 84 5a 3c ab 9c 69 03-5a 25 ce da 2e 4a 34 b7 ..Z<..i.Z%...J4. - 00b0 - 9a ce 7a de ce 76 a9 d1-26 a2 4a fd cd 19 fc f8 ..z..v..&.J..... - 00c0 - 52 77 38 ab e8 d4 5c d7-e8 29 b4 05 fa 3d 0a e0 Rw8...\..)...=.. - - Start Time: 1739587243 - Timeout : 7200 (sec) - Verify return code: 0 (ok) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -20508EF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGCAgEBAgIDBAQCEwIEIE5TGs7VH8OILAo2KDZxIhXiKhiWNAvm5Hg8Vu7MLxud -BDCK85+31jarLg2nDgWBodJvMrDD7GDsH+GcSHG7fklpPe9kLShjjzsrJ8ktHi0Q -peGhBgIEZ6/+q6IEAgIcIKQGBAQBAAAArgYCBED4G1SzAwIBHQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256 -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run test with TLS 1.2 (ECDSA) -spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -tls1_2 -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify error:num=1:unspecified certificate verification error -verify return:1 -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My EC Cert - i:CN=Issuer - a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAvMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB -BggqhkjOPQMBBwNCAATkHfGJRQPRrCgtPC/DvNZvcWXTS1J32Zhj22bqAZD97nGx -Ij5JLGfjTsGcm9QXRK0SJQdH2IQm4HYfkWEhagJso4GBMH8wDAYDVR0TAQH/BAIw -ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC -B4AwHQYDVR0OBBYEFLsR2YPW65pN2I6/OblZ7eDIGxZ0MB8GA1UdIwQYMBaAFOIX -Zv6cAQ/9WyUdwNIWi/JPKOwRMA0GCSqGSIb3DQEBCwUAA4IBAQAalvvlkL8dypF6 -0F/mFHfC4yOLUcUrqj2IBGTnHN5RY2V51L0PZXk26NdfK10mORq7eGwjl6ZBurIZ -DeqSsHgPDrTINRsjy70sbFCfVARKbl/a7hox8k0WII6mYj95SPrVe4ayS5gOytPL -bIfamHkpOItXheyvRgJ6kansVGebIOgiJIN2lV6Ku0XTZT9v9bmXuKdOA2UJF7M0 -b665nds6iKDB/Vf/MRi7Vg8zdelTEXrFqj7TfOXYjqDjNh6lCsOEkDdnWzsEDeGy -fgzqQa8uW/EhgExT47sKw6Qb4FMwJhj25s6/zukAG+c6hZgKUiOiWuO6E6UdsBN5 -w/bnJlJg ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My EC Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: ECDSA -Server Temp Key: X25519, 253 bits ---- -SSL handshake has read 1086 bytes and written 290 bytes -Verification error: unspecified certificate verification error ---- -New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 -Protocol: TLSv1.2 -Server public key is 256 bit -Secure Renegotiation IS supported -Compression: NONE -Expansion: NONE -No ALPN negotiated -SSL-Session: - Protocol : TLSv1.2 - Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 - Session-ID: 1900CA299E816903F7671D773794CD178053C52FD47374C21BC453608610DF9B - Session-ID-ctx: - Master-Key: 394BDB73EA30CD44FFD484ABC8515D0A732C1E3677899521306DBF533B6775D5EABF36D1488F7129BAB4CBBD7A64A23A - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - 52 36 7d de f3 85 0a b5-1b 48 a0 13 4e cc ec cf R6}......H..N... - 0010 - 40 5a a4 0a 16 50 b5 a4-02 7f bc ee 52 b3 91 0b @Z...P......R... - 0020 - 29 8e c7 a7 96 be 19 8a-48 f3 ad 2c ac 21 06 4d ).......H..,.!.M - 0030 - b0 70 8f d9 ec 23 74 68-d9 16 86 37 59 0b 2a 4c .p...#th...7Y.*L - 0040 - 7c 46 10 6f c2 02 1d 2a-05 c3 ab 7b 84 c4 18 46 |F.o...*...{...F - 0050 - 71 54 5c b0 27 c1 74 da-43 e1 7e 3a 9a 69 76 b2 qT\.'.t.C.~:.iv. - 0060 - b1 d2 75 6b 10 e8 e9 7c-6b 3e 45 39 1b 7e dc 2a ..uk...|k>E9.~.* - 0070 - 86 f0 04 38 88 a1 35 c9-25 3a 76 84 9a 66 42 f8 ...8..5.%:v..fB. - 0080 - f7 c1 d0 d1 91 cd b9 3e-a3 24 ba 2d 53 2a 6d bf .......>.$.-S*m. - 0090 - 2d 66 ed 21 a5 e0 ea 48-de b8 12 01 92 88 3e 16 -f.!...H......>. - 00a0 - 16 a4 93 cd f5 5b a9 19-83 46 05 15 15 c4 74 7f .....[...F....t. - - Start Time: 1739587243 - Timeout : 7200 (sec) - Verify return code: 1 (unspecified certificate verification error) - Extended master secret: yes ---- - TLS SUCCESSFUL -20C0CCF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2 -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MF8CAQECAgMDBALALAQABDA5S9tz6jDNRP/UhKvIUV0KcyweNneJlSEwbb9TO2d1 -1eq/NtFIj3EpurTLvXpkojqhBgIEZ6/+q6IEAgIcIKQGBAQBAAAArQMCAQGzAwIB -HQ== ------END SSL SESSION PARAMETERS----- -Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 -Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 -Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 -CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384 -Secure Renegotiation IS supported - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run test with TLS 1.2 and ECDH -spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1 -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify error:num=1:unspecified certificate verification error -verify return:1 -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My EC Cert - i:CN=Issuer - a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAvMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB -BggqhkjOPQMBBwNCAATkHfGJRQPRrCgtPC/DvNZvcWXTS1J32Zhj22bqAZD97nGx -Ij5JLGfjTsGcm9QXRK0SJQdH2IQm4HYfkWEhagJso4GBMH8wDAYDVR0TAQH/BAIw -ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC -B4AwHQYDVR0OBBYEFLsR2YPW65pN2I6/OblZ7eDIGxZ0MB8GA1UdIwQYMBaAFOIX -Zv6cAQ/9WyUdwNIWi/JPKOwRMA0GCSqGSIb3DQEBCwUAA4IBAQAalvvlkL8dypF6 -0F/mFHfC4yOLUcUrqj2IBGTnHN5RY2V51L0PZXk26NdfK10mORq7eGwjl6ZBurIZ -DeqSsHgPDrTINRsjy70sbFCfVARKbl/a7hox8k0WII6mYj95SPrVe4ayS5gOytPL -bIfamHkpOItXheyvRgJ6kansVGebIOgiJIN2lV6Ku0XTZT9v9bmXuKdOA2UJF7M0 -b665nds6iKDB/Vf/MRi7Vg8zdelTEXrFqj7TfOXYjqDjNh6lCsOEkDdnWzsEDeGy -fgzqQa8uW/EhgExT47sKw6Qb4FMwJhj25s6/zukAG+c6hZgKUiOiWuO6E6UdsBN5 -w/bnJlJg ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My EC Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: ECDSA -Server Temp Key: ECDH, prime256v1, 256 bits ---- -SSL handshake has read 1118 bytes and written 263 bytes -Verification error: unspecified certificate verification error ---- -New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256 -Protocol: TLSv1.2 -Server public key is 256 bit -Secure Renegotiation IS supported -Compression: NONE -Expansion: NONE -No ALPN negotiated -SSL-Session: - Protocol : TLSv1.2 - Cipher : ECDHE-ECDSA-AES128-GCM-SHA256 - Session-ID: 683ADDB7BC42FCE28309C48E10AEA460BC6B9BEBFD6A5EFCF94A4D945CF53ED7 - Session-ID-ctx: - Master-Key: 65B0EBDC6E1CB3F435BCD25882E9AEDB9D96B6C0C6492533C63939FF3CC0231D1C134A83522BE81A16858F613A84F128 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - cf e7 fa a2 cf c4 3e e9-e4 1a 24 7e 8a e5 6b 20 ......>...$~..k - 0010 - 80 95 92 2d b4 79 47 3e-0f 3f 53 87 2a a6 27 5e ...-.yG>.?S.*.'^ - 0020 - 9f a1 23 9f 06 37 16 20-67 59 a5 29 f7 47 8a 6a ..#..7. gY.).G.j - 0030 - 06 42 6b 42 bd 64 23 54-84 7b 70 63 4b 75 3d ff .BkB.d#T.{pcKu=. - 0040 - af 1c fd 7e eb 3f 45 9d-2d 7e 12 46 46 b1 94 27 ...~.?E.-~.FF..' - 0050 - 75 c3 50 16 9a 6e 55 e4-85 97 6d 63 e2 55 e5 84 u.P..nU...mc.U.. - 0060 - 51 39 37 30 7c 75 67 72-48 06 6f 50 b8 09 c7 58 Q970|ugrH.oP...X - 0070 - 8c 44 b1 2e 36 a0 af d0-fc 30 46 e4 6f a2 86 60 .D..6....0F.o..` - 0080 - 11 60 fb c8 43 e6 32 05-4c 56 13 e4 04 21 85 5c .`..C.2.LV...!.\ - 0090 - 1a e3 17 e5 66 ba 06 b4-ea 33 29 e5 8e c8 d8 bb ....f....3)..... - 00a0 - d7 4d 1a 66 b1 17 9e 30-3b 3c ef 27 58 15 f1 c2 .M.f...0;<.'X... - - Start Time: 1739587244 - Timeout : 7200 (sec) - Verify return code: 1 (unspecified certificate verification error) - Extended master secret: yes ---- - TLS SUCCESSFUL -20008CF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MF8CAQECAgMDBALAKwQABDBlsOvcbhyz9DW80liC6a7bnZa2wMZJJTPGOTn/PMAj -HRwTSoNSK+gaFoWPYTqE8SihBgIEZ6/+q6IEAgIcIKQGBAQBAAAArQMCAQGzAwIB -Fw== ------END SSL SESSION PARAMETERS----- -Shared ciphers:ECDHE-ECDSA-AES128-GCM-SHA256 -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 -Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 -Supported groups: secp256r1 -Shared groups: secp256r1 -CIPHER is ECDHE-ECDSA-AES128-GCM-SHA256 -Secure Renegotiation IS supported - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - -## Run test with TLS 1.3 and specific suite -spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem -tls1_3 -ciphersuites TLS_AES_256_GCM_SHA384 -groups secp256r1 -Connecting to 127.0.0.1 -CONNECTED(00000005) -Can't use SSL_get_servername -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify error:num=1:unspecified certificate verification error -verify return:1 -depth=1 CN=Issuer -verify return:1 -depth=0 O=PKCS11 Provider, CN=My EC Cert -verify return:1 ---- -Certificate chain - 0 s:O=PKCS11 Provider, CN=My EC Cert - i:CN=Issuer - a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 - v:NotBefore: Feb 15 02:40:06 2025 GMT; NotAfter: Feb 15 02:40:06 2026 GMT ---- -Server certificate ------BEGIN CERTIFICATE----- -MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 -ZXIwHhcNMjUwMjE1MDI0MDA2WhcNMjYwMjE1MDI0MDA2WjAvMRgwFgYDVQQKEw9Q -S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB -BggqhkjOPQMBBwNCAATkHfGJRQPRrCgtPC/DvNZvcWXTS1J32Zhj22bqAZD97nGx -Ij5JLGfjTsGcm9QXRK0SJQdH2IQm4HYfkWEhagJso4GBMH8wDAYDVR0TAQH/BAIw -ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC -B4AwHQYDVR0OBBYEFLsR2YPW65pN2I6/OblZ7eDIGxZ0MB8GA1UdIwQYMBaAFOIX -Zv6cAQ/9WyUdwNIWi/JPKOwRMA0GCSqGSIb3DQEBCwUAA4IBAQAalvvlkL8dypF6 -0F/mFHfC4yOLUcUrqj2IBGTnHN5RY2V51L0PZXk26NdfK10mORq7eGwjl6ZBurIZ -DeqSsHgPDrTINRsjy70sbFCfVARKbl/a7hox8k0WII6mYj95SPrVe4ayS5gOytPL -bIfamHkpOItXheyvRgJ6kansVGebIOgiJIN2lV6Ku0XTZT9v9bmXuKdOA2UJF7M0 -b665nds6iKDB/Vf/MRi7Vg8zdelTEXrFqj7TfOXYjqDjNh6lCsOEkDdnWzsEDeGy -fgzqQa8uW/EhgExT47sKw6Qb4FMwJhj25s6/zukAG+c6hZgKUiOiWuO6E6UdsBN5 -w/bnJlJg ------END CERTIFICATE----- -subject=O=PKCS11 Provider, CN=My EC Cert -issuer=CN=Issuer ---- -No client certificate CA names sent -Peer signing digest: SHA256 -Peer signature type: ECDSA -Server Temp Key: ECDH, ?, 0 bits ---- -SSL handshake has read 1060 bytes and written 329 bytes -Verification error: unspecified certificate verification error ---- -New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 -Protocol: TLSv1.3 -Server public key is 256 bit -This TLS version forbids renegotiation. -Compression: NONE -Expansion: NONE -No ALPN negotiated -Early data was not sent -Verify return code: 1 (unspecified certificate verification error) ---- ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: A401E76D750E157B20632C433C3CF0CF76AB8584BCE059F5528B8D0903299346 - Session-ID-ctx: - Resumption PSK: A8FCADFCB0404767ADE3CF2FC66438E5D497942D31CA014D46CF71B1C250FE480732BADD81212775CEC13BB457E71954 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - a9 41 11 71 1a 3f 9e a6-fd d9 ad 76 a4 44 76 40 .A.q.?.....v.Dv@ - 0010 - c9 da 98 67 37 08 a9 76-2d d7 70 62 d9 b2 eb 69 ...g7..v-.pb...i - 0020 - 52 26 9a ba 08 e3 85 ce-1b 5a 33 6e d8 e2 f3 fa R&.......Z3n.... - 0030 - ac 2f 3b 6f 7d cf 8a f3-db d2 26 95 45 3f 96 30 ./;o}.....&.E?.0 - 0040 - 32 25 12 00 dc af 3f 2e-b5 28 32 64 9c b2 5e 21 2%....?..(2d..^! - 0050 - f7 5b 7a 23 71 31 37 c1-be c2 7d 1a c1 13 b0 78 .[z#q17...}....x - 0060 - f4 29 4e df c9 dd ab da-0f aa d2 80 cc 5c 8d 98 .)N..........\.. - 0070 - 6b 24 79 52 f9 85 a2 a9-8a f9 f0 2b fc 4c 37 c9 k$yR.......+.L7. - 0080 - c2 34 8f 7c b8 89 e8 b6-0a d9 c9 b2 4b ed ae d5 .4.|........K... - 0090 - 14 57 54 a8 7a 62 a3 a8-82 ac 95 aa 47 1b 9a b1 .WT.zb......G... - 00a0 - 70 78 0c 63 c2 33 54 23-e1 5f 09 f0 7e ee 3e ff px.c.3T#._..~.>. - 00b0 - 36 90 7d d8 2b 72 e9 b3-91 41 16 20 06 98 62 14 6.}.+r...A. ..b. - 00c0 - 93 49 9f 90 0e 7a 30 b6-c4 c2 78 66 a9 0d 63 1c .I...z0...xf..c. - - Start Time: 1739587244 - Timeout : 7200 (sec) - Verify return code: 1 (unspecified certificate verification error) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK ---- -Post-Handshake New Session Ticket arrived: -SSL-Session: - Protocol : TLSv1.3 - Cipher : TLS_AES_256_GCM_SHA384 - Session-ID: 61B6E686F324A2C2CEA3E5753403CDE179D744E67635FEF2C927F45B8409E7C1 - Session-ID-ctx: - Resumption PSK: 577B013A8835602FF368884C0A26DE892DD2222103F8940CC02E6EE6B0313594D9CC55B18963068E71C9B449E4F60612 - PSK identity: None - PSK identity hint: None - SRP username: None - TLS session ticket lifetime hint: 7200 (seconds) - TLS session ticket: - 0000 - a9 41 11 71 1a 3f 9e a6-fd d9 ad 76 a4 44 76 40 .A.q.?.....v.Dv@ - 0010 - 02 0e 13 fc 4b ac 30 76-95 56 10 09 ae 2e 3b 6c ....K.0v.V....;l - 0020 - 08 7a a2 32 33 3f fb a3-90 2f b6 81 6a 49 5c 8f .z.23?.../..jI\. - 0030 - 1e f8 64 fe 96 35 b3 f4-95 84 06 eb 8d 30 ee 12 ..d..5.......0.. - 0040 - 28 cd 23 ad 72 13 10 a4-5d a9 d2 2e 31 f4 af ae (.#.r...]...1... - 0050 - fd 23 b0 0b a6 6f cf 3a-c3 f5 ea 78 e1 15 b4 56 .#...o.:...x...V - 0060 - 54 95 ed 2f ef 22 12 14-a2 34 f0 ff 8d 00 0c 97 T../."...4...... - 0070 - e8 fb fe 65 d2 44 e3 26-f2 54 a3 25 3e 07 fc 25 ...e.D.&.T.%>..% - 0080 - 35 17 9e eb 71 57 4b 9a-c3 19 d6 e7 31 f3 67 43 5...qWK.....1.gC - 0090 - 30 d8 92 2f 5e 4f b8 75-49 49 36 0a c2 8c fc d7 0../^O.uII6..... - 00a0 - 00 42 cb 7a 1c 44 56 76-66 73 f6 2c de fb 5a 59 .B.z.DVvfs.,..ZY - 00b0 - 37 1b cc bd 9d 2b fe 84-45 11 1a a4 9e f5 b4 f8 7....+..E....... - 00c0 - cd c2 61 27 bc e2 08 d2-cf 7e 21 c7 72 0c 06 92 ..a'.....