I: pbuilder: network access will be disabled during build I: Current time: Thu Mar 19 21:57:18 +14 2026 I: pbuilder-time-stamp: 1773907038 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/unstable-reproducible-base.tgz] I: copying local configuration W: --override-config is not set; not updating apt.conf Read the manpage for details. I: mounting /proc filesystem I: mounting /sys filesystem I: creating /{dev,run}/shm I: mounting /dev/pts filesystem I: redirecting /dev/ptmx to /dev/pts/ptmx I: policy-rc.d already exists I: using eatmydata during job I: Copying source file I: copying [pkcs11-provider_1.0-1.dsc] I: copying [./pkcs11-provider_1.0.orig.tar.gz] I: copying [./pkcs11-provider_1.0-1.debian.tar.xz] I: Extracting source dpkg-source: warning: cannot verify inline signature for ./pkcs11-provider_1.0-1.dsc: unsupported subcommand dpkg-source: info: extracting pkcs11-provider in pkcs11-provider-1.0 dpkg-source: info: unpacking pkcs11-provider_1.0.orig.tar.gz dpkg-source: info: unpacking pkcs11-provider_1.0-1.debian.tar.xz I: Not using root during the build. I: Installing the build-deps I: user script /srv/workspace/pbuilder/123237/tmp/hooks/D01_modify_environment starting debug: Running on ionos16-i386. I: Changing host+domainname to test build reproducibility I: Adding a custom variable just for the fun of it... I: Changing /bin/sh to bash '/bin/sh' -> '/bin/bash' lrwxrwxrwx 1 root root 9 Mar 19 07:57 /bin/sh -> /bin/bash I: Setting pbuilder2's login shell to /bin/bash I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other I: user script /srv/workspace/pbuilder/123237/tmp/hooks/D01_modify_environment finished I: user script /srv/workspace/pbuilder/123237/tmp/hooks/D02_print_environment starting I: set BASH=/bin/sh BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath BASH_ALIASES=() BASH_ARGC=() BASH_ARGV=() BASH_CMDS=() BASH_LINENO=([0]="12" [1]="0") BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") BASH_VERSINFO=([0]="5" [1]="2" [2]="37" [3]="1" [4]="release" [5]="i686-pc-linux-gnu") BASH_VERSION='5.2.37(1)-release' BUILDDIR=/build/reproducible-path BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' BUILDUSERNAME=pbuilder2 BUILD_ARCH=i386 DEBIAN_FRONTEND=noninteractive DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=21 ' DIRSTACK=() DISTRIBUTION=unstable EUID=0 FUNCNAME=([0]="Echo" [1]="main") GROUPS=() HOME=/root HOSTNAME=i-capture-the-hostname HOSTTYPE=i686 HOST_ARCH=i386 IFS=' ' INVOCATION_ID=279d05b0e8a54bf8927c023e95fe5483 LANG=C LANGUAGE=de_CH:de LC_ALL=C LD_LIBRARY_PATH=/usr/lib/libeatmydata LD_PRELOAD=libeatmydata.so MACHTYPE=i686-pc-linux-gnu MAIL=/var/mail/root OPTERR=1 OPTIND=1 OSTYPE=linux-gnu PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path PBCURRENTCOMMANDLINEOPERATION=build PBUILDER_OPERATION=build PBUILDER_PKGDATADIR=/usr/share/pbuilder PBUILDER_PKGLIBDIR=/usr/lib/pbuilder PBUILDER_SYSCONFDIR=/etc PIPESTATUS=([0]="0") POSIXLY_CORRECT=y PPID=123237 PS4='+ ' PWD=/ SHELL=/bin/bash SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix SHLVL=3 SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.aVpuEwHD/pbuilderrc_myfs --distribution unstable --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.aVpuEwHD/b2 --logfile b2/build.log pkcs11-provider_1.0-1.dsc' SUDO_GID=112 SUDO_UID=107 SUDO_USER=jenkins TERM=unknown TZ=/usr/share/zoneinfo/Etc/GMT-14 UID=0 USER=root _='I: set' http_proxy=http://213.165.73.152:3128 I: uname -a Linux i-capture-the-hostname 6.1.0-31-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.128-1 (2025-02-07) x86_64 GNU/Linux I: ls -l /bin lrwxrwxrwx 1 root root 7 Nov 22 2024 /bin -> usr/bin I: user script /srv/workspace/pbuilder/123237/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy Version: 0.invalid.0 Architecture: i386 Maintainer: Debian Pbuilder Team Description: Dummy package to satisfy dependencies with aptitude - created by pbuilder This package was created automatically by pbuilder to satisfy the build-dependencies of the package being currently built. Depends: debhelper-compat (= 13), dh-package-notes, libssl-dev (>= 3.0.7~), meson (>= 0.57~), pkgconf, expect, gnutls-bin, libnss3-dev, libp11-kit-dev, libstoken-dev, opensc, openssl, p11-kit, p11-kit-modules, softhsm2 dpkg-deb: building package 'pbuilder-satisfydepends-dummy' in '/tmp/satisfydepends-aptitude/pbuilder-satisfydepends-dummy.deb'. Selecting previously unselected package pbuilder-satisfydepends-dummy. (Reading database ... 19794 files and directories currently installed.) Preparing to unpack .../pbuilder-satisfydepends-dummy.deb ... Unpacking pbuilder-satisfydepends-dummy (0.invalid.0) ... dpkg: pbuilder-satisfydepends-dummy: dependency problems, but configuring anyway as you requested: pbuilder-satisfydepends-dummy depends on debhelper-compat (= 13); however: Package debhelper-compat is not installed. pbuilder-satisfydepends-dummy depends on dh-package-notes; however: Package dh-package-notes is not installed. pbuilder-satisfydepends-dummy depends on libssl-dev (>= 3.0.7~); however: Package libssl-dev is not installed. pbuilder-satisfydepends-dummy depends on meson (>= 0.57~); however: Package meson is not installed. pbuilder-satisfydepends-dummy depends on pkgconf; however: Package pkgconf is not installed. pbuilder-satisfydepends-dummy depends on expect; however: Package expect is not installed. pbuilder-satisfydepends-dummy depends on gnutls-bin; however: Package gnutls-bin is not installed. pbuilder-satisfydepends-dummy depends on libnss3-dev; however: Package libnss3-dev is not installed. pbuilder-satisfydepends-dummy depends on libp11-kit-dev; however: Package libp11-kit-dev is not installed. pbuilder-satisfydepends-dummy depends on libstoken-dev; however: Package libstoken-dev is not installed. pbuilder-satisfydepends-dummy depends on opensc; however: Package opensc is not installed. pbuilder-satisfydepends-dummy depends on openssl; however: Package openssl is not installed. pbuilder-satisfydepends-dummy depends on p11-kit; however: Package p11-kit is not installed. pbuilder-satisfydepends-dummy depends on p11-kit-modules; however: Package p11-kit-modules is not installed. pbuilder-satisfydepends-dummy depends on softhsm2; however: Package softhsm2 is not installed. Setting up pbuilder-satisfydepends-dummy (0.invalid.0) ... Reading package lists... Building dependency tree... Reading state information... Initializing package states... Writing extended state information... Building tag database... pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) The following NEW packages will be installed: autoconf{a} automake{a} autopoint{a} autotools-dev{a} bsdextrautils{a} debhelper{a} dh-autoreconf{a} dh-package-notes{a} dh-strip-nondeterminism{a} dwz{a} expect{a} file{a} gettext{a} gettext-base{a} gnutls-bin{a} groff-base{a} intltool-debian{a} libarchive-zip-perl{a} libdebhelper-perl{a} libeac3{a} libelf1t64{a} libevent-2.1-7t64{a} libexpat1{a} libffi8{a} libfile-stripnondeterminism-perl{a} libglib2.0-0t64{a} libgnutls-dane0t64{a} libgnutls30t64{a} libicu72{a} libidn2-0{a} libmagic-mgc{a} libmagic1t64{a} libnspr4{a} libnspr4-dev{a} libnss3{a} libnss3-dev{a} libp11-kit-dev{a} libp11-kit0{a} libpipeline1{a} libpkgconf3{a} libproc2-0{a} libpython3-stdlib{a} libpython3.13-minimal{a} libpython3.13-stdlib{a} libreadline8t64{a} libsofthsm2{a} libssl-dev{a} libstoken-dev{a} libstoken1t64{a} libtasn1-6{a} libtcl8.6{a} libtext-charwidth-perl{a} libtext-wrapi18n-perl{a} libtomcrypt-dev{a} libtomcrypt1{a} libtommath1{a} libtool{a} libuchardet0{a} libunbound8{a} libunistring5{a} libxml2{a} m4{a} man-db{a} media-types{a} meson{a} netbase{a} ninja-build{a} opensc{a} opensc-pkcs11{a} openssl{a} p11-kit{a} p11-kit-modules{a} pkgconf{a} pkgconf-bin{a} po-debconf{a} procps{a} python3{a} python3-autocommand{a} python3-inflect{a} python3-jaraco.context{a} python3-jaraco.functools{a} python3-jaraco.text{a} python3-minimal{a} python3-more-itertools{a} python3-pkg-resources{a} python3-setuptools{a} python3-typeguard{a} python3-typing-extensions{a} python3-zipp{a} python3.13{a} python3.13-minimal{a} readline-common{a} sensible-utils{a} softhsm2{a} softhsm2-common{a} tcl-expect{a} tcl8.6{a} tzdata{a} ucf{a} The following packages are RECOMMENDED but will NOT be installed: ca-certificates curl libarchive-cpio-perl libglib2.0-data libltdl-dev libmail-sendmail-perl linux-sysctl-defaults lynx pcscd psmisc shared-mime-info wget xdg-user-dirs 0 packages upgraded, 99 newly installed, 0 to remove and 0 not upgraded. Need to get 48.5 MB of archives. After unpacking 175 MB will be used. Writing extended state information... Get: 1 http://deb.debian.org/debian unstable/main i386 libpython3.13-minimal i386 3.13.2-1 [859 kB] Get: 2 http://deb.debian.org/debian unstable/main i386 libexpat1 i386 2.6.4-1 [107 kB] Get: 3 http://deb.debian.org/debian unstable/main i386 python3.13-minimal i386 3.13.2-1 [2266 kB] Get: 4 http://deb.debian.org/debian unstable/main i386 python3-minimal i386 3.13.1-2 [27.0 kB] Get: 5 http://deb.debian.org/debian unstable/main i386 media-types all 11.0.0 [27.6 kB] Get: 6 http://deb.debian.org/debian unstable/main i386 netbase all 6.4 [12.8 kB] Get: 7 http://deb.debian.org/debian unstable/main i386 tzdata all 2025a-2 [259 kB] Get: 8 http://deb.debian.org/debian unstable/main i386 libffi8 i386 3.4.7-1 [21.4 kB] Get: 9 http://deb.debian.org/debian unstable/main i386 readline-common all 8.2-6 [69.4 kB] Get: 10 http://deb.debian.org/debian unstable/main i386 libreadline8t64 i386 8.2-6 [173 kB] Get: 11 http://deb.debian.org/debian unstable/main i386 libpython3.13-stdlib i386 3.13.2-1 [1985 kB] Get: 12 http://deb.debian.org/debian unstable/main i386 python3.13 i386 3.13.2-1 [745 kB] Get: 13 http://deb.debian.org/debian unstable/main i386 libpython3-stdlib i386 3.13.1-2 [9952 B] Get: 14 http://deb.debian.org/debian unstable/main i386 python3 i386 3.13.1-2 [28.0 kB] Get: 15 http://deb.debian.org/debian unstable/main i386 libproc2-0 i386 2:4.0.4-7 [66.0 kB] Get: 16 http://deb.debian.org/debian unstable/main i386 procps i386 2:4.0.4-7 [876 kB] Get: 17 http://deb.debian.org/debian unstable/main i386 sensible-utils all 0.0.24 [24.8 kB] Get: 18 http://deb.debian.org/debian unstable/main i386 libmagic-mgc i386 1:5.45-3+b1 [314 kB] Get: 19 http://deb.debian.org/debian unstable/main i386 libmagic1t64 i386 1:5.45-3+b1 [115 kB] Get: 20 http://deb.debian.org/debian unstable/main i386 file i386 1:5.45-3+b1 [43.2 kB] Get: 21 http://deb.debian.org/debian unstable/main i386 gettext-base i386 0.23.1-1 [245 kB] Get: 22 http://deb.debian.org/debian unstable/main i386 libuchardet0 i386 0.0.8-1+b2 [69.2 kB] Get: 23 http://deb.debian.org/debian unstable/main i386 groff-base i386 1.23.0-7 [1199 kB] Get: 24 http://deb.debian.org/debian unstable/main i386 bsdextrautils i386 2.40.4-3 [96.2 kB] Get: 25 http://deb.debian.org/debian unstable/main i386 libpipeline1 i386 1.5.8-1 [41.2 kB] Get: 26 http://deb.debian.org/debian unstable/main i386 man-db i386 2.13.0-1 [1428 kB] Get: 27 http://deb.debian.org/debian unstable/main i386 libtext-charwidth-perl i386 0.04-11+b4 [9656 B] Get: 28 http://deb.debian.org/debian unstable/main i386 libtext-wrapi18n-perl all 0.06-10 [8808 B] Get: 29 http://deb.debian.org/debian unstable/main i386 ucf all 3.0049 [42.5 kB] Get: 30 http://deb.debian.org/debian unstable/main i386 m4 i386 1.4.19-5 [301 kB] Get: 31 http://deb.debian.org/debian unstable/main i386 autoconf all 2.72-3 [493 kB] Get: 32 http://deb.debian.org/debian unstable/main i386 autotools-dev all 20220109.1 [51.6 kB] Get: 33 http://deb.debian.org/debian unstable/main i386 automake all 1:1.17-3 [862 kB] Get: 34 http://deb.debian.org/debian unstable/main i386 autopoint all 0.23.1-1 [770 kB] Get: 35 http://deb.debian.org/debian unstable/main i386 libdebhelper-perl all 13.24.1 [90.9 kB] Get: 36 http://deb.debian.org/debian unstable/main i386 libtool all 2.5.4-3 [539 kB] Get: 37 http://deb.debian.org/debian unstable/main i386 dh-autoreconf all 20 [17.1 kB] Get: 38 http://deb.debian.org/debian unstable/main i386 libarchive-zip-perl all 1.68-1 [104 kB] Get: 39 http://deb.debian.org/debian unstable/main i386 libfile-stripnondeterminism-perl all 1.14.1-2 [19.7 kB] Get: 40 http://deb.debian.org/debian unstable/main i386 dh-strip-nondeterminism all 1.14.1-2 [8620 B] Get: 41 http://deb.debian.org/debian unstable/main i386 libelf1t64 i386 0.192-4 [195 kB] Get: 42 http://deb.debian.org/debian unstable/main i386 dwz i386 0.15-1+b1 [116 kB] Get: 43 http://deb.debian.org/debian unstable/main i386 libunistring5 i386 1.3-1 [458 kB] Get: 44 http://deb.debian.org/debian unstable/main i386 libicu72 i386 72.1-6 [9582 kB] Get: 45 http://deb.debian.org/debian unstable/main i386 libxml2 i386 2.12.7+dfsg+really2.9.14-0.2+b1 [734 kB] Get: 46 http://deb.debian.org/debian unstable/main i386 gettext i386 0.23.1-1 [1714 kB] Get: 47 http://deb.debian.org/debian unstable/main i386 intltool-debian all 0.35.0+20060710.6 [22.9 kB] Get: 48 http://deb.debian.org/debian unstable/main i386 po-debconf all 1.0.21+nmu1 [248 kB] Get: 49 http://deb.debian.org/debian unstable/main i386 debhelper all 13.24.1 [920 kB] Get: 50 http://deb.debian.org/debian unstable/main i386 dh-package-notes all 0.15 [6692 B] Get: 51 http://deb.debian.org/debian unstable/main i386 libtcl8.6 i386 8.6.16+dfsg-1 [1103 kB] Get: 52 http://deb.debian.org/debian unstable/main i386 tcl8.6 i386 8.6.16+dfsg-1 [121 kB] Get: 53 http://deb.debian.org/debian unstable/main i386 tcl-expect i386 5.45.4-3+b1 [134 kB] Get: 54 http://deb.debian.org/debian unstable/main i386 expect i386 5.45.4-3+b1 [159 kB] Get: 55 http://deb.debian.org/debian unstable/main i386 libidn2-0 i386 2.3.7-2+b1 [130 kB] Get: 56 http://deb.debian.org/debian unstable/main i386 libp11-kit0 i386 0.25.5-3 [423 kB] Get: 57 http://deb.debian.org/debian unstable/main i386 libtasn1-6 i386 4.20.0-1 [51.6 kB] Get: 58 http://deb.debian.org/debian unstable/main i386 libgnutls30t64 i386 3.8.9-2 [1462 kB] Get: 59 http://deb.debian.org/debian unstable/main i386 libevent-2.1-7t64 i386 2.1.12-stable-10+b1 [195 kB] Get: 60 http://deb.debian.org/debian unstable/main i386 libunbound8 i386 1.22.0-1+b1 [633 kB] Get: 61 http://deb.debian.org/debian unstable/main i386 libgnutls-dane0t64 i386 3.8.9-2 [453 kB] Get: 62 http://deb.debian.org/debian unstable/main i386 gnutls-bin i386 3.8.9-2 [696 kB] Get: 63 http://deb.debian.org/debian unstable/main i386 libeac3 i386 1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3 [55.7 kB] Get: 64 http://deb.debian.org/debian unstable/main i386 libglib2.0-0t64 i386 2.83.3-2 [1581 kB] Get: 65 http://deb.debian.org/debian unstable/main i386 libnspr4 i386 2:4.36-1 [119 kB] Get: 66 http://deb.debian.org/debian unstable/main i386 libnspr4-dev i386 2:4.36-1 [220 kB] Get: 67 http://deb.debian.org/debian unstable/main i386 libnss3 i386 2:3.107-1 [1503 kB] Get: 68 http://deb.debian.org/debian unstable/main i386 libnss3-dev i386 2:3.107-1 [253 kB] Get: 69 http://deb.debian.org/debian unstable/main i386 libp11-kit-dev i386 0.25.5-3 [208 kB] Get: 70 http://deb.debian.org/debian unstable/main i386 libpkgconf3 i386 1.8.1-4 [38.4 kB] Get: 71 http://deb.debian.org/debian unstable/main i386 softhsm2-common i386 2.6.1-2.2+b1 [12.4 kB] Get: 72 http://deb.debian.org/debian unstable/main i386 libsofthsm2 i386 2.6.1-2.2+b1 [264 kB] Get: 73 http://deb.debian.org/debian unstable/main i386 libssl-dev i386 3.4.1-1 [2837 kB] Get: 74 http://deb.debian.org/debian unstable/main i386 libtommath1 i386 1.3.0-1 [64.8 kB] Get: 75 http://deb.debian.org/debian unstable/main i386 libtomcrypt1 i386 1.18.2+dfsg-7+b2 [407 kB] Get: 76 http://deb.debian.org/debian unstable/main i386 libstoken1t64 i386 0.92-1.1+b2 [31.2 kB] Get: 77 http://deb.debian.org/debian unstable/main i386 libtomcrypt-dev i386 1.18.2+dfsg-7+b2 [1272 kB] Get: 78 http://deb.debian.org/debian unstable/main i386 libstoken-dev i386 0.92-1.1+b2 [8204 B] Get: 79 http://deb.debian.org/debian unstable/main i386 ninja-build i386 1.12.1-1 [153 kB] Get: 80 http://deb.debian.org/debian unstable/main i386 python3-autocommand all 2.2.2-3 [13.6 kB] Get: 81 http://deb.debian.org/debian unstable/main i386 python3-more-itertools all 10.6.0-1 [65.3 kB] Get: 82 http://deb.debian.org/debian unstable/main i386 python3-typing-extensions all 4.12.2-2 [73.0 kB] Get: 83 http://deb.debian.org/debian unstable/main i386 python3-typeguard all 4.4.1-1 [37.0 kB] Get: 84 http://deb.debian.org/debian unstable/main i386 python3-inflect all 7.3.1-2 [32.4 kB] Get: 85 http://deb.debian.org/debian unstable/main i386 python3-jaraco.context all 6.0.0-1 [7984 B] Get: 86 http://deb.debian.org/debian unstable/main i386 python3-jaraco.functools all 4.1.0-1 [12.0 kB] Get: 87 http://deb.debian.org/debian unstable/main i386 python3-pkg-resources all 75.6.0-1 [222 kB] Get: 88 http://deb.debian.org/debian unstable/main i386 python3-jaraco.text all 4.0.0-1 [11.4 kB] Get: 89 http://deb.debian.org/debian unstable/main i386 python3-zipp all 3.21.0-1 [10.6 kB] Get: 90 http://deb.debian.org/debian unstable/main i386 python3-setuptools all 75.6.0-1 [720 kB] Get: 91 http://deb.debian.org/debian unstable/main i386 meson all 1.7.0-1 [639 kB] Get: 92 http://deb.debian.org/debian unstable/main i386 opensc-pkcs11 i386 0.26.0-1 [910 kB] Get: 93 http://deb.debian.org/debian unstable/main i386 opensc i386 0.26.0-1 [415 kB] Get: 94 http://deb.debian.org/debian unstable/main i386 openssl i386 3.4.1-1 [1432 kB] Get: 95 http://deb.debian.org/debian unstable/main i386 p11-kit-modules i386 0.25.5-3 [270 kB] Get: 96 http://deb.debian.org/debian unstable/main i386 p11-kit i386 0.25.5-3 [406 kB] Get: 97 http://deb.debian.org/debian unstable/main i386 pkgconf-bin i386 1.8.1-4 [30.6 kB] Get: 98 http://deb.debian.org/debian unstable/main i386 pkgconf i386 1.8.1-4 [26.2 kB] Get: 99 http://deb.debian.org/debian unstable/main i386 softhsm2 i386 2.6.1-2.2+b1 [177 kB] Fetched 48.5 MB in 0s (126 MB/s) Preconfiguring packages ... Selecting previously unselected package libpython3.13-minimal:i386. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19794 files and directories currently installed.) Preparing to unpack .../libpython3.13-minimal_3.13.2-1_i386.deb ... Unpacking libpython3.13-minimal:i386 (3.13.2-1) ... Selecting previously unselected package libexpat1:i386. Preparing to unpack .../libexpat1_2.6.4-1_i386.deb ... Unpacking libexpat1:i386 (2.6.4-1) ... Selecting previously unselected package python3.13-minimal. Preparing to unpack .../python3.13-minimal_3.13.2-1_i386.deb ... Unpacking python3.13-minimal (3.13.2-1) ... Setting up libpython3.13-minimal:i386 (3.13.2-1) ... Setting up libexpat1:i386 (2.6.4-1) ... Setting up python3.13-minimal (3.13.2-1) ... Selecting previously unselected package python3-minimal. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 20128 files and directories currently installed.) Preparing to unpack .../0-python3-minimal_3.13.1-2_i386.deb ... Unpacking python3-minimal (3.13.1-2) ... Selecting previously unselected package media-types. Preparing to unpack .../1-media-types_11.0.0_all.deb ... Unpacking media-types (11.0.0) ... Selecting previously unselected package netbase. Preparing to unpack .../2-netbase_6.4_all.deb ... Unpacking netbase (6.4) ... Selecting previously unselected package tzdata. Preparing to unpack .../3-tzdata_2025a-2_all.deb ... Unpacking tzdata (2025a-2) ... Selecting previously unselected package libffi8:i386. Preparing to unpack .../4-libffi8_3.4.7-1_i386.deb ... Unpacking libffi8:i386 (3.4.7-1) ... Selecting previously unselected package readline-common. Preparing to unpack .../5-readline-common_8.2-6_all.deb ... Unpacking readline-common (8.2-6) ... Selecting previously unselected package libreadline8t64:i386. Preparing to unpack .../6-libreadline8t64_8.2-6_i386.deb ... Adding 'diversion of /lib/i386-linux-gnu/libhistory.so.8 to /lib/i386-linux-gnu/libhistory.so.8.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/i386-linux-gnu/libhistory.so.8.2 to /lib/i386-linux-gnu/libhistory.so.8.2.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/i386-linux-gnu/libreadline.so.8 to /lib/i386-linux-gnu/libreadline.so.8.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/i386-linux-gnu/libreadline.so.8.2 to /lib/i386-linux-gnu/libreadline.so.8.2.usr-is-merged by libreadline8t64' Unpacking libreadline8t64:i386 (8.2-6) ... Selecting previously unselected package libpython3.13-stdlib:i386. Preparing to unpack .../7-libpython3.13-stdlib_3.13.2-1_i386.deb ... Unpacking libpython3.13-stdlib:i386 (3.13.2-1) ... Selecting previously unselected package python3.13. Preparing to unpack .../8-python3.13_3.13.2-1_i386.deb ... Unpacking python3.13 (3.13.2-1) ... Selecting previously unselected package libpython3-stdlib:i386. Preparing to unpack .../9-libpython3-stdlib_3.13.1-2_i386.deb ... Unpacking libpython3-stdlib:i386 (3.13.1-2) ... Setting up python3-minimal (3.13.1-2) ... Selecting previously unselected package python3. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 21138 files and directories currently installed.) Preparing to unpack .../00-python3_3.13.1-2_i386.deb ... Unpacking python3 (3.13.1-2) ... Selecting previously unselected package libproc2-0:i386. Preparing to unpack .../01-libproc2-0_2%3a4.0.4-7_i386.deb ... Unpacking libproc2-0:i386 (2:4.0.4-7) ... Selecting previously unselected package procps. Preparing to unpack .../02-procps_2%3a4.0.4-7_i386.deb ... Unpacking procps (2:4.0.4-7) ... Selecting previously unselected package sensible-utils. Preparing to unpack .../03-sensible-utils_0.0.24_all.deb ... Unpacking sensible-utils (0.0.24) ... Selecting previously unselected package libmagic-mgc. Preparing to unpack .../04-libmagic-mgc_1%3a5.45-3+b1_i386.deb ... Unpacking libmagic-mgc (1:5.45-3+b1) ... Selecting previously unselected package libmagic1t64:i386. Preparing to unpack .../05-libmagic1t64_1%3a5.45-3+b1_i386.deb ... Unpacking libmagic1t64:i386 (1:5.45-3+b1) ... Selecting previously unselected package file. Preparing to unpack .../06-file_1%3a5.45-3+b1_i386.deb ... Unpacking file (1:5.45-3+b1) ... Selecting previously unselected package gettext-base. Preparing to unpack .../07-gettext-base_0.23.1-1_i386.deb ... Unpacking gettext-base (0.23.1-1) ... Selecting previously unselected package libuchardet0:i386. Preparing to unpack .../08-libuchardet0_0.0.8-1+b2_i386.deb ... Unpacking libuchardet0:i386 (0.0.8-1+b2) ... Selecting previously unselected package groff-base. Preparing to unpack .../09-groff-base_1.23.0-7_i386.deb ... Unpacking groff-base (1.23.0-7) ... Selecting previously unselected package bsdextrautils. Preparing to unpack .../10-bsdextrautils_2.40.4-3_i386.deb ... Unpacking bsdextrautils (2.40.4-3) ... Selecting previously unselected package libpipeline1:i386. Preparing to unpack .../11-libpipeline1_1.5.8-1_i386.deb ... Unpacking libpipeline1:i386 (1.5.8-1) ... Selecting previously unselected package man-db. Preparing to unpack .../12-man-db_2.13.0-1_i386.deb ... Unpacking man-db (2.13.0-1) ... Selecting previously unselected package libtext-charwidth-perl:i386. Preparing to unpack .../13-libtext-charwidth-perl_0.04-11+b4_i386.deb ... Unpacking libtext-charwidth-perl:i386 (0.04-11+b4) ... Selecting previously unselected package libtext-wrapi18n-perl. Preparing to unpack .../14-libtext-wrapi18n-perl_0.06-10_all.deb ... Unpacking libtext-wrapi18n-perl (0.06-10) ... Selecting previously unselected package ucf. Preparing to unpack .../15-ucf_3.0049_all.deb ... Moving old data out of the way Unpacking ucf (3.0049) ... Selecting previously unselected package m4. Preparing to unpack .../16-m4_1.4.19-5_i386.deb ... Unpacking m4 (1.4.19-5) ... Selecting previously unselected package autoconf. Preparing to unpack .../17-autoconf_2.72-3_all.deb ... Unpacking autoconf (2.72-3) ... Selecting previously unselected package autotools-dev. Preparing to unpack .../18-autotools-dev_20220109.1_all.deb ... Unpacking autotools-dev (20220109.1) ... Selecting previously unselected package automake. Preparing to unpack .../19-automake_1%3a1.17-3_all.deb ... Unpacking automake (1:1.17-3) ... Selecting previously unselected package autopoint. Preparing to unpack .../20-autopoint_0.23.1-1_all.deb ... Unpacking autopoint (0.23.1-1) ... Selecting previously unselected package libdebhelper-perl. Preparing to unpack .../21-libdebhelper-perl_13.24.1_all.deb ... Unpacking libdebhelper-perl (13.24.1) ... Selecting previously unselected package libtool. Preparing to unpack .../22-libtool_2.5.4-3_all.deb ... Unpacking libtool (2.5.4-3) ... Selecting previously unselected package dh-autoreconf. Preparing to unpack .../23-dh-autoreconf_20_all.deb ... Unpacking dh-autoreconf (20) ... Selecting previously unselected package libarchive-zip-perl. Preparing to unpack .../24-libarchive-zip-perl_1.68-1_all.deb ... Unpacking libarchive-zip-perl (1.68-1) ... Selecting previously unselected package libfile-stripnondeterminism-perl. Preparing to unpack .../25-libfile-stripnondeterminism-perl_1.14.1-2_all.deb ... Unpacking libfile-stripnondeterminism-perl (1.14.1-2) ... Selecting previously unselected package dh-strip-nondeterminism. Preparing to unpack .../26-dh-strip-nondeterminism_1.14.1-2_all.deb ... Unpacking dh-strip-nondeterminism (1.14.1-2) ... Selecting previously unselected package libelf1t64:i386. Preparing to unpack .../27-libelf1t64_0.192-4_i386.deb ... Unpacking libelf1t64:i386 (0.192-4) ... Selecting previously unselected package dwz. Preparing to unpack .../28-dwz_0.15-1+b1_i386.deb ... Unpacking dwz (0.15-1+b1) ... Selecting previously unselected package libunistring5:i386. Preparing to unpack .../29-libunistring5_1.3-1_i386.deb ... Unpacking libunistring5:i386 (1.3-1) ... Selecting previously unselected package libicu72:i386. Preparing to unpack .../30-libicu72_72.1-6_i386.deb ... Unpacking libicu72:i386 (72.1-6) ... Selecting previously unselected package libxml2:i386. Preparing to unpack .../31-libxml2_2.12.7+dfsg+really2.9.14-0.2+b1_i386.deb ... Unpacking libxml2:i386 (2.12.7+dfsg+really2.9.14-0.2+b1) ... Selecting previously unselected package gettext. Preparing to unpack .../32-gettext_0.23.1-1_i386.deb ... Unpacking gettext (0.23.1-1) ... Selecting previously unselected package intltool-debian. Preparing to unpack .../33-intltool-debian_0.35.0+20060710.6_all.deb ... Unpacking intltool-debian (0.35.0+20060710.6) ... Selecting previously unselected package po-debconf. Preparing to unpack .../34-po-debconf_1.0.21+nmu1_all.deb ... Unpacking po-debconf (1.0.21+nmu1) ... Selecting previously unselected package debhelper. Preparing to unpack .../35-debhelper_13.24.1_all.deb ... Unpacking debhelper (13.24.1) ... Selecting previously unselected package dh-package-notes. Preparing to unpack .../36-dh-package-notes_0.15_all.deb ... Unpacking dh-package-notes (0.15) ... Selecting previously unselected package libtcl8.6:i386. Preparing to unpack .../37-libtcl8.6_8.6.16+dfsg-1_i386.deb ... Unpacking libtcl8.6:i386 (8.6.16+dfsg-1) ... Selecting previously unselected package tcl8.6. Preparing to unpack .../38-tcl8.6_8.6.16+dfsg-1_i386.deb ... Unpacking tcl8.6 (8.6.16+dfsg-1) ... Selecting previously unselected package tcl-expect:i386. Preparing to unpack .../39-tcl-expect_5.45.4-3+b1_i386.deb ... Unpacking tcl-expect:i386 (5.45.4-3+b1) ... Selecting previously unselected package expect. Preparing to unpack .../40-expect_5.45.4-3+b1_i386.deb ... Unpacking expect (5.45.4-3+b1) ... Selecting previously unselected package libidn2-0:i386. Preparing to unpack .../41-libidn2-0_2.3.7-2+b1_i386.deb ... Unpacking libidn2-0:i386 (2.3.7-2+b1) ... Selecting previously unselected package libp11-kit0:i386. Preparing to unpack .../42-libp11-kit0_0.25.5-3_i386.deb ... Unpacking libp11-kit0:i386 (0.25.5-3) ... Selecting previously unselected package libtasn1-6:i386. Preparing to unpack .../43-libtasn1-6_4.20.0-1_i386.deb ... Unpacking libtasn1-6:i386 (4.20.0-1) ... Selecting previously unselected package libgnutls30t64:i386. Preparing to unpack .../44-libgnutls30t64_3.8.9-2_i386.deb ... Unpacking libgnutls30t64:i386 (3.8.9-2) ... Selecting previously unselected package libevent-2.1-7t64:i386. Preparing to unpack .../45-libevent-2.1-7t64_2.1.12-stable-10+b1_i386.deb ... Unpacking libevent-2.1-7t64:i386 (2.1.12-stable-10+b1) ... Selecting previously unselected package libunbound8:i386. Preparing to unpack .../46-libunbound8_1.22.0-1+b1_i386.deb ... Unpacking libunbound8:i386 (1.22.0-1+b1) ... Selecting previously unselected package libgnutls-dane0t64:i386. Preparing to unpack .../47-libgnutls-dane0t64_3.8.9-2_i386.deb ... Unpacking libgnutls-dane0t64:i386 (3.8.9-2) ... Selecting previously unselected package gnutls-bin. Preparing to unpack .../48-gnutls-bin_3.8.9-2_i386.deb ... Unpacking gnutls-bin (3.8.9-2) ... Selecting previously unselected package libeac3:i386. Preparing to unpack .../49-libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3_i386.deb ... Unpacking libeac3:i386 (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ... Selecting previously unselected package libglib2.0-0t64:i386. Preparing to unpack .../50-libglib2.0-0t64_2.83.3-2_i386.deb ... Unpacking libglib2.0-0t64:i386 (2.83.3-2) ... Selecting previously unselected package libnspr4:i386. Preparing to unpack .../51-libnspr4_2%3a4.36-1_i386.deb ... Unpacking libnspr4:i386 (2:4.36-1) ... Selecting previously unselected package libnspr4-dev. Preparing to unpack .../52-libnspr4-dev_2%3a4.36-1_i386.deb ... Unpacking libnspr4-dev (2:4.36-1) ... Selecting previously unselected package libnss3:i386. Preparing to unpack .../53-libnss3_2%3a3.107-1_i386.deb ... Unpacking libnss3:i386 (2:3.107-1) ... Selecting previously unselected package libnss3-dev:i386. Preparing to unpack .../54-libnss3-dev_2%3a3.107-1_i386.deb ... Unpacking libnss3-dev:i386 (2:3.107-1) ... Selecting previously unselected package libp11-kit-dev:i386. Preparing to unpack .../55-libp11-kit-dev_0.25.5-3_i386.deb ... Unpacking libp11-kit-dev:i386 (0.25.5-3) ... Selecting previously unselected package libpkgconf3:i386. Preparing to unpack .../56-libpkgconf3_1.8.1-4_i386.deb ... Unpacking libpkgconf3:i386 (1.8.1-4) ... Selecting previously unselected package softhsm2-common. Preparing to unpack .../57-softhsm2-common_2.6.1-2.2+b1_i386.deb ... Unpacking softhsm2-common (2.6.1-2.2+b1) ... Selecting previously unselected package libsofthsm2. Preparing to unpack .../58-libsofthsm2_2.6.1-2.2+b1_i386.deb ... Unpacking libsofthsm2 (2.6.1-2.2+b1) ... Selecting previously unselected package libssl-dev:i386. Preparing to unpack .../59-libssl-dev_3.4.1-1_i386.deb ... Unpacking libssl-dev:i386 (3.4.1-1) ... Selecting previously unselected package libtommath1:i386. Preparing to unpack .../60-libtommath1_1.3.0-1_i386.deb ... Unpacking libtommath1:i386 (1.3.0-1) ... Selecting previously unselected package libtomcrypt1:i386. Preparing to unpack .../61-libtomcrypt1_1.18.2+dfsg-7+b2_i386.deb ... Unpacking libtomcrypt1:i386 (1.18.2+dfsg-7+b2) ... Selecting previously unselected package libstoken1t64:i386. Preparing to unpack .../62-libstoken1t64_0.92-1.1+b2_i386.deb ... Unpacking libstoken1t64:i386 (0.92-1.1+b2) ... Selecting previously unselected package libtomcrypt-dev. Preparing to unpack .../63-libtomcrypt-dev_1.18.2+dfsg-7+b2_i386.deb ... Unpacking libtomcrypt-dev (1.18.2+dfsg-7+b2) ... Selecting previously unselected package libstoken-dev:i386. Preparing to unpack .../64-libstoken-dev_0.92-1.1+b2_i386.deb ... Unpacking libstoken-dev:i386 (0.92-1.1+b2) ... Selecting previously unselected package ninja-build. Preparing to unpack .../65-ninja-build_1.12.1-1_i386.deb ... Unpacking ninja-build (1.12.1-1) ... Selecting previously unselected package python3-autocommand. Preparing to unpack .../66-python3-autocommand_2.2.2-3_all.deb ... Unpacking python3-autocommand (2.2.2-3) ... Selecting previously unselected package python3-more-itertools. Preparing to unpack .../67-python3-more-itertools_10.6.0-1_all.deb ... Unpacking python3-more-itertools (10.6.0-1) ... Selecting previously unselected package python3-typing-extensions. Preparing to unpack .../68-python3-typing-extensions_4.12.2-2_all.deb ... Unpacking python3-typing-extensions (4.12.2-2) ... Selecting previously unselected package python3-typeguard. Preparing to unpack .../69-python3-typeguard_4.4.1-1_all.deb ... Unpacking python3-typeguard (4.4.1-1) ... Selecting previously unselected package python3-inflect. Preparing to unpack .../70-python3-inflect_7.3.1-2_all.deb ... Unpacking python3-inflect (7.3.1-2) ... Selecting previously unselected package python3-jaraco.context. Preparing to unpack .../71-python3-jaraco.context_6.0.0-1_all.deb ... Unpacking python3-jaraco.context (6.0.0-1) ... Selecting previously unselected package python3-jaraco.functools. Preparing to unpack .../72-python3-jaraco.functools_4.1.0-1_all.deb ... Unpacking python3-jaraco.functools (4.1.0-1) ... Selecting previously unselected package python3-pkg-resources. Preparing to unpack .../73-python3-pkg-resources_75.6.0-1_all.deb ... Unpacking python3-pkg-resources (75.6.0-1) ... Selecting previously unselected package python3-jaraco.text. Preparing to unpack .../74-python3-jaraco.text_4.0.0-1_all.deb ... Unpacking python3-jaraco.text (4.0.0-1) ... Selecting previously unselected package python3-zipp. Preparing to unpack .../75-python3-zipp_3.21.0-1_all.deb ... Unpacking python3-zipp (3.21.0-1) ... Selecting previously unselected package python3-setuptools. Preparing to unpack .../76-python3-setuptools_75.6.0-1_all.deb ... Unpacking python3-setuptools (75.6.0-1) ... Selecting previously unselected package meson. Preparing to unpack .../77-meson_1.7.0-1_all.deb ... Unpacking meson (1.7.0-1) ... Selecting previously unselected package opensc-pkcs11:i386. Preparing to unpack .../78-opensc-pkcs11_0.26.0-1_i386.deb ... Unpacking opensc-pkcs11:i386 (0.26.0-1) ... Selecting previously unselected package opensc. Preparing to unpack .../79-opensc_0.26.0-1_i386.deb ... Unpacking opensc (0.26.0-1) ... Selecting previously unselected package openssl. Preparing to unpack .../80-openssl_3.4.1-1_i386.deb ... Unpacking openssl (3.4.1-1) ... Selecting previously unselected package p11-kit-modules:i386. Preparing to unpack .../81-p11-kit-modules_0.25.5-3_i386.deb ... Unpacking p11-kit-modules:i386 (0.25.5-3) ... Selecting previously unselected package p11-kit. Preparing to unpack .../82-p11-kit_0.25.5-3_i386.deb ... Unpacking p11-kit (0.25.5-3) ... Selecting previously unselected package pkgconf-bin. Preparing to unpack .../83-pkgconf-bin_1.8.1-4_i386.deb ... Unpacking pkgconf-bin (1.8.1-4) ... Selecting previously unselected package pkgconf:i386. Preparing to unpack .../84-pkgconf_1.8.1-4_i386.deb ... Unpacking pkgconf:i386 (1.8.1-4) ... Selecting previously unselected package softhsm2. Preparing to unpack .../85-softhsm2_2.6.1-2.2+b1_i386.deb ... Unpacking softhsm2 (2.6.1-2.2+b1) ... Setting up media-types (11.0.0) ... Setting up libpipeline1:i386 (1.5.8-1) ... Setting up libtext-charwidth-perl:i386 (0.04-11+b4) ... Setting up libicu72:i386 (72.1-6) ... Setting up bsdextrautils (2.40.4-3) ... Setting up libmagic-mgc (1:5.45-3+b1) ... Setting up libarchive-zip-perl (1.68-1) ... Setting up libtommath1:i386 (1.3.0-1) ... Setting up libdebhelper-perl (13.24.1) ... Setting up libmagic1t64:i386 (1:5.45-3+b1) ... Setting up gettext-base (0.23.1-1) ... Setting up m4 (1.4.19-5) ... Setting up libevent-2.1-7t64:i386 (2.1.12-stable-10+b1) ... Setting up file (1:5.45-3+b1) ... Setting up libtext-wrapi18n-perl (0.06-10) ... Setting up ninja-build (1.12.1-1) ... Setting up libelf1t64:i386 (0.192-4) ... Setting up libeac3:i386 (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ... Setting up tzdata (2025a-2) ... Current default time zone: 'Etc/UTC' Local time is now: Thu Mar 19 07:57:38 UTC 2026. Universal Time is now: Thu Mar 19 07:57:38 UTC 2026. Run 'dpkg-reconfigure tzdata' if you wish to change it. Setting up autotools-dev (20220109.1) ... Setting up libunbound8:i386 (1.22.0-1+b1) ... Setting up libpkgconf3:i386 (1.8.1-4) ... Setting up libnspr4:i386 (2:4.36-1) ... Setting up libproc2-0:i386 (2:4.0.4-7) ... Setting up libunistring5:i386 (1.3-1) ... Setting up libssl-dev:i386 (3.4.1-1) ... Setting up libtcl8.6:i386 (8.6.16+dfsg-1) ... Setting up autopoint (0.23.1-1) ... Setting up pkgconf-bin (1.8.1-4) ... Setting up autoconf (2.72-3) ... Setting up libffi8:i386 (3.4.7-1) ... Setting up dwz (0.15-1+b1) ... Setting up sensible-utils (0.0.24) ... Setting up libuchardet0:i386 (0.0.8-1+b2) ... Setting up procps (2:4.0.4-7) ... Setting up libtasn1-6:i386 (4.20.0-1) ... Setting up netbase (6.4) ... Setting up openssl (3.4.1-1) ... Setting up readline-common (8.2-6) ... Setting up libxml2:i386 (2.12.7+dfsg+really2.9.14-0.2+b1) ... Setting up libtomcrypt1:i386 (1.18.2+dfsg-7+b2) ... Setting up automake (1:1.17-3) ... update-alternatives: using /usr/bin/automake-1.17 to provide /usr/bin/automake (automake) in auto mode Setting up libfile-stripnondeterminism-perl (1.14.1-2) ... Setting up libnspr4-dev (2:4.36-1) ... Setting up tcl8.6 (8.6.16+dfsg-1) ... Setting up gettext (0.23.1-1) ... Setting up libtool (2.5.4-3) ... Setting up tcl-expect:i386 (5.45.4-3+b1) ... Setting up libidn2-0:i386 (2.3.7-2+b1) ... Setting up libnss3:i386 (2:3.107-1) ... Setting up pkgconf:i386 (1.8.1-4) ... Setting up intltool-debian (0.35.0+20060710.6) ... Setting up libstoken1t64:i386 (0.92-1.1+b2) ... Setting up dh-autoreconf (20) ... Setting up libtomcrypt-dev (1.18.2+dfsg-7+b2) ... Setting up libglib2.0-0t64:i386 (2.83.3-2) ... No schema files found: doing nothing. Setting up libstoken-dev:i386 (0.92-1.1+b2) ... Setting up libp11-kit0:i386 (0.25.5-3) ... Setting up ucf (3.0049) ... Setting up libreadline8t64:i386 (8.2-6) ... Setting up dh-strip-nondeterminism (1.14.1-2) ... Setting up libnss3-dev:i386 (2:3.107-1) ... Setting up groff-base (1.23.0-7) ... Setting up libpython3.13-stdlib:i386 (3.13.2-1) ... Setting up libp11-kit-dev:i386 (0.25.5-3) ... Setting up libpython3-stdlib:i386 (3.13.1-2) ... Setting up libgnutls30t64:i386 (3.8.9-2) ... Setting up softhsm2-common (2.6.1-2.2+b1) ... Creating config file /etc/softhsm/softhsm2.conf with new version Setting up python3.13 (3.13.2-1) ... Setting up po-debconf (1.0.21+nmu1) ... Setting up expect (5.45.4-3+b1) ... Setting up python3 (3.13.1-2) ... Setting up python3-zipp (3.21.0-1) ... Setting up python3-autocommand (2.2.2-3) ... Setting up man-db (2.13.0-1) ... Not building database; man-db/auto-update is not 'true'. Setting up opensc-pkcs11:i386 (0.26.0-1) ... Setting up p11-kit-modules:i386 (0.25.5-3) ... Setting up libgnutls-dane0t64:i386 (3.8.9-2) ... Setting up python3-typing-extensions (4.12.2-2) ... Setting up p11-kit (0.25.5-3) ... Setting up gnutls-bin (3.8.9-2) ... Setting up python3-more-itertools (10.6.0-1) ... Setting up libsofthsm2 (2.6.1-2.2+b1) ... Setting up softhsm2 (2.6.1-2.2+b1) ... Setting up python3-jaraco.functools (4.1.0-1) ... Setting up python3-jaraco.context (6.0.0-1) ... Setting up opensc (0.26.0-1) ... Setting up python3-typeguard (4.4.1-1) ... Setting up debhelper (13.24.1) ... Setting up python3-inflect (7.3.1-2) ... Setting up python3-jaraco.text (4.0.0-1) ... Setting up python3-pkg-resources (75.6.0-1) ... Setting up dh-package-notes (0.15) ... Setting up python3-setuptools (75.6.0-1) ... Setting up meson (1.7.0-1) ... Processing triggers for libc-bin (2.40-6) ... Reading package lists... Building dependency tree... Reading state information... Reading extended state information... Initializing package states... Writing extended state information... Building tag database... -> Finished parsing the build-deps I: Building the package I: user script /srv/workspace/pbuilder/123237/tmp/hooks/A99_set_merged_usr starting Not re-configuring usrmerge for unstable I: user script /srv/workspace/pbuilder/123237/tmp/hooks/A99_set_merged_usr finished hostname: Name or service not known I: Running cd /build/reproducible-path/pkcs11-provider-1.0/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../pkcs11-provider_1.0-1_source.changes dpkg-buildpackage: info: source package pkcs11-provider dpkg-buildpackage: info: source version 1.0-1 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Luca Boccassi dpkg-source --before-build . dpkg-buildpackage: info: host architecture i386 debian/rules clean dh clean --buildsystem=meson dh_auto_clean -O--buildsystem=meson dh_autoreconf_clean -O--buildsystem=meson dh_clean -O--buildsystem=meson debian/rules binary dh binary --buildsystem=meson dh_update_autotools_config -O--buildsystem=meson dh_autoreconf -O--buildsystem=meson dh_auto_configure -O--buildsystem=meson cd obj-i686-linux-gnu && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 meson setup .. --wrap-mode=nodownload --buildtype=plain --prefix=/usr --sysconfdir=/etc --localstatedir=/var --libdir=lib/i386-linux-gnu -Dpython.bytecompile=-1 The Meson build system Version: 1.7.0 Source dir: /build/reproducible-path/pkcs11-provider-1.0 Build dir: /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu Build type: native build Project name: pkcs11-provider Project version: 1.0 C compiler for the host machine: cc (gcc 14.2.0 "cc (Debian 14.2.0-17) 14.2.0") C linker for the host machine: cc ld.bfd 2.44 Host machine cpu family: x86 Host machine cpu: i686 Compiler for C supports arguments -Wwrite-strings: YES Compiler for C supports arguments -Wpointer-arith: YES Compiler for C supports arguments -Wno-missing-field-initializers: YES Compiler for C supports arguments -Wformat: YES Compiler for C supports arguments -Wshadow: YES Compiler for C supports arguments -Wno-unused-parameter: YES Compiler for C supports arguments -Werror=implicit-function-declaration: YES Compiler for C supports arguments -Werror=missing-prototypes: YES Compiler for C supports arguments -Werror=format-security: YES Compiler for C supports arguments -Werror=parentheses: YES Compiler for C supports arguments -Werror=implicit: YES Compiler for C supports arguments -Werror=strict-prototypes: YES Compiler for C supports arguments -fno-strict-aliasing: YES Compiler for C supports arguments -fno-delete-null-pointer-checks: YES Compiler for C supports arguments -fdiagnostics-show-option: YES Found pkg-config: YES (/usr/bin/pkg-config) 1.8.1 Run-time dependency libcrypto found: YES 3.4.1 Run-time dependency libssl found: YES 3.4.1 Run-time dependency p11-kit-1 found: YES 0.25.5 Has header "dlfcn.h" : YES Configuring config.h using configuration Compiler for C supports link arguments -Wl,--version-script,/build/reproducible-path/pkcs11-provider-1.0/src/provider.map: YES Did not find CMake 'cmake' Found CMake: NO Run-time dependency nss-softokn found: NO (tried pkgconfig and cmake) Run-time dependency nss found: YES 3.107 Program setup.sh found: YES (/build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh) Program valgrind found: NO Program test-wrapper found: YES (/build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper) Build targets in project: 12 pkcs11-provider 1.0 User defined options buildtype : plain libdir : lib/i386-linux-gnu localstatedir : /var prefix : /usr python.bytecompile: -1 sysconfdir : /etc wrap_mode : nodownload Found ninja-1.12.1 at /usr/bin/ninja dh_auto_build -O--buildsystem=meson cd obj-i686-linux-gnu && LC_ALL=C.UTF-8 ninja -j21 -v [1/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/pk11_uri.c.o -MF src/pkcs11.so.p/pk11_uri.c.o.d -o src/pkcs11.so.p/pk11_uri.c.o -c ../src/pk11_uri.c [2/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/tls.c.o -MF src/pkcs11.so.p/tls.c.o.d -o src/pkcs11.so.p/tls.c.o -c ../src/tls.c [3/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/random.c.o -MF src/pkcs11.so.p/random.c.o.d -o src/pkcs11.so.p/random.c.o -c ../src/random.c [4/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/decoder.c.o -MF src/pkcs11.so.p/decoder.c.o.d -o src/pkcs11.so.p/decoder.c.o -c ../src/decoder.c [5/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/asymmetric_cipher.c.o -MF src/pkcs11.so.p/asymmetric_cipher.c.o.d -o src/pkcs11.so.p/asymmetric_cipher.c.o -c ../src/asymmetric_cipher.c [6/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/debug.c.o -MF src/pkcs11.so.p/debug.c.o.d -o src/pkcs11.so.p/debug.c.o -c ../src/debug.c [7/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/digests.c.o -MF src/pkcs11.so.p/digests.c.o.d -o src/pkcs11.so.p/digests.c.o -c ../src/digests.c [8/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/store.c.o -MF src/pkcs11.so.p/store.c.o.d -o src/pkcs11.so.p/store.c.o -c ../src/store.c [9/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/kdf.c.o -MF src/pkcs11.so.p/kdf.c.o.d -o src/pkcs11.so.p/kdf.c.o -c ../src/kdf.c [10/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/exchange.c.o -MF src/pkcs11.so.p/exchange.c.o.d -o src/pkcs11.so.p/exchange.c.o -c ../src/exchange.c [11/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/slot.c.o -MF src/pkcs11.so.p/slot.c.o.d -o src/pkcs11.so.p/slot.c.o -c ../src/slot.c [12/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/encoder.c.o -MF src/pkcs11.so.p/encoder.c.o.d -o src/pkcs11.so.p/encoder.c.o -c ../src/encoder.c [13/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/util.c.o -MF src/pkcs11.so.p/util.c.o.d -o src/pkcs11.so.p/util.c.o -c ../src/util.c [14/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/session.c.o -MF src/pkcs11.so.p/session.c.o.d -o src/pkcs11.so.p/session.c.o -c ../src/session.c [15/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/keymgmt.c.o -MF src/pkcs11.so.p/keymgmt.c.o.d -o src/pkcs11.so.p/keymgmt.c.o -c ../src/keymgmt.c [16/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/interface.c.o -MF src/pkcs11.so.p/interface.c.o.d -o src/pkcs11.so.p/interface.c.o -c ../src/interface.c [17/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/signature.c.o -MF src/pkcs11.so.p/signature.c.o.d -o src/pkcs11.so.p/signature.c.o -c ../src/signature.c [18/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/provider.c.o -MF src/pkcs11.so.p/provider.c.o.d -o src/pkcs11.so.p/provider.c.o -c ../src/provider.c [19/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/objects.c.o -MF src/pkcs11.so.p/objects.c.o.d -o src/pkcs11.so.p/objects.c.o -c ../src/objects.c [20/20] cc -o src/pkcs11.so src/pkcs11.so.p/asymmetric_cipher.c.o src/pkcs11.so.p/debug.c.o src/pkcs11.so.p/encoder.c.o src/pkcs11.so.p/decoder.c.o src/pkcs11.so.p/digests.c.o src/pkcs11.so.p/exchange.c.o src/pkcs11.so.p/kdf.c.o src/pkcs11.so.p/keymgmt.c.o src/pkcs11.so.p/pk11_uri.c.o src/pkcs11.so.p/interface.c.o src/pkcs11.so.p/objects.c.o src/pkcs11.so.p/provider.c.o src/pkcs11.so.p/random.c.o src/pkcs11.so.p/session.c.o src/pkcs11.so.p/signature.c.o src/pkcs11.so.p/slot.c.o src/pkcs11.so.p/store.c.o src/pkcs11.so.p/tls.c.o src/pkcs11.so.p/util.c.o -Wl,--as-needed -Wl,--allow-shlib-undefined -shared -fPIC -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--version-script,/build/reproducible-path/pkcs11-provider-1.0/src/provider.map /usr/lib/i386-linux-gnu/libcrypto.so dh_auto_test -O--buildsystem=meson cd obj-i686-linux-gnu && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 MESON_TESTTHREADS=21 meson test --verbose ninja: Entering directory `/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu' [1/29] Compiling C object tests/tlssetkey.p/tlssetkey.c.o [2/29] Compiling C object tests/tdigests.p/tdigests.c.o [3/29] Compiling C object tests/tpkey.p/tpkey.c.o [4/29] Compiling C object tests/tcmpkeys.p/tcmpkeys.c.o [5/29] Compiling C object tests/tpkey.p/util.c.o [6/29] Compiling C object tests/tlssetkey.p/util.c.o [7/29] Compiling C object tests/tfork.p/util.c.o [8/29] Compiling C object tests/ccerts.p/ccerts.c.o [9/29] Compiling C object tests/treadkeys.p/treadkeys.c.o [10/29] Compiling C object tests/tlsctx.p/tlsctx.c.o [11/29] Compiling C object tests/tsession.p/tsession.c.o [12/29] Linking target tests/tdigests [13/29] Compiling C object tests/pincache.p/pincache.c.o [14/29] Compiling C object tests/tfork.p/tfork.c.o [15/29] Linking target tests/tlssetkey [16/29] Linking target tests/tpkey [17/29] Compiling C object tests/tgenkey.p/util.c.o [18/29] Linking target tests/treadkeys [19/29] Compiling C object tests/tlsctx.p/util.c.o [20/29] Linking target tests/tsession [21/29] Compiling C object tests/tcmpkeys.p/util.c.o [22/29] Compiling C object tests/ccerts.p/util.c.o [23/29] Linking target tests/pincache [24/29] Linking target tests/tfork [25/29] Compiling C object tests/tgenkey.p/tgenkey.c.o [26/29] Linking target tests/tlsctx [27/29] Linking target tests/ccerts [28/29] Linking target tests/tcmpkeys [29/29] Linking target tests/tgenkey 1/92 pkcs11-provider:softokn / setup RUNNING >>> TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 P11KITCLIENTPATH=/usr/lib/i386-linux-gnu/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=237 SOFTOKNPATH=/usr/lib/i386-linux-gnu SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/src MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softokn ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=softokn + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softokn + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softokn/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softokn ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softokn + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softokn/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softokn/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' softokn == softhsm ']' + '[' softokn == softokn ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/softokn-init.sh ++ title SECTION 'Setup NSS Softokn' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Setup NSS Softokn' ++ echo '' ++ command -v certutil ++ echo 'NSS'\''s certutil command is required' ######################################## ## Setup NSS Softokn NSS's certutil command is required ++ exit 0 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 1/92 pkcs11-provider:softokn / setup OK 0.02s 2/92 pkcs11-provider:softhsm / setup RUNNING >>> TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 P11KITCLIENTPATH=/usr/lib/i386-linux-gnu/pkcs11/p11-kit-client.so SHARED_EXT=.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/i386-linux-gnu MALLOC_PERTURB_=171 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/src MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softhsm ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=softhsm + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' softhsm == softhsm ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/softhsm-init.sh ++ title SECTION 'Searching for SoftHSM PKCS#11 library' ++ case "$1" in ++ shift 1 ++ echo '########################################' ######################################## ## Searching for SoftHSM PKCS#11 library ++ echo '## Searching for SoftHSM PKCS#11 library' ++ echo '' ++ command -v softhsm2-util +++++ type -p softhsm2-util ++++ dirname /usr/bin/softhsm2-util +++ dirname /usr/bin ++ softhsm_prefix=/usr ++ find_softhsm /usr/lib64/softhsm/libsofthsm2.so /usr/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/local/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ++ for _lib in "$@" ++ test -f /usr/lib64/softhsm/libsofthsm2.so ++ for _lib in "$@" ++ test -f /usr/lib/softhsm/libsofthsm2.so ++ echo 'Using softhsm path /usr/lib/softhsm/libsofthsm2.so' ++ P11LIB=/usr/lib/softhsm/libsofthsm2.so ++ return ++ export P11LIB ++ title SECTION 'Set up testing system' Using softhsm path /usr/lib/softhsm/libsofthsm2.so ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Set up testing system' ++ echo '' ++ cat ######################################## ## Set up testing system ++ export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/softhsm.conf ++ SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/softhsm.conf ++ export 'TOKENLABEL=SoftHSM Token' ++ TOKENLABEL='SoftHSM Token' ++ export TOKENLABELURI=SoftHSM%20Token ++ TOKENLABELURI=SoftHSM%20Token ++ softhsm2-util --init-token --label 'SoftHSM Token' --free --pin 12345678 --so-pin 12345678 Slot 0 has a free/uninitialized token. The token has been initialized and is reassigned to slot 588010675 ++ export 'TOKENOPTIONS=\npkcs11-module-quirks = no-deinit no-operation-state' ++ TOKENOPTIONS='\npkcs11-module-quirks = no-deinit no-operation-state' ++ export 'TOKENCONFIGVARS=export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/softhsm.conf' ++ TOKENCONFIGVARS='export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/softhsm.conf' ++ export TESTPORT=32000 ++ TESTPORT=32000 ++ export SUPPORT_ALLOWED_MECHANISMS=1 ++ SUPPORT_ALLOWED_MECHANISMS=1 + SEEDFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/noisefile.bin + dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/noisefile.bin bs=2048 count=1 + RAND64FILE=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/64krandom.bin + dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/64krandom.bin bs=2048 count=32 ++ uname + '[' Linux == Darwin ']' ++ type -p certtool + certtool=/usr/bin/certtool + '[' -z /usr/bin/certtool ']' + P11DEFARGS=("--module=${P11LIB}" "--login" "--pin=${PINVALUE}" "--token-label=${TOKENLABEL}") + cat + SERIAL=1 + title LINE 'Creating new Self Sign CA' + case "$1" in + shift 1 + echo 'Creating new Self Sign CA' + KEYID=0000 Creating new Self Sign CA + URIKEYID=%00%00 + CACRTN=caCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=caCert --id=0000 Key pair generated: Private Key Object; RSA label: caCert ID: 0000 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0000;object=caCert;type=private Public Key Object; RSA 2048 bits label: caCert ID: 0000 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0000;object=caCert;type=public + crt_selfsign caCert Issuer 0000 + LABEL=caCert + CN=Issuer + KEYID=0000 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = Issuer|g' -e 's|serial = .*|serial = 2|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cacert.cfg + /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=public' --outder Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 02 Validity: Not Before: Thu Mar 19 07:57:51 UTC 2026 Not After: Fri Mar 19 07:57:51 UTC 2027 Subject: CN=Issuer Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:f7:88:a4:c5:4b:38:b4:1c:36:0a:01:7c:c1:9a:e9 24:0f:ee:c0:ab:35:4d:51:00:21:f3:47:d0:90:ee:ca d4:eb:1b:14:39:84:3a:52:2c:33:c4:03:9a:25:5c:ce 2c:d2:fb:b1:37:8a:0b:18:49:72:8e:81:fd:f5:66:b4 5e:3a:ef:7d:3e:e3:21:ff:6f:60:18:d9:92:ae:5a:ee 8a:29:85:55:78:31:c3:c4:88:48:ae:a3:f9:1e:94:43 0e:a9:32:0a:a7:52:19:bf:ce:09:d6:5f:5e:49:cc:30 c8:f3:52:5d:ed:79:03:db:f3:a5:ac:76:b2:5a:c2:38 68:34:35:7b:40:e4:54:8a:38:1d:09:88:2a:c8:2c:54 b1:58:81:e3:e2:19:b2:de:0b:32:33:55:ac:60:c6:6c f0:9e:d3:c7:0a:c7:11:ba:fc:d9:8a:b2:5f:bd:30:f4 e4:e0:29:4f:ba:95:ee:70:d0:4a:8c:f7:e1:da:f1:1c 01:a0:8a:fe:38:a5:32:5d:91:32:ea:10:77:66:d4:10 db:23:31:0c:8d:cf:cd:e4:12:76:7c:e2:36:70:d6:f9 17:f6:89:93:05:ba:8d:ea:06:8b:69:85:eb:a4:e6:6d 8b:8c:09:94:3a:1e:89:54:b7:1a:cc:fa:0c:fa:15:b6 0d Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Certificate signing. Subject Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:7290eb48ed6b8d9ef4248776c8785ee0b2a84432 sha256:5d17a15a63d05c1e226d6b207ccf92e44f93e82d12c0aa8074a7157409d1b2c5 Public Key PIN: pin-sha256:XRehWmPQXB4ibWsgfM+S5E+T6C0SwKqAdKcVdAnRssU= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --type=cert --id=0000 --label=caCert Created certificate: Certificate Object; type = X.509 cert label: caCert subject: DN: CN=Issuer serial: 02 ID: 0000 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert + CACRT_PEM=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem + CACRT=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt + openssl x509 -inform DER -in /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt -outform PEM -out /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem + CABASEURIWITHPINVALUE='pkcs11:id=%00%00?pin-value=12345678' + CABASEURIWITHPINSOURCE='pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + CABASEURI=pkcs11:id=%00%00 + CAPUBURI='pkcs11:type=public;id=%00%00' + CAPRIURI='pkcs11:type=private;id=%00%00' + CACRTURI='pkcs11:type=cert;object=caCert' + title LINE 'RSA PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA PKCS11 URIS' RSA PKCS11 URIS pkcs11:id=%00%00?pin-value=12345678 pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%00 pkcs11:type=public;id=%00%00 pkcs11:type=private;id=%00%00 pkcs11:type=cert;object=caCert + echo 'pkcs11:id=%00%00?pin-value=12345678' + echo 'pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%00 + echo 'pkcs11:type=public;id=%00%00' + echo 'pkcs11:type=private;id=%00%00' + echo 'pkcs11:type=cert;object=caCert' + echo '' + cat /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cacert.cfg + echo 'organization = "PKCS11 Provider"' + sed -e '/^cert_signing_key$/d' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + KEYID=0001 + URIKEYID=%00%01 + TSTCRTN=testCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert --id=0001 Key pair generated: Private Key Object; RSA label: testCert ID: 0001 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0001;object=testCert;type=private Public Key Object; RSA 2048 bits label: testCert ID: 0001 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0001;object=testCert;type=public + ca_sign testCert 'My Test Cert' 0001 + LABEL=testCert + CN='My Test Cert' + KEYID=0001 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Test Cert|g' -e 's|serial = .*|serial = 3|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 03 Validity: Not Before: Thu Mar 19 07:57:51 UTC 2026 Not After: Fri Mar 19 07:57:51 UTC 2027 Subject: CN=My Test Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:c4:cc:17:87:53:95:f9:d1:83:49:63:13:62:29:4a 65:21:8a:5e:80:00:97:7d:ea:9e:ed:14:7a:23:ea:0e a1:b9:94:fc:31:04:80:f7:25:cd:7a:b9:04:45:22:54 04:99:fa:34:7a:e9:d0:f3:ce:bd:2c:cd:8f:40:d0:69 1b:db:96:5e:db:e6:16:04:a8:6a:b2:b7:4c:3d:aa:cb a4:c1:17:9a:15:07:bb:02:c3:01:dc:d2:7c:bb:7b:d8 1d:e3:b1:fd:91:f2:4b:1d:a4:89:d8:e5:06:02:25:6b f7:04:5f:03:b4:82:4d:e5:e3:4d:4a:fa:8b:11:f1:91 e5:46:de:f9:ff:9e:ac:f8:4a:de:21:99:cb:93:f1:f1 e7:ea:5e:fa:e7:0c:42:54:81:62:87:a3:7a:a1:27:f6 b6:e9:ec:09:ae:84:ae:97:fc:ae:96:48:13:50:0f:30 33:ef:97:32:7d:1f:bf:ac:f4:24:cd:5b:b3:82:77:89 88:5e:33:40:0d:fd:6d:dd:22:1c:6d:66:c9:04:b8:9c a5:e5:63:94:9e:e3:de:12:b1:1f:30:89:11:5e:0d:22 93:19:35:4e:86:e2:a0:04:21:d7:6f:4c:1d:d7:6d:93 8f:03:6d:39:a0:f3:6b:c2:e7:4d:ce:e5:6c:08:46:d3 43 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): 130c4576271989b1dccf24166becb12fa75ff519 Authority Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:130c4576271989b1dccf24166becb12fa75ff519 sha256:df1f9f69e0d12a57df02d35e18950b2c91e711178a81c8cc6edbf48336925c6c Public Key PIN: pin-sha256:3x+faeDRKlffAtNeGJULLJHnEReKgcjMbtv0gzaSXGw= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testCert.crt --type=cert --id=0001 --label=testCert Created certificate: Certificate Object; type = X.509 cert label: testCert subject: DN: O=PKCS11 Provider, CN=My Test Cert serial: 03 ID: 0001 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert + BASEURIWITHPINVALUE='pkcs11:id=%00%01?pin-value=12345678' + BASEURIWITHPINSOURCE='pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + BASEURI=pkcs11:id=%00%01 + PUBURI='pkcs11:type=public;id=%00%01' + PRIURI='pkcs11:type=private;id=%00%01' + CRTURI='pkcs11:type=cert;object=testCert' + title LINE 'RSA PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA PKCS11 URIS' RSA PKCS11 URIS + echo 'pkcs11:id=%00%01?pin-value=12345678' + echo 'pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%01 + echo 'pkcs11:type=public;id=%00%01' + echo 'pkcs11:type=private;id=%00%01' + echo 'pkcs11:type=cert;object=testCert' + echo '' + KEYID=0002 + URIKEYID=%00%02 + ECCRTN=ecCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecCert --id=0002 pkcs11:id=%00%01?pin-value=12345678 pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%01 pkcs11:type=public;id=%00%01 pkcs11:type=private;id=%00%01 pkcs11:type=cert;object=testCert Key pair generated: Private Key Object; EC label: ecCert ID: 0002 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441040f97cd3cbff619be06069cb5f67a7b37f19a7f224d255fbc44ac857e06bd49ed39627f3b236078bbf7b9783bbf06462eb346d5f137d0d4455150695c4b5fadd1 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecCert ID: 0002 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public + ca_sign ecCert 'My EC Cert' 0002 + LABEL=ecCert + CN='My EC Cert' + KEYID=0002 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert|g' -e 's|serial = .*|serial = 4|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ecCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Fri Mar 19 21:57:52 2027 CA expiration time: Fri Mar 19 21:57:51 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 04 Validity: Not Before: Thu Mar 19 07:57:52 UTC 2026 Not After: Fri Mar 19 07:57:52 UTC 2027 Subject: CN=My EC Cert,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: 0f:97:cd:3c:bf:f6:19:be:06:06:9c:b5:f6:7a:7b:37 f1:9a:7f:22:4d:25:5f:bc:44:ac:85:7e:06:bd:49:ed Y: 39:62:7f:3b:23:60:78:bb:f7:b9:78:3b:bf:06:46:2e b3:46:d5:f1:37:d0:d4:45:51:50:69:5c:4b:5f:ad:d1 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 3452da3415e040eeee031670bcdfca0c1ace9480 Authority Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:3452da3415e040eeee031670bcdfca0c1ace9480 sha256:263fb2130e5d45653d3fb49cd3e26dd9f25bff938f2716432d36fb1fc3289b7a Public Key PIN: pin-sha256:Jj+yEw5dRWU9P7Sc0+Jt2fJb/5OPJxZDLTb7H8Mom3o= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ecCert.crt --type=cert --id=0002 --label=ecCert Created certificate: Certificate Object; type = X.509 cert label: ecCert subject: DN: O=PKCS11 Provider, CN=My EC Cert serial: 04 ID: 0002 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert + ECBASEURIWITHPINVALUE='pkcs11:id=%00%02?pin-value=12345678' + ECBASEURIWITHPINSOURCE='pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + ECBASEURI=pkcs11:id=%00%02 + ECPUBURI='pkcs11:type=public;id=%00%02' + ECPRIURI='pkcs11:type=private;id=%00%02' + ECCRTURI='pkcs11:type=cert;object=ecCert' + KEYID=0003 + URIKEYID=%00%03 + ECPEERCRTN=ecPeerCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecPeerCert --id=0003 Key pair generated: Private Key Object; EC label: ecPeerCert ID: 0003 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441042fb07636dec9df7def9d5ebbb91c741eee43df687cf5db993e9930b0671a4c88ab1ec60cc4e90c3a5bc1aa605be118765e9030e3a1536770e41c3c78b3410481 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecPeerCert ID: 0003 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public + crt_selfsign ecPeerCert 'My Peer EC Cert' 0003 + LABEL=ecPeerCert + CN='My Peer EC Cert' + KEYID=0003 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Peer EC Cert|g' -e 's|serial = .*|serial = 5|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cacert.cfg + /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ecPeerCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=public' --outder Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 05 Validity: Not Before: Thu Mar 19 07:57:52 UTC 2026 Not After: Fri Mar 19 07:57:52 UTC 2027 Subject: CN=My Peer EC Cert Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: 2f:b0:76:36:de:c9:df:7d:ef:9d:5e:bb:b9:1c:74:1e ee:43:df:68:7c:f5:db:99:3e:99:30:b0:67:1a:4c:88 Y: 00:ab:1e:c6:0c:c4:e9:0c:3a:5b:c1:aa:60:5b:e1:18 76:5e:90:30:e3:a1:53:67:70:e4:1c:3c:78:b3:41:04 81 Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Certificate signing. Subject Key Identifier (not critical): 715a04cc41e0c4cfa8eae613a86b97eedde39958 Other Information: Public Key ID: sha1:715a04cc41e0c4cfa8eae613a86b97eedde39958 sha256:f4c37f84007987175cd025e65d6a986b4cef4eee01118d97ae869fc111051d11 Public Key PIN: pin-sha256:9MN/hAB5hxdc0CXmXWqYa0zvTu4BEY2XroafwREFHRE= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ecPeerCert.crt --type=cert --id=0003 --label=ecPeerCert Created certificate: Certificate Object; type = X.509 cert label: ecPeerCert subject: DN: CN=My Peer EC Cert serial: 05 ID: 0003 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert + ECPEERBASEURIWITHPINVALUE='pkcs11:id=%00%03?pin-value=12345678' + ECPEERBASEURIWITHPINSOURCE='pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + ECPEERBASEURI=pkcs11:id=%00%03 + ECPEERPUBURI='pkcs11:type=public;id=%00%03' + ECPEERPRIURI='pkcs11:type=private;id=%00%03' + ECPEERCRTURI='pkcs11:type=cert;object=ecPeerCert' + title LINE 'EC PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC PKCS11 URIS' + echo 'pkcs11:id=%00%02?pin-value=12345678' + echo 'pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%02 + echo 'pkcs11:type=public;id=%00%02' + echo 'pkcs11:type=private;id=%00%02' + echo 'pkcs11:type=cert;object=ecCert' + echo 'pkcs11:id=%00%03?pin-value=12345678' + echo 'pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%03 + echo 'pkcs11:type=public;id=%00%03' + echo 'pkcs11:type=private;id=%00%03' + echo 'pkcs11:type=cert;object=ecPeerCert' + echo '' EC PKCS11 URIS pkcs11:id=%00%02?pin-value=12345678 pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%02 pkcs11:type=public;id=%00%02 pkcs11:type=private;id=%00%02 pkcs11:type=cert;object=ecCert pkcs11:id=%00%03?pin-value=12345678 pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%03 pkcs11:type=public;id=%00%03 pkcs11:type=private;id=%00%03 pkcs11:type=cert;object=ecPeerCert + '[' 1 -eq 1 ']' + KEYID=0004 + URIKEYID=%00%04 + EDCRTN=edCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:edwards25519 --label=edCert --id=0004 Key pair generated: Private Key Object; EC_EDWARDS label: edCert ID: 0004 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0004;object=edCert;type=private Public Key Object; EC_EDWARDS EC_POINT 272 bits EC_POINT: 04203339aa9679e84dfa4c7ec13265c9b7468aebcadf49443bcfedb8f2d0ce1f51f4 EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) label: edCert ID: 0004 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0004;object=edCert;type=public + ca_sign edCert 'My ED25519 Cert' 0004 + LABEL=edCert + CN='My ED25519 Cert' + KEYID=0004 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My ED25519 Cert|g' -e 's|serial = .