~!.r... - - Start Time: 1739587244 - Timeout : 7200 (sec) - Verify return code: 1 (unspecified certificate verification error) - Extended master secret: no - Max Early Data: 0 ---- -read R BLOCK - TLS SUCCESSFUL -20309BF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: -Server output: -spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGBAgEBAgIDBAQCEwIEIH9dtW5TWMc5mRanR7OiQVq0KBuz6PjaWgmLrVrJSEnG -BDBXewE6iDVgL/NoiEwKJt6JLdIiIQP4lAzALm7msDE1lNnMVbGJYwaOccm0SeT2 -BhKhBgIEZ6/+rKIEAgIcIKQGBAQBAAAArgUCAwr44bMDAgEX ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384 -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 -Supported groups: secp256r1 -Shared groups: secp256r1 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) - - ## -######################################## - -Server output: -spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -Using default temp DH parameters -ACCEPT ------BEGIN SSL SESSION PARAMETERS----- -MIGBAgEBAgIDBAQCEwIEIH9dtW5TWMc5mRanR7OiQVq0KBuz6PjaWgmLrVrJSEnG -BDBXewE6iDVgL/NoiEwKJt6JLdIiIQP4lAzALm7msDE1lNnMVbGJYwaOccm0SeT2 -BhKhBgIEZ6/+rKIEAgIcIKQGBAQBAAAArgUCAwr44bMDAgEX ------END SSL SESSION PARAMETERS----- -Shared ciphers:TLS_AES_256_GCM_SHA384 -Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 -Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 -Supported groups: secp256r1 -Shared groups: secp256r1 -CIPHER is TLS_AES_256_GCM_SHA384 -This TLS version forbids renegotiation. - TLS SUCCESSFUL -Q -DONE -shutdown accept socket -shutting down SSL -CONNECTION CLOSED - 0 items in the session cache - 0 client connects (SSL_connect()) - 0 client renegotiates (SSL_connect()) - 0 client connects that finished - 1 server accepts (SSL_accept()) - 0 server renegotiates (SSL_accept()) - 1 server accepts that finished - 0 session cache hits - 0 session cache misses - 0 session cache timeouts - 0 callback cache hits - 0 cache full overflows (128 allowed) ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -75/92 pkcs11-provider:softhsm / tls OK 4.58s +75/92 pkcs11-provider:softhsm / tls SKIP 0.14s exit status 77 76/92 pkcs11-provider:kryoptic / tls RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=223 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=151 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -76/92 pkcs11-provider:kryoptic / tls SKIP 0.02s exit status 77 +76/92 pkcs11-provider:kryoptic / tls SKIP 0.12s exit status 77 77/92 pkcs11-provider:kryoptic.nss / tls RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=242 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=246 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -77/92 pkcs11-provider:kryoptic.nss / tls SKIP 0.02s exit status 77 +77/92 pkcs11-provider:kryoptic.nss / tls SKIP 0.12s exit status 77 78/92 pkcs11-provider:softokn / tlsfuzzer RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=100 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=104 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -78/92 pkcs11-provider:softokn / tlsfuzzer SKIP 0.02s exit status 77 +78/92 pkcs11-provider:softokn / tlsfuzzer SKIP 0.14s exit status 77 79/92 pkcs11-provider:softhsm / tlsfuzzer RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=107 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttlsfuzzer -TLS fuzzer is not available -- skipping ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -79/92 pkcs11-provider:softhsm / tlsfuzzer SKIP 0.03s exit status 77 +79/92 pkcs11-provider:softhsm / tlsfuzzer SKIP 0.12s exit status 77 80/92 pkcs11-provider:kryoptic / tlsfuzzer RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=188 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=22 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -80/92 pkcs11-provider:kryoptic / tlsfuzzer SKIP 0.02s exit status 77 +80/92 pkcs11-provider:kryoptic / tlsfuzzer SKIP 0.11s exit status 77 81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer RUNNING ->>> MALLOC_PERTURB_=23 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=227 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer SKIP 0.02s exit status 77 +81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer SKIP 0.12s exit status 77 82/92 pkcs11-provider:softokn / uri RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=121 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=91 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -82/92 pkcs11-provider:softokn / uri SKIP 0.02s exit status 77 +82/92 pkcs11-provider:softokn / uri SKIP 0.12s exit status 77 83/92 pkcs11-provider:softhsm / uri RUNNING ->>> MALLOC_PERTURB_=101 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=160 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/turi - -## Check that storeutl returns URIs - openssl storeutl -text pkcs11: - -## Check returned URIs work to find objects -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%FD%94%1E%83%DE%9F%9D%09%88%13%E2%C6%19%91%98%4D;object=Pkey%20sigver%20Test;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%03;object=ecPeerCert;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%10;object=testRsaPssCert;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%1B%76%74%2B%76%C1%A3%3F%EA%CB%18%B1%AC%C2%8F%22;object=Test-RSA-gen-1b76742b;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%AD%CB%E5%37%EE%55%45%68%C0%EC%86%79%9D%85%4D%B7;object=Test-EC-gen-adcbe537;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%06;object=ecCert2;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%01;object=testCert;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%DB%33%F0%7A%56%B7%12%A9%B8%AA%E7%0C%F1%14%3F%1C;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%BC%C4%40%62%D0%3C%29%76%F2%1E%2F%17%BB%7A%F0%3C;object=Test-RSA-Key-Usage-bcc44062;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%B1%86%B9%48%BC%59%2B%6F%AA%6E%1E%04%B0%A2%F0%B4;object=Fork-Test;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%11;object=testRsaPss2Cert;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%E9%E9%C4%C8%CE%AA%93%DD%DE%D4%E6%4D%51%3C%07%23;object=Test-Ed-gen-e9e9c4c8;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%00;object=caCert;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%A3%09%42%E4%31%EC%E0%95%C1%9C%85%A2%91%E1%45%CF;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%0A%51%5C%CE%A7%65%C3%EA%FC%F3%C2%34%92%5A%6A%AC;object=Test-RSA-PSS-gen-0a515cce;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%02;object=ecCert;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%CF%55%C1%E9%E2%97%C1%BD%12%2A%BA%C3%0B%12%BC%6D;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%08;object=ecCert3;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%92%A9%7B%2E%D7%1F%31%18%E2%AE%EA%59%DC%FB%68%18;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%09;object=ed2Cert;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%04;object=edCert;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%53%35%A8%F9%B3%34%23%49%F1%16%57%C4%17%75%E0%C7;object=Test-Ed-gen-5335a8f9;type=private - openssl storeutl -text "$uri" -$uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=fd09d9c379182829;token=SoftHSM%20Token;id=%00%05;object=testCert2;type=private - openssl storeutl -text "$uri" - -## Check each URI component is tested -$cmp=pkcs11:model=SoftHSM%20v2 - openssl storeutl -text "pkcs11:${cmp}" -$cmp=manufacturer=SoftHSM%20project - openssl storeutl -text "pkcs11:${cmp}" -$cmp=serial=fd09d9c379182829 - openssl storeutl -text "pkcs11:${cmp}" -$cmp=token=SoftHSM%20Token - openssl storeutl -text "pkcs11:${cmp}" -$cmp=id=%FD%94%1E%83%DE%9F%9D%09%88%13%E2%C6%19%91%98%4D - openssl storeutl -text "pkcs11:${cmp}" -$cmp=object=Pkey%20sigver%20Test - openssl storeutl -text "pkcs11:${cmp}" -$cmp=type=private - openssl storeutl -text "pkcs11:${cmp}" ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -83/92 pkcs11-provider:softhsm / uri OK 3.30s +83/92 pkcs11-provider:softhsm / uri SKIP 0.11s exit status 77 84/92 pkcs11-provider:kryoptic / uri RUNNING ->>> MALLOC_PERTURB_=233 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.t +>>> MALLOC_PERTURB_=184 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -84/92 pkcs11-provider:kryoptic / uri SKIP 0.02s exit status 77 +84/92 pkcs11-provider:kryoptic / uri SKIP 0.11s exit status 77 85/92 pkcs11-provider:kryoptic.nss / uri RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=180 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=229 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -85/92 pkcs11-provider:kryoptic.nss / uri SKIP 0.02s exit status 77 +85/92 pkcs11-provider:kryoptic.nss / uri SKIP 0.12s exit status 77 86/92 pkcs11-provider:softhsm / ecxc RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=156 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-softhsm.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=13 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― -Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecxc ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -86/92 pkcs11-provider:softhsm / ecxc SKIP 0.02s exit status 77 +86/92 pkcs11-provider:softhsm / ecxc SKIP 0.13s exit status 77 87/92 pkcs11-provider:kryoptic / ecxc RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=167 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=161 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -87/92 pkcs11-provider:kryoptic / ecxc SKIP 0.02s exit status 77 +87/92 pkcs11-provider:kryoptic / ecxc SKIP 0.12s exit status 77 88/92 pkcs11-provider:kryoptic.nss / ecxc RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=186 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=171 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -88/92 pkcs11-provider:kryoptic.nss / ecxc SKIP 0.02s exit status 77 +88/92 pkcs11-provider:kryoptic.nss / ecxc SKIP 0.13s exit status 77 89/92 pkcs11-provider:softokn / cms RUNNING ->>> MALLOC_PERTURB_=91 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-softokn.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=252 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -89/92 pkcs11-provider:softokn / cms SKIP 0.02s exit status 77 +89/92 pkcs11-provider:softokn / cms SKIP 0.12s exit status 77 90/92 pkcs11-provider:kryoptic / cms RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests MALLOC_PERTURB_=128 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=236 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -90/92 pkcs11-provider:kryoptic / cms SKIP 0.02s exit status 77 +90/92 pkcs11-provider:kryoptic / cms SKIP 0.14s exit status 77 91/92 pkcs11-provider:kryoptic.nss / cms RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=119 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.nss.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=215 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -91/92 pkcs11-provider:kryoptic.nss / cms SKIP 0.02s exit status 77 +91/92 pkcs11-provider:kryoptic.nss / cms SKIP 0.12s exit status 77 92/92 pkcs11-provider:kryoptic / pinlock RUNNING ->>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=74 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pinlock-kryoptic.t +>>> MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=23 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pinlock-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― -92/92 pkcs11-provider:kryoptic / pinlock SKIP 0.02s exit status 77 +92/92 pkcs11-provider:kryoptic / pinlock SKIP 0.13s exit status 77 + +Summary of Failures: -Ok: 21 + 2/92 pkcs11-provider:softhsm / setup TIMEOUT 30.13s killed by signal 15 SIGTERM + +Ok: 3 Expected Fail: 0 Fail: 0 Unexpected Pass: 0 -Skipped: 71 -Timeout: 0 +Skipped: 88 +Timeout: 1 Full log written to /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/meson-logs/testlog.txt - create-stamp debian/debhelper-build-stamp - dh_testroot -O--buildsystem=meson - dh_prep -O--buildsystem=meson - dh_auto_install --destdir=debian/pkcs11-provider/ -O--buildsystem=meson - cd obj-arm-linux-gnueabihf && DESTDIR=/build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider LC_ALL=C.UTF-8 ninja install -[0/1] Installing files -Installing src/pkcs11.so to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/lib/arm-linux-gnueabihf/ossl-modules -Installing /build/reproducible-path/pkcs11-provider-1.0/docs/provider-pkcs11.7 to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/share/man/man7 - dh_installdocs -O--buildsystem=meson - dh_installchangelogs -O--buildsystem=meson - dh_installman -O--buildsystem=meson - dh_installsystemduser -O--buildsystem=meson - dh_perl -O--buildsystem=meson - dh_link -O--buildsystem=meson - dh_strip_nondeterminism -O--buildsystem=meson - dh_compress -O--buildsystem=meson - dh_fixperms -O--buildsystem=meson - dh_missing -O--buildsystem=meson - dh_dwz -a -O--buildsystem=meson - dh_strip -a -O--buildsystem=meson - dh_makeshlibs -a -O--buildsystem=meson - dh_shlibdeps -a -O--buildsystem=meson -dpkg-shlibdeps: warning: diversions involved - output may be incorrect - diversion by libc6 from: /lib/ld-linux-armhf.so.3 -dpkg-shlibdeps: warning: diversions involved - output may be incorrect - diversion by libc6 to: /lib/ld-linux-armhf.so.3.usr-is-merged - dh_installdeb -O--buildsystem=meson - dh_gencontrol -O--buildsystem=meson - dh_md5sums -O--buildsystem=meson - dh_builddeb -O--buildsystem=meson -dpkg-deb: building package 'pkcs11-provider' in '../pkcs11-provider_1.0-1_armhf.deb'. -dpkg-deb: building package 'pkcs11-provider-dbgsym' in '../pkcs11-provider-dbgsym_1.0-1_armhf.deb'. - dpkg-genbuildinfo --build=binary -O../pkcs11-provider_1.0-1_armhf.buildinfo - dpkg-genchanges --build=binary -O../pkcs11-provider_1.0-1_armhf.changes -dpkg-genchanges: info: binary-only upload (no source code included) - dpkg-source --after-build . -dpkg-buildpackage: info: binary-only upload (no source included) -dpkg-genchanges: info: including full source code in upload + cd obj-arm-linux-gnueabihf && tail -v -n \+0 meson-logs/testlog.txt +==> meson-logs/testlog.txt <== +Log of Meson test suite run on 2025-02-15T16:45:50.502395 + +Inherited environment: DEB_HOST_MULTIARCH=arm-linux-gnueabihf LC_ALL=C.UTF-8 DEB_HOST_GNU_SYSTEM=linux-gnueabihf DEB_BUILD_GNU_TYPE=arm-linux-gnueabihf DEB_LDFLAGS_MAINT_APPEND=-specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs DEB_TARGET_ARCH_LIBC=gnu SUDO_UID=103 DEB_BUILD_ARCH_ENDIAN=little DEB_BUILD_GNU_SYSTEM=linux-gnueabihf DEB_BUILD_ARCH_BITS=32 DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=4 ' DEB_HOST_ARCH=armhf DEB_TARGET_ARCH_ENDIAN=little PWD=/build/reproducible-path/pkcs11-provider-1.0 SOURCE_DATE_EPOCH=1739300950 MAIL=/var/mail/root OLDPWD=/ PBUILDER_PKGDATADIR=/usr/share/pbuilder DEB_HOST_ARCH_BITS=32 LANG=C MAKEFLAGS='' DEB_TARGET_ARCH=armhf DEB_HOST_GNU_CPU=arm DEB_BUILD_ARCH_LIBC=gnu DEB_VENDOR=Debian BUILDUSERNAME=pbuilder2 MFLAGS='' DEB_TARGET_ARCH_BITS=32 DEB_BUILD_ARCH_CPU=arm LD_PRELOAD='' DEB_HOST_ARCH_OS=linux SHLVL=3 DEB_HOST_ARCH_CPU=arm MAKELEVEL=1 PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path PBCURRENTCOMMANDLINEOPERATION=build DEB_BUILD_ARCH_ABI=eabihf LANGUAGE=it_CH:it PBUILDER_SYSCONFDIR=/etc DEB_SOURCE_PACKAGE_NAME=pkcs11-provider DEB_BUILD_ARCH=armhf DEB_HOST_ARCH_LIBC=gnu TZ=/usr/share/zoneinfo/Etc/GMT-14 INVOCATION_ID=16500e78a3fa4c4c945567814eeecbb0 SUDO_GID=110 SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.PEXVOq4Y/pbuilderrc_sKJr --distribution unstable --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.PEXVOq4Y/b2 --logfile b2/build.log pkcs11-provider_1.0-1.dsc' DEB_TARGET_ARCH_CPU=arm DEB_HOST_GNU_TYPE=arm-linux-gnueabihf DEB_BUILD_ARCH_OS=linux LOGNAME=pbuilder2 BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' DEB_TARGET_MULTIARCH=arm-linux-gnueabihf DEB_BUILD_GNU_CPU=arm DEB_TARGET_ARCH_OS=linux USER=pbuilder2 DEB_HOST_ARCH_ABI=eabihf DEB_BUILD_MULTIARCH=arm-linux-gnueabihf DEBUGINFOD_URLS=https://debuginfod.debian.net DEB_TARGET_GNU_TYPE=arm-linux-gnueabihf DEB_TARGET_ARCH_ABI=eabihf _=/usr/bin/env SUDO_USER=jenkins PBUILDER_PKGLIBDIR=/usr/lib/pbuilder DEB_TARGET_GNU_CPU=arm DEBIAN_FRONTEND=noninteractive HOME=/build/reproducible-path/pkcs11-provider-1.0/debian/.debhelper/generated/_source/home DEB_RULES_REQUIRES_ROOT=no DEB_TARGET_GNU_SYSTEM=linux-gnueabihf DEB_HOST_ARCH_ENDIAN=little TERM=unknown DEB_SOURCE_PACKAGE_VERSION=1.0-1 DEB_BUILD_MAINT_OPTIONS=hardening=+all PBUILDER_OPERATION=build SHELL=/bin/bash DH_INTERNAL_BUILDFLAGS=1 ASFLAGS='' ASFLAGS_FOR_BUILD='' CFLAGS='-g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' CFLAGS_FOR_BUILD='-g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' CPPFLAGS='-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2' CPPFLAGS_FOR_BUILD='-D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -D_TIME_BITS=64 -Wdate-time -D_FORTIFY_SOURCE=2' CXXFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' CXXFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' DFLAGS=-frelease DFLAGS_FOR_BUILD=-frelease FCFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection' FCFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection' FFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection' FFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection' LDFLAGS='-Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs' LDFLAGS_FOR_BUILD='-Wl,-z,relro -Wl,-z,now' OBJCFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' OBJCFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' OBJCXXFLAGS='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' OBJCXXFLAGS_FOR_BUILD='-g -O2 -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security' XDG_RUNTIME_DIR=/tmp/dh-xdg-rundir-76fpjFaz DEB_PYTHON_INSTALL_LAYOUT=deb MESON_TESTTHREADS=4 + +==================================== 1/92 ==================================== +test: pkcs11-provider:softokn / setup +start time: 02:45:50 +duration: 0.43s +result: exit status 0 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=237 SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softokn +----------------------------------- stdout ----------------------------------- +######################################## +## Setup NSS Softokn + +NSS's certutil command is required +----------------------------------- stderr ----------------------------------- ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh +++ : /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests +++ helper_emit=1 +++ sed --version +++ grep -q 'GNU sed' +++ sed_inplace=('-i') +++ export sed_inplace ++ '[' 1 -ne 1 ']' ++ TOKENTYPE=softokn ++ SUPPORT_ED25519=1 ++ SUPPORT_ED448=1 ++ SUPPORT_RSA_PKCS1_ENCRYPTION=1 ++ SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 ++ SUPPORT_TLSFUZZER=1 ++ SUPPORT_ALLOWED_MECHANISMS=0 +++ opensc-tool -i +++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' +++ grep OpenSC +Failed to establish context: Unable to load external module ++ OPENSC_VERSION=26 ++ [[ 26 -le 25 ]] ++ [[ '' = \1 ]] +++ cat /proc/sys/crypto/fips_enabled +cat: /proc/sys/crypto/fips_enabled: No such file or directory ++ [[ '' = \1 ]] ++ TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softokn ++ TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softokn/tokens ++ '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softokn ']' ++ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softokn ++ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softokn/tokens ++ PINVALUE=12345678 ++ PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softokn/pinfile.txt ++ echo 12345678 ++ export GNUTLS_PIN=12345678 ++ GNUTLS_PIN=12345678 ++ '[' softokn == softhsm ']' ++ '[' softokn == softokn ']' ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/softokn-init.sh +++ title SECTION 'Setup NSS Softokn' +++ case "$1" in +++ shift 1 +++ echo '########################################' +++ echo '## Setup NSS Softokn' +++ echo '' +++ command -v certutil +++ echo 'NSS'\''s certutil command is required' +++ exit 0 +============================================================================== + +==================================== 2/92 ==================================== +test: pkcs11-provider:softhsm / setup +start time: 02:45:50 +duration: 30.13s +result: killed by signal 15 SIGTERM +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=147 SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softhsm +----------------------------------- stdout ----------------------------------- +######################################## +## Searching for SoftHSM PKCS#11 library + +Using softhsm path /usr/lib/softhsm/libsofthsm2.so +######################################## +## Set up testing system + +Slot 0 has a free/uninitialized token. +The token has been initialized and is reassigned to slot 1580369002 +Creating new Self Sign CA +Key pair generated: +Private Key Object; RSA + label: caCert + ID: 0000 + Usage: decrypt, sign, signRecover, unwrap + Access: sensitive, always sensitive, never extractable, local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0000;object=caCert;type=private +Public Key Object; RSA 2048 bits + label: caCert + ID: 0000 + Usage: encrypt, verify, verifyRecover, wrap + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0000;object=caCert;type=public +Generating a self signed certificate... +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 02 + Validity: + Not Before: Sat Feb 15 02:45:54 UTC 2025 + Not After: Sun Feb 15 02:45:54 UTC 2026 + Subject: CN=Issuer + Subject Public Key Algorithm: RSA + Algorithm Security Level: Medium (2048 bits) + Modulus (bits 2048): + 00:be:e0:e1:7f:5b:b3:74:8d:db:73:e4:88:62:42:1f + 4a:74:4f:ac:d9:71:19:33:31:60:46:03:50:8c:40:55 + be:96:4a:fd:d2:33:d4:de:c3:7d:b6:97:68:39:bc:b8 + 76:52:09:91:c4:09:d7:57:4d:01:21:11:bb:b9:3d:f2 + bf:68:9e:b0:1b:44:f6:30:eb:20:23:f9:26:e2:02:09 + be:30:bd:b7:f7:61:59:f0:0a:be:c7:fa:74:ca:44:74 + 88:96:47:e6:c9:e4:bb:ab:32:7c:7c:05:5b:36:50:00 + bc:79:96:47:d1:72:a3:c2:49:e6:c1:89:7e:47:d9:24 + 00:a3:eb:19:fd:45:f6:b5:81:e1:8d:3e:89:a2:dc:1c + 86:ed:4d:4b:dd:5b:6a:08:62:57:1c:8f:cf:2c:3f:2f + 50:2f:d6:a7:8a:ac:b4:e5:aa:f3:1d:c7:6f:8f:22:fa + e0:80:5a:c9:3b:7d:be:3f:45:09:25:d9:ee:6b:3c:32 + fb:b4:be:63:4b:34:ae:6f:db:35:bd:70:cc:db:cf:8b + c4:7f:b1:67:4c:fe:92:0b:79:56:e6:76:86:b3:66:63 + d8:4d:57:4d:ab:1f:87:36:65:79:d0:bc:4b:d3:be:f1 + 13:16:9e:9d:89:09:82:a9:61:40:e9:0a:86:3d:cb:51 + 47 + Exponent (bits 24): + 01:00:01 + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): TRUE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Certificate signing. + Subject Key Identifier (not critical): + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f +Other Information: + Public Key ID: + sha1:fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f + sha256:9719131a7294c1a2c66b2ccf999e3871681306fd0f99566d1bed71094391fdcb + Public Key PIN: + pin-sha256:lxkTGnKUwaLGayzPmZ44cWgTBv0PmVZtG+1xCUOR/cs= + + + +Signing certificate... +Created certificate: +Certificate Object; type = X.509 cert + label: caCert + subject: DN: CN=Issuer + serial: 02 + ID: 0000 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert +RSA PKCS11 URIS +pkcs11:id=%00%00?pin-value=12345678 +pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%00 +pkcs11:type=public;id=%00%00 +pkcs11:type=private;id=%00%00 +pkcs11:type=cert;object=caCert + +Key pair generated: +Private Key Object; RSA + label: testCert + ID: 0001 + Usage: decrypt, sign, signRecover, unwrap + Access: sensitive, always sensitive, never extractable, local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0001;object=testCert;type=private +Public Key Object; RSA 2048 bits + label: testCert + ID: 0001 + Usage: encrypt, verify, verifyRecover, wrap + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0001;object=testCert;type=public +Created certificate: +Certificate Object; type = X.509 cert + label: testCert + subject: DN: O=PKCS11 Provider, CN=My Test Cert + serial: 03 + ID: 0001 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert +RSA PKCS11 URIS +pkcs11:id=%00%01?pin-value=12345678 +pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%01 +pkcs11:type=public;id=%00%01 +pkcs11:type=private;id=%00%01 +pkcs11:type=cert;object=testCert + +Key pair generated: +Private Key Object; EC + label: ecCert + ID: 0002 + Usage: decrypt, sign, signRecover, unwrap, derive + Access: sensitive, always sensitive, never extractable, local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private +Public Key Object; EC EC_POINT 256 bits + EC_POINT: 044104a50c3a0692d7ffe3798fa779bb6ad6dd7021611f89872b1ff0fc27d11c646884d241e18b724bff78c12fe1075b212fd16550c0dd919cced4d07f2b9848176fc1 + EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) + label: ecCert + ID: 0002 + Usage: encrypt, verify, verifyRecover, wrap, derive + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public +Created certificate: +Certificate Object; type = X.509 cert + label: ecCert + subject: DN: O=PKCS11 Provider, CN=My EC Cert + serial: 04 + ID: 0002 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert +Key pair generated: +Private Key Object; EC + label: ecPeerCert + ID: 0003 + Usage: decrypt, sign, signRecover, unwrap, derive + Access: sensitive, always sensitive, never extractable, local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private +Public Key Object; EC EC_POINT 256 bits + EC_POINT: 04410461b0a609964f075887270fbdc7d9645fb485cbceb5359948afed3292f56a1267afcb6b5879ed74dea8e7aa31f958e430abe5121978f240799250477e17a1d4fa + EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) + label: ecPeerCert + ID: 0003 + Usage: encrypt, verify, verifyRecover, wrap, derive + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public +Generating a self signed certificate... +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 05 + Validity: + Not Before: Sat Feb 15 02:45:57 UTC 2025 + Not After: Sun Feb 15 02:45:57 UTC 2026 + Subject: CN=My Peer EC Cert + Subject Public Key Algorithm: EC/ECDSA + Algorithm Security Level: High (256 bits) + Curve: SECP256R1 + X: + 61:b0:a6:09:96:4f:07:58:87:27:0f:bd:c7:d9:64:5f + b4:85:cb:ce:b5:35:99:48:af:ed:32:92:f5:6a:12:67 + Y: + 00:af:cb:6b:58:79:ed:74:de:a8:e7:aa:31:f9:58:e4 + 30:ab:e5:12:19:78:f2:40:79:92:50:47:7e:17:a1:d4 + fa + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): TRUE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Certificate signing. + Subject Key Identifier (not critical): + fad05d587eb955b74c11db08cd12fdb29005c75e +Other Information: + Public Key ID: + sha1:fad05d587eb955b74c11db08cd12fdb29005c75e + sha256:147c65cd261025abe1239d327742dab111ef2a8ec7430dfd8d88ffabf3144bc9 + Public Key PIN: + pin-sha256:FHxlzSYQJavhI50yd0LasRHvKo7HQw39jYj/q/MUS8k= + + + +Signing certificate... +Created certificate: +Certificate Object; type = X.509 cert + label: ecPeerCert + subject: DN: CN=My Peer EC Cert + serial: 05 + ID: 0003 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert +EC PKCS11 URIS +pkcs11:id=%00%02?pin-value=12345678 +pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%02 +pkcs11:type=public;id=%00%02 +pkcs11:type=private;id=%00%02 +pkcs11:type=cert;object=ecCert +pkcs11:id=%00%03?pin-value=12345678 +pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%03 +pkcs11:type=public;id=%00%03 +pkcs11:type=private;id=%00%03 +pkcs11:type=cert;object=ecPeerCert + +Key pair generated: +Private Key Object; EC_EDWARDS + label: edCert + ID: 0004 + Usage: decrypt, sign, signRecover, unwrap, derive + Access: sensitive, always sensitive, never extractable, local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0004;object=edCert;type=private +Public Key Object; EC_EDWARDS EC_POINT 272 bits + EC_POINT: 0420da30256d983d76bb387e56b4fb8a071f1c7bb153615cd9bbc501a5868014c477 + EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) + label: edCert + ID: 0004 + Usage: encrypt, verify, verifyRecover, wrap, derive + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0004;object=edCert;type=public +Created certificate: +Certificate Object; type = X.509 cert + label: edCert + subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert + serial: 06 + ID: 0004 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert +ED25519 PKCS11 URIS +pkcs11:id=%00%04;pin-value=12345678 +pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%04 +pkcs11:type=public;id=%00%04 +pkcs11:type=private;id=%00%04 +pkcs11:type=cert;object=edCert +Key pair generated: +Private Key Object; EC_EDWARDS + label: ed2Cert + ID: 0009 + Usage: decrypt, sign, signRecover, unwrap, derive + Access: sensitive, always sensitive, never extractable, local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private +Public Key Object; EC_EDWARDS EC_POINT 472 bits + EC_POINT: 0439788cd4a6c27f5968ed144862ec025e40d47c229b9141e04cc725192afc5b436aefab145a9c608dd44bf245d8647cd93a7dff55a4710b627480 + EC_PARAMS: 06032b6571 (OID 1.3.101.113) + label: ed2Cert + ID: 0009 + Usage: encrypt, verify, verifyRecover, wrap, derive + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public +Created certificate: +Certificate Object; type = X.509 cert + label: ed2Cert + subject: DN: O=PKCS11 Provider, CN=My ED448 Cert + serial: 07 + ID: 0009 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert +ED448 PKCS11 URIS +pkcs11:id=%00%09;pin-value=12345678 +pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%09 +pkcs11:type=public;id=%00%09 +pkcs11:type=private;id=%00%09 +pkcs11:type=cert;object=ed2Cert + +## generate RSA key pair, self-signed certificate, remove public key +Key pair generated: +Private Key Object; RSA + label: testCert2 + ID: 0005 + Usage: decrypt, sign, signRecover, unwrap + Access: sensitive, always sensitive, never extractable, local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private +Public Key Object; RSA 2048 bits + label: testCert2 + ID: 0005 + Usage: encrypt, verify, verifyRecover, wrap + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0005;object=testCert2;type=public +Created certificate: +Certificate Object; type = X.509 cert + label: testCert2 + subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 + serial: 08 + ID: 0005 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert +RSA2 PKCS11 URIS +pkcs11:id=%00%05?pin-value=12345678 +pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%05 +pkcs11:type=private;id=%00%05 +pkcs11:type=cert;object=testCert2 + + +## generate EC key pair, self-signed certificate, remove public key +Key pair generated: +Private Key Object; EC + label: ecCert2 + ID: 0006 + Usage: decrypt, sign, signRecover, unwrap, derive + Access: sensitive, always sensitive, never extractable, local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private +Public Key Object; EC EC_POINT 384 bits + EC_POINT: 04610431a8423c545fa9dc357e9acc224766f38884a0c063573c44806025f0f9751f38b8039fb56c2e051d175ebfd16ccc2edf4448ce2eb24494214ea8c5c973e0932a193542722b32e0e51d018badc42ff42381b751f16c18d77727000fd2cb72004e + EC_PARAMS: 06052b81040022 (OID 1.3.132.0.34) + label: ecCert2 + ID: 0006 + Usage: encrypt, verify, verifyRecover, wrap, derive + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=public +Created certificate: +Certificate Object; type = X.509 cert + label: ecCert2 + subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 + serial: 09 + ID: 0006 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert +EC2 PKCS11 URIS +pkcs11:id=%00%06?pin-value=12345678 +pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%06 +pkcs11:type=private;id=%00%06 +pkcs11:type=cert;object=ecCert2 + + +## explicit EC unsupported + +## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate +Key pair generated: +Private Key Object; EC + label: ecCert3 + ID: 0008 + Usage: decrypt, sign, signRecover, unwrap, derive + Access: always authenticate, sensitive, always sensitive, never extractable, local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private +Public Key Object; EC EC_POINT 528 bits + EC_POINT: 0481850400a1ef345dba5343f7e1aceca401949946ea1c9ff0f5720b73fa941efd3bbbb18951c97068460c34a2c5574e98fa04ce810adfbcd4e613bc3952e29fbb2c5833fbd50136c8080d38a739e7f5459e23b73fb56ec175a4d28542b8f61666cd867aba98b451e3b99d0f6f4a6db4013ce908ecb20da76c83d84ff4a1348034f385c95f076242 + EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) + label: ecCert3 + ID: 0008 + Usage: encrypt, verify, verifyRecover, wrap, derive + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public +Created certificate: +Certificate Object; type = X.509 cert + label: ecCert3 + subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 + serial: 0A + ID: 0008 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert +EC3 PKCS11 URIS +pkcs11:id=%00%08?pin-value=12345678 +pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%08 +pkcs11:type=public;id=%00%08 +pkcs11:type=private;id=%00%08 +pkcs11:type=cert;object=ecCert3 + +Key pair generated: +Private Key Object; RSA + label: testRsaPssCert + ID: 0010 + Usage: decrypt, sign, signRecover, unwrap + Access: sensitive, always sensitive, never extractable, local + Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private +Public Key Object; RSA 2048 bits + label: testRsaPssCert + ID: 0010 + Usage: encrypt, verify, verifyRecover, wrap + Access: local + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public +Created certificate: +Certificate Object; type = X.509 cert + label: testRsaPssCert + subject: DN: O=PKCS11 Provider, CN=My RsaPss Cert + serial: 0B + ID: 0010 + uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=e8d403425e32846a;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert +RSA-PSS PKCS11 URIS +pkcs11:id=%00%10?pin-value=12345678 +pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt +pkcs11:id=%00%10 +pkcs11:type=public;id=%00%10 +pkcs11:type=private;id=%00%10 +pkcs11:type=cert;object=testRsaPssCert + +----------------------------------- stderr ----------------------------------- ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh +++ : /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests +++ helper_emit=1 +++ sed --version +++ grep -q 'GNU sed' +++ sed_inplace=('-i') +++ export sed_inplace ++ '[' 1 -ne 1 ']' ++ TOKENTYPE=softhsm ++ SUPPORT_ED25519=1 ++ SUPPORT_ED448=1 ++ SUPPORT_RSA_PKCS1_ENCRYPTION=1 ++ SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 ++ SUPPORT_TLSFUZZER=1 ++ SUPPORT_ALLOWED_MECHANISMS=0 +++ opensc-tool -i +++ grep OpenSC +++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' +Failed to establish context: Unable to load external module ++ OPENSC_VERSION=26 ++ [[ 26 -le 25 ]] ++ [[ '' = \1 ]] +++ cat /proc/sys/crypto/fips_enabled +cat: /proc/sys/crypto/fips_enabled: No such file or directory ++ [[ '' = \1 ]] ++ TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm ++ TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/tokens ++ '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm ']' ++ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm ++ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/tokens ++ PINVALUE=12345678 ++ PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt ++ echo 12345678 ++ export GNUTLS_PIN=12345678 ++ GNUTLS_PIN=12345678 ++ '[' softhsm == softhsm ']' ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/softhsm-init.sh +++ title SECTION 'Searching for SoftHSM PKCS#11 library' +++ case "$1" in +++ shift 1 +++ echo '########################################' +++ echo '## Searching for SoftHSM PKCS#11 library' +++ echo '' +++ command -v softhsm2-util ++++++ type -p softhsm2-util +++++ dirname /usr/bin/softhsm2-util ++++ dirname /usr/bin +++ softhsm_prefix=/usr +++ find_softhsm /usr/lib64/softhsm/libsofthsm2.so /usr/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/local/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so +++ for _lib in "$@" +++ test -f /usr/lib64/softhsm/libsofthsm2.so +++ for _lib in "$@" +++ test -f /usr/lib/softhsm/libsofthsm2.so +++ echo 'Using softhsm path /usr/lib/softhsm/libsofthsm2.so' +++ P11LIB=/usr/lib/softhsm/libsofthsm2.so +++ return +++ export P11LIB +++ title SECTION 'Set up testing system' +++ case "$1" in +++ shift 1 +++ echo '########################################' +++ echo '## Set up testing system' +++ echo '' +++ cat +++ export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/softhsm.conf +++ SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/softhsm.conf +++ export 'TOKENLABEL=SoftHSM Token' +++ TOKENLABEL='SoftHSM Token' +++ export TOKENLABELURI=SoftHSM%20Token +++ TOKENLABELURI=SoftHSM%20Token +++ softhsm2-util --init-token --label 'SoftHSM Token' --free --pin 12345678 --so-pin 12345678 +++ export 'TOKENOPTIONS=\npkcs11-module-quirks = no-deinit no-operation-state' +++ TOKENOPTIONS='\npkcs11-module-quirks = no-deinit no-operation-state' +++ export 'TOKENCONFIGVARS=export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/softhsm.conf' +++ TOKENCONFIGVARS='export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/softhsm.conf' +++ export TESTPORT=32000 +++ TESTPORT=32000 +++ export SUPPORT_ALLOWED_MECHANISMS=1 +++ SUPPORT_ALLOWED_MECHANISMS=1 ++ SEEDFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/noisefile.bin ++ dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/noisefile.bin bs=2048 count=1 ++ RAND64FILE=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/64krandom.bin ++ dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/64krandom.bin bs=2048 count=32 +++ uname ++ '[' Linux == Darwin ']' +++ type -p certtool ++ certtool=/usr/bin/certtool ++ '[' -z /usr/bin/certtool ']' ++ P11DEFARGS=("--module=${P11LIB}" "--login" "--pin=${PINVALUE}" "--token-label=${TOKENLABEL}") ++ cat ++ SERIAL=1 ++ title LINE 'Creating new Self Sign CA' ++ case "$1" in ++ shift 1 ++ echo 'Creating new Self Sign CA' ++ KEYID=0000 ++ URIKEYID=%00%00 ++ CACRTN=caCert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=caCert --id=0000 ++ crt_selfsign caCert Issuer 0000 ++ LABEL=caCert ++ CN=Issuer ++ KEYID=0000 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = Issuer|g' -e 's|serial = .*|serial = 2|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cacert.cfg ++ /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=public' --outder ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --type=cert --id=0000 --label=caCert ++ CACRT_PEM=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem ++ CACRT=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt ++ openssl x509 -inform DER -in /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt -outform PEM -out /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.pem ++ CABASEURIWITHPINVALUE='pkcs11:id=%00%00?pin-value=12345678' ++ CABASEURIWITHPINSOURCE='pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ CABASEURI=pkcs11:id=%00%00 ++ CAPUBURI='pkcs11:type=public;id=%00%00' ++ CAPRIURI='pkcs11:type=private;id=%00%00' ++ CACRTURI='pkcs11:type=cert;object=caCert' ++ title LINE 'RSA PKCS11 URIS' ++ case "$1" in ++ shift 1 ++ echo 'RSA PKCS11 URIS' ++ echo 'pkcs11:id=%00%00?pin-value=12345678' ++ echo 'pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%00 ++ echo 'pkcs11:type=public;id=%00%00' ++ echo 'pkcs11:type=private;id=%00%00' ++ echo 'pkcs11:type=cert;object=caCert' ++ echo '' ++ cat /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cacert.cfg ++ echo 'organization = "PKCS11 Provider"' ++ sed -e '/^cert_signing_key$/d' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg ++ KEYID=0001 ++ URIKEYID=%00%01 ++ TSTCRTN=testCert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert --id=0001 ++ ca_sign testCert 'My Test Cert' 0001 ++ LABEL=testCert ++ CN='My Test Cert' ++ KEYID=0001 ++ shift 3 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = My Test Cert|g' -e 's|serial = .*|serial = 3|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg ++ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' +Generating a signed certificate... + +Expiration time: Sun Feb 15 16:45:55 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 +Warning: The time set exceeds the CA's expiration time +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 03 + Validity: + Not Before: Sat Feb 15 02:45:55 UTC 2025 + Not After: Sun Feb 15 02:45:55 UTC 2026 + Subject: CN=My Test Cert,O=PKCS11 Provider + Subject Public Key Algorithm: RSA + Algorithm Security Level: Medium (2048 bits) + Modulus (bits 2048): + 00:ae:ba:78:48:32:5e:88:3a:04:59:20:e5:69:12:a1 + 47:de:4a:89:84:6f:0e:fc:9f:42:55:8b:22:b6:9b:d1 + 12:6c:3c:a7:7b:13:c2:1a:94:93:49:aa:73:33:8e:dc + b2:cb:e8:fe:f4:06:3a:a7:9d:83:13:4b:fd:c8:8f:36 + d2:06:b1:de:2f:13:0f:c6:ec:05:41:37:a1:e2:c9:ec + 69:16:75:c5:3a:1d:8a:2f:fc:37:1e:1e:3a:e8:85:9f + a6:75:bb:68:ab:32:c3:44:8c:70:cd:27:90:4d:99:97 + e8:4d:e3:09:48:f2:6c:ad:36:0d:a4:b0:1a:05:d6:03 + 5d:b9:5d:62:0b:f8:49:ee:41:10:60:63:6f:93:5d:82 + 8a:7f:a0:c1:fd:e5:74:a5:01:35:b3:9b:3c:ec:6c:65 + 56:7e:dd:c4:1a:eb:c1:3b:24:22:4f:c5:16:cd:b3:31 + 7a:81:1a:33:62:28:60:0b:53:b6:e1:2c:6f:bf:a7:9f + f3:55:c7:d3:1d:eb:c3:d6:0c:33:03:93:b3:10:63:55 + f4:cb:d6:38:da:c5:75:6e:03:e5:89:9e:0c:78:2a:02 + 78:46:c6:7d:36:9d:8b:c5:b8:4c:a7:52:46:65:40:3a + af:f3:6a:d3:9b:b9:72:72:4b:09:ae:f2:cf:52:0a:60 + 3d + Exponent (bits 24): + 01:00:01 + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): FALSE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Key encipherment. + Subject Key Identifier (not critical): + 907e49f6d951a06d669cc31f59c5c4a908f23318 + Authority Key Identifier (not critical): + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f +Other Information: + Public Key ID: + sha1:907e49f6d951a06d669cc31f59c5c4a908f23318 + sha256:850f29d386c6b525b61fe762f5300702cddf4040a2a0174074d9596126ce7c96 + Public Key PIN: + pin-sha256:hQ8p04bGtSW2H+di9TAHAs3fQECioBdAdNlZYSbOfJY= + + + +Signing certificate... ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testCert.crt --type=cert --id=0001 --label=testCert ++ BASEURIWITHPINVALUE='pkcs11:id=%00%01?pin-value=12345678' ++ BASEURIWITHPINSOURCE='pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ BASEURI=pkcs11:id=%00%01 ++ PUBURI='pkcs11:type=public;id=%00%01' ++ PRIURI='pkcs11:type=private;id=%00%01' ++ CRTURI='pkcs11:type=cert;object=testCert' ++ title LINE 'RSA PKCS11 URIS' ++ case "$1" in ++ shift 1 ++ echo 'RSA PKCS11 URIS' ++ echo 'pkcs11:id=%00%01?pin-value=12345678' ++ echo 'pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%01 ++ echo 'pkcs11:type=public;id=%00%01' ++ echo 'pkcs11:type=private;id=%00%01' ++ echo 'pkcs11:type=cert;object=testCert' ++ echo '' ++ KEYID=0002 ++ URIKEYID=%00%02 ++ ECCRTN=ecCert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecCert --id=0002 ++ ca_sign ecCert 'My EC Cert' 0002 ++ LABEL=ecCert ++ CN='My EC Cert' ++ KEYID=0002 ++ shift 3 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = My EC Cert|g' -e 's|serial = .*|serial = 4|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg ++ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' +Generating a signed certificate... + +Expiration time: Sun Feb 15 16:45:56 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 +Warning: The time set exceeds the CA's expiration time +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 04 + Validity: + Not Before: Sat Feb 15 02:45:56 UTC 2025 + Not After: Sun Feb 15 02:45:56 UTC 2026 + Subject: CN=My EC Cert,O=PKCS11 Provider + Subject Public Key Algorithm: EC/ECDSA + Algorithm Security Level: High (256 bits) + Curve: SECP256R1 + X: + 00:a5:0c:3a:06:92:d7:ff:e3:79:8f:a7:79:bb:6a:d6 + dd:70:21:61:1f:89:87:2b:1f:f0:fc:27:d1:1c:64:68 + 84 + Y: + 00:d2:41:e1:8b:72:4b:ff:78:c1:2f:e1:07:5b:21:2f + d1:65:50:c0:dd:91:9c:ce:d4:d0:7f:2b:98:48:17:6f + c1 + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): FALSE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Subject Key Identifier (not critical): + 153455a413ec2a20bdf3ad0dc9225fcf78c6b572 + Authority Key Identifier (not critical): + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f +Other Information: + Public Key ID: + sha1:153455a413ec2a20bdf3ad0dc9225fcf78c6b572 + sha256:bbbb2472f314dbeb2f18065971da6905569041a3f0efe93034ce7265916a21db + Public Key PIN: + pin-sha256:u7skcvMU2+svGAZZcdppBVaQQaPw7+kwNM5yZZFqIds= + + + +Signing certificate... ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecCert.crt --type=cert --id=0002 --label=ecCert ++ ECBASEURIWITHPINVALUE='pkcs11:id=%00%02?pin-value=12345678' ++ ECBASEURIWITHPINSOURCE='pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ ECBASEURI=pkcs11:id=%00%02 ++ ECPUBURI='pkcs11:type=public;id=%00%02' ++ ECPRIURI='pkcs11:type=private;id=%00%02' ++ ECCRTURI='pkcs11:type=cert;object=ecCert' ++ KEYID=0003 ++ URIKEYID=%00%03 ++ ECPEERCRTN=ecPeerCert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecPeerCert --id=0003 ++ crt_selfsign ecPeerCert 'My Peer EC Cert' 0003 ++ LABEL=ecPeerCert ++ CN='My Peer EC Cert' ++ KEYID=0003 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = My Peer EC Cert|g' -e 's|serial = .