*|serial = 6|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/edCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Fri Mar 19 21:57:52 2027 CA expiration time: Fri Mar 19 21:57:51 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 06 Validity: Not Before: Thu Mar 19 07:57:52 UTC 2026 Not After: Fri Mar 19 07:57:52 UTC 2027 Subject: CN=My ED25519 Cert,O=PKCS11 Provider Subject Public Key Algorithm: EdDSA (Ed25519) Algorithm Security Level: High (256 bits) Curve: Ed25519 X: 33:39:aa:96:79:e8:4d:fa:4c:7e:c1:32:65:c9:b7:46 8a:eb:ca:df:49:44:3b:cf:ed:b8:f2:d0:ce:1f:51:f4 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 017ff9e28cc483d5a129c44ac82a031c982057c2 Authority Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:017ff9e28cc483d5a129c44ac82a031c982057c2 sha256:37ca96e17984182ba1d3550a503c7942b771a8a748686398b52bc40e61329b45 Public Key PIN: pin-sha256:N8qW4XmEGCuh01UKUDx5QrdxqKdIaGOYtSvEDmEym0U= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/edCert.crt --type=cert --id=0004 --label=edCert Created certificate: Certificate Object; type = X.509 cert label: edCert subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert serial: 06 ID: 0004 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert + EDBASEURIWITHPINVALUE='pkcs11:id=%00%04;pin-value=12345678' + EDBASEURIWITHPINSOURCE='pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + EDBASEURI=pkcs11:id=%00%04 + EDPUBURI='pkcs11:type=public;id=%00%04' + EDPRIURI='pkcs11:type=private;id=%00%04' + EDCRTURI='pkcs11:type=cert;object=edCert' + title LINE 'ED25519 PKCS11 URIS' + case "$1" in + shift 1 + echo 'ED25519 PKCS11 URIS' ED25519 PKCS11 URIS + echo 'pkcs11:id=%00%04;pin-value=12345678' + echo 'pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%04 + echo 'pkcs11:type=public;id=%00%04' + echo 'pkcs11:type=private;id=%00%04' + echo 'pkcs11:type=cert;object=edCert' + '[' 1 -eq 1 ']' + KEYID=0009 + URIKEYID=%00%09 + ED2CRTN=ed2Cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:Ed448 --label=ed2Cert --id=0009 pkcs11:id=%00%04;pin-value=12345678 pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%04 pkcs11:type=public;id=%00%04 pkcs11:type=private;id=%00%04 pkcs11:type=cert;object=edCert Key pair generated: Private Key Object; EC_EDWARDS label: ed2Cert ID: 0009 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private Public Key Object; EC_EDWARDS EC_POINT 472 bits EC_POINT: 04390b64b8f1d9c918c8890781d7a671579304847674290b0cfa203db453fa6f0c68c9dd9d921f1a5e34b706d3da3762d59728f1b0040fea940a80 EC_PARAMS: 06032b6571 (OID 1.3.101.113) label: ed2Cert ID: 0009 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public + ca_sign ed2Cert 'My ED448 Cert' 0009 + LABEL=ed2Cert + CN='My ED448 Cert' + KEYID=0009 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My ED448 Cert|g' -e 's|serial = .*|serial = 7|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ed2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Fri Mar 19 21:57:52 2027 CA expiration time: Fri Mar 19 21:57:51 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 07 Validity: Not Before: Thu Mar 19 07:57:52 UTC 2026 Not After: Fri Mar 19 07:57:52 UTC 2027 Subject: CN=My ED448 Cert,O=PKCS11 Provider Subject Public Key Algorithm: EdDSA (Ed448) Algorithm Security Level: Ultra (456 bits) Curve: Ed448 X: 0b:64:b8:f1:d9:c9:18:c8:89:07:81:d7:a6:71:57:93 04:84:76:74:29:0b:0c:fa:20:3d:b4:53:fa:6f:0c:68 c9:dd:9d:92:1f:1a:5e:34:b7:06:d3:da:37:62:d5:97 28:f1:b0:04:0f:ea:94:0a:80 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 3b89315132d31bb0823118b2042253a1570b7ae5 Authority Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:3b89315132d31bb0823118b2042253a1570b7ae5 sha256:06243393d8596a27d70ad981547c8f315f23875317d3ada6660d2672667855f5 Public Key PIN: pin-sha256:BiQzk9hZaifXCtmBVHyPMV8jh1MX062mZg0mcmZ4VfU= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ed2Cert.crt --type=cert --id=0009 --label=ed2Cert Created certificate: Certificate Object; type = X.509 cert label: ed2Cert subject: DN: O=PKCS11 Provider, CN=My ED448 Cert serial: 07 ID: 0009 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert + ED2BASEURIWITHPINVALUE='pkcs11:id=%00%09;pin-value=12345678' + ED2BASEURIWITHPINSOURCE='pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + ED2BASEURI=pkcs11:id=%00%09 + ED2PUBURI='pkcs11:type=public;id=%00%09' + ED2PRIURI='pkcs11:type=private;id=%00%09' + ED2CRTURI='pkcs11:type=cert;object=ed2Cert' + title LINE 'ED448 PKCS11 URIS' + case "$1" in + shift 1 + echo 'ED448 PKCS11 URIS' + echo 'pkcs11:id=%00%09;pin-value=12345678' + echo 'pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%09 + echo 'pkcs11:type=public;id=%00%09' + echo 'pkcs11:type=private;id=%00%09' + echo 'pkcs11:type=cert;object=ed2Cert' + title PARA 'generate RSA key pair, self-signed certificate, remove public key' + case "$1" in + shift 1 + echo '' + echo '## generate RSA key pair, self-signed certificate, remove public key' + '[' -f '' ']' + KEYID=0005 + URIKEYID=%00%05 + TSTCRTN=testCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert2 --id=0005 ED448 PKCS11 URIS pkcs11:id=%00%09;pin-value=12345678 pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%09 pkcs11:type=public;id=%00%09 pkcs11:type=private;id=%00%09 pkcs11:type=cert;object=ed2Cert ## generate RSA key pair, self-signed certificate, remove public key Key pair generated: Private Key Object; RSA label: testCert2 ID: 0005 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private Public Key Object; RSA 2048 bits label: testCert2 ID: 0005 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0005;object=testCert2;type=public + ca_sign testCert2 'My Test Cert 2' 0005 + LABEL=testCert2 + CN='My Test Cert 2' + KEYID=0005 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Test Cert 2|g' -e 's|serial = .*|serial = 8|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Fri Mar 19 21:57:52 2027 CA expiration time: Fri Mar 19 21:57:51 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 08 Validity: Not Before: Thu Mar 19 07:57:52 UTC 2026 Not After: Fri Mar 19 07:57:52 UTC 2027 Subject: CN=My Test Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:a0:2d:b2:c6:df:f8:f2:b4:7e:54:cf:9b:e0:64:2f 8d:f9:ac:16:6c:43:17:2a:d9:34:b8:69:35:83:21:f9 0e:8f:6f:49:09:49:79:ed:50:88:64:e6:83:13:dc:47 64:f1:cf:c2:b3:61:7b:bf:c9:e0:91:43:44:d8:cf:f3 15:8d:18:fd:23:b9:b7:15:66:f1:5c:df:30:2f:a5:96 ab:06:62:07:71:7e:7f:6a:91:92:6f:ae:b4:c3:b2:4a 1a:b1:93:b7:0d:09:b0:51:29:0e:71:2d:4b:c9:33:e9 05:70:02:b0:94:36:6e:90:6e:d3:0a:4b:00:78:96:e9 83:90:d3:5b:00:81:e5:8f:f4:14:89:8e:13:9c:a7:56 47:91:bd:32:2d:fa:ce:cf:6d:d3:5d:7a:4a:09:d4:60 cb:fc:3f:aa:52:08:74:e9:2f:c8:0d:62:21:6a:d2:2c f5:89:a3:82:75:4c:21:97:83:1e:53:a8:f2:6f:ce:94 1b:fc:14:36:59:79:81:b8:db:78:09:d7:c9:07:43:4b e7:c8:99:08:6a:d1:f1:2b:ca:49:5a:1b:f7:89:b6:ea 36:d9:f2:07:04:62:7b:f8:b0:fc:91:ce:8e:66:fc:19 64:2c:9b:dd:20:e5:f5:50:a2:6f:1f:09:90:10:41:8a ef Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): 1ffc039ef90d018ce4da0916b1b5761ee977527f Authority Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:1ffc039ef90d018ce4da0916b1b5761ee977527f sha256:a720328a2e20bb8dab8034148ba429c4f2137ddabf157d5560cb8ef77655463c Public Key PIN: pin-sha256:pyAyii4gu42rgDQUi6QpxPITfdq/FX1VYMuO93ZVRjw= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testCert2.crt --type=cert --id=0005 --label=testCert2 Created certificate: Certificate Object; type = X.509 cert label: testCert2 subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 serial: 08 ID: 0005 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0005 + BASE2URIWITHPINVALUE='pkcs11:id=%00%05?pin-value=12345678' + BASE2URIWITHPINSOURCE='pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + BASE2URI=pkcs11:id=%00%05 + PRI2URI='pkcs11:type=private;id=%00%05' + CRT2URI='pkcs11:type=cert;object=testCert2' + title LINE 'RSA2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA2 PKCS11 URIS' + echo 'pkcs11:id=%00%05?pin-value=12345678' + echo 'pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%05 + echo 'pkcs11:type=private;id=%00%05' + echo 'pkcs11:type=cert;object=testCert2' + echo '' + title PARA 'generate EC key pair, self-signed certificate, remove public key' + case "$1" in + shift 1 + echo '' RSA2 PKCS11 URIS pkcs11:id=%00%05?pin-value=12345678 pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%05 pkcs11:type=private;id=%00%05 pkcs11:type=cert;object=testCert2 + echo '## generate EC key pair, self-signed certificate, remove public key' + '[' -f '' ']' + KEYID=0006 + URIKEYID=%00%06 + TSTCRTN=ecCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp384r1 --label=ecCert2 --id=0006 ## generate EC key pair, self-signed certificate, remove public key Key pair generated: Private Key Object; EC label: ecCert2 ID: 0006 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private Public Key Object; EC EC_POINT 384 bits EC_POINT: 046104bc5cb1439b3b0b046aa284cf887880059abe9b3b1babff30ca5a49a88cb00a1346e4fdfe4af7279c4a80d920758f13ca63653c3b1de731475f0225764554a6369688203b9d53f55f00f91668b3a8c51cf11bc049df70e58618dd12ba1206429d EC_PARAMS: 06052b81040022 (OID 1.3.132.0.34) label: ecCert2 ID: 0006 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=public + ca_sign ecCert2 'My EC Cert 2' 0006 + LABEL=ecCert2 + CN='My EC Cert 2' + KEYID=0006 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert 2|g' -e 's|serial = .*|serial = 9|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ecCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Fri Mar 19 21:57:52 2027 CA expiration time: Fri Mar 19 21:57:51 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 09 Validity: Not Before: Thu Mar 19 07:57:52 UTC 2026 Not After: Fri Mar 19 07:57:52 UTC 2027 Subject: CN=My EC Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Ultra (384 bits) Curve: SECP384R1 X: 00:bc:5c:b1:43:9b:3b:0b:04:6a:a2:84:cf:88:78:80 05:9a:be:9b:3b:1b:ab:ff:30:ca:5a:49:a8:8c:b0:0a 13:46:e4:fd:fe:4a:f7:27:9c:4a:80:d9:20:75:8f:13 ca Y: 63:65:3c:3b:1d:e7:31:47:5f:02:25:76:45:54:a6:36 96:88:20:3b:9d:53:f5:5f:00:f9:16:68:b3:a8:c5:1c f1:1b:c0:49:df:70:e5:86:18:dd:12:ba:12:06:42:9d Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 02c38ef7d818c92e9885ea7696b920451656fd3d Authority Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:02c38ef7d818c92e9885ea7696b920451656fd3d sha256:8393afb34b264f33a1e20441b6331cd8e14ed9c5ad92466c85f348254f8ac719 Public Key PIN: pin-sha256:g5Ovs0smTzOh4gRBtjMc2OFO2cWtkkZshfNIJU+Kxxk= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ecCert2.crt --type=cert --id=0006 --label=ecCert2 Created certificate: Certificate Object; type = X.509 cert label: ecCert2 subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 serial: 09 ID: 0006 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0006 + ECBASE2URIWITHPINVALUE='pkcs11:id=%00%06?pin-value=12345678' + ECBASE2URIWITHPINSOURCE='pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + ECBASE2URI=pkcs11:id=%00%06 + ECPRI2URI='pkcs11:type=private;id=%00%06' + ECCRT2URI='pkcs11:type=cert;object=ecCert2' + title LINE 'EC2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC2 PKCS11 URIS' + echo 'pkcs11:id=%00%06?pin-value=12345678' + echo 'pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%06 + echo 'pkcs11:type=private;id=%00%06' + echo 'pkcs11:type=cert;object=ecCert2' + echo '' + '[' -z '' ']' + title PARA 'explicit EC unsupported' EC2 PKCS11 URIS pkcs11:id=%00%06?pin-value=12345678 pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%06 pkcs11:type=private;id=%00%06 pkcs11:type=cert;object=ecCert2 + case "$1" in + shift 1 + echo '' ## explicit EC unsupported ## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate + echo '## explicit EC unsupported' + '[' -f '' ']' + title PARA 'generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' + case "$1" in + shift 1 + echo '' + echo '## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' + '[' -f '' ']' + KEYID=0008 + URIKEYID=%00%08 + TSTCRTN=ecCert3 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp521r1 --label=ecCert3 --id=0008 --always-auth Key pair generated: Private Key Object; EC label: ecCert3 ID: 0008 Usage: decrypt, sign, signRecover, unwrap, derive Access: always authenticate, sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private Public Key Object; EC EC_POINT 528 bits EC_POINT: 0481850401d4f019103108f6457acb46917bd87ff09381215413f68d70576d8212b3421db5521e86a4056a4f2b539adb4d1bd808f7c53931b059e0b8a9f3dcb3f727162d63d801890a4186cad4818e8fb269f775f53ee20ca6ea6527027232b3f9d3e571f66130f3ecc5c3abec25e5fcfc5cdc8d4652431e89d28b24fa41677d6a62c6a5b60962c6 EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) label: ecCert3 ID: 0008 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public + ca_sign ecCert3 'My EC Cert 3' 0008 + LABEL=ecCert3 + CN='My EC Cert 3' + KEYID=0008 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert 3|g' -e 's|serial = .*|serial = 10|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ecCert3.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Fri Mar 19 21:57:52 2027 CA expiration time: Fri Mar 19 21:57:51 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0a Validity: Not Before: Thu Mar 19 07:57:52 UTC 2026 Not After: Fri Mar 19 07:57:52 UTC 2027 Subject: CN=My EC Cert 3,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Future (528 bits) Curve: SECP521R1 X: 01:d4:f0:19:10:31:08:f6:45:7a:cb:46:91:7b:d8:7f f0:93:81:21:54:13:f6:8d:70:57:6d:82:12:b3:42:1d b5:52:1e:86:a4:05:6a:4f:2b:53:9a:db:4d:1b:d8:08 f7:c5:39:31:b0:59:e0:b8:a9:f3:dc:b3:f7:27:16:2d 63:d8 Y: 01:89:0a:41:86:ca:d4:81:8e:8f:b2:69:f7:75:f5:3e e2:0c:a6:ea:65:27:02:72:32:b3:f9:d3:e5:71:f6:61 30:f3:ec:c5:c3:ab:ec:25:e5:fc:fc:5c:dc:8d:46:52 43:1e:89:d2:8b:24:fa:41:67:7d:6a:62:c6:a5:b6:09 62:c6 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 50f6dd20e51974582dbc51c562dda87dfeeb7450 Authority Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:50f6dd20e51974582dbc51c562dda87dfeeb7450 sha256:5772fef680c7b8593b40d493b63fe685d4d1f5a2b996d2a28fbc64fd7816807b Public Key PIN: pin-sha256:V3L+9oDHuFk7QNSTtj/mhdTR9aK5ltKij7xk/XgWgHs= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/ecCert3.crt --type=cert --id=0008 --label=ecCert3 Created certificate: Certificate Object; type = X.509 cert label: ecCert3 subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 serial: 0A ID: 0008 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert + ECBASE3URIWITHPINVALUE='pkcs11:id=%00%08?pin-value=12345678' + ECBASE3URIWITHPINSOURCE='pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + ECBASE3URI=pkcs11:id=%00%08 + ECPUB3URI='pkcs11:type=public;id=%00%08' + ECPRI3URI='pkcs11:type=private;id=%00%08' + ECCRT3URI='pkcs11:type=cert;object=ecCert3' + title LINE 'EC3 PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC3 PKCS11 URIS' + echo 'pkcs11:id=%00%08?pin-value=12345678' + echo 'pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%08 + echo 'pkcs11:type=public;id=%00%08' + echo 'pkcs11:type=private;id=%00%08' + echo 'pkcs11:type=cert;object=ecCert3' + echo '' + '[' 1 -eq 1 ']' EC3 PKCS11 URIS pkcs11:id=%00%08?pin-value=12345678 pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%08 pkcs11:type=public;id=%00%08 pkcs11:type=private;id=%00%08 pkcs11:type=cert;object=ecCert3 + KEYID=0010 + URIKEYID=%00%10 + TSTCRTN=testRsaPssCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testRsaPssCert --id=0010 --allowed-mechanisms RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS Key pair generated: Private Key Object; RSA label: testRsaPssCert ID: 0010 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private Public Key Object; RSA 2048 bits label: testRsaPssCert ID: 0010 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public + ca_sign testRsaPssCert 'My RsaPss Cert' 0010 --sign-params=RSA-PSS + LABEL=testRsaPssCert + CN='My RsaPss Cert' + KEYID=0010 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My RsaPss Cert|g' -e 's|serial = .*|serial = 11|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testRsaPssCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS Generating a signed certificate... Expiration time: Fri Mar 19 21:57:53 2027 CA expiration time: Fri Mar 19 21:57:51 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0b Validity: Not Before: Thu Mar 19 07:57:53 UTC 2026 Not After: Fri Mar 19 07:57:53 UTC 2027 Subject: CN=My RsaPss Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:a7:f9:ee:dd:12:9a:7b:56:a2:f6:a5:32:8c:c1:10 cb:b3:fb:58:1c:6f:e3:2b:e7:9e:52:df:75:b4:ee:14 31:f4:a6:92:fd:4b:3e:44:de:28:93:11:8f:4c:9e:bd a8:40:74:90:ff:c2:19:47:f2:a1:bb:5d:dd:45:01:ca 62:c7:85:4e:b1:09:aa:13:bd:94:56:2a:79:4d:c3:18 3c:0c:e3:cb:7d:fc:6c:c3:c1:00:37:c8:6f:00:b0:63 36:94:1b:42:15:f4:27:26:97:b9:36:8a:1c:e6:cd:3f 36:8f:95:6b:a0:32:f2:fa:11:9c:2e:94:e1:5f:a5:b9 48:70:33:14:d3:dd:50:73:c9:ac:fa:80:37:3b:72:41 15:ee:16:1d:08:d0:d5:42:95:10:db:23:a1:bc:9e:6e 7c:ed:75:84:11:8f:1e:d8:cf:b9:4b:3e:7f:b9:70:d4 f5:c8:46:7a:ef:8f:20:6d:71:aa:85:30:a9:ef:47:1f 2c:9c:3c:40:42:d3:42:17:f2:f4:86:c6:9d:a2:fe:b6 08:5c:eb:38:c5:c3:ff:3a:d1:93:ff:65:6f:d9:4b:9b d8:1c:8d:d9:71:fb:4a:b2:3c:f3:fb:f0:aa:a6:ab:2d c6:ec:14:b9:5c:48:f5:fb:cf:9a:30:3c:c4:f8:0a:5a 07 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): 99139572a17cd41c5d16e9f0093188c7dfbcfce3 Authority Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:99139572a17cd41c5d16e9f0093188c7dfbcfce3 sha256:0d58983ad20de98eb803e74b6eb8f547f39c291205b48168dc64feb32066fb9b Public Key PIN: pin-sha256:DViYOtIN6Y64A+dLbrj1R/OcKRIFtIFo3GT+syBm+5s= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testRsaPssCert.crt --type=cert --id=0010 --label=testRsaPssCert Created certificate: Certificate Object; type = X.509 cert label: testRsaPssCert subject: DN: O=PKCS11 Provider, CN=My RsaPss Cert serial: 0B ID: 0010 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert + RSAPSSBASEURIWITHPINVALUE='pkcs11:id=%00%10?pin-value=12345678' + RSAPSSBASEURIWITHPINSOURCE='pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + RSAPSSBASEURI=pkcs11:id=%00%10 + RSAPSSPUBURI='pkcs11:type=public;id=%00%10' + RSAPSSPRIURI='pkcs11:type=private;id=%00%10' + RSAPSSCRTURI='pkcs11:type=cert;object=testRsaPssCert' + title LINE 'RSA-PSS PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA-PSS PKCS11 URIS' + echo 'pkcs11:id=%00%10?pin-value=12345678' + echo 'pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%10 + echo 'pkcs11:type=public;id=%00%10' + echo 'pkcs11:type=private;id=%00%10' + echo 'pkcs11:type=cert;object=testRsaPssCert' + echo '' + KEYID=0011 + URIKEYID=%00%11 + TSTCRTN=testRsaPss2Cert RSA-PSS PKCS11 URIS pkcs11:id=%00%10?pin-value=12345678 pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%10 pkcs11:type=public;id=%00%10 pkcs11:type=private;id=%00%10 pkcs11:type=cert;object=testRsaPssCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:3092 --label=testRsaPss2Cert --id=0011 --allowed-mechanisms SHA256-RSA-PKCS-PSS Key pair generated: Private Key Object; RSA label: testRsaPss2Cert ID: 0011 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: SHA256-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private Public Key Object; RSA 3092 bits label: testRsaPss2Cert ID: 0011 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public + ca_sign testRsaPss2Cert 'My RsaPss2 Cert' 0011 --sign-params=RSA-PSS --hash=SHA256 + LABEL=testRsaPss2Cert + CN='My RsaPss2 Cert' + KEYID=0011 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My RsaPss2 Cert|g' -e 's|serial = .