*|serial = 5|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cacert.cfg ++ /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecPeerCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=public' --outder ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecPeerCert.crt --type=cert --id=0003 --label=ecPeerCert ++ ECPEERBASEURIWITHPINVALUE='pkcs11:id=%00%03?pin-value=12345678' ++ ECPEERBASEURIWITHPINSOURCE='pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ ECPEERBASEURI=pkcs11:id=%00%03 ++ ECPEERPUBURI='pkcs11:type=public;id=%00%03' ++ ECPEERPRIURI='pkcs11:type=private;id=%00%03' ++ ECPEERCRTURI='pkcs11:type=cert;object=ecPeerCert' ++ title LINE 'EC PKCS11 URIS' ++ case "$1" in ++ shift 1 ++ echo 'EC PKCS11 URIS' ++ echo 'pkcs11:id=%00%02?pin-value=12345678' ++ echo 'pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%02 ++ echo 'pkcs11:type=public;id=%00%02' ++ echo 'pkcs11:type=private;id=%00%02' ++ echo 'pkcs11:type=cert;object=ecCert' ++ echo 'pkcs11:id=%00%03?pin-value=12345678' ++ echo 'pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%03 ++ echo 'pkcs11:type=public;id=%00%03' ++ echo 'pkcs11:type=private;id=%00%03' ++ echo 'pkcs11:type=cert;object=ecPeerCert' ++ echo '' ++ '[' 1 -eq 1 ']' ++ KEYID=0004 ++ URIKEYID=%00%04 ++ EDCRTN=edCert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:edwards25519 --label=edCert --id=0004 ++ ca_sign edCert 'My ED25519 Cert' 0004 ++ LABEL=edCert ++ CN='My ED25519 Cert' ++ KEYID=0004 ++ shift 3 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = My ED25519 Cert|g' -e 's|serial = .*|serial = 6|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg ++ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/edCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' +Generating a signed certificate... + +Expiration time: Sun Feb 15 16:45:58 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 +Warning: The time set exceeds the CA's expiration time +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 06 + Validity: + Not Before: Sat Feb 15 02:45:58 UTC 2025 + Not After: Sun Feb 15 02:45:58 UTC 2026 + Subject: CN=My ED25519 Cert,O=PKCS11 Provider + Subject Public Key Algorithm: EdDSA (Ed25519) + Algorithm Security Level: High (256 bits) + Curve: Ed25519 + X: + da:30:25:6d:98:3d:76:bb:38:7e:56:b4:fb:8a:07:1f + 1c:7b:b1:53:61:5c:d9:bb:c5:01:a5:86:80:14:c4:77 + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): FALSE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Subject Key Identifier (not critical): + f5ba4bb0e3eef4106142c076e481394641848fba + Authority Key Identifier (not critical): + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f +Other Information: + Public Key ID: + sha1:f5ba4bb0e3eef4106142c076e481394641848fba + sha256:7cbb1b72297ccdc6bed571991e33cd193725f5a7dc91b87b828aab809041bf4b + Public Key PIN: + pin-sha256:fLsbcil8zca+1XGZHjPNGTcl9afckbh7goqrgJBBv0s= + + + +Signing certificate... ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/edCert.crt --type=cert --id=0004 --label=edCert ++ EDBASEURIWITHPINVALUE='pkcs11:id=%00%04;pin-value=12345678' ++ EDBASEURIWITHPINSOURCE='pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ EDBASEURI=pkcs11:id=%00%04 ++ EDPUBURI='pkcs11:type=public;id=%00%04' ++ EDPRIURI='pkcs11:type=private;id=%00%04' ++ EDCRTURI='pkcs11:type=cert;object=edCert' ++ title LINE 'ED25519 PKCS11 URIS' ++ case "$1" in ++ shift 1 ++ echo 'ED25519 PKCS11 URIS' ++ echo 'pkcs11:id=%00%04;pin-value=12345678' ++ echo 'pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%04 ++ echo 'pkcs11:type=public;id=%00%04' ++ echo 'pkcs11:type=private;id=%00%04' ++ echo 'pkcs11:type=cert;object=edCert' ++ '[' 1 -eq 1 ']' ++ KEYID=0009 ++ URIKEYID=%00%09 ++ ED2CRTN=ed2Cert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:Ed448 --label=ed2Cert --id=0009 ++ ca_sign ed2Cert 'My ED448 Cert' 0009 ++ LABEL=ed2Cert ++ CN='My ED448 Cert' ++ KEYID=0009 ++ shift 3 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = My ED448 Cert|g' -e 's|serial = .*|serial = 7|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg ++ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ed2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' +Generating a signed certificate... + +Expiration time: Sun Feb 15 16:45:59 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 +Warning: The time set exceeds the CA's expiration time +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 07 + Validity: + Not Before: Sat Feb 15 02:45:59 UTC 2025 + Not After: Sun Feb 15 02:45:59 UTC 2026 + Subject: CN=My ED448 Cert,O=PKCS11 Provider + Subject Public Key Algorithm: EdDSA (Ed448) + Algorithm Security Level: Ultra (456 bits) + Curve: Ed448 + X: + 78:8c:d4:a6:c2:7f:59:68:ed:14:48:62:ec:02:5e:40 + d4:7c:22:9b:91:41:e0:4c:c7:25:19:2a:fc:5b:43:6a + ef:ab:14:5a:9c:60:8d:d4:4b:f2:45:d8:64:7c:d9:3a + 7d:ff:55:a4:71:0b:62:74:80 + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): FALSE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Subject Key Identifier (not critical): + 42793b4f1578716fa560c23a412d1e9765a14c30 + Authority Key Identifier (not critical): + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f +Other Information: + Public Key ID: + sha1:42793b4f1578716fa560c23a412d1e9765a14c30 + sha256:c40cbbeabff7837a6ba7a29fc556cd905f074ebe8b39c8b1573dfdd62eb6f1ba + Public Key PIN: + pin-sha256:xAy76r/3g3prp6KfxVbNkF8HTr6LOcixVz391i628bo= + + + +Signing certificate... ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ed2Cert.crt --type=cert --id=0009 --label=ed2Cert ++ ED2BASEURIWITHPINVALUE='pkcs11:id=%00%09;pin-value=12345678' ++ ED2BASEURIWITHPINSOURCE='pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ ED2BASEURI=pkcs11:id=%00%09 ++ ED2PUBURI='pkcs11:type=public;id=%00%09' ++ ED2PRIURI='pkcs11:type=private;id=%00%09' ++ ED2CRTURI='pkcs11:type=cert;object=ed2Cert' ++ title LINE 'ED448 PKCS11 URIS' ++ case "$1" in ++ shift 1 ++ echo 'ED448 PKCS11 URIS' ++ echo 'pkcs11:id=%00%09;pin-value=12345678' ++ echo 'pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%09 ++ echo 'pkcs11:type=public;id=%00%09' ++ echo 'pkcs11:type=private;id=%00%09' ++ echo 'pkcs11:type=cert;object=ed2Cert' ++ title PARA 'generate RSA key pair, self-signed certificate, remove public key' ++ case "$1" in ++ shift 1 ++ echo '' ++ echo '## generate RSA key pair, self-signed certificate, remove public key' ++ '[' -f '' ']' ++ KEYID=0005 ++ URIKEYID=%00%05 ++ TSTCRTN=testCert2 ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert2 --id=0005 ++ ca_sign testCert2 'My Test Cert 2' 0005 ++ LABEL=testCert2 ++ CN='My Test Cert 2' ++ KEYID=0005 ++ shift 3 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = My Test Cert 2|g' -e 's|serial = .*|serial = 8|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg ++ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' +Generating a signed certificate... + +Expiration time: Sun Feb 15 16:46:02 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 +Warning: The time set exceeds the CA's expiration time +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 08 + Validity: + Not Before: Sat Feb 15 02:46:02 UTC 2025 + Not After: Sun Feb 15 02:46:02 UTC 2026 + Subject: CN=My Test Cert 2,O=PKCS11 Provider + Subject Public Key Algorithm: RSA + Algorithm Security Level: Medium (2048 bits) + Modulus (bits 2048): + 00:d0:88:b2:2e:7a:04:73:45:1c:1b:72:b3:2b:9d:31 + e2:50:e5:75:d3:71:97:89:ea:eb:ad:a6:82:77:f6:df + 0d:16:25:bc:3d:6b:a7:dd:78:39:1e:90:13:77:28:64 + 0a:78:06:43:91:59:6e:cc:6c:80:bb:f9:d7:22:58:42 + c7:96:b4:41:3d:52:c0:b5:e3:35:53:61:bd:c9:51:f2 + 53:13:56:cd:a1:72:1e:f0:4e:0f:93:cd:70:16:91:09 + 10:1c:fd:57:fc:09:7c:1d:a7:d7:50:0b:8b:31:cf:bc + a1:fb:8b:ee:df:cb:2d:44:62:36:98:9c:eb:79:2b:11 + b9:fa:81:e6:73:3e:12:71:c2:03:25:65:b9:7a:aa:f5 + 81:2c:58:7b:7f:18:f0:e2:4b:4f:f3:6b:ac:8a:6f:3e + 1c:e5:90:28:2b:a8:fe:a8:f0:8c:28:6f:66:6e:e0:f1 + 0b:8d:c7:cf:ee:f9:91:d6:97:78:7e:89:a8:bf:28:a5 + b3:19:a0:0a:3e:38:b4:ef:45:ac:aa:c6:67:83:3d:31 + 22:a1:b6:12:3c:af:f5:af:50:fb:7e:28:72:6a:c4:2f + 97:6f:2b:5a:5b:80:e8:1a:b5:79:31:15:a4:79:19:eb + 96:ca:32:67:78:1a:5c:3b:cd:c6:81:6b:7e:95:14:85 + 93 + Exponent (bits 24): + 01:00:01 + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): FALSE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Key encipherment. + Subject Key Identifier (not critical): + aa82f649b57b6028680dff688286cc2ada100ded + Authority Key Identifier (not critical): + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f +Other Information: + Public Key ID: + sha1:aa82f649b57b6028680dff688286cc2ada100ded + sha256:4005aa451fc50e84475c46f3c84a5cbbaefb011b0d62daa208cdea41f723ec2e + Public Key PIN: + pin-sha256:QAWqRR/FDoRHXEbzyEpcu677ARsNYtqiCM3qQfcj7C4= + + + +Signing certificate... ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testCert2.crt --type=cert --id=0005 --label=testCert2 ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0005 ++ BASE2URIWITHPINVALUE='pkcs11:id=%00%05?pin-value=12345678' ++ BASE2URIWITHPINSOURCE='pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ BASE2URI=pkcs11:id=%00%05 ++ PRI2URI='pkcs11:type=private;id=%00%05' ++ CRT2URI='pkcs11:type=cert;object=testCert2' ++ title LINE 'RSA2 PKCS11 URIS' ++ case "$1" in ++ shift 1 ++ echo 'RSA2 PKCS11 URIS' ++ echo 'pkcs11:id=%00%05?pin-value=12345678' ++ echo 'pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%05 ++ echo 'pkcs11:type=private;id=%00%05' ++ echo 'pkcs11:type=cert;object=testCert2' ++ echo '' ++ title PARA 'generate EC key pair, self-signed certificate, remove public key' ++ case "$1" in ++ shift 1 ++ echo '' ++ echo '## generate EC key pair, self-signed certificate, remove public key' ++ '[' -f '' ']' ++ KEYID=0006 ++ URIKEYID=%00%06 ++ TSTCRTN=ecCert2 ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp384r1 --label=ecCert2 --id=0006 ++ ca_sign ecCert2 'My EC Cert 2' 0006 ++ LABEL=ecCert2 ++ CN='My EC Cert 2' ++ KEYID=0006 ++ shift 3 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = My EC Cert 2|g' -e 's|serial = .*|serial = 9|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg ++ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' +Generating a signed certificate... + +Expiration time: Sun Feb 15 16:46:04 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 +Warning: The time set exceeds the CA's expiration time +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 09 + Validity: + Not Before: Sat Feb 15 02:46:04 UTC 2025 + Not After: Sun Feb 15 02:46:04 UTC 2026 + Subject: CN=My EC Cert 2,O=PKCS11 Provider + Subject Public Key Algorithm: EC/ECDSA + Algorithm Security Level: Ultra (384 bits) + Curve: SECP384R1 + X: + 31:a8:42:3c:54:5f:a9:dc:35:7e:9a:cc:22:47:66:f3 + 88:84:a0:c0:63:57:3c:44:80:60:25:f0:f9:75:1f:38 + b8:03:9f:b5:6c:2e:05:1d:17:5e:bf:d1:6c:cc:2e:df + Y: + 44:48:ce:2e:b2:44:94:21:4e:a8:c5:c9:73:e0:93:2a + 19:35:42:72:2b:32:e0:e5:1d:01:8b:ad:c4:2f:f4:23 + 81:b7:51:f1:6c:18:d7:77:27:00:0f:d2:cb:72:00:4e + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): FALSE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Subject Key Identifier (not critical): + 30176db154f92befd1edf9a9906cce8aae552972 + Authority Key Identifier (not critical): + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f +Other Information: + Public Key ID: + sha1:30176db154f92befd1edf9a9906cce8aae552972 + sha256:c4aabfba4b0addc93f6782e216f6c98e2aca7338e2bd3337f8bb8481408b72e2 + Public Key PIN: + pin-sha256:xKq/uksK3ck/Z4LiFvbJjirKczjivTM3+LuEgUCLcuI= + + + +Signing certificate... ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecCert2.crt --type=cert --id=0006 --label=ecCert2 ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0006 ++ ECBASE2URIWITHPINVALUE='pkcs11:id=%00%06?pin-value=12345678' ++ ECBASE2URIWITHPINSOURCE='pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ ECBASE2URI=pkcs11:id=%00%06 ++ ECPRI2URI='pkcs11:type=private;id=%00%06' ++ ECCRT2URI='pkcs11:type=cert;object=ecCert2' ++ title LINE 'EC2 PKCS11 URIS' ++ case "$1" in ++ shift 1 ++ echo 'EC2 PKCS11 URIS' ++ echo 'pkcs11:id=%00%06?pin-value=12345678' ++ echo 'pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%06 ++ echo 'pkcs11:type=private;id=%00%06' ++ echo 'pkcs11:type=cert;object=ecCert2' ++ echo '' ++ '[' -z '' ']' ++ title PARA 'explicit EC unsupported' ++ case "$1" in ++ shift 1 ++ echo '' ++ echo '## explicit EC unsupported' ++ '[' -f '' ']' ++ title PARA 'generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' ++ case "$1" in ++ shift 1 ++ echo '' ++ echo '## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' ++ '[' -f '' ']' ++ KEYID=0008 ++ URIKEYID=%00%08 ++ TSTCRTN=ecCert3 ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp521r1 --label=ecCert3 --id=0008 --always-auth ++ ca_sign ecCert3 'My EC Cert 3' 0008 ++ LABEL=ecCert3 ++ CN='My EC Cert 3' ++ KEYID=0008 ++ shift 3 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = My EC Cert 3|g' -e 's|serial = .*|serial = 10|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg ++ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecCert3.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' +Generating a signed certificate... + +Expiration time: Sun Feb 15 16:46:05 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 +Warning: The time set exceeds the CA's expiration time +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 0a + Validity: + Not Before: Sat Feb 15 02:46:05 UTC 2025 + Not After: Sun Feb 15 02:46:05 UTC 2026 + Subject: CN=My EC Cert 3,O=PKCS11 Provider + Subject Public Key Algorithm: EC/ECDSA + Algorithm Security Level: Future (528 bits) + Curve: SECP521R1 + X: + 00:a1:ef:34:5d:ba:53:43:f7:e1:ac:ec:a4:01:94:99 + 46:ea:1c:9f:f0:f5:72:0b:73:fa:94:1e:fd:3b:bb:b1 + 89:51:c9:70:68:46:0c:34:a2:c5:57:4e:98:fa:04:ce + 81:0a:df:bc:d4:e6:13:bc:39:52:e2:9f:bb:2c:58:33 + fb:d5 + Y: + 01:36:c8:08:0d:38:a7:39:e7:f5:45:9e:23:b7:3f:b5 + 6e:c1:75:a4:d2:85:42:b8:f6:16:66:cd:86:7a:ba:98 + b4:51:e3:b9:9d:0f:6f:4a:6d:b4:01:3c:e9:08:ec:b2 + 0d:a7:6c:83:d8:4f:f4:a1:34:80:34:f3:85:c9:5f:07 + 62:42 + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): FALSE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Subject Key Identifier (not critical): + 05425a09c9bdc904c481a75e4ffc0f20a8c96b9c + Authority Key Identifier (not critical): + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f +Other Information: + Public Key ID: + sha1:05425a09c9bdc904c481a75e4ffc0f20a8c96b9c + sha256:d9891dd6981d278b692a35a13f78f9215b13d89ea2f608cbee05495498f13d58 + Public Key PIN: + pin-sha256:2Ykd1pgdJ4tpKjWhP3j5IVsT2J6i9gjL7gVJVJjxPVg= + + + +Signing certificate... ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/ecCert3.crt --type=cert --id=0008 --label=ecCert3 ++ ECBASE3URIWITHPINVALUE='pkcs11:id=%00%08?pin-value=12345678' ++ ECBASE3URIWITHPINSOURCE='pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ ECBASE3URI=pkcs11:id=%00%08 ++ ECPUB3URI='pkcs11:type=public;id=%00%08' ++ ECPRI3URI='pkcs11:type=private;id=%00%08' ++ ECCRT3URI='pkcs11:type=cert;object=ecCert3' ++ title LINE 'EC3 PKCS11 URIS' ++ case "$1" in ++ shift 1 ++ echo 'EC3 PKCS11 URIS' ++ echo 'pkcs11:id=%00%08?pin-value=12345678' ++ echo 'pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%08 ++ echo 'pkcs11:type=public;id=%00%08' ++ echo 'pkcs11:type=private;id=%00%08' ++ echo 'pkcs11:type=cert;object=ecCert3' ++ echo '' ++ '[' 1 -eq 1 ']' ++ KEYID=0010 ++ URIKEYID=%00%10 ++ TSTCRTN=testRsaPssCert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testRsaPssCert --id=0010 --allowed-mechanisms RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS ++ ca_sign testRsaPssCert 'My RsaPss Cert' 0010 --sign-params=RSA-PSS ++ LABEL=testRsaPssCert ++ CN='My RsaPss Cert' ++ KEYID=0010 ++ shift 3 ++ (( SERIAL+=1 )) ++ sed -e 's|cn = .*|cn = My RsaPss Cert|g' -e 's|serial = .*|serial = 11|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg ++ /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testRsaPssCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS +Generating a signed certificate... + +Expiration time: Sun Feb 15 16:46:09 2026 +CA expiration time: Sun Feb 15 16:45:54 2026 +Warning: The time set exceeds the CA's expiration time +X.509 Certificate Information: + Version: 3 + Serial Number (hex): 0b + Validity: + Not Before: Sat Feb 15 02:46:09 UTC 2025 + Not After: Sun Feb 15 02:46:09 UTC 2026 + Subject: CN=My RsaPss Cert,O=PKCS11 Provider + Subject Public Key Algorithm: RSA + Algorithm Security Level: Medium (2048 bits) + Modulus (bits 2048): + 00:b4:a8:ef:0a:42:b1:0e:3c:d9:2e:63:3c:26:1f:64 + 27:83:b0:fc:0d:6b:bf:70:d0:a9:7e:7f:bd:88:2c:50 + de:f4:96:31:1c:9e:34:c7:b8:ca:0c:b4:55:23:fb:76 + 72:f9:7a:31:6d:48:ed:e0:7e:64:a2:51:9f:2b:c9:f3 + e4:b7:3b:79:dc:bd:ab:94:e3:fa:32:8b:9f:03:3e:e2 + c3:78:96:4e:8e:af:fb:c9:92:bd:5a:cd:40:42:c9:fc + e8:5b:b6:0b:98:11:ab:5c:da:8e:33:19:38:29:14:21 + 67:f8:2c:d8:ad:b4:9c:43:34:c1:70:8c:e9:9e:f9:ba + 65:6f:ab:28:14:39:ae:da:cf:7f:f9:8a:55:45:81:ba + fd:ca:f8:13:57:6a:9d:ee:56:ca:2c:15:b8:a0:fd:86 + c9:2c:a0:1f:22:d1:73:8a:1f:c0:ee:05:c3:ba:14:21 + ae:69:84:13:b6:27:b1:09:22:89:a8:a7:1d:be:2a:ba + 96:bf:da:90:80:51:44:36:52:f0:9c:a1:9b:6f:80:35 + 61:7f:8f:51:95:d8:35:d2:e3:95:97:22:cb:d1:2e:42 + c5:b6:4d:ae:e3:99:28:e5:e8:77:05:5c:95:92:f7:10 + 96:1e:26:92:18:78:0e:7a:76:a7:42:a1:99:65:f8:b9 + df + Exponent (bits 24): + 01:00:01 + Extensions: + Basic Constraints (critical): + Certificate Authority (CA): FALSE + Subject Alternative Name (not critical): + RFC822Name: testcert@example.org + Key Usage (critical): + Digital signature. + Key encipherment. + Subject Key Identifier (not critical): + d292810ca51bf77de73accd2c344958f9d0e7923 + Authority Key Identifier (not critical): + fc1282b5ed5b7c9a5ad2bcf4df66c9045a7d310f +Other Information: + Public Key ID: + sha1:d292810ca51bf77de73accd2c344958f9d0e7923 + sha256:fe3bd9bf8ecdc7d16e3b441a119813d5ac505cd86c09ba0dfc29a3c223056cf7 + Public Key PIN: + pin-sha256:/jvZv47Nx9FuO0QaEZgT1axQXNhsCboN/CmjwiMFbPc= + + + +Signing certificate... ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/testRsaPssCert.crt --type=cert --id=0010 --label=testRsaPssCert ++ RSAPSSBASEURIWITHPINVALUE='pkcs11:id=%00%10?pin-value=12345678' ++ RSAPSSBASEURIWITHPINSOURCE='pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ RSAPSSBASEURI=pkcs11:id=%00%10 ++ RSAPSSPUBURI='pkcs11:type=public;id=%00%10' ++ RSAPSSPRIURI='pkcs11:type=private;id=%00%10' ++ RSAPSSCRTURI='pkcs11:type=cert;object=testRsaPssCert' ++ title LINE 'RSA-PSS PKCS11 URIS' ++ case "$1" in ++ shift 1 ++ echo 'RSA-PSS PKCS11 URIS' ++ echo 'pkcs11:id=%00%10?pin-value=12345678' ++ echo 'pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/softhsm/pinfile.txt' ++ echo pkcs11:id=%00%10 ++ echo 'pkcs11:type=public;id=%00%10' ++ echo 'pkcs11:type=private;id=%00%10' ++ echo 'pkcs11:type=cert;object=testRsaPssCert' ++ echo '' ++ KEYID=0011 ++ URIKEYID=%00%11 ++ TSTCRTN=testRsaPss2Cert ++ pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:3092 --label=testRsaPss2Cert --id=0011 --allowed-mechanisms SHA256-RSA-PKCS-PSS +============================================================================== + +==================================== 3/92 ==================================== +test: pkcs11-provider:kryoptic / setup +start time: 02:46:21 +duration: 0.25s +result: exit status 0 +command: MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic +----------------------------------- stdout ----------------------------------- +######################################## +## Searching for Kryoptic module + +skipped: Unable to find kryoptic PKCS#11 library +----------------------------------- stderr ----------------------------------- ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh +++ : /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests +++ helper_emit=1 +++ sed --version +++ grep -q 'GNU sed' +++ sed_inplace=('-i') +++ export sed_inplace ++ '[' 1 -ne 1 ']' ++ TOKENTYPE=kryoptic ++ SUPPORT_ED25519=1 ++ SUPPORT_ED448=1 ++ SUPPORT_RSA_PKCS1_ENCRYPTION=1 ++ SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 ++ SUPPORT_TLSFUZZER=1 ++ SUPPORT_ALLOWED_MECHANISMS=0 +++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' +++ opensc-tool -i +++ grep OpenSC +Failed to establish context: Unable to load external module ++ OPENSC_VERSION=26 ++ [[ 26 -le 25 ]] ++ [[ '' = \1 ]] +++ cat /proc/sys/crypto/fips_enabled +cat: /proc/sys/crypto/fips_enabled: No such file or directory ++ [[ '' = \1 ]] ++ TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic ++ TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic/tokens ++ '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic ']' ++ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic ++ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic/tokens ++ PINVALUE=12345678 ++ PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic/pinfile.txt ++ echo 12345678 ++ export GNUTLS_PIN=12345678 ++ GNUTLS_PIN=12345678 ++ '[' kryoptic == softhsm ']' ++ '[' kryoptic == softokn ']' ++ '[' kryoptic == kryoptic ']' ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh +++ title SECTION 'Searching for Kryoptic module' +++ case "$1" in +++ shift 1 +++ echo '########################################' +++ echo '## Searching for Kryoptic module' +++ echo '' +++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /target/debug/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /target/release/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so +++ for _lib in "$@" +++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ echo 'skipped: Unable to find kryoptic PKCS#11 library' +++ exit 0 +============================================================================== + +==================================== 4/92 ==================================== +test: pkcs11-provider:kryoptic.nss / setup +start time: 02:46:21 +duration: 0.26s +result: exit status 0 +command: MALLOC_PERTURB_=72 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/arm-linux-gnueabihf/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/arm-linux-gnueabihf LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic.nss +----------------------------------- stdout ----------------------------------- +######################################## +## Searching for Kryoptic module + +skipped: Unable to find kryoptic PKCS#11 library +----------------------------------- stderr ----------------------------------- ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh +++ : /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests +++ helper_emit=1 +++ sed --version +++ grep -q 'GNU sed' +++ sed_inplace=('-i') +++ export sed_inplace ++ '[' 1 -ne 1 ']' ++ TOKENTYPE=kryoptic.nss ++ SUPPORT_ED25519=1 ++ SUPPORT_ED448=1 ++ SUPPORT_RSA_PKCS1_ENCRYPTION=1 ++ SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 ++ SUPPORT_TLSFUZZER=1 ++ SUPPORT_ALLOWED_MECHANISMS=0 +++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' +++ opensc-tool -i +++ grep OpenSC +Failed to establish context: Unable to load external module ++ OPENSC_VERSION=26 ++ [[ 26 -le 25 ]] ++ [[ '' = \1 ]] +++ cat /proc/sys/crypto/fips_enabled +cat: /proc/sys/crypto/fips_enabled: No such file or directory ++ [[ '' = \1 ]] ++ TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss ++ TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss/tokens ++ '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss ']' ++ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss ++ mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss/tokens ++ PINVALUE=12345678 ++ PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss/pinfile.txt ++ echo 12345678 ++ export GNUTLS_PIN=12345678 ++ GNUTLS_PIN=12345678 ++ '[' kryoptic.nss == softhsm ']' ++ '[' kryoptic.nss == softokn ']' ++ '[' kryoptic.nss == kryoptic ']' ++ '[' kryoptic.nss == kryoptic.nss ']' ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic.nss-init.sh +++ export KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss/kryoptic.conf +++ KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests/kryoptic.nss/kryoptic.conf +++ cat +++ export 'TOKENLABEL=Kryoptic Soft Token' +++ TOKENLABEL='Kryoptic Soft Token' +++ export TOKENLABELURI=Kryoptic%20Soft%20Token +++ TOKENLABELURI=Kryoptic%20Soft%20Token +++ source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh ++++ title SECTION 'Searching for Kryoptic module' ++++ case "$1" in ++++ shift 1 ++++ echo '########################################' ++++ echo '## Searching for Kryoptic module' ++++ echo '' ++++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++++ for _lib in "$@" ++++ test -f /target/debug/libkryoptic_pkcs11.so ++++ for _lib in "$@" ++++ test -f /target/release/libkryoptic_pkcs11.so ++++ for _lib in "$@" ++++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so ++++ for _lib in "$@" ++++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so ++++ for _lib in "$@" ++++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so ++++ for _lib in "$@" ++++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++++ echo 'skipped: Unable to find kryoptic PKCS#11 library' ++++ exit 0 +============================================================================== + +==================================== 5/92 ==================================== +test: pkcs11-provider:softokn / basic +start time: 02:46:21 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=254 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softokn.t +============================================================================== + +==================================== 6/92 ==================================== +test: pkcs11-provider:softhsm / basic +start time: 02:46:21 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=147 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softhsm.t +============================================================================== + +==================================== 7/92 ==================================== +test: pkcs11-provider:kryoptic / basic +start time: 02:46:21 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=249 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.t +============================================================================== + +==================================== 8/92 ==================================== +test: pkcs11-provider:kryoptic.nss / basic +start time: 02:46:22 +duration: 0.11s +result: exit status 77 +command: MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.nss.t +============================================================================== + +==================================== 9/92 ==================================== +test: pkcs11-provider:softokn / pubkey +start time: 02:46:22 +duration: 0.14s +result: exit status 77 +command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=31 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softokn.t +============================================================================== + +=================================== 10/92 ==================================== +test: pkcs11-provider:softhsm / pubkey +start time: 02:46:22 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=142 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softhsm.t +============================================================================== + +=================================== 11/92 ==================================== +test: pkcs11-provider:kryoptic / pubkey +start time: 02:46:22 +duration: 0.14s +result: exit status 77 +command: MALLOC_PERTURB_=132 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.t +============================================================================== + +=================================== 12/92 ==================================== +test: pkcs11-provider:kryoptic.nss / pubkey +start time: 02:46:22 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=145 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.nss.t +============================================================================== + +=================================== 13/92 ==================================== +test: pkcs11-provider:softokn / certs +start time: 02:46:22 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=55 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softokn.t +============================================================================== + +=================================== 14/92 ==================================== +test: pkcs11-provider:softhsm / certs +start time: 02:46:22 +duration: 0.11s +result: exit status 77 +command: MALLOC_PERTURB_=24 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softhsm.t +============================================================================== + +=================================== 15/92 ==================================== +test: pkcs11-provider:kryoptic / certs +start time: 02:46:22 +duration: 0.13s +result: exit status 77 +command: MALLOC_PERTURB_=76 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.t +============================================================================== + +=================================== 16/92 ==================================== +test: pkcs11-provider:kryoptic.nss / certs +start time: 02:46:23 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=195 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.nss.t +============================================================================== + +=================================== 17/92 ==================================== +test: pkcs11-provider:softokn / ecc +start time: 02:46:23 +duration: 0.11s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=116 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softokn.t +============================================================================== + +=================================== 18/92 ==================================== +test: pkcs11-provider:softhsm / ecc +start time: 02:46:23 +duration: 0.15s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=166 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softhsm.t +============================================================================== + +=================================== 19/92 ==================================== +test: pkcs11-provider:kryoptic / ecc +start time: 02:46:23 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=54 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.t +============================================================================== + +=================================== 20/92 ==================================== +test: pkcs11-provider:kryoptic.nss / ecc +start time: 02:46:23 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=198 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.nss.t +============================================================================== + +=================================== 21/92 ==================================== +test: pkcs11-provider:softhsm / edwards +start time: 02:46:23 +duration: 0.15s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=39 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-softhsm.t +============================================================================== + +=================================== 22/92 ==================================== +test: pkcs11-provider:kryoptic / edwards +start time: 02:46:23 +duration: 0.15s +result: exit status 77 +command: MALLOC_PERTURB_=178 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.t +============================================================================== + +=================================== 23/92 ==================================== +test: pkcs11-provider:kryoptic.nss / edwards +start time: 02:46:24 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=248 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.nss.t +============================================================================== + +=================================== 24/92 ==================================== +test: pkcs11-provider:softokn / ecdh +start time: 02:46:24 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=52 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-softokn.t +============================================================================== + +=================================== 25/92 ==================================== +test: pkcs11-provider:kryoptic / ecdh +start time: 02:46:24 +duration: 0.10s +result: exit status 77 +command: MALLOC_PERTURB_=99 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.t +============================================================================== + +=================================== 26/92 ==================================== +test: pkcs11-provider:kryoptic.nss / ecdh +start time: 02:46:24 +duration: 0.16s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=235 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.nss.t +============================================================================== + +=================================== 27/92 ==================================== +test: pkcs11-provider:softokn / democa +start time: 02:46:24 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=237 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softokn.t +============================================================================== + +=================================== 28/92 ==================================== +test: pkcs11-provider:softhsm / democa +start time: 02:46:24 +duration: 0.12s +result: exit status 77 +command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=114 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softhsm.t +============================================================================== + +=================================== 29/92 ==================================== +test: pkcs11-provider:kryoptic / democa +start time: 02:46:24 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=108 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.t +============================================================================== + +=================================== 30/92 ==================================== +test: pkcs11-provider:kryoptic.nss / democa +start time: 02:46:25 +duration: 0.10s +result: exit status 77 +command: MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.nss.t +============================================================================== + +=================================== 31/92 ==================================== +test: pkcs11-provider:softokn / digest +start time: 02:46:25 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=90 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softokn.t +============================================================================== + +=================================== 32/92 ==================================== +test: pkcs11-provider:softhsm / digest +start time: 02:46:25 +duration: 0.10s +result: exit status 77 +command: MALLOC_PERTURB_=38 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softhsm.t +============================================================================== + +=================================== 33/92 ==================================== +test: pkcs11-provider:kryoptic / digest +start time: 02:46:25 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=137 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.t +============================================================================== + +=================================== 34/92 ==================================== +test: pkcs11-provider:kryoptic.nss / digest +start time: 02:46:25 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=191 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.nss.t +============================================================================== + +=================================== 35/92 ==================================== +test: pkcs11-provider:softokn / fork +start time: 02:46:25 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=54 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softokn.t +============================================================================== + +=================================== 36/92 ==================================== +test: pkcs11-provider:softhsm / fork +start time: 02:46:25 +duration: 0.12s +result: exit status 77 +command: MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softhsm.t +============================================================================== + +=================================== 37/92 ==================================== +test: pkcs11-provider:kryoptic / fork +start time: 02:46:25 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=195 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.t +============================================================================== + +=================================== 38/92 ==================================== +test: pkcs11-provider:kryoptic.nss / fork +start time: 02:46:26 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=211 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.nss.t +============================================================================== + +=================================== 39/92 ==================================== +test: pkcs11-provider:softokn / oaepsha2 +start time: 02:46:26 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=40 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-softokn.t +============================================================================== + +=================================== 40/92 ==================================== +test: pkcs11-provider:kryoptic / oaepsha2 +start time: 02:46:26 +duration: 0.14s +result: exit status 77 +command: MALLOC_PERTURB_=173 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.t +============================================================================== + +=================================== 41/92 ==================================== +test: pkcs11-provider:kryoptic.nss / oaepsha2 +start time: 02:46:26 +duration: 0.15s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=243 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.nss.t +============================================================================== + +=================================== 42/92 ==================================== +test: pkcs11-provider:softokn / hkdf +start time: 02:46:26 +duration: 0.15s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=58 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-softokn.t +============================================================================== + +=================================== 43/92 ==================================== +test: pkcs11-provider:kryoptic / hkdf +start time: 02:46:26 +duration: 0.15s +result: exit status 77 +command: MALLOC_PERTURB_=105 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.t +============================================================================== + +=================================== 44/92 ==================================== +test: pkcs11-provider:kryoptic.nss / hkdf +start time: 02:46:26 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=102 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.nss.t +============================================================================== + +=================================== 45/92 ==================================== +test: pkcs11-provider:softokn / imported +start time: 02:46:27 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=225 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-softokn.t +============================================================================== + +=================================== 46/92 ==================================== +test: pkcs11-provider:kryoptic / imported +start time: 02:46:27 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=230 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.t +============================================================================== + +=================================== 47/92 ==================================== +test: pkcs11-provider:kryoptic.nss / imported +start time: 02:46:27 +duration: 0.15s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=78 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.nss.t +============================================================================== + +=================================== 48/92 ==================================== +test: pkcs11-provider:softokn / rsapss +start time: 02:46:27 +duration: 0.12s +result: exit status 77 +command: MALLOC_PERTURB_=30 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softokn.t +============================================================================== + +=================================== 49/92 ==================================== +test: pkcs11-provider:softhsm / rsapss +start time: 02:46:27 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=223 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softhsm.t +============================================================================== + +=================================== 50/92 ==================================== +test: pkcs11-provider:kryoptic / rsapss +start time: 02:46:27 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=95 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.t +============================================================================== + +=================================== 51/92 ==================================== +test: pkcs11-provider:kryoptic.nss / rsapss +start time: 02:46:27 +duration: 0.11s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=188 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.nss.t +============================================================================== + +=================================== 52/92 ==================================== +test: pkcs11-provider:softhsm / rsapssam +start time: 02:46:28 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=200 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-softhsm.t +============================================================================== + +=================================== 53/92 ==================================== +test: pkcs11-provider:kryoptic / rsapssam +start time: 02:46:28 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=194 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-kryoptic.t +============================================================================== + +=================================== 54/92 ==================================== +test: pkcs11-provider:softokn / genkey +start time: 02:46:28 +duration: 0.13s +result: exit status 77 +command: ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=31 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softokn.t +============================================================================== + +=================================== 55/92 ==================================== +test: pkcs11-provider:softhsm / genkey +start time: 