*|serial = 12|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testRsaPss2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS --hash=SHA256 Generating a signed certificate... Expiration time: Fri Mar 19 21:57:54 2027 CA expiration time: Fri Mar 19 21:57:51 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0c Validity: Not Before: Thu Mar 19 07:57:54 UTC 2026 Not After: Fri Mar 19 07:57:54 UTC 2027 Subject: CN=My RsaPss2 Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: High (3092 bits) Modulus (bits 3092): 0f:1e:61:95:68:b9:a2:f9:8d:b5:90:22:3e:4f:dc:be be:44:fd:16:86:45:63:49:20:e9:be:18:57:94:0e:f9 49:76:eb:4b:08:66:f4:e7:1f:86:7f:70:2f:f5:bf:4c 04:d9:48:81:67:4a:00:73:65:7a:84:f1:f1:9e:6c:6a 22:09:7e:6c:25:53:87:a7:05:af:d7:81:31:0a:4f:2d 39:3a:70:05:96:de:be:16:13:0f:a3:97:7b:9d:7a:b8 82:1a:65:5e:fd:7c:65:6d:35:96:0a:bb:a5:65:ea:66 6e:3d:51:a2:ef:3b:d5:53:0b:26:5e:c8:ab:fa:fe:9f 6f:42:37:92:c9:0e:e3:27:d3:2f:c9:e0:ba:75:d5:a6 cf:59:c5:69:b4:50:a1:14:e0:df:54:63:a4:76:a9:a7 c1:0a:5d:75:90:16:32:4d:ad:89:96:a0:1e:b5:03:b8 57:92:d0:33:f3:ab:70:98:25:c8:ae:35:ed:1c:88:dc 29:86:af:ea:72:f9:11:db:d5:9e:94:5b:b3:b7:29:7b 59:4f:fe:41:5f:64:78:01:a5:62:f4:c3:43:a5:c5:7e 70:6e:61:19:4a:37:94:55:d3:ef:51:70:d0:c6:f7:e6 a1:69:12:31:f2:e9:72:e9:c3:fc:9f:8b:de:24:aa:86 6a:7d:a1:96:c4:c1:b2:d8:77:8f:8a:3f:42:3d:99:fa a1:0c:95:b9:47:b9:14:f9:4a:dd:e1:0c:ef:9a:b2:5e a5:91:2b:d6:db:54:c7:2a:40:ab:39:c6:48:9f:43:46 f0:3f:89:10:0f:02:05:1b:1d:b7:4c:6f:80:11:7e:59 47:d0:8f:25:b6:59:71:99:5e:59:ea:87:5b:4b:52:53 72:eb:b2:7b:c6:ec:b7:0b:41:1f:c4:3e:3a:85:a0:0a 5d:61:61:e7:32:0a:30:8e:2f:1c:aa:79:2f:bf:d2:9f 8c:3c:29:de:e4:f9:3e:f2:fa:1a:a6:6b:50:2a:60:46 ca:2c:09 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): adde6a3a7489a9c1dd4b070a9cac807b3b06c609 Authority Key Identifier (not critical): 7290eb48ed6b8d9ef4248776c8785ee0b2a84432 Other Information: Public Key ID: sha1:adde6a3a7489a9c1dd4b070a9cac807b3b06c609 sha256:fd91d4a1d6eb01688fe08c829a89718d2249db1fd8347edcb4304b87e31437db Public Key PIN: pin-sha256:/ZHUodbrAWiP4IyCmolxjSJJ2x/YNH7ctDBLh+MUN9s= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testRsaPss2Cert.crt --type=cert --id=0011 --label=testRsaPss2Cert Created certificate: Certificate Object; type = X.509 cert label: testRsaPss2Cert subject: DN: O=PKCS11 Provider, CN=My RsaPss2 Cert serial: 0C ID: 0011 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert + RSAPSS2BASEURIWITHPINVALUE='pkcs11:id=%00%11?pin-value=12345678' + RSAPSS2BASEURIWITHPINSOURCE='pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + RSAPSS2BASEURI=pkcs11:id=%00%11 + RSAPSS2PUBURI='pkcs11:type=public;id=%00%11' + RSAPSS2PRIURI='pkcs11:type=private;id=%00%11' + RSAPSS2CRTURI='pkcs11:type=cert;object=testRsaPss2Cert' + title LINE 'RSA-PSS 2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA-PSS 2 PKCS11 URIS' + echo 'pkcs11:id=%00%11?pin-value=12345678' + echo 'pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%11 + echo 'pkcs11:type=public;id=%00%11' + echo 'pkcs11:type=private;id=%00%11' RSA-PSS 2 PKCS11 URIS pkcs11:id=%00%11?pin-value=12345678 pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%11 pkcs11:type=public;id=%00%11 pkcs11:type=private;id=%00%11 pkcs11:type=cert;object=testRsaPss2Cert + echo 'pkcs11:type=cert;object=testRsaPss2Cert' + echo '' + title PARA 'Show contents of softhsm token' + case "$1" in + shift 1 + echo '' + echo '## Show contents of softhsm token' + '[' -f '' ']' + echo ' ----------------------------------------------------------------------------------------------------' + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' -O ## Show contents of softhsm token ---------------------------------------------------------------------------------------------------- Private Key Object; EC label: ecPeerCert ID: 0003 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private Certificate Object; type = X.509 cert label: ed2Cert subject: DN: O=PKCS11 Provider, CN=My ED448 Cert serial: 07 ID: 0009 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert Private Key Object; RSA label: caCert ID: 0000 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0000;object=caCert;type=private Certificate Object; type = X.509 cert label: ecCert3 subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 serial: 0A ID: 0008 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert Private Key Object; EC label: ecCert ID: 0002 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private Public Key Object; EC EC_POINT 528 bits EC_POINT: 0481850401d4f019103108f6457acb46917bd87ff09381215413f68d70576d8212b3421db5521e86a4056a4f2b539adb4d1bd808f7c53931b059e0b8a9f3dcb3f727162d63d801890a4186cad4818e8fb269f775f53ee20ca6ea6527027232b3f9d3e571f66130f3ecc5c3abec25e5fcfc5cdc8d4652431e89d28b24fa41677d6a62c6a5b60962c6 EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) label: ecCert3 ID: 0008 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public Certificate Object; type = X.509 cert label: ecCert subject: DN: O=PKCS11 Provider, CN=My EC Cert serial: 04 ID: 0002 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441040f97cd3cbff619be06069cb5f67a7b37f19a7f224d255fbc44ac857e06bd49ed39627f3b236078bbf7b9783bbf06462eb346d5f137d0d4455150695c4b5fadd1 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecCert ID: 0002 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public Private Key Object; EC label: ecCert3 ID: 0008 Usage: decrypt, sign, signRecover, unwrap, derive Access: always authenticate, sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private Certificate Object; type = X.509 cert label: edCert subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert serial: 06 ID: 0004 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert Public Key Object; EC_EDWARDS EC_POINT 272 bits EC_POINT: 04203339aa9679e84dfa4c7ec13265c9b7468aebcadf49443bcfedb8f2d0ce1f51f4 EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) label: edCert ID: 0004 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0004;object=edCert;type=public Private Key Object; RSA label: testRsaPssCert ID: 0010 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private Certificate Object; type = X.509 cert label: ecCert2 subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 serial: 09 ID: 0006 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert Private Key Object; RSA label: testRsaPss2Cert ID: 0011 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: SHA256-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private Private Key Object; EC label: ecCert2 ID: 0006 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private Public Key Object; RSA 2048 bits label: testRsaPssCert ID: 0010 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public Certificate Object; type = X.509 cert label: testCert2 subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 serial: 08 ID: 0005 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441042fb07636dec9df7def9d5ebbb91c741eee43df687cf5db993e9930b0671a4c88ab1ec60cc4e90c3a5bc1aa605be118765e9030e3a1536770e41c3c78b3410481 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecPeerCert ID: 0003 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public Private Key Object; EC_EDWARDS label: ed2Cert ID: 0009 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private Certificate Object; type = X.509 cert label: ecPeerCert subject: DN: CN=My Peer EC Cert serial: 05 ID: 0003 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert Certificate Object; type = X.509 cert label: testRsaPss2Cert subject: DN: O=PKCS11 Provider, CN=My RsaPss2 Cert serial: 0C ID: 0011 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert Public Key Object; RSA 3092 bits label: testRsaPss2Cert ID: 0011 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public Private Key Object; RSA label: testCert2 ID: 0005 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private Public Key Object; EC_EDWARDS EC_POINT 472 bits EC_POINT: 04390b64b8f1d9c918c8890781d7a671579304847674290b0cfa203db453fa6f0c68c9dd9d921f1a5e34b706d3da3762d59728f1b0040fea940a80 EC_PARAMS: 06032b6571 (OID 1.3.101.113) label: ed2Cert ID: 0009 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public Private Key Object; EC_EDWARDS label: edCert ID: 0004 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0004;object=edCert;type=private Certificate Object; type = X.509 cert label: testRsaPssCert subject: DN: O=PKCS11 Provider, CN=My RsaPss Cert serial: 0B ID: 0010 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert Public Key Object; RSA 2048 bits label: testCert ID: 0001 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0001;object=testCert;type=public Certificate Object; type = X.509 cert label: testCert subject: DN: O=PKCS11 Provider, CN=My Test Cert serial: 03 ID: 0001 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert Certificate Object; type = X.509 cert label: caCert subject: DN: CN=Issuer serial: 02 ID: 0000 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert Private Key Object; RSA label: testCert ID: 0001 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0001;object=testCert;type=private Public Key Object; RSA 2048 bits label: caCert ID: 0000 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0000;object=caCert;type=public + echo ' ----------------------------------------------------------------------------------------------------' + title PARA 'Output configurations' + case "$1" in + shift 1 + echo '' + echo '## Output configurations' + '[' -f '' ']' + OPENSSL_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf + title LINE 'Generate openssl config file' ---------------------------------------------------------------------------------------------------- ## Output configurations + case "$1" in + shift 1 + echo 'Generate openssl config file' Generate openssl config file + sed -e 's|@libtoollibs@|/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/src|g' -e 's|@testsblddir@|/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests|g' -e 's|@testsdir@|/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm|g' -e 's|@SHARED_EXT@|.so|g' -e 's|@PINFILE@|/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/pinfile.txt|g' -e 's|##TOKENOPTIONS|\npkcs11-module-quirks = no-deinit no-operation-state|g' /build/reproducible-path/pkcs11-provider-1.0/tests/openssl.cnf.in + title LINE 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testvars' + case "$1" in + shift 1 + echo 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testvars' Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testvars + cat + '[' -n pkcs11:id=%00%04 ']' + cat + '[' -n pkcs11:id=%00%09 ']' + cat + '[' -n '' ']' + '[' -n pkcs11:id=%00%10 ']' + cat + cat + gen_unsetvars + grep '^export' /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/testvars + sed -e s/export/unset/ -e 's/=.*$//' + title ENDSECTION + case "$1" in + echo '' + echo ' ##' ## + echo '########################################' + echo '' ######################################## ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 2/92 pkcs11-provider:softhsm / setup OK 2.84s 3/92 pkcs11-provider:kryoptic / setup RUNNING >>> TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=213 P11KITCLIENTPATH=/usr/lib/i386-linux-gnu/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SOFTOKNPATH=/usr/lib/i386-linux-gnu SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/src MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=kryoptic + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' kryoptic == softhsm ']' + '[' kryoptic == softokn ']' + '[' kryoptic == kryoptic ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh ++ title SECTION 'Searching for Kryoptic module' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Searching for Kryoptic module' ++ echo '' ######################################## ## Searching for Kryoptic module ++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /target/debug/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /target/release/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so ++ for _lib in "$@" ++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ echo 'skipped: Unable to find kryoptic PKCS#11 library' ++ exit 0 skipped: Unable to find kryoptic PKCS#11 library ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 3/92 pkcs11-provider:kryoptic / setup OK 0.02s 4/92 pkcs11-provider:kryoptic.nss / setup RUNNING >>> TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 P11KITCLIENTPATH=/usr/lib/i386-linux-gnu/pkcs11/p11-kit-client.so ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=181 SOFTOKNPATH=/usr/lib/i386-linux-gnu SHARED_EXT=.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/src MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic.nss ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=kryoptic.nss + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic.nss + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic.nss/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic.nss ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic.nss + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic.nss/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic.nss/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' kryoptic.nss == softhsm ']' + '[' kryoptic.nss == softokn ']' + '[' kryoptic.nss == kryoptic ']' + '[' kryoptic.nss == kryoptic.nss ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic.nss-init.sh ++ export KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic.nss/kryoptic.conf ++ KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/kryoptic.nss/kryoptic.conf ++ cat ++ export 'TOKENLABEL=Kryoptic Soft Token' ++ TOKENLABEL='Kryoptic Soft Token' ++ export TOKENLABELURI=Kryoptic%20Soft%20Token ++ TOKENLABELURI=Kryoptic%20Soft%20Token ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh +++ title SECTION 'Searching for Kryoptic module' +++ case "$1" in +++ shift 1 +++ echo '########################################' +++ echo '## Searching for Kryoptic module' +++ echo '' +++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /target/debug/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /target/release/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so +++ for _lib in "$@" +++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ echo 'skipped: Unable to find kryoptic PKCS#11 library' +++ exit 0 ######################################## ## Searching for Kryoptic module skipped: Unable to find kryoptic PKCS#11 library ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 4/92 pkcs11-provider:kryoptic.nss / setup OK 0.02s 5/92 pkcs11-provider:softokn / basic RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=157 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 5/92 pkcs11-provider:softokn / basic SKIP 0.01s exit status 77 6/92 pkcs11-provider:softhsm / basic RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=91 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tbasic ## Raw Sign check error openssl pkeyutl -sign -inkey "${BASEURI}" -pkeyopt pad-mode:none -in ${TMPPDIR}/64Brandom.bin -out ${TMPPDIR}/raw-sig.bin Public Key operation error 40E963F7:error:0200007A:rsa routines:p11prov_sig_operate:data too small for key size:../src/signature.c:971: ## Sign and Verify with provided Hash and RSA openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## Sign and Verify with provided Hash and RSA with DigestInfo struct openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -pkeyopt digest:sha256 -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pkeyopt digest:sha256 -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## DigestSign and DigestVerify with RSA openssl pkeyutl -sign -inkey "${BASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully RSA basic encrypt and decrypt openssl pkeyutl -encrypt -inkey "${PUBURI}" -pubin -in ${SECRETFILE} -out ${SECRETFILE}.enc openssl pkeyutl -decrypt -inkey "${PRIURI}" -in ${SECRETFILE}.enc -out ${SECRETFILE}.dec ## Test Disallow Public Export openssl pkey -in $PUBURI -pubin -pubout -text ## Test CSR generation from RSA private keys openssl req -new -batch -key "${PRIURI}" -out ${TMPPDIR}/rsa_csr.pem openssl req -in ${TMPPDIR}/rsa_csr.pem -verify -noout Certificate request self-signature verify OK ## Test fetching public keys without PIN in config files openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/rsa.pub.nopin.pem openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ec.pub.nopin.pem openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/ed.pub.nopin.pem ## Test fetching public keys with a PIN in URI openssl pkey -in $BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripin.pem openssl pkey -in $ECBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripin.pem openssl pkey -in $EDBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripin.pem openssl pkey -in $ED2BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripin.pem ## Test fetching public keys with a PIN source in URI openssl pkey -in $BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripinsource.pem openssl pkey -in $ECBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripinsource.pem openssl pkey -in $EDBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripinsource.pem openssl pkey -in $ED2BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripinsource.pem ## Test prompting without PIN in config files ## Test EVP_PKEY_eq on public RSA key both on token ## Test EVP_PKEY_eq on public EC key both on token ## Test EVP_PKEY_eq on public RSA key via import ## Match private RSA key against public key ## Match private RSA key against public key (commutativity) ## Test EVP_PKEY_eq on public EC key via import ## Match private EC key against public key ## Match private EC key against public key (commutativity) ## Test EVP_PKEY_eq with key exporting disabled ## Test RSA key ## Test EC key ## Test PIN caching Prompt: "Enter pass phrase for PKCS#11 Token (Slot 588010675 - SoftHSM slot ID 0x230c54b3):" Returning: 12345678 Child Done ALL A-OK! Prompt: "Enter pass phrase for PKCS#11 Token (Slot 588010675 - SoftHSM slot ID 0x230c54b3):" Returning: 12345678 Child Done ALL A-OK! ## Test interactive Login on key without ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ## Test interactive Login repeated for operation on key with ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ## Test Key generation Performed tests: 4 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 6/92 pkcs11-provider:softhsm / basic OK 8.41s 7/92 pkcs11-provider:kryoptic / basic RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=187 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 7/92 pkcs11-provider:kryoptic / basic SKIP 0.01s exit status 77 8/92 pkcs11-provider:kryoptic.nss / basic RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=184 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 8/92 pkcs11-provider:kryoptic.nss / basic SKIP 0.01s exit status 77 9/92 pkcs11-provider:softokn / pubkey RUNNING >>> MALLOC_PERTURB_=204 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 9/92 pkcs11-provider:softokn / pubkey SKIP 0.01s exit status 77 10/92 pkcs11-provider:softhsm / pubkey RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=129 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tpubkey ## Export RSA Public key to a file openssl pkey -in $BASEURI -pubin -pubout -out ${TMPPDIR}/baseout.pub Export Public key to a file (pub-uri) openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/pubout.pub Print Public key from private openssl pkey -in $PRIURI -pubout -text ## Export Public check error openssl pkey -in pkcs11:id=%de%ad -pubin -pubout -out ${TMPPDIR}/pubout-invlid.pub Could not find private key of Public Key from pkcs11:id=%de%ad ## Export EC Public key to a file openssl pkey -in $ECBASEURI -pubin -pubout -out ${TMPPDIR}/baseecout.pub Export EC Public key to a file (pub-uri) openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/pubecout.pub Print EC Public key from private openssl pkey -in $ECPRIURI -pubout -text ## Check we can get RSA public keys from certificate objects Export Public key to a file (priv-uri) openssl pkey -in $PRI2URI -pubout -out ${TMPPDIR}/priv-cert.pub Export Public key to a file (base-uri) openssl pkey -in $BASE2URI -pubout -out ${TMPPDIR}/base-cert.pub ## Check we can get EC public keys from certificate objects Export Public EC key to a file (priv-uri) openssl pkey -in $ECPRI2URI -pubout -out ${TMPPDIR}/ec-priv-cert.pub Export Public key to a file (base-uri) openssl pkey -in $ECBASE2URI -pubout -out ${TMPPDIR}/ec-base-cert.pub ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 10/92 pkcs11-provider:softhsm / pubkey OK 0.26s 11/92 pkcs11-provider:kryoptic / pubkey RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=21 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 11/92 pkcs11-provider:kryoptic / pubkey SKIP 0.01s exit status 77 12/92 pkcs11-provider:kryoptic.nss / pubkey RUNNING >>> MALLOC_PERTURB_=55 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 12/92 pkcs11-provider:kryoptic.nss / pubkey SKIP 0.01s exit status 77 13/92 pkcs11-provider:softokn / certs RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=228 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 13/92 pkcs11-provider:softokn / certs SKIP 0.01s exit status 77 14/92 pkcs11-provider:softhsm / certs RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=199 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tcerts ## Check we can fetch certifiatce objects openssl x509 -in ${CRTURI} -subject -out ${TMPPDIR}/crt-subj.txt openssl x509 -in ${ECCRTURI} -subject -out ${TMPPDIR}/eccrt-subj.txt ## Use storeutl command to match specific certs via params openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate ## Test fetching certificate without PIN in config files openssl x509 -in $CRTURI -subject -out ${TMPPDIR}/crt-subj-nopin.txt ## Test fetching certificate via STORE api Cert load successfully ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 14/92 pkcs11-provider:softhsm / certs OK 0.19s 15/92 pkcs11-provider:kryoptic / certs RUNNING >>> MALLOC_PERTURB_=59 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 15/92 pkcs11-provider:kryoptic / certs SKIP 0.01s exit status 77 16/92 pkcs11-provider:kryoptic.nss / certs RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=222 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 16/92 pkcs11-provider:kryoptic.nss / certs SKIP 0.01s exit status 77 17/92 pkcs11-provider:softokn / ecc RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=144 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 17/92 pkcs11-provider:softokn / ecc SKIP 0.01s exit status 77 18/92 pkcs11-provider:softhsm / ecc RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=89 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecc ## Export EC Public key to a file openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ecout.pub Print EC Public key from private openssl pkey -in $ECPRIURI -pubout -text ## Sign and Verify with provided Hash and EC openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${ECBASEURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-ecsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${TMPPDIR}/ecout.pub" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-256) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-384) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-512) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha512-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-256) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-384) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-512) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-512-ecdgstsig.bin Signature Verified Successfully ## Test CSR generation from private ECC keys openssl req -new -batch -key "${ECPRIURI}" -out ${TMPPDIR}/ecdsa_csr.pem openssl req -in ${TMPPDIR}/ecdsa_csr.pem -verify -noout Certificate request self-signature verify OK ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 18/92 pkcs11-provider:softhsm / ecc OK 0.42s 19/92 pkcs11-provider:kryoptic / ecc RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=191 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 19/92 pkcs11-provider:kryoptic / ecc SKIP 0.01s exit status 77 20/92 pkcs11-provider:kryoptic.nss / ecc RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=187 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 20/92 pkcs11-provider:kryoptic.nss / ecc SKIP 0.01s exit status 77 21/92 pkcs11-provider:softhsm / edwards RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=173 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tedwards ## Export ED25519 Public key to a file openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/edout.pub Print ED25519 Public key from private openssl pkey -in $EDPRIURI -pubout -text ## DigestSign and DigestVerify with ED25519 openssl pkeyutl -sign -inkey "${EDBASEURI}" -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-eddgstsig.bin openssl pkeyutl -verify -inkey "${EDBASEURI}" -pubin -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-eddgstsig.bin Signature Verified Successfully ## Test CSR generation from private ED25519 keys openssl req -new -batch -key "${EDPRIURI}" -out ${TMPPDIR}/ed25519_csr.pem openssl req -in ${TMPPDIR}/ed25519_csr.pem -verify -noout Certificate request self-signature verify OK ## Test EVP_PKEY_eq on public Edwards key both on token ## Test EVP_PKEY_eq on public ED key via import ## Match private ED key against public key ## Match private ED key against public key (commutativity) ## Test Key generation Performed tests: 1 ## Export ED448 Public key to a file openssl pkey -in $ED2PUBURI -pubin -pubout -out ${TMPPDIR}/ed2out.pub Print ED448 Public key from private openssl pkey -in $ED2PRIURI -pubout -text ## DigestSign and DigestVerify with ED448 openssl pkeyutl -sign -inkey "${ED2BASEURI}" -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-eddgstsig.bin openssl pkeyutl -verify -inkey "${ED2BASEURI}" -pubin -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-eddgstsig.bin Signature Verified Successfully ## Test CSR generation from private ED448 keys openssl req -new -batch -key "${ED2PRIURI}" -out ${TMPPDIR}/ed448_csr.pem openssl req -in ${TMPPDIR}/ed448_csr.pem -verify -noout Certificate request self-signature verify OK ## Test EVP_PKEY_eq on public Edwards key both on token ## Test EVP_PKEY_eq on public ED448 key via import ## Match private ED448 key against public key ## Match private ED448 key against public key (commutativity) ## Test Ed448 Key generation Performed tests: 1 ## Test interactive Login on key without ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 21/92 pkcs11-provider:softhsm / edwards OK 0.89s 22/92 pkcs11-provider:kryoptic / edwards RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=70 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 22/92 pkcs11-provider:kryoptic / edwards SKIP 0.01s exit status 77 23/92 pkcs11-provider:kryoptic.nss / edwards RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=226 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 23/92 pkcs11-provider:kryoptic.nss / edwards SKIP 0.01s exit status 77 24/92 pkcs11-provider:softokn / ecdh RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=111 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 24/92 pkcs11-provider:softokn / ecdh SKIP 0.01s exit status 77 25/92 pkcs11-provider:kryoptic / ecdh RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=154 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 25/92 pkcs11-provider:kryoptic / ecdh SKIP 0.01s exit status 77 26/92 pkcs11-provider:kryoptic.nss / ecdh RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=248 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 26/92 pkcs11-provider:kryoptic.nss / ecdh SKIP 0.01s exit status 77 27/92 pkcs11-provider:softokn / democa RUNNING >>> MALLOC_PERTURB_=66 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 27/92 pkcs11-provider:softokn / democa SKIP 0.01s exit status 77 28/92 pkcs11-provider:softhsm / democa RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=175 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdemoca ## Set up demoCA ## Generating CA cert if needed openssl req -batch -noenc -x509 -new -key ${PRIURI} -out ${DEMOCA}/cacert.pem ## Generating a new CSR with key in file openssl req -batch -noenc -newkey rsa:2048 -subj "/CN=testing-csr-signing/O=PKCS11 Provider/C=US" -keyout ${DEMOCA}/cert.key -out ${DEMOCA}/cert.csr .....