02:46:28 +duration: 0.12s +result: exit status 77 +command: MALLOC_PERTURB_=226 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softhsm.t +============================================================================== + +=================================== 56/92 ==================================== +test: pkcs11-provider:kryoptic / genkey +start time: 02:46:28 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=203 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.t +============================================================================== + +=================================== 57/92 ==================================== +test: pkcs11-provider:kryoptic.nss / genkey +start time: 02:46:28 +duration: 0.11s +result: exit status 77 +command: MALLOC_PERTURB_=185 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.nss.t +============================================================================== + +=================================== 58/92 ==================================== +test: pkcs11-provider:softokn / pkey +start time: 02:46:28 +duration: 0.15s +result: exit status 77 +command: MALLOC_PERTURB_=226 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softokn.t +============================================================================== + +=================================== 59/92 ==================================== +test: pkcs11-provider:softhsm / pkey +start time: 02:46:29 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=251 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softhsm.t +============================================================================== + +=================================== 60/92 ==================================== +test: pkcs11-provider:kryoptic / pkey +start time: 02:46:29 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=231 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.t +============================================================================== + +=================================== 61/92 ==================================== +test: pkcs11-provider:kryoptic.nss / pkey +start time: 02:46:29 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=119 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.nss.t +============================================================================== + +=================================== 62/92 ==================================== +test: pkcs11-provider:softokn / session +start time: 02:46:29 +duration: 0.15s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=203 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softokn.t +============================================================================== + +=================================== 63/92 ==================================== +test: pkcs11-provider:softhsm / session +start time: 02:46:29 +duration: 0.14s +result: exit status 77 +command: MALLOC_PERTURB_=190 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softhsm.t +============================================================================== + +=================================== 64/92 ==================================== +test: pkcs11-provider:kryoptic / session +start time: 02:46:29 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=209 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.t +============================================================================== + +=================================== 65/92 ==================================== +test: pkcs11-provider:kryoptic.nss / session +start time: 02:46:29 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=235 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.nss.t +============================================================================== + +=================================== 66/92 ==================================== +test: pkcs11-provider:softokn / rand +start time: 02:46:30 +duration: 0.09s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=243 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softokn.t +============================================================================== + +=================================== 67/92 ==================================== +test: pkcs11-provider:softhsm / rand +start time: 02:46:30 +duration: 0.10s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=80 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softhsm.t +============================================================================== + +=================================== 68/92 ==================================== +test: pkcs11-provider:kryoptic / rand +start time: 02:46:30 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=13 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.t +============================================================================== + +=================================== 69/92 ==================================== +test: pkcs11-provider:kryoptic.nss / rand +start time: 02:46:30 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=109 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.nss.t +============================================================================== + +=================================== 70/92 ==================================== +test: pkcs11-provider:softokn / readkeys +start time: 02:46:30 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=20 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softokn.t +============================================================================== + +=================================== 71/92 ==================================== +test: pkcs11-provider:softhsm / readkeys +start time: 02:46:30 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=179 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softhsm.t +============================================================================== + +=================================== 72/92 ==================================== +test: pkcs11-provider:kryoptic / readkeys +start time: 02:46:30 +duration: 0.12s +result: exit status 77 +command: MALLOC_PERTURB_=56 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.t +============================================================================== + +=================================== 73/92 ==================================== +test: pkcs11-provider:kryoptic.nss / readkeys +start time: 02:46:31 +duration: 0.16s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=143 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.nss.t +============================================================================== + +=================================== 74/92 ==================================== +test: pkcs11-provider:softokn / tls +start time: 02:46:31 +duration: 0.19s +result: exit status 77 +command: MALLOC_PERTURB_=113 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softokn.t +============================================================================== + +=================================== 75/92 ==================================== +test: pkcs11-provider:softhsm / tls +start time: 02:46:31 +duration: 0.14s +result: exit status 77 +command: MALLOC_PERTURB_=67 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softhsm.t +============================================================================== + +=================================== 76/92 ==================================== +test: pkcs11-provider:kryoptic / tls +start time: 02:46:31 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=151 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.t +============================================================================== + +=================================== 77/92 ==================================== +test: pkcs11-provider:kryoptic.nss / tls +start time: 02:46:31 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=246 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.nss.t +============================================================================== + +=================================== 78/92 ==================================== +test: pkcs11-provider:softokn / tlsfuzzer +start time: 02:46:31 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=104 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softokn.t +============================================================================== + +=================================== 79/92 ==================================== +test: pkcs11-provider:softhsm / tlsfuzzer +start time: 02:46:31 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=107 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softhsm.t +============================================================================== + +=================================== 80/92 ==================================== +test: pkcs11-provider:kryoptic / tlsfuzzer +start time: 02:46:32 +duration: 0.11s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=22 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.t +============================================================================== + +=================================== 81/92 ==================================== +test: pkcs11-provider:kryoptic.nss / tlsfuzzer +start time: 02:46:32 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=227 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.nss.t +============================================================================== + +=================================== 82/92 ==================================== +test: pkcs11-provider:softokn / uri +start time: 02:46:32 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=91 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softokn.t +============================================================================== + +=================================== 83/92 ==================================== +test: pkcs11-provider:softhsm / uri +start time: 02:46:32 +duration: 0.11s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=160 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softhsm.t +============================================================================== + +=================================== 84/92 ==================================== +test: pkcs11-provider:kryoptic / uri +start time: 02:46:32 +duration: 0.11s +result: exit status 77 +command: MALLOC_PERTURB_=184 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.t +============================================================================== + +=================================== 85/92 ==================================== +test: pkcs11-provider:kryoptic.nss / uri +start time: 02:46:32 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=229 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.nss.t +============================================================================== + +=================================== 86/92 ==================================== +test: pkcs11-provider:softhsm / ecxc +start time: 02:46:32 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=13 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-softhsm.t +============================================================================== + +=================================== 87/92 ==================================== +test: pkcs11-provider:kryoptic / ecxc +start time: 02:46:33 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=161 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.t +============================================================================== + +=================================== 88/92 ==================================== +test: pkcs11-provider:kryoptic.nss / ecxc +start time: 02:46:33 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=171 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.nss.t +============================================================================== + +=================================== 89/92 ==================================== +test: pkcs11-provider:softokn / cms +start time: 02:46:33 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=252 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-softokn.t +============================================================================== + +=================================== 90/92 ==================================== +test: pkcs11-provider:kryoptic / cms +start time: 02:46:33 +duration: 0.14s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=236 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.t +============================================================================== + +=================================== 91/92 ==================================== +test: pkcs11-provider:kryoptic.nss / cms +start time: 02:46:33 +duration: 0.12s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=215 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.nss.t +============================================================================== + +=================================== 92/92 ==================================== +test: pkcs11-provider:kryoptic / pinlock +start time: 02:46:33 +duration: 0.13s +result: exit status 77 +command: MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-arm-linux-gnueabihf/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=23 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pinlock-kryoptic.t +============================================================================== + + +Summary of Failures: + + 2/92 pkcs11-provider:softhsm / setup TIMEOUT 30.13s killed by signal 15 SIGTERM + +Ok: 3 +Expected Fail: 0 +Fail: 0 +Unexpected Pass: 0 +Skipped: 88 +Timeout: 1 +dh_auto_test: error: cd obj-arm-linux-gnueabihf && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 MESON_TESTTHREADS=4 meson test --verbose returned exit code 1 +make: *** [debian/rules:9: binary] Error 25 +dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 I: copying local configuration +E: Failed autobuilding of package +I: user script /srv/workspace/pbuilder/11140/tmp/hooks/C01_cleanup starting +debug output: disk usage on i-capture-the-hostname at Sat Feb 15 02:46:34 UTC 2025 +Filesystem Size Used Avail Use% Mounted on +tmpfs 5.8G 0 5.8G 0% /dev/shm + +I: user script /srv/workspace/pbuilder/11140/tmp/hooks/C01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/7814 and its subdirectories -I: Current time: Fri Feb 14 14:40:59 -12 2025 -I: pbuilder-time-stamp: 1739587259 +I: removing directory /srv/workspace/pbuilder/11140 and its subdirectories