+.....+.+.....+++++++++++++++++++++++++++++++++++++++*..+......+.+......+...+++++++++++++++++++++++++++++++++++++++*..+..+......+....+..+.+........+......+.+.........+.....+......+...+.....................+.+..+.+..+............+.............+..+......................+...............+...+............+......+............+..+...+...+.........+................+........................+.....+....+..+...+.+......+.....+....+.....+.+...+.....+..........+.........+.....+......+.........+...+...+..........+......+.........+.........+..+.........+.+...+..+.............+..+....+......+.......................................+......+........+...+...+......+.+.........+.....+......+.......+...+...+..+....+........+...+.......+...+.........+.........+...........+..........+...+...+..+............+....+..+............+.+.........+..+...+......+.+...........+...+................+.........+..+.......+........+..........+.....+............+...+.......+......+.........+.....+.+......+.....+.+.........+.....+...+...+.......+.....+......+......+.+............+.....+................+......+...........+..........+...+.....+.+.....+.+..+..........+.....+......+....+..+.+...+............+...+.........+.....+...+...+............+....+.....+...+......+.......+.....+...+....+...........+.......+.....+.......+..+.+...+.........+.....+...+............+.......+...+......+......+.........+............+.........+.........+..+...+......+......+....+.....+...+......+....+...+........+......+....+.....+..........+.....+....+...+.....+.........+.............+.....+...+....+.....+...+.+..+....+...+...+.....+.......+..+...+......+......+.........+.+.....+.+.........+...+........+........................+....+.....+....+...+..+.+..+.......+...+..+.......+.....+.+........+.+.....+.+..+..........+......+...........+...+.+...........+....+..+....+........+...+...+....+.....................+..+.......+............+...+..+....+..+.......+......+.........+.....++++++ ....+...............+++++++++++++++++++++++++++++++++++++++*..+......+...+.+......+...+............+...........+.......+..+...+.+......+........+.+............+...+......+...+...+....................+++++++++++++++++++++++++++++++++++++++*.......+...........+.+...+..............+.+...........+.+........+......++++++ ----- ## Signing the new certificate openssl ca -batch -in ${DEMOCA}/cert.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-csr-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 19 07:58:05 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing RSA key in token openssl req -batch -noenc -new -key ${PRIURI} -subj "/CN=testing-rsa-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa.csr ## Signing the new RSA key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsa-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 19 07:58:05 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing EC key in token openssl req -batch -noenc -new -key ${ECPRIURI} -subj "/CN=testing-ec-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ec.csr ## Signing the new EC key certificate openssl ca -batch -in ${DEMOCA}/cert-ec.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ec-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 19 07:58:05 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing ED key in token openssl req -batch -noenc -new -key ${EDPRIURI} -subj "/CN=testing-ed-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ed.csr ## Signing the new ED key certificate openssl ca -batch -in ${DEMOCA}/cert-ed.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ed-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 19 07:58:05 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing ED448 key in token openssl req -batch -noenc -new -key ${ED2PRIURI} -subj "/CN=testing-ed2-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ed2.csr ## Signing the new ED448 key certificate openssl ca -batch -in ${DEMOCA}/cert-ed2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ed2-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 19 07:58:05 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing RSA-PSS key in token openssl req -batch -noenc -new -key ${RSAPSSPRIURI} -sigopt rsa_padding_mode:pss -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US" -sigopt rsa_padding_mode:pss -out ${DEMOCA}/cert-rsa-pss.csr ## Signing the new RSA-PSS key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsapss-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 19 07:58:05 2027 GMT (365 days) Write out database with 1 new entries Database updated openssl x509 -text -in ${DEMOCA}/cert.pem ## Generating a new CSR with existing SHA256 restricted RSA-PSS key in token openssl req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss -subj "/CN=testing-rsapss-sha2-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa-pss2.csr -sigopt rsa_padding_mode:pss -sigopt digest:sha256 ## Signing the new SHA256 restricted RSA-PSS key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa-pss2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsapss-sha2-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 19 07:58:06 2027 GMT (365 days) Write out database with 1 new entries Database updated openssl x509 -text -in ${DEMOCA}/cert.pem ## Generating a new CSR with existing RSA-PSS key in token openssl req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa-pss2.csr -sigopt rsa_padding_mode:pss -sigopt digest:sha256 -sigopt rsa_pss_saltlen:-2 ## Signing the new RSA-PSS key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsapss-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 19 07:58:06 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Set up OCSP openssl req -batch -noenc -new -subj "/CN=OCSP/O=PKCS11 Provider/C=US" -key ${PRIURI} -out ${DEMOCA}/ocspSigning.csr openssl ca -batch -keyfile ${PRIURI} -cert ${DEMOCA}/cacert.pem -in ${DEMOCA}/ocspSigning.csr -out ${DEMOCA}/ocspSigning.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'OCSP' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 19 07:58:06 2027 GMT (365 days) Write out database with 1 new entries Database updated ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 28/92 pkcs11-provider:softhsm / democa OK 1.58s 29/92 pkcs11-provider:kryoptic / democa RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=213 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 29/92 pkcs11-provider:kryoptic / democa SKIP 0.01s exit status 77 30/92 pkcs11-provider:kryoptic.nss / democa RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=50 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 30/92 pkcs11-provider:kryoptic.nss / democa SKIP 0.01s exit status 77 31/92 pkcs11-provider:softokn / digest RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=24 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 31/92 pkcs11-provider:softokn / digest SKIP 0.01s exit status 77 32/92 pkcs11-provider:softhsm / digest RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=32 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdigest ## Test Digests support sha512-224: Unsupported by pkcs11 token sha512-256: Unsupported by pkcs11 token sha3-224: Unsupported by pkcs11 token sha3-256: Unsupported by pkcs11 token sha3-384: Unsupported by pkcs11 token sha3-512: Unsupported by pkcs11 token PASSED ## Test Digests Blocked No digest available for testing pkcs11 provider Digest operations failed as expected ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 32/92 pkcs11-provider:softhsm / digest OK 0.05s 33/92 pkcs11-provider:kryoptic / digest RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=41 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 33/92 pkcs11-provider:kryoptic / digest SKIP 0.01s exit status 77 34/92 pkcs11-provider:kryoptic.nss / digest RUNNING >>> MALLOC_PERTURB_=236 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 34/92 pkcs11-provider:kryoptic.nss / digest SKIP 0.01s exit status 77 35/92 pkcs11-provider:softokn / fork RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=180 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 35/92 pkcs11-provider:softokn / fork SKIP 0.01s exit status 77 36/92 pkcs11-provider:softhsm / fork RUNNING >>> MALLOC_PERTURB_=153 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/tfork Child Done Child Done ALL A-OK! ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 36/92 pkcs11-provider:softhsm / fork OK 1.66s 37/92 pkcs11-provider:kryoptic / fork RUNNING >>> MALLOC_PERTURB_=218 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 37/92 pkcs11-provider:kryoptic / fork SKIP 0.01s exit status 77 38/92 pkcs11-provider:kryoptic.nss / fork RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=138 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 38/92 pkcs11-provider:kryoptic.nss / fork SKIP 0.01s exit status 77 39/92 pkcs11-provider:softokn / oaepsha2 RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=248 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 39/92 pkcs11-provider:softokn / oaepsha2 SKIP 0.01s exit status 77 40/92 pkcs11-provider:kryoptic / oaepsha2 RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=190 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 40/92 pkcs11-provider:kryoptic / oaepsha2 SKIP 0.01s exit status 77 41/92 pkcs11-provider:kryoptic.nss / oaepsha2 RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=223 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 41/92 pkcs11-provider:kryoptic.nss / oaepsha2 SKIP 0.01s exit status 77 42/92 pkcs11-provider:softokn / hkdf RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=192 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 42/92 pkcs11-provider:softokn / hkdf SKIP 0.01s exit status 77 43/92 pkcs11-provider:kryoptic / hkdf RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=87 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 43/92 pkcs11-provider:kryoptic / hkdf SKIP 0.01s exit status 77 44/92 pkcs11-provider:kryoptic.nss / hkdf RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=225 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 44/92 pkcs11-provider:kryoptic.nss / hkdf SKIP 0.01s exit status 77 45/92 pkcs11-provider:softokn / imported RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=231 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 45/92 pkcs11-provider:softokn / imported SKIP 0.01s exit status 77 46/92 pkcs11-provider:kryoptic / imported RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=172 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 46/92 pkcs11-provider:kryoptic / imported SKIP 0.01s exit status 77 47/92 pkcs11-provider:kryoptic.nss / imported RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=8 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 47/92 pkcs11-provider:kryoptic.nss / imported SKIP 0.01s exit status 77 48/92 pkcs11-provider:softokn / rsapss RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=225 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 48/92 pkcs11-provider:softokn / rsapss SKIP 0.01s exit status 77 49/92 pkcs11-provider:softhsm / rsapss RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=79 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapss ## DigestSign and DigestVerify with RSA PSS openssl pkeyutl -sign -inkey "${BASEURI}" -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully Re-verify using OpenSSL default provider openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with RSA PSS with default params openssl pkeyutl -sign -inkey "${BASEURI}" -pkeyopt pad-mode:pss -in ${RAND64FILE} -rawin -out ${TMPPDIR}/def-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -pkeyopt pad-mode:pss -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/def-dgstsig.bin Signature Verified Successfully Re-verify using OpenSSL default provider openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -pkeyopt pad-mode:pss -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/def-dgstsig.bin Signature Verified Successfully ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 49/92 pkcs11-provider:softhsm / rsapss OK 0.16s 50/92 pkcs11-provider:kryoptic / rsapss RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=78 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 50/92 pkcs11-provider:kryoptic / rsapss SKIP 0.01s exit status 77 51/92 pkcs11-provider:kryoptic.nss / rsapss RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=24 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 51/92 pkcs11-provider:kryoptic.nss / rsapss SKIP 0.01s exit status 77 52/92 pkcs11-provider:softhsm / rsapssam RUNNING >>> MALLOC_PERTURB_=13 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapssam ## DigestSign and DigestVerify with RSA PSS (SHA256 restriction) openssl pkeyutl -sign -inkey "${RSAPSS2PRIURI}" -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin openssl pkeyutl -verify -inkey "${RSAPSS2PUBURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin Signature Verified Successfully ## Fail DigestSign with RSA PSS because of restricted Digest openssl pkeyutl -sign -inkey "${RSAPSS2PRIURI}" -digest sha384 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha384 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-rsapps-genpkey-dgstsig.bin 2>&1 ## Fail Signing with RSA PKCS1 mech and RSA-PSS key openssl pkeyutl -sign -inkey "${RSAPSSPRIURI}" -digest sha256 -pkeyopt rsa_padding_mode:pkcs1 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-rsa-not-rsapss-sig.bin 2>&1 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 52/92 pkcs11-provider:softhsm / rsapssam OK 0.12s 53/92 pkcs11-provider:kryoptic / rsapssam RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=118 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 53/92 pkcs11-provider:kryoptic / rsapssam SKIP 0.01s exit status 77 54/92 pkcs11-provider:softokn / genkey RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=245 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 54/92 pkcs11-provider:softokn / genkey SKIP 0.01s exit status 77 55/92 pkcs11-provider:softhsm / genkey RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=61 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/tgenkey Performed tests: 0 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 55/92 pkcs11-provider:softhsm / genkey OK 0.01s 56/92 pkcs11-provider:kryoptic / genkey RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=97 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 56/92 pkcs11-provider:kryoptic / genkey SKIP 0.01s exit status 77 57/92 pkcs11-provider:kryoptic.nss / genkey RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=112 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 57/92 pkcs11-provider:kryoptic.nss / genkey SKIP 0.01s exit status 77 58/92 pkcs11-provider:softokn / pkey RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=70 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 58/92 pkcs11-provider:softokn / pkey SKIP 0.01s exit status 77 59/92 pkcs11-provider:softhsm / pkey RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=165 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/tpkey ALL A-OK! ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 59/92 pkcs11-provider:softhsm / pkey OK 0.12s 60/92 pkcs11-provider:kryoptic / pkey RUNNING >>> MALLOC_PERTURB_=246 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 60/92 pkcs11-provider:kryoptic / pkey SKIP 0.01s exit status 77 61/92 pkcs11-provider:kryoptic.nss / pkey RUNNING >>> MALLOC_PERTURB_=142 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 61/92 pkcs11-provider:kryoptic.nss / pkey SKIP 0.01s exit status 77 62/92 pkcs11-provider:softokn / session RUNNING >>> MALLOC_PERTURB_=201 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 62/92 pkcs11-provider:softokn / session SKIP 0.01s exit status 77 63/92 pkcs11-provider:softhsm / session RUNNING >>> MALLOC_PERTURB_=116 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/tsession ALL A-OK!―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 63/92 pkcs11-provider:softhsm / session OK 0.27s 64/92 pkcs11-provider:kryoptic / session RUNNING >>> MALLOC_PERTURB_=14 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 64/92 pkcs11-provider:kryoptic / session SKIP 0.01s exit status 77 65/92 pkcs11-provider:kryoptic.nss / session RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=76 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 65/92 pkcs11-provider:kryoptic.nss / session SKIP 0.01s exit status 77 66/92 pkcs11-provider:softokn / rand RUNNING >>> MALLOC_PERTURB_=119 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 66/92 pkcs11-provider:softokn / rand SKIP 0.01s exit status 77 67/92 pkcs11-provider:softhsm / rand RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=100 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trand ## Test PKCS11 RNG openssl rand 1 406968F7:error:0308010C:digital envelope routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:355:Global default library context, Algorithm (PKCS11-RAND : 0), Properties () 406968F7:error:12000090:random number generator:rand_new_drbg:unable to fetch drbg:../crypto/rand/rand_lib.c:660: openssl rand 1 ¡ ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 67/92 pkcs11-provider:softhsm / rand OK 0.04s 68/92 pkcs11-provider:kryoptic / rand RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=146 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 68/92 pkcs11-provider:kryoptic / rand SKIP 0.01s exit status 77 69/92 pkcs11-provider:kryoptic.nss / rand RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=214 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 69/92 pkcs11-provider:kryoptic.nss / rand SKIP 0.01s exit status 77 70/92 pkcs11-provider:softokn / readkeys RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=183 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 70/92 pkcs11-provider:softokn / readkeys SKIP 0.01s exit status 77 71/92 pkcs11-provider:softhsm / readkeys RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=248 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/treadkeys ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 71/92 pkcs11-provider:softhsm / readkeys OK 0.03s 72/92 pkcs11-provider:kryoptic / readkeys RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=61 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 72/92 pkcs11-provider:kryoptic / readkeys SKIP 0.01s exit status 77 73/92 pkcs11-provider:kryoptic.nss / readkeys RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=233 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 73/92 pkcs11-provider:kryoptic.nss / readkeys SKIP 0.01s exit status 77 74/92 pkcs11-provider:softokn / tls RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=136 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 74/92 pkcs11-provider:softokn / tls SKIP 0.01s exit status 77 75/92 pkcs11-provider:softhsm / tls RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=127 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttls ## Test SSL_CTX creation SSL Context works! ## Test setting cert/keys on TLS Context Cert and Key successfully set on TLS Context! ## Test setting cert/keys on TLS Context w/o pub key Cert and Key successfully set on TLS Context! ## Test an actual TLS connection ######################################## ## TLS with key in provider ## Run sanity test with default values (RSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:51 2026 GMT; NotAfter: Mar 19 07:57:51 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUxWhcNMjcwMzE5MDc1NzUxWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMTMF4dTlfnRg0ljE2IpSmUhil6AAJd96p7t FHoj6g6huZT8MQSA9yXNerkERSJUBJn6NHrp0PPOvSzNj0DQaRvbll7b5hYEqGqy t0w9qsukwReaFQe7AsMB3NJ8u3vYHeOx/ZHySx2kidjlBgIla/cEXwO0gk3l401K +osR8ZHlRt75/56s+EreIZnLk/Hx5+pe+ucMQlSBYoejeqEn9rbp7AmuhK6X/K6W SBNQDzAz75cyfR+/rPQkzVuzgneJiF4zQA39bd0iHG1myQS4nKXlY5Se494SsR8w iRFeDSKTGTVOhuKgBCHXb0wd122TjwNtOaDza8LnTc7lbAhG00MCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBQTDEV2JxmJsdzPJBZr7LEvp1/1GTAf BgNVHSMEGDAWgBRykOtI7WuNnvQkh3bIeF7gsqhEMjANBgkqhkiG9w0BAQsFAAOC AQEAjx4xKvHXZkNSNbtUCYmvJycOlffFq/LDPGqhC+kn+5hi3GuEMVASf6EId9wi DKOBc9UCEFN7djA0QNt3PPchVtF/PE1wud9GemNlCFpi6+HkFg4kxyyOs2DHjsbK GwyrjTEB56n/V256uEt1BD9XXliwOcuTwSmXHvwKrJYmhjIsKnmyT6PIW2MQZBNR 2jbAdQSVFnrzygFVOEwwuNZOymkK/5AdLx39xh38nrpionDg77fzOyq/Ut35Z52k cGKL3bQi2q9yk6xzCTNKCxd4BQHQOIBHGS1JEeMA/bf5R9KK2p91hw6tD6/LssUi ABMgtSvMmiJ5Bj4I7TtHiopimg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: FA4DA169CA67FCE14C1E2E91FDA03FE8A23F497F4E2968FFF6BD748C780A1A03 Session-ID-ctx: Resumption PSK: 9B1997715E026A1B19382227241C336B9127F0F972E7BF3B2494F9BDF1334B321582E7DC1E1CF7FD3AE03D2BB742AD45 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - e0 4f bc fa 95 e4 38 0d-a3 68 c6 11 83 6a 9b 9d .O....8..h...j.. 0010 - 9a d1 c1 4d ad e0 53 38-ee 1d 88 0d 7f fd c6 6b ...M..S8.......k 0020 - 36 4b 2e 77 a2 09 94 ae-8c ce 93 6d b9 0a dc de 6K.w.......m.... 0030 - b8 36 6e 5b 60 c4 bc 2f-ea 4b 8d fb 8c 37 21 dd .6n[`../.K...7!. 0040 - 28 ca f2 87 f3 2e d2 4f-48 0d 0d 37 bd d7 78 5b (......OH..7..x[ 0050 - 65 5f da 72 31 84 32 92-19 53 cf 24 f6 0a 63 ef e_.r1.2..S.$..c. 0060 - ba 02 c6 00 82 a5 58 7b-43 09 6e b9 1c b0 a7 21 ......X{C.n....! 0070 - 91 ef 18 80 a6 82 aa dc-a8 89 92 1f 72 31 71 a3 ............r1q. 0080 - b8 e3 37 d0 b0 42 a6 05-4d d4 16 13 1a 8c 86 2d ..7..B..M......- 0090 - 1b 03 1e ac 55 7c 41 f3-f4 6c f1 a7 39 50 c6 ab ....U|A..l..9P.. 00a0 - 1c 13 25 c3 0d e2 e3 f5-c1 8d f3 dd d4 30 2e 76 ..%..........0.v 00b0 - 51 95 70 74 16 a7 5f 34-05 b4 88 c6 b7 b9 bf 25 Q.pt.._4.......% 00c0 - af f3 d7 a9 d8 6c 11 03-63 85 4a e9 81 a4 10 2f .....l..c.J..../ Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: EF7F53228BACF4739C54AD31E58891DD4E9CC692AA0FABE144DAD41CFF05B0BC Session-ID-ctx: Resumption PSK: 5F9CBC4DC25AB5114F3D142F88BBCBA22858B8A17E1B780BA954CA5270E988E14F941EB7CC1090A56622E1FF2BD2BB54 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - e0 4f bc fa 95 e4 38 0d-a3 68 c6 11 83 6a 9b 9d .O....8..h...j.. 0010 - cf 63 58 6c e4 e1 38 dc-b9 9a 28 51 47 78 b1 0a .cXl..8...(QGx.. 0020 - 1e 12 85 d6 4f 9c cd 12-50 a9 19 2d 70 60 65 2d ....O...P..-p`e- 0030 - 20 ec f2 96 e6 40 75 49-62 41 15 2a 0c ec d9 d0 ....@uIbA.*.... 0040 - a0 09 f9 27 8f 10 c4 7d-13 4b 86 a6 ba 6b d0 12 ...'...}.K...k.. 0050 - 72 da c3 ed 57 ef 40 72-e1 be 2a 3b 5f 0d cd 22 r...W.@r..*;_.." 0060 - 63 4c 0a ef e6 8a e5 9a-eb db cd 4d 00 31 7d 39 cL.........M.1}9 0070 - 4b b9 89 82 12 d0 1b 48-40 0f 74 d9 65 7a 4a ae K......H@.t.ezJ. 0080 - f5 f1 b0 e2 71 35 54 db-8c d4 c7 d2 5c 48 01 d7 ....q5T.....\H.. 0090 - 6b 31 34 35 d1 f5 af ef-d0 0f f6 10 7e 8c 91 5f k145........~.._ 00a0 - 81 d4 80 d8 67 87 d8 69-c8 af c4 62 02 67 0d 62 ....g..i...b.g.b 00b0 - 0e b3 13 59 42 14 08 11-02 5c 41 d6 32 b9 a7 32 ...YB....\A.2..2 00c0 - c8 7e e8 30 c4 70 08 73-92 73 f9 5a 71 a3 3d 57 .~.0.p.s.s.Zq.=W Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40F969F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEINC5a8mcFLAyAAQmUXic4HCWahBzMGxYYzsZi7EMqM05 BDBfnLxNwlq1EU89FC+Iu8uiKFi4oX4beAupVMpScOmI4U+UHrfMEJClZiLh/yvS u1ShBgIEabuskaIEAgIcIKQGBAQBAAAArgYCBHfagp2zAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (RSA-PSS) ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%10 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 2048 (bit); sigalg: RSASSA-PSS v:NotBefore: Mar 19 07:58:09 2026 GMT; NotAfter: Apr 18 07:58:09 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIEIzCCAtugAwIBAgIUazaBHC5QvNY0ad/Sl+1imzddHwswPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwMzE5MDc1ODA5WhcNMjYwNDE4MDc1ODA5WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCASAwCwYJKoZIhvcNAQEKA4IBDwAwggEKAoIBAQCn+e7dEpp7VqL2pTKM wRDLs/tYHG/jK+eeUt91tO4UMfSmkv1LPkTeKJMRj0yevahAdJD/whlH8qG7Xd1F Acpix4VOsQmqE72UVip5TcMYPAzjy338bMPBADfIbwCwYzaUG0IV9Ccml7k2ihzm zT82j5VroDLy+hGcLpThX6W5SHAzFNPdUHPJrPqANztyQRXuFh0I0NVClRDbI6G8 nm587XWEEY8e2M+5Sz5/uXDU9chGeu+PIG1xqoUwqe9HHyycPEBC00IX8vSGxp2i /rYIXOs4xcP/OtGT/2Vv2Uub2ByN2XH7SrI88/vwqqarLcbsFLlcSPX7z5owPMT4 CloHAgMBAAGjaTBnMB0GA1UdDgQWBBQ4OEb/N8NQwbhllceRlDxNdgS/FjAfBgNV HSMEGDAWgBQ4OEb/N8NQwbhllceRlDxNdgS/FjAPBgNVHRMBAf8EBTADAQH/MAkG A1UdEQQCMAAwCQYDVR0SBAIwADA9BgkqhkiG9w0BAQowMKANMAsGCWCGSAFlAwQC AaEaMBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgGiAwIBIAOCAQEAp5htlWEJ66kk LXcpbmkaC95AvvNWG7t9N9GIXFGJjuU2XYvS+LYz+b/O2YFZj9FWGEckXyfkEpbT sx7XpnKsrX1xA04mSTSYSZhJGKE6apMIBcNugETSfYdx46PSHvKSMZtkH6MvMCP1 0G0sUeScr5PRKjC0lhCEJ/8pu/6Bg5QYcteiA2AAHkYRObbMZdnufKUsF9bwfb++ el2lih53DHHLL4asnUwPSqViYt2G1s636yqiI20C3reXurVQuLcYsRaLeL1DJqn+ 5pYa0MJUzKnRNPvVDGiT4pzXnxMXQwftBA+2dcmU93bChRU2jdaU8YE1DvFdn846 tlO5/lKIsw== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1619 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 1321D608D42F06CC4FFD0A5BBB63C95AC66E5018315F82B6A18226C44DB23FE7 Session-ID-ctx: Resumption PSK: 8170E908F7ECAE5F21DC29D509D3302A94E7CD885DD6213BE25817D46245462A338F861AD6F3396227EB5CDAC12CD4C8 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - bd 30 4e 9d a5 8d 86 c3-60 5e b6 db 9c 18 99 78 .0N.....`^.....x 0010 - fe e0 95 76 88 ef d5 70-e2 0b 78 13 49 c4 0b 6e ...v...p..x.I..n 0020 - fd 82 8a e2 b9 27 2a 77-80 70 28 31 a7 46 07 0d .....'*w.p(1.F.. 0030 - 61 3d f6 bc d8 cb 8b 34-ea 91 09 29 d0 1c 5f 08 a=.....4...).._. 0040 - 8e c2 8a cb 11 cc e1 ad-fd e2 08 09 c0 4e 56 09 .............NV. 0050 - 9f 97 fd 14 24 16 57 42-d6 f2 47 7e c5 81 57 7c ....$.WB..G~..W| 0060 - b2 21 f0 04 97 a8 8e 94-bf d2 e7 e5 11 31 2d ba .!...........1-. 0070 - 2a 54 66 31 8a c0 84 d3-19 ab 82 a4 10 e1 ee f6 *Tf1............ 0080 - 93 a6 44 8d 7c 49 58 ba-f5 9f 69 06 53 5a b0 b0 ..D.|IX...i.SZ.. 0090 - 50 65 b0 18 6c 17 04 2e-00 f4 e2 cf 11 71 58 ca Pe..l........qX. 00a0 - f6 de 6f 04 9f e5 a2 0d-55 7d 3b 49 28 0a 4d e2 ..o.....U};I(.M. 00b0 - f6 e0 55 a9 a4 85 b3 06-e2 0e 86 6e 3b 2a 8a ad ..U........n;*.. 00c0 - 3b f3 6b 9e b8 29 f8 b8-c4 2c 82 93 a3 4e e1 bf ;.k..)...,...N.. Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 76D60B52A42960F9183AAA4F7076140B59B13B2C2DBEAF2F6AB38216F1D06523 Session-ID-ctx: Resumption PSK: B78D88C8B98A29C5A5D60C390396C5085B4F82DA618B8B5BEFEAF57309FAC7E333E53A9022D7036C3B621BB2B105B371 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - bd 30 4e 9d a5 8d 86 c3-60 5e b6 db 9c 18 99 78 .0N.....`^.....x 0010 - bc a4 33 0a 36 03 aa e4-4c 17 5e 13 3e 6d 17 4d ..3.6...L.^.>m.M 0020 - 50 95 47 62 11 e8 d1 93-b6 e5 f0 9c 39 10 7d 70 P.Gb........9.}p 0030 - 00 57 a3 97 55 89 89 f5-89 74 6c c8 c4 52 96 fc .W..U....tl..R.. 0040 - 9f 41 1d de 1b 65 17 ec-a1 51 ce fa e2 7a 3d c9 .A...e...Q...z=. 0050 - 7a de 42 75 57 57 9a a4-2a bb 66 f1 dc 1d dd 7a z.BuWW..*.f....z 0060 - 66 c0 37 7d 9d 00 7f f1-2e 45 25 60 7d e4 b9 8a f.7}.....E%`}... 0070 - c8 a0 4b 0f 03 16 49 c5-d6 bf 73 e6 e4 c7 a8 f1 ..K...I...s..... 0080 - 0a 93 55 63 0d da a4 27-b8 a5 50 3b a7 18 28 0e ..Uc...'..P;..(. 0090 - 94 f9 0e 0f 58 a3 31 88-79 84 89 78 93 d1 45 74 ....X.1.y..x..Et 00a0 - b8 f7 29 b5 2a 98 fa ed-92 35 7f b6 27 89 3f 74 ..).*....5..'.?t 00b0 - 5d 8f 31 be b4 15 d7 9f-72 4b 0c 8b b4 4a 29 f0 ].1.....rK...J). 00c0 - 92 aa c9 a2 a4 9c f7 a1-2f 5b 58 c8 bf d2 44 da ......../[X...D. Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40B969F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/rsapss-default.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIEUnh9XOcNAzy8VmH2CSkosFV+FIBFp4rebOfChf26+S BDC3jYjIuYopxaXWDDkDlsUIW0+C2mGLi1vv6vVzCfrH4zPlOpAi1wNsO2IbsrEF s3GhBgIEabuskaIEAgIcIKQGBAQBAAAArgcCBQDC+/HwswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 TLS SUCCESSFUL Q Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with RSA-PSS and SHA256 ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 3092 (bit); sigalg: RSASSA-PSS v:NotBefore: Mar 19 07:58:09 2026 GMT; NotAfter: Apr 18 07:58:09 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIFKDCCA12gAwIBAgIUdqylRRoeFjvSDwO+zd2DdnldpEYwPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwMzE5MDc1ODA5WhcNMjYwNDE4MDc1ODA5WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgw8eYZVouaL5jbWQIj5P 3L6+RP0WhkVjSSDpvhhXlA75SXbrSwhm9Ocfhn9wL/W/TATZSIFnSgBzZXqE8fGe bGoiCX5sJVOHpwWv14ExCk8tOTpwBZbevhYTD6OXe516uIIaZV79fGVtNZYKu6Vl 6mZuPVGi7zvVUwsmXsir+v6fb0I3kskO4yfTL8ngunXVps9ZxWm0UKEU4N9UY6R2 qafBCl11kBYyTa2JlqAetQO4V5LQM/OrcJglyK417RyI3CmGr+py+RHb1Z6UW7O3 KXtZT/5BX2R4AaVi9MNDpcV+cG5hGUo3lFXT71Fw0Mb35qFpEjHy6XLpw/yfi94k qoZqfaGWxMGy2HePij9CPZn6oQyVuUe5FPlK3eEM75qyXqWRK9bbVMcqQKs5xkif Q0bwP4kQDwIFGx23TG+AEX5ZR9CPJbZZcZleWeqHW0tSU3LrsnvG7LcLQR/EPjqF oApdYWHnMgowji8cqnkvv9KfjDwp3uT5PvL6GqZrUCpgRsosCQIDAQABo2kwZzAd BgNVHQ4EFgQUZOYXqArRsUdDPBuE8ePwKW0uZ+IwHwYDVR0jBBgwFoAUZOYXqArR sUdDPBuE8ePwKW0uZ+IwDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B AQgwCwYJYIZIAWUDBAIBogMCASADggGEAAoPKzOul+tI0q9aeYbIC9DgTQuzkQNG LkNmnZwDQ9jX5E6BbaprAKwv7Q7bJtX/m0FhURsYuck0HU7O/ZI89m6g+FBg2cUT kkGSy4J/mmG15gxVCAXYihUNgESXDuPJhSltfSLYF+ZugRm6/fZw0V6TCHVYigR3 WzIcuWdHdqxqUmbCo4W3dTsMGzxr9R0nVIvjEPUkjRsYVLbapMLR9KD3Stkac5L6 Gso/1If02cXRZkP/YMYBVAFuTCU1jC9xu0cwgfMs/fZvWdflbm/++D53s8KyxlGw PdoUUY4bmJLIW0udT1dQr5jPXJpEdHs+iXjwth/OKHWx/4zqytxxlWo3aFCbqcWM KwZjrjfZ5TTUaSBaCyOvzwqBkEpvswi5TgnNRb9xf1xM+Z9fldOIykSe1GpbAbbz gvtRqK4ZvClTPmwop8cRkaAx5BhgqbjYdLvHxlKqvFrD3j8VbrklLxkDjN7NakL2 czxzKtIigl8dB4ApSoQxItzRBQsXQQnLyOWYKQ== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 2011 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 3092 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 4D87DBDF8BCA2439BFE1BB519EB8C15DD55361B937C0CD9C2F79B021630B4947 Session-ID-ctx: Resumption PSK: A0A4100E10AE997DE2E3102B6F2DCBC46321D977B54F59C20E532A5AD9CB5DB670C3F68845F0A472D3A764893AB45EBD PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - df 10 3e ca 70 a9 10 30-6e 1f a1 7b 46 94 45 d1 ..>.p..0n..{F.E. 0010 - 59 85 de 21 1e ac 0d 09-f9 02 a6 d7 9c 1d 4a 0b Y..!..........J. 0020 - 6c a3 a2 58 09 c2 32 dd-6b c0 e8 cf a2 5f a9 59 l..X..2.k...._.Y 0030 - 9a 21 38 0c 1a 76 7c 96-97 eb 9d 43 4b 44 73 d0 .!8..v|....CKDs. 0040 - 6f 17 02 7f bf ef 29 1d-92 7b 68 a8 23 ab 66 82 o.....)..{h.#.f. 0050 - bb a9 10 87 f1 55 f2 40-da d7 a3 ae 4c df 6b b2 .....U.@....L.k. 0060 - 98 9a 71 45 31 12 01 3f-6c 7b 61 0b c7 e8 17 db ..qE1..?l{a..... 0070 - 05 8d d0 0e e9 23 bb b6-3f 4b dd 66 85 e3 85 16 .....#..?K.f.... 0080 - 20 03 28 66 13 25 84 53-ef 04 c5 fa 48 74 36 41 .(f.%.S....Ht6A 0090 - 94 f1 3a da d7 21 9c 13-60 6d d3 55 ae d3 39 33 ..:..!..`m.U..93 00a0 - 5c 96 3b 05 07 a5 91 f6-fd 82 4e d5 7e 20 80 15 \.;.......N.~ .. 00b0 - 83 ff bf 1f 02 98 d6 96-3a 52 fa d6 8e 34 78 11 ........:R...4x. 00c0 - 94 aa f9 18 73 a6 b7 10-8d ad db 33 d1 47 c4 ec ....s......3.G.. Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 4FBE6A3040E5D1BDE35A30807B536E2660E6BC32F0DB8E35895923F93AE29A89 Session-ID-ctx: Resumption PSK: 1B18570532C546023626623616C95833EBC0C6F61158D6B7F89660925F5C9D7857F392B53B6AB23610BC34A0718905E2 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - df 10 3e ca 70 a9 10 30-6e 1f a1 7b 46 94 45 d1 ..>.p..0n..{F.E. 0010 - 82 21 3e 18 b6 89 a6 4a-64 28 5c 68 19 f1 86 eb .!>....Jd(\h.... 0020 - 67 81 a4 3a 8d 74 6c 58-4e 31 0a 97 31 14 68 f8 g..:.tlXN1..1.h. 0030 - 02 68 db b8 9c cb c3 2a-5f 5b bc 84 11 18 18 25 .h.....*_[.....% 0040 - a6 a9 3c 1e be 22 cc 99-41 b8 72 69 3c 6e fd fc ..<.."..A.ri.L$H-..A.&.5.. 0080 - 3b 9b 94 1c 8c a0 7f 52-c8 ad 17 ff 09 8e d0 19 ;......R........ 0090 - 5b a5 db 9c 1f 16 eb ac-ca 0d 09 d8 9e 28 f6 1d [............(.. 00a0 - b6 f7 a0 7e 12 f5 d3 6b-78 b2 cf dd 2e c1 ab 09 ...~...kx....... 00b0 - 4d e2 f0 1e 5c f7 bf 54-09 37 37 48 b2 1b fc 66 M...\..T.77H...f 00c0 - b1 f5 84 3e 76 9e fe 72-28 d0 37 77 86 d9 a9 4c ...>v..r(.7w...L Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: A0AB408EB3EBDF85E1B029C0482BC52D527D42E92A42ABCD538D8C04020FF5F6 Session-ID-ctx: Resumption PSK: C2DBF79B6149B19EED16D12C15E619424C52145BB1D150DAE524C979132F161F9A7413E91043F94FB4A63B1131BFC9C6 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - e5 fc 67 5e 2b 5a 3c 21-93 a0 6b 22 9d b0 c5 92 ..g^+Z Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 401964F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIFAyQH4Ffu3j8tZ4ONg45//PYRfZoSwC+DSLt9/Nr4wo BDDC2/ebYUmxnu0W0SwV5hlCTFIUW7HRUNrlJMl5Ey8WH5p0E+kQQ/lPtKY7ETG/ ycahBgIEabuskaIEAgIcIKQGBAQBAAAArgcCBQCoeO0WswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 TLS SUCCESSFUL CIPHER is TLS_AES_256_GCM_SHA384 Q This TLS version forbids renegotiation. DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed25519) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED25519 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED25519 Cert i:CN=Issuer a:PKEY: ED25519, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICSDCCATCgAwIBAgIBBjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjA0MRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxGDAWBgNVBAMTD015IEVEMjU1MTkgQ2VydDAqMAUGAytl cAMhADM5qpZ56E36TH7BMmXJt0aK68rfSUQ7z+248tDOH1H0o4GBMH8wDAYDVR0T AQH/BAIwADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8B Af8EBAMCB4AwHQYDVR0OBBYEFAF/+eKMxIPVoSnESsgqAxyYIFfCMB8GA1UdIwQY MBaAFHKQ60jta42e9CSHdsh4XuCyqEQyMA0GCSqGSIb3DQEBCwUAA4IBAQBsAMu+ 27lknrMlrNqiGCq8aYvWBBsnGCqL3M7BXN0S9782lQCEiQE6kot6GHl+tBgJqhzj 6fi7CggnfVcX/1jPneXFAr/AKauriPgHCjsfwZaejBr8iMYegwEWN9gmAxgTWvft SP0zC0Doxr0OsWI1+w34zkSuw8f668vmgpbj4ps04dI48Ey9Utr/34/etk9l4ARc jOHnQUxDbqqZJCb1FyJiSKsWqlBGGcMJNEgYwwVBpHA/PSb7xOyaN4vjkEW6buDl PNGZ/+DANmg4y6fEMds6v8ScznpomCQ3uhnY7K1x4+V3tDeU3+BMI5+3qQhoEGtO IiqB1ddxEbohGAnu -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED25519 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: ed25519 Server Temp Key: X25519, 253 bits --- SSL handshake has read 952 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: B64CA6F891B802F467ED9AD30A28F762E65BA8FF373D995D35D3A39EEC196833 Session-ID-ctx: Resumption PSK: CC79D68321B761947EC9EDA2B01B4908075350B98C8F85BDAE7E52A4D78A8949A755D4858B84542F6FF5B25A582C46AA PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 06 6d 62 47 4e 63 99 d1-5a a6 bc d3 02 5a 3f 28 .mbGNc..Z....Z?( 0010 - 90 4a ff cb c3 ab 41 21-3b 41 57 b9 9e f1 50 bb .J....A!;AW...P. 0020 - e3 a9 6e 76 1b 70 58 2b-3a a8 25 dd 76 b6 6d 97 ..nv.pX+:.%.v.m. 0030 - de d9 2b e0 63 46 d1 c7-1a 23 ef 8c 09 dc 65 d3 ..+.cF...#....e. 0040 - be 72 63 0a ab ac c2 5d-4d 13 69 ba c8 20 da 6b .rc....]M.i.. .k 0050 - 11 24 13 0a 8c 06 90 c5-d2 df 88 23 67 24 d1 f9 .$.........#g$.. 0060 - 70 37 5c 5e 2a 97 4d f6-b5 9d 19 69 98 58 bf 7d p7\^*.M....i.X.} 0070 - 27 b8 6c f0 e7 7d ad b7-b7 b0 9d c7 3f 99 d1 82 '.l..}......?... 0080 - 2a 52 b9 d0 13 23 47 1c-00 36 83 12 7e 5c 54 0d *R...#G..6..~\T. 0090 - 20 4c da a1 3d 35 cd d7-f7 30 6d 1f cb 4c fb 7c L..=5...0m..L.| 00a0 - e1 5c 27 36 3d 53 5e 3a-69 80 1f ea 45 2f d0 b4 .\'6=S^:i...E/.. 00b0 - 4a 39 f0 7c 53 fe 9d 36-00 6c 25 09 59 c0 12 cf J9.|S..6.l%.Y... 00c0 - 7c fb af 37 2d a3 e6 b0-d4 8b 0d c1 e6 c8 c5 a7 |..7-........... Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: E855FDD685D2DC0539F5C459A14163D6CA5AD93E75C9E52605D415D91D5A2AC4 Session-ID-ctx: Resumption PSK: 5D81D422DEC2BB76F16233E038375858591FEBFE292BF40DDEA924DA7D3A8D4B837D76B2CD3DC8EE931447A522C35E13 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 06 6d 62 47 4e 63 99 d1-5a a6 bc d3 02 5a 3f 28 .mbGNc..Z....Z?( 0010 - e6 63 65 93 54 7b 8f 3c-c0 81 fd aa 11 c1 fc 3c .ce.T{.<.......< 0020 - fa 5e 44 5b 39 34 9a e0-7e 9e 44 55 03 ad 5d e9 .^D[94..~.DU..]. 0030 - 37 9a e1 87 ab 80 40 b0-63 5c b4 6e 55 39 c6 6f 7.....@.c\.nU9.o 0040 - b6 cd 68 e0 66 48 19 26-06 1e 4c f7 90 b3 44 0e ..h.fH.&..L...D. 0050 - 3f 76 3b 67 5f 40 20 69-fd 9e c0 ce f2 0a 19 7c ?v;g_@ i.......| 0060 - 98 b1 fb a8 cd 0a ab 93-ce d6 ae ac 61 2b 2c 3f ............a+,? 0070 - a1 bd e4 8c d4 3a 8f ff-07 50 59 e0 05 68 89 56 .....:...PY..h.V 0080 - 85 cd 88 37 3a b3 e6 89-44 7e 96 ac 3a 18 0b 2c ...7:...D~..:.., 0090 - b0 06 f6 05 f0 97 38 39-cb b9 80 9d a2 2f 2d 5b ......89...../-[ 00a0 - 1c e0 c8 ec b2 8b 20 80-52 29 ff c2 96 3b 17 43 ...... .R)...;.C 00b0 - c6 c6 54 84 9f 6d e9 ec-9a a3 ea 3a 64 65 5a 33 ..T..m.....:deZ3 00c0 - 9b e4 f4 43 e7 13 8f 30-fb 2d 9e 4b 43 8a e3 dd ...C...0.-.KC... Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40796BF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIDffEWwbWEuAxjXJrQ3WvVdHKjDETCqJAC7TUFajDzm7 BDBdgdQi3sK7dvFiM+A4N1hYWR/r/ikr9A3eqSTafTqNS4N9drLNPcjukxRHpSLD XhOhBgIEabuskaIEAgIcIKQGBAQBAAAArgcCBQDDnFYrswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed448) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED448 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED448 Cert i:CN=Issuer a:PKEY: ED448, 456 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICXzCCAUegAwIBAgIBBzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjAyMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFjAUBgNVBAMTDU15IEVENDQ4IENlcnQwQzAFBgMrZXED OgALZLjx2ckYyIkHgdemcVeTBIR2dCkLDPogPbRT+m8MaMndnZIfGl40twbT2jdi 1Zco8bAED+qUCoCjgYEwfzAMBgNVHRMBAf8EAjAAMB8GA1UdEQQYMBaBFHRlc3Rj ZXJ0QGV4YW1wbGUub3JnMA4GA1UdDwEB/wQEAwIHgDAdBgNVHQ4EFgQUO4kxUTLT G7CCMRiyBCJToVcLeuUwHwYDVR0jBBgwFoAUcpDrSO1rjZ70JId2yHhe4LKoRDIw DQYJKoZIhvcNAQELBQADggEBAF8SMPbprNnJba813F069O0bZyKsEYC3wWwJvSG1 VOKZd41YEGS4wI1I4Whd6fBZ4MDPRU+dtpuir0WX1jt+1didZ/bfP0Y1S6dgQNeJ MgCsZ6LZp/VOzFAaH/SZI07bfdmwivuppWrI8lj/tmIH7aSawLs9OxxV6DS2URu1 0xf8ToCXgWcb3NlQrHq+mLh+mYK8Y78qJpgneOef19Z+YJ/swxlR/Vftd75TOM6b f9JLqbqwd4HXjZ2IMzqHjqNHCo9i2jHxdPAOUVXNiVB/ClOsGkGbBH7RoN+b1OsI 5xEJqPRyHFrUivh3zC+6rUMIFzu7UNjStduVvYQm1x6ZUO0= -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED448 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: ed448 Server Temp Key: X25519, 253 bits --- SSL handshake has read 1025 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 456 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 3D60C1FEDACCCF9891EAEFEE3D142E5871DBF437422BCB2BD7722FC24102B371 Session-ID-ctx: Resumption PSK: 82BF22612971C7BC1BC2F03250F938B067605228D8E3D00D17580F55AAD585C5DE6748340B55121A66A628CAE7F0A283 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - e4 4c c6 b3 36 62 18 7f-7f f1 e6 60 10 40 90 30 .L..6b.....`.@.0 0010 - 20 76 e0 17 6f 7b 2c 40-18 44 6c 85 b7 16 a1 36 v..o{,@.Dl....6 0020 - 17 ae 52 08 98 02 53 70-6d fd 9f 98 0d 47 a7 ce ..R...Spm....G.. 0030 - 6b 0c 8d 6b c6 fa 86 95-d3 b0 d2 94 c2 cf b5 ca k..k............ 0040 - cf c9 90 b4 b8 41 c9 a4-03 27 21 fa 2b 91 49 70 .....A...'!.+.Ip 0050 - 9c 8c 38 ce 41 73 81 ba-15 7e 93 1d be 47 3e d1 ..8.As...~...G>. 0060 - c6 3d 63 41 db 0d 0c 52-2f 4d 2e 0c ee c1 9b 0d .=cA...R/M...... 0070 - 72 f0 8b 54 33 55 7b 0c-98 75 77 e6 95 7c b9 f6 r..T3U{..uw..|.. 0080 - 36 e6 0f 59 87 a1 32 3e-a2 dd b5 e4 8a 35 e2 71 6..Y..2>.....5.q 0090 - 1f a2 f9 2e 63 db d6 2b-59 fd 14 3c 7f 7b ee aa ....c..+Y..<.{.. 00a0 - 60 d9 8e fc 77 ab 0f f0-ad 0d 5a d0 3e c8 9a d0 `...w.....Z.>... 00b0 - 02 f4 b5 ad 3d 7c 21 0a-95 d6 c7 75 f5 17 22 a3 ....=|!....u..". 00c0 - 1c b6 59 96 29 90 c4 2b-a8 4f c0 16 ce dd 5d 70 ..Y.)..+.O....]p Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 2A525FDCBB458A87556F27F633A83EDE0CA15EBC6295B62EAECFBAC4AFDD9BB8 Session-ID-ctx: Resumption PSK: 80D22CE726C7A6FE6B2A1542214688979B909F3F462E342578314C02B768A73297EEC7199E421863DED16CFF1B364EB1 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - e4 4c c6 b3 36 62 18 7f-7f f1 e6 60 10 40 90 30 .L..6b.....`.@.0 0010 - bd 8a 3f 68 82 b4 33 b9-f2 63 5f 3b 54 05 07 8e ..?h..3..c_;T... 0020 - 9c c4 a7 d5 87 61 51 aa-f9 d2 03 12 d7 77 37 81 .....aQ......w7. 0030 - b7 a9 65 26 4a 1a 2b 1c-48 a4 c8 df c3 d4 59 4a ..e&J.+.H.....YJ 0040 - 0d 11 c3 c9 2e cc 72 08-fb 1a 1a ca 3f 2e 69 d5 ......r.....?.i. 0050 - b7 ce e4 4e 1f 2e 01 57-75 28 43 ef 6f 9d 70 c7 ...N...Wu(C.o.p. 0060 - 70 52 a4 37 70 a1 90 1b-cd 71 61 46 bb a7 2b 0c pR.7p....qaF..+. 0070 - 69 da f9 97 17 85 9e 04-75 74 42 c9 3a 48 d7 34 i.......utB.:H.4 0080 - 37 4c 8d ed 1c 4d 83 87-32 df 26 73 3d 44 86 21 7L...M..2.&s=D.! 0090 - 37 05 5b 88 d9 b9 b8 74-c1 8d 95 57 0d 9d 67 c1 7.[....t...W..g. 00a0 - 64 ef 0d 6b 9e 02 cd f8-dd ed 93 89 e2 92 4c 1f d..k..........L. 00b0 - 53 a0 fd 96 9e d8 1f 2e-3f f6 22 2e 7e 35 6f 65 S.......?.".~5oe 00c0 - da 51 19 10 51 ea f7 89-8b 59 1c 6a b4 bb d1 b9 .Q..Q....Y.j.... Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40596BF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%09 -cert pkcs11:type=cert;object=ed2Cert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIE/V41y+1o9guoY+42qWRQK33MgFp+JiEV3maGuxG9j/ BDCA0iznJsem/msqFUIhRoiXm5CfP0YuNCV4MUwCt2inMpfuxxmeQhhj3tFs/xs2 TrGhBgIEabuskaIEAgIcIKQGBAQBAAAArgcCBQCr7Eg3swMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:51 2026 GMT; NotAfter: Mar 19 07:57:51 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUxWhcNMjcwMzE5MDc1NzUxWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMTMF4dTlfnRg0ljE2IpSmUhil6AAJd96p7t FHoj6g6huZT8MQSA9yXNerkERSJUBJn6NHrp0PPOvSzNj0DQaRvbll7b5hYEqGqy t0w9qsukwReaFQe7AsMB3NJ8u3vYHeOx/ZHySx2kidjlBgIla/cEXwO0gk3l401K +osR8ZHlRt75/56s+EreIZnLk/Hx5+pe+ucMQlSBYoejeqEn9rbp7AmuhK6X/K6W SBNQDzAz75cyfR+/rPQkzVuzgneJiF4zQA39bd0iHG1myQS4nKXlY5Se494SsR8w iRFeDSKTGTVOhuKgBCHXb0wd122TjwNtOaDza8LnTc7lbAhG00MCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBQTDEV2JxmJsdzPJBZr7LEvp1/1GTAf BgNVHSMEGDAWgBRykOtI7WuNnvQkh3bIeF7gsqhEMjANBgkqhkiG9w0BAQsFAAOC AQEAjx4xKvHXZkNSNbtUCYmvJycOlffFq/LDPGqhC+kn+5hi3GuEMVASf6EId9wi DKOBc9UCEFN7djA0QNt3PPchVtF/PE1wud9GemNlCFpi6+HkFg4kxyyOs2DHjsbK GwyrjTEB56n/V256uEt1BD9XXliwOcuTwSmXHvwKrJYmhjIsKnmyT6PIW2MQZBNR 2jbAdQSVFnrzygFVOEwwuNZOymkK/5AdLx39xh38nrpionDg77fzOyq/Ut35Z52k cGKL3bQi2q9yk6xzCTNKCxd4BQHQOIBHGS1JEeMA/bf5R9KK2p91hw6tD6/LssUi ABMgtSvMmiJ5Bj4I7TtHiopimg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1476 bytes and written 290 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 6DDF7D1768A21728BD1F0C5B39C35F93A823FF9202741C2E59519ECACC72F7B2 Session-ID-ctx: Master-Key: 3FF997C642A2D35720FF2F5E87E6071155927F5D53092E6BA31B8C1709F3BD7194541C826B03519A934EF5028C7B85AC PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - eb 47 27 7b 9e 91 45 29-e8 e4 72 a8 6e 21 bc fd .G'{..E)..r.n!.. 0010 - d6 9e 07 08 65 ba cf 40-ea 6c 91 9a 1a 3b d6 c9 ....e..@.l...;.. 0020 - 18 55 d4 c7 36 a2 29 d4-02 7f 3a de b6 61 f2 b2 .U..6.)...:..a.. 0030 - 01 f8 4a 26 dc d2 bd a0-61 06 99 3d c2 41 dd 2f ..J&....a..=.A./ 0040 - d3 38 b6 ed 04 79 a7 79-12 63 9e 50 85 03 e9 04 .8...y.y.c.P.... 0050 - 5e 87 22 64 d5 b1 55 b0-86 7c 53 61 8e ca 13 dd ^."d..U..|Sa.... 0060 - 7b e8 85 0c fe 70 d0 a7-15 a5 6f 74 ae 41 ec bf {....p....ot.A.. 0070 - 7f aa 4a 01 ca 99 bd f0-67 ee 6e 31 ed 58 51 cd ..J.....g.n1.XQ. 0080 - a8 4d 94 7e 48 d7 ba 43-fd 87 b2 bf c4 17 59 a7 .M.~H..C......Y. 0090 - cf c6 fa 9a 5b 1f f5 bb-ed e6 8f 31 56 66 1a d2 ....[......1Vf.. 00a0 - fa ca 39 2d cd 8a c2 43-ff 87 fb a7 a1 a5 cf 26 ..9-...C.......& Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 400962F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAMAQABDA/+ZfGQqLTVyD/L16H5gcRVZJ/XVMJLmujG4wXCfO9 cZRUHIJrA1Gak071Aox7hayhBgIEabuskaIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-RSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with explicit TLS 1.3 spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem -tls1_3 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:51 2026 GMT; NotAfter: Mar 19 07:57:51 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUxWhcNMjcwMzE5MDc1NzUxWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMTMF4dTlfnRg0ljE2IpSmUhil6AAJd96p7t FHoj6g6huZT8MQSA9yXNerkERSJUBJn6NHrp0PPOvSzNj0DQaRvbll7b5hYEqGqy t0w9qsukwReaFQe7AsMB3NJ8u3vYHeOx/ZHySx2kidjlBgIla/cEXwO0gk3l401K +osR8ZHlRt75/56s+EreIZnLk/Hx5+pe+ucMQlSBYoejeqEn9rbp7AmuhK6X/K6W SBNQDzAz75cyfR+/rPQkzVuzgneJiF4zQA39bd0iHG1myQS4nKXlY5Se494SsR8w iRFeDSKTGTVOhuKgBCHXb0wd122TjwNtOaDza8LnTc7lbAhG00MCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBQTDEV2JxmJsdzPJBZr7LEvp1/1GTAf BgNVHSMEGDAWgBRykOtI7WuNnvQkh3bIeF7gsqhEMjANBgkqhkiG9w0BAQsFAAOC AQEAjx4xKvHXZkNSNbtUCYmvJycOlffFq/LDPGqhC+kn+5hi3GuEMVASf6EId9wi DKOBc9UCEFN7djA0QNt3PPchVtF/PE1wud9GemNlCFpi6+HkFg4kxyyOs2DHjsbK GwyrjTEB56n/V256uEt1BD9XXliwOcuTwSmXHvwKrJYmhjIsKnmyT6PIW2MQZBNR 2jbAdQSVFnrzygFVOEwwuNZOymkK/5AdLx39xh38nrpionDg77fzOyq/Ut35Z52k cGKL3bQi2q9yk6xzCTNKCxd4BQHQOIBHGS1JEeMA/bf5R9KK2p91hw6tD6/LssUi ABMgtSvMmiJ5Bj4I7TtHiopimg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 318 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 9A9A0E53B28E0EE7F7D709EE565571212CB1A427A593BC2F3FC7074147FE82F4 Session-ID-ctx: Resumption PSK: 3EE753DA4B353E8D010A0CD123BE52D6DF6218975287FD111DC1FE05FD8698EC80F91C3E8FD929935CAD1C3DBE75FB66 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 36 29 99 36 18 0a 38 3a-7e 20 bb 42 04 7b f3 e9 6).6..8:~ .B.{.. 0010 - 5e db ec f6 c2 a1 9c f5-87 3a a5 ab 5b 89 b9 8b ^........:..[... 0020 - 54 a9 f6 28 8b ed 33 11-4d f4 32 c0 50 60 d8 ae T..(..3.M.2.P`.. 0030 - 19 3d 6d 95 34 09 98 b8-68 9c 78 b2 19 9e ac b2 .=m.4...h.x..... 0040 - 86 f4 d5 d7 ec 8c c3 3e-86 0f 9d ef 36 3b fd c7 .......>....6;.. 0050 - 35 68 d3 a2 12 32 a9 66-ab f2 3f b4 fd 3c 01 c9 5h...2.f..?..<.. 0060 - c3 a3 17 93 e4 32 f3 18-08 d1 84 09 dc b1 de 2d .....2.........- 0070 - 15 ea a5 8d c8 cc 6b 19-12 8d 34 3a 2a a7 3e 9f ......k...4:*.>. 0080 - f1 05 82 2d 1a 9a b8 2b-91 5e 1e 86 0f 61 80 7c ...-...+.^...a.| 0090 - 5b 62 bc 69 bf a2 60 4c-65 3b aa bb f6 2b 0a 22 [b.i..`Le;...+." 00a0 - 6a 23 91 f7 0c fc ec fd-c0 8b a6 77 7b 8e 4e 3f j#.........w{.N? 00b0 - 4f 42 c5 9d 36 4c 88 8f-60 62 81 7a 9f a8 38 2e OB..6L..`b.z..8. 00c0 - 1e 79 6f 2a b7 e2 21 9c-23 9c e7 cf cd 1a c4 b7 .yo*..!.#....... Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 467AEC4E68D4B0D9C8987F17B5CD07DE19E6023CBA34E4ACF169D2E3EC0B0000 Session-ID-ctx: Resumption PSK: D062404A3C330D1FA32308E0A77F83699E70C3364743BC991481881C9E0FB1B86D72D91F732E3A0CF88ADD7165D42F44 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 36 29 99 36 18 0a 38 3a-7e 20 bb 42 04 7b f3 e9 6).6..8:~ .B.{.. 0010 - 33 14 f6 a9 da 2a 29 85-4e 19 af 76 a8 17 24 d0 3....*).N..v..$. 0020 - 84 9b 91 2a df b8 56 97-b8 68 fb 0a 84 f0 02 0a ...*..V..h...... 0030 - 77 f3 0b f2 48 1d 73 d3-d2 ec 1a c2 a7 0c 5d 2e w...H.s.......]. 0040 - 3e 74 e0 a2 fe 7d 22 16-9c 58 24 74 47 31 a5 9b >t...}"..X$tG1.. 0050 - 39 63 12 5e 50 55 88 0d-4a 98 80 d8 d5 5e 62 cf 9c.^PU..J....^b. 0060 - f8 71 bd 39 6f 9d 12 f7-14 b8 cb 10 9f bc a1 7d .q.9o..........} 0070 - 37 f3 54 f8 1a 05 dd 4d-98 18 54 73 95 70 5b ed 7.T....M..Ts.p[. 0080 - c8 5c 01 19 e1 c8 c9 9b-7d 89 ed d1 3e 3b ad bc .\......}...>;.. 0090 - f8 93 11 d6 88 d6 90 05-2f b0 3c dd 22 51 1f 7a ......../.<."Q.z 00a0 - 66 40 dd 33 cb 33 07 bc-1d f8 d8 19 ab 8a cf 70 f@.3.3.........p 00b0 - 96 33 b8 86 ac a9 9e 0f-f6 b5 b5 db dc c4 dc 3b .3.............; 00c0 - 39 cf c8 ab 9e 50 bb 69-03 b9 62 a9 41 48 99 c2 9....P.i..b.AH.. Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40696CF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIDC8noRym2g9g0DsugX+dASL1u9vh24SCDDzbmFRWAGJ BDDQYkBKPDMNH6MjCOCnf4NpnnDDNkdDvJkUgYgcng+xuG1y2R9zLjoM+IrdcWXU L0ShBgIEabuskaIEAgIcIKQGBAQBAAAArgcCBQDfO6cKswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 (ECDSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQPl808v/YZvgYGnLX2ens38Zp/Ik0lX7xErIV+Br1J7Tli fzsjYHi797l4O78GRi6zRtXxN9DURVFQaVxLX63Ro4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFDRS2jQV4EDu7gMWcLzfygwazpSAMB8GA1UdIwQYMBaAFHKQ 60jta42e9CSHdsh4XuCyqEQyMA0GCSqGSIb3DQEBCwUAA4IBAQAL45XJ7y2i+uYv 4vL7i2muGGaTrmbfko44GBY1hHxXIqfGUFgT0oBRtOnXc0Ia/wHYtSjHZf4lcx9u qAcJY368k9wZOA4V7BhC6/eU1qkVctqQuZ7dzFgGDtLF5xW2V+U0TXGKKg38f+cn DyitlqVUXw08z4O9jgSV8aqUlt2Kmf9MQ/Tii4HXHNDSvv773qYma5tkAkq/SH4D nOVoKlGRxAFCJ73snQoWiz/CT+pfs023PgTai/5Ur2FFSHervVJmdSMpbylN6T3L XldyGZqr1uyqvXFkCCV3cdcAjLeSFRhxZr24ckv/mavRikhNYDkKqdpVHmxb8xkY eHu1Rpzl -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1086 bytes and written 290 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 Session-ID: 24C37E4C7B3C690C5CBE06887DE658F422EF5967666F26634ED3C385DFA5E9EC Session-ID-ctx: Master-Key: 32F75874F61A9044A8BCB0B7628CDC664D1F0894376E4C3B8956DA8E4A203FE88E61329BE47F4A6BDBB7347E9F005501 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 0c 8a c3 e6 15 cf 9c 8b-0e ce 6e b6 39 5d ab 7f ..........n.9].. 0010 - c6 11 18 13 ee fc 07 ce-47 e6 6e 36 66 8a cf 20 ........G.n6f.. 0020 - 07 1f 64 e5 f5 5a 0c aa-42 5b 29 48 da b3 29 c2 ..d..Z..B[)H..). 0030 - 27 94 5a 56 b9 5f b0 4a-1c d5 3d 43 ab 9a 43 20 '.ZV._.J..=C..C 0040 - 52 ac c5 13 4b f5 51 95-48 d1 1a ff de b1 30 e4 R...K.Q.H.....0. 0050 - 87 13 4e 77 5b e8 2e a9-87 81 8e ca f9 86 a9 4d ..Nw[..........M 0060 - af 1c 2e 57 09 74 3e 36-b7 c8 be d3 2d 17 98 bc ...W.t>6....-... 0070 - c5 ab 7d 78 ba c2 36 ef-18 73 62 2f c6 b4 eb c5 ..}x..6..sb/.... 0080 - 02 72 7a 08 c2 e2 0b 60-35 65 95 41 48 7d 23 15 .rz....`5e.AH}#. 0090 - ce 69 38 59 00 58 3a 02-17 24 4b 0d 49 5e 1a 5b .i8Y.X:..$K.I^.[ 00a0 - 95 6b 19 cf 65 01 c2 20-ca 93 a2 3c 55 be 5e e9 .k..e.. ....... 0020 - 26 c3 f2 3b d6 5d 62 df-5d 69 37 ca 85 6d 6e b4 &..;.]b.]i7..mn. 0030 - 3d 94 6c f3 89 14 ca b9-c7 1a ad 28 42 60 b8 60 =.l........(B`.` 0040 - b8 39 0a 4c 19 1e 44 04-3d 28 62 16 70 19 29 53 .9.L..D.=(b.p.)S 0050 - 40 7e d6 ed 07 b3 ee 3c-08 4a 08 f8 19 19 74 dc @~.....<.J....t. 0060 - d3 82 8c 54 3b 1b 53 ea-4e 7d a0 78 d7 0a d3 0d ...T;.S.N}.x.... 0070 - e7 16 6f 79 f8 79 89 34-40 95 54 7f 4e 57 cc 26 ..oy.y.4@.T.NW.& 0080 - 60 b6 b4 ca 7c dd ee ea-9a 5f 75 db d6 8a ec 62 `...|...._u....b 0090 - b9 0b 7e 86 ea ed ad 6b-6f 4f 68 57 74 04 86 8e ..~....koOhWt... 00a0 - 12 a2 ac 2b 8b 1f ce 45-63 16 46 1e 3b 58 db 13 ...+...Ec.F.;X.. Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 405965F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAKwQABDCNC379n3iyTNx74mnHRZFUMq34HhfUf0fWWpGfSEBU 2sjIQNSlRD9PezvGIPk5j0ehBgIEabuskaIEAgIcIKQGBAQBAAAArQMCAQGzAwIB Fw== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES128-GCM-SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is ECDHE-ECDSA-AES128-GCM-SHA256 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.3 and specific suite spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem -tls1_3 -ciphersuites TLS_AES_256_GCM_SHA384 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQPl808v/YZvgYGnLX2ens38Zp/Ik0lX7xErIV+Br1J7Tli fzsjYHi797l4O78GRi6zRtXxN9DURVFQaVxLX63Ro4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFDRS2jQV4EDu7gMWcLzfygwazpSAMB8GA1UdIwQYMBaAFHKQ 60jta42e9CSHdsh4XuCyqEQyMA0GCSqGSIb3DQEBCwUAA4IBAQAL45XJ7y2i+uYv 4vL7i2muGGaTrmbfko44GBY1hHxXIqfGUFgT0oBRtOnXc0Ia/wHYtSjHZf4lcx9u qAcJY368k9wZOA4V7BhC6/eU1qkVctqQuZ7dzFgGDtLF5xW2V+U0TXGKKg38f+cn DyitlqVUXw08z4O9jgSV8aqUlt2Kmf9MQ/Tii4HXHNDSvv773qYma5tkAkq/SH4D nOVoKlGRxAFCJ73snQoWiz/CT+pfs023PgTai/5Ur2FFSHervVJmdSMpbylN6T3L XldyGZqr1uyqvXFkCCV3cdcAjLeSFRhxZr24ckv/mavRikhNYDkKqdpVHmxb8xkY eHu1Rpzl -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1061 bytes and written 329 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 324E8D97B0C77712B08BC8B9CFFF827186AA9CB4D49443ABAAFB45AB23DD1BDD Session-ID-ctx: Resumption PSK: 4158C4D9D3AA8AD4AE8AE1A5BAAFC10266B1995D8EA3A9833EEBB06B007ACFD9C9626315CCCE1AD3DE75119204C60E35 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - ad 4a b9 ab 47 68 a5 d1-89 59 2d f2 f6 1d 28 b2 .J..Gh...Y-...(. 0010 - 99 4b 91 d1 f0 fb e9 a6-51 63 5e c2 55 fe a5 12 .K......Qc^.U... 0020 - 46 46 4e d0 ac 48 02 95-70 58 32 0b ce e2 d9 3a FFN..H..pX2....: 0030 - 0b 0b 48 24 4a a5 4e dc-64 f3 6a c8 4c f3 ff bb ..H$J.N.d.j.L... 0040 - 9f 8c a3 28 b8 4c 43 73-ce fd 61 c8 a0 c1 81 ff ...(.LCs..a..... 0050 - 85 af 8f 97 76 f0 bf f9-42 57 e9 38 7d 76 b3 c1 ....v...BW.8}v.. 0060 - 4a fb cd 04 79 71 6c dd-f4 f6 2a 71 58 64 88 05 J...yql...*qXd.. 0070 - a9 94 2d c1 83 25 71 45-47 e5 72 72 bf 22 32 eb ..-..%qEG.rr."2. 0080 - 13 f0 2e e0 23 d8 b9 9b-00 1b 22 9f b7 a4 9d 60 ....#....."....` 0090 - 3d e8 f4 56 59 17 3a fc-f3 eb 9e 89 08 80 03 85 =..VY.:......... 00a0 - f6 2d ec bd 48 6f 36 fd-89 d7 ec ad a6 43 1d eb .-..Ho6......C.. 00b0 - 5e a6 f9 da 8f d0 59 5e-6f e5 68 d2 1f 28 28 6d ^.....Y^o.h..((m 00c0 - 08 ad fc 17 2e 41 37 42-b1 26 e5 f7 87 ce d4 a9 .....A7B.&...... Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: ACDE8022C614CE0EDDEE2DE63D68BEE722A2289CCF450187F60F67EDA78DCDA3 Session-ID-ctx: Resumption PSK: A145BAF04EB606CA8E5D8975F06EAC91FB8B00139674EA8D641586C4A04806D8F6C68D49C03C751C6D07548CFED60646 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - ad 4a b9 ab 47 68 a5 d1-89 59 2d f2 f6 1d 28 b2 .J..Gh...Y-...(. 0010 - be b4 21 2b b5 ce 50 93-d8 4e fc d9 d6 1c a7 24 ..!+..P..N.....$ 0020 - 80 ec 0f 85 a5 d0 b4 f6-d9 00 1f 9d 97 83 d4 49 ...............I 0030 - a7 ff 67 b6 a4 fd 91 e2-79 01 cf 6e 2a 84 f1 02 ..g.....y..n*... 0040 - 11 da 53 dc 30 e3 2c 2f-21 d7 b1 a7 0d 3c 18 cf ..S.0.,/!....<.. 0050 - 88 fa d4 b2 39 96 f4 0f-8d fb 45 ee 33 5d c7 d6 ....9.....E.3].. 0060 - 2c 67 03 32 9f b3 48 87-a9 19 c6 05 72 c8 f0 00 ,g.2..H.....r... 0070 - d8 80 ad 83 2d 62 57 a3-0a 04 0b 0e 24 6b 00 71 ....-bW.....$k.q 0080 - ca 77 5e 80 68 ea aa 88-aa 41 e4 3e 64 5c 8d 57 .w^.h....A.>d\.W 0090 - a5 dd 6e b1 fd 5b d3 82-b9 0c d4 e7 70 65 02 4f ..n..[......pe.O 00a0 - a9 11 d8 c8 ba 2b 13 16-1c 1e 2e f4 40 fb c6 05 .....+......@... 00b0 - b2 cc cc 0b 82 43 00 10-75 e3 6a ec 66 c8 55 36 .....C..u.j.f.U6 00c0 - 5e 78 06 79 df 66 de e6-b6 ff 51 e9 b5 34 53 aa ^x.y.f....Q..4S. Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40E968F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEICXu4YhxSwGkrs54sIotmpdB/QHSx4kjw30spJSwNms+ BDChRbrwTrYGyo5diXXwbqyR+4sAE5Z06o1kFYbEoEgG2PbGjUnAPHUcbQdUjP7W BkahBgIEabuskaIEAgIcIKQGBAQBAAAArgYCBCMqFlWzAwIBFw== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## ######################################## ######################################## ## Forcing the provider for all server operations ## Run sanity test with default values (RSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:51 2026 GMT; NotAfter: Mar 19 07:57:51 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUxWhcNMjcwMzE5MDc1NzUxWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMTMF4dTlfnRg0ljE2IpSmUhil6AAJd96p7t FHoj6g6huZT8MQSA9yXNerkERSJUBJn6NHrp0PPOvSzNj0DQaRvbll7b5hYEqGqy t0w9qsukwReaFQe7AsMB3NJ8u3vYHeOx/ZHySx2kidjlBgIla/cEXwO0gk3l401K +osR8ZHlRt75/56s+EreIZnLk/Hx5+pe+ucMQlSBYoejeqEn9rbp7AmuhK6X/K6W SBNQDzAz75cyfR+/rPQkzVuzgneJiF4zQA39bd0iHG1myQS4nKXlY5Se494SsR8w iRFeDSKTGTVOhuKgBCHXb0wd122TjwNtOaDza8LnTc7lbAhG00MCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBQTDEV2JxmJsdzPJBZr7LEvp1/1GTAf BgNVHSMEGDAWgBRykOtI7WuNnvQkh3bIeF7gsqhEMjANBgkqhkiG9w0BAQsFAAOC AQEAjx4xKvHXZkNSNbtUCYmvJycOlffFq/LDPGqhC+kn+5hi3GuEMVASf6EId9wi DKOBc9UCEFN7djA0QNt3PPchVtF/PE1wud9GemNlCFpi6+HkFg4kxyyOs2DHjsbK GwyrjTEB56n/V256uEt1BD9XXliwOcuTwSmXHvwKrJYmhjIsKnmyT6PIW2MQZBNR 2jbAdQSVFnrzygFVOEwwuNZOymkK/5AdLx39xh38nrpionDg77fzOyq/Ut35Z52k cGKL3bQi2q9yk6xzCTNKCxd4BQHQOIBHGS1JEeMA/bf5R9KK2p91hw6tD6/LssUi ABMgtSvMmiJ5Bj4I7TtHiopimg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: E3D87B19D208570BCE0411493CAD548DB1D5D470A60BE69B51502E89985C6E80 Session-ID-ctx: Resumption PSK: ED57FD53596834C33035A713642DBF687B885E7C0F55ED65FA8E73A19496E96D6EE19BCDEA62BDDC3C42C89860C7B9E0 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - f1 20 3d 41 57 1a 09 76-4b d1 f1 32 2e 1f d3 3d . =AW..vK..2...= 0010 - d6 5d 6a b9 55 26 4e 23-a9 c8 f7 f1 8a ac 4c 73 .]j.U&N#......Ls 0020 - b0 08 23 a5 ae 64 c4 cf-61 14 10 85 40 71 5e a1 ..#..d..a...@q^. 0030 - 0b 5f b7 7e f0 1d 27 2b-71 ad 8a 1f b4 cf ea 8a ._.~..'+q....... 0040 - 6f 58 dd 1b a0 a8 66 c8-cd 51 41 64 e8 80 50 dc oX....f..QAd..P. 0050 - 55 fb fb 49 02 e0 71 0c-c5 6e 24 09 ed 11 39 f6 U..I..q..n$...9. 0060 - 72 bd ab 17 7f 5a 5a 43-16 32 67 b5 c1 71 11 ee r....ZZC.2g..q.. 0070 - b2 1b 23 d1 f0 a5 d7 5e-55 01 f6 b7 77 ef 05 bc ..#....^U...w... 0080 - 7a ce 91 d8 73 7d 9b 44-db 40 e4 7f 87 af 56 1e z...s}.D.@....V. 0090 - 5d 6d 90 1a 89 3f c0 8c-3e d4 3e 9c 4c c7 89 fc ]m...?..>.>.L... 00a0 - f8 12 84 ba 8e 43 94 21-86 7b 94 dd 55 b6 97 4a .....C.!.{..U..J 00b0 - 6a 87 2f 77 e9 38 c9 61-bb b1 2c b4 30 93 7e ad j./w.8.a..,.0.~. 00c0 - a7 78 ba 31 fb 07 4e 59-62 f8 c3 ec 72 64 d3 09 .x.1..NYb...rd.. Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: FA035A2D4D70DFA760E581E92600C69B7657438F96E13E3FB4EA308BC36E45A8 Session-ID-ctx: Resumption PSK: 02CFC1F864E86F4B0B14D863EBE2A76BB819206D2792ED3C141BA1C1410DF1C5628EDC1FD5C5BED46A79959409F526DE PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - f1 20 3d 41 57 1a 09 76-4b d1 f1 32 2e 1f d3 3d . =AW..vK..2...= 0010 - 9d 12 a3 0a d5 55 a1 79-15 bc 48 98 b7 23 4e f0 .....U.y..H..#N. 0020 - ba 8d 04 29 b2 0f e5 58-0c 1e af af 5b 4a e5 65 ...)...X....[J.e 0030 - d1 cf 61 19 3b cf c1 38-6d 9d a5 6e 92 42 cb d2 ..a.;..8m..n.B.. 0040 - bf 02 54 1a b7 c8 d0 eb-30 77 69 d2 31 86 d6 81 ..T.....0wi.1... 0050 - 54 0f 33 bf 1a cc 64 29-15 c4 2f 88 fd b3 7d 89 T.3...d)../...}. 0060 - 86 38 bc 0c 26 87 81 2e-42 30 02 0f 43 52 de 0f .8..&...B0..CR.. 0070 - 89 a8 74 77 78 e5 32 45-1b 73 e9 be 0c 41 ca 13 ..twx.2E.s...A.. 0080 - 16 bc c9 b5 b7 c6 4b 59-a0 09 f2 9c 97 ae 9c d2 ......KY........ 0090 - 4c 7e 43 96 32 2f 84 8d-48 bd 2a 5f 55 5e 23 d6 L~C.2/..H.*_U^#. 00a0 - e1 c0 bf 7d d5 3a 33 b0-d6 5b a4 36 c1 c3 ce 3b ...}.:3..[.6...; 00b0 - be 65 b6 48 10 84 ee 10-6c 00 aa 1b 96 7a 11 c9 .e.H....l....z.. 00c0 - 5f cf 8e 94 3d fa 1d b0-c7 67 ec d8 78 c4 b7 26 _...=....g..x..& Start Time: 1773907089 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40596CF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIG6AJhU3N+Dkelrc2t/aiO+0rMarYTRqy2JZP0POzbO8 BDACz8H4ZOhvSwsU2GPr4qdruBkgbSeS7TwUG6HBQQ3xxWKO3B/Vxb7UanmVlAn1 Jt6hBgIEabuskaIEAgIcIKQGBAQBAAAArgYCBFl4k92zAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (RSA-PSS) ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%10 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 2048 (bit); sigalg: RSASSA-PSS v:NotBefore: Mar 19 07:58:09 2026 GMT; NotAfter: Apr 18 07:58:09 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIEIzCCAtugAwIBAgIUBZ9WzkzBNqw7dTLAs9YkwlGMZhEwPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwMzE5MDc1ODA5WhcNMjYwNDE4MDc1ODA5WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCASAwCwYJKoZIhvcNAQEKA4IBDwAwggEKAoIBAQCn+e7dEpp7VqL2pTKM wRDLs/tYHG/jK+eeUt91tO4UMfSmkv1LPkTeKJMRj0yevahAdJD/whlH8qG7Xd1F Acpix4VOsQmqE72UVip5TcMYPAzjy338bMPBADfIbwCwYzaUG0IV9Ccml7k2ihzm zT82j5VroDLy+hGcLpThX6W5SHAzFNPdUHPJrPqANztyQRXuFh0I0NVClRDbI6G8 nm587XWEEY8e2M+5Sz5/uXDU9chGeu+PIG1xqoUwqe9HHyycPEBC00IX8vSGxp2i /rYIXOs4xcP/OtGT/2Vv2Uub2ByN2XH7SrI88/vwqqarLcbsFLlcSPX7z5owPMT4 CloHAgMBAAGjaTBnMB0GA1UdDgQWBBQ4OEb/N8NQwbhllceRlDxNdgS/FjAfBgNV HSMEGDAWgBQ4OEb/N8NQwbhllceRlDxNdgS/FjAPBgNVHRMBAf8EBTADAQH/MAkG A1UdEQQCMAAwCQYDVR0SBAIwADA9BgkqhkiG9w0BAQowMKANMAsGCWCGSAFlAwQC AaEaMBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgGiAwIBIAOCAQEAM+2Eyg0XVEkn y2/Nvr+ouU5dVldmaxkbJruJD4wkF25pfrEkYfv/ethGdT2FUiiL/ENOPVSoDXw4 RbQY9ISS8/sDjskPIDhwP/y4JsU6K72aM2qmPG5pDiqd749sxSGPJk5cFarI63Wd BJd8fYcRBhNyEbHjAVp1S3VLDfLBBDOX9dRJop5t2CZ2K2f0PtlT3/TRHgUd+gKL SLkXAzOm2F6X/7WE2aUZdsKnyRo77y3WPtqyp+mq1oSU6bTQ8RNtK29MyYfEx/CV xHJHEsmaKeOcbnObtpK2hjDn5iMNbGwNi8V1PwZ4G5kYW2/JoG5Ew5VKI8SkcxCI 7VSZC/CAqQ== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1619 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 650D6D11E4BC0F7EABA2048F20283CBFD38AD2102BEC4C6A5945B35986551BC9 Session-ID-ctx: Resumption PSK: 3203515B6F1FC1590E6144AC9B7B0FB21E6D0202D355E58DD723D50A581EF7689F18C5F945C70A4B1223470C7377D2BC PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 7f 05 8a 5b 54 ad ed d9-62 f3 87 f7 53 3c d7 cb ...[T...b...S<.. 0010 - 77 77 9c 8f 87 4a 96 9e-1a 47 b3 51 bb 38 57 23 ww...J...G.Q.8W# 0020 - 91 d9 8c 99 8a 6c 1a 6a-ed 09 59 e0 89 ca 66 70 .....l.j..Y...fp 0030 - 7e c8 80 5c 25 89 40 16-9c cb f9 b5 b1 49 2d 97 ~..\%.@......I-. 0040 - 3b 8b 86 58 66 e8 18 0b-f7 4e 68 c6 a6 d9 75 0f ;..Xf....Nh...u. 0050 - 0a 89 c8 d0 4a ce 32 e1-49 c7 09 a3 1f aa 23 1d ....J.2.I.....#. 0060 - 0c 63 48 25 a3 f3 34 d6-fd 57 99 1a e1 0d 81 16 .cH%..4..W...... 0070 - f4 47 14 fe 14 8c 8b 2f-29 5d 59 24 41 66 08 de .G...../)]Y$Af.. 0080 - 7a c7 01 3a cf 27 d9 82-87 bc 4e 0b 6a 66 32 ca z..:.'....N.jf2. 0090 - a0 59 28 60 13 30 18 8a-0c 76 a8 0c 65 be c4 55 .Y(`.0...v..e..U 00a0 - f9 ee 6a 3f a8 5b df 63-e8 50 26 59 04 31 6a 16 ..j?.[.c.P&Y.1j. 00b0 - 0c 55 b3 37 8c 1d f9 8e-5f 5e 04 e8 dd 4d f6 15 .U.7...._^...M.. 00c0 - bc f5 30 45 97 49 4e cd-bd fe 76 7d a8 51 05 1f ..0E.IN...v}.Q.. Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: ADBED9925E8D7108E136EB752C74D73D54637ECCCB00DB8671B9CE14227FB6C0 Session-ID-ctx: Resumption PSK: A0F3DB9E796504C8C212877AE3FACCA0AA9D2EDB7B093AC386DACE819F53DFECF039966EFF884697CF33457125C26CB5 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 7f 05 8a 5b 54 ad ed d9-62 f3 87 f7 53 3c d7 cb ...[T...b...S<.. 0010 - a9 c5 dc 45 05 26 48 61-a6 ba 87 3a a4 93 20 ed ...E.&Ha...:.. . 0020 - ba 69 10 0d e2 33 cb 6d-67 ec 65 c3 16 ed d5 39 .i...3.mg.e....9 0030 - 5e 2a 9b 50 72 0b f6 ff-74 60 2d ba 3e 37 55 4a ^*.Pr...t`-.>7UJ 0040 - b5 d9 6d 8b 81 ab a4 8c-42 e5 97 a1 52 55 f8 e0 ..m.....B...RU.. 0050 - f2 82 e1 71 7b 6b 92 4b-fb 97 a2 c2 9d 86 94 f4 ...q{k.K........ 0060 - 26 82 6a 19 cc 93 68 53-48 2b 48 c2 81 94 76 9d &.j...hSH+H...v. 0070 - b4 4b 3c e1 69 4d 68 f8-43 ec dd 2d de 22 fd c9 .K<.iMh.C..-.".. 0080 - 1a d5 15 fb 31 c6 bd 09-78 25 ad 84 77 7c 6a 0c ....1...x%..w|j. 0090 - e2 06 36 55 35 aa ed de-3e fa 78 5e 4d 77 3d 1f ..6U5...>.x^Mw=. 00a0 - 5e 37 4f 84 84 8d 70 b7-7e 39 8b 30 af 7b b6 14 ^7O...p.~9.0.{.. 00b0 - 6a 04 d3 00 b2 ab f1 2c-8c c8 b3 46 ee c0 0e 17 j......,...F.... 00c0 - 3b 36 0b 99 3e 6a 43 ea-9a 35 48 df 35 19 cb 17 ;6..>jC..5H.5... Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40C968F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/rsapss-default.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIDtjkRIPoN2EI3l7Bi/FbTfeWyOTsfP9vqXSLm6niN+z BDCg89ueeWUEyMISh3rj+sygqp0u23sJOsOG2s6Bn1Pf7PA5lm7/iEaXzzNFcSXC bLWhBgIEabuskqIEAgIcIKQGBAQBAAAArgcCBQCkkC7/swMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 TLS SUCCESSFUL Q Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with RSA-PSS and SHA256 ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 3096 (bit); sigalg: RSASSA-PSS v:NotBefore: Mar 19 07:58:10 2026 GMT; NotAfter: Apr 18 07:58:10 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIFKDCCA12gAwIBAgIUFRRMyu8XASqo9p/D5GWfGp/kSg8wPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwMzE5MDc1ODEwWhcNMjYwNDE4MDc1ODEwWjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgw8eYZVouaL5jbWQIj5P 3L6+RP0WhkVjSSDpvhhXlA75SXbrSwhm9Ocfhn9wL/W/TATZSIFnSgBzZXqE8fGe bGoiCX5sJVOHpwWv14ExCk8tOTpwBZbevhYTD6OXe516uIIaZV79fGVtNZYKu6Vl 6mZuPVGi7zvVUwsmXsir+v6fb0I3kskO4yfTL8ngunXVps9ZxWm0UKEU4N9UY6R2 qafBCl11kBYyTa2JlqAetQO4V5LQM/OrcJglyK417RyI3CmGr+py+RHb1Z6UW7O3 KXtZT/5BX2R4AaVi9MNDpcV+cG5hGUo3lFXT71Fw0Mb35qFpEjHy6XLpw/yfi94k qoZqfaGWxMGy2HePij9CPZn6oQyVuUe5FPlK3eEM75qyXqWRK9bbVMcqQKs5xkif Q0bwP4kQDwIFGx23TG+AEX5ZR9CPJbZZcZleWeqHW0tSU3LrsnvG7LcLQR/EPjqF oApdYWHnMgowji8cqnkvv9KfjDwp3uT5PvL6GqZrUCpgRsosCQIDAQABo2kwZzAd BgNVHQ4EFgQUZOYXqArRsUdDPBuE8ePwKW0uZ+IwHwYDVR0jBBgwFoAUZOYXqArR sUdDPBuE8ePwKW0uZ+IwDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B AQgwCwYJYIZIAWUDBAIBogMCASADggGEAAgDMXsmrpsR/5JttQxq6apB1rytRJRs 1sKhbAslesKKVndyZjy7dkf3fqsPshHVLMkKJiR2vhWuDp+I75qwdpMDRVczdTxG jISYk+JbypV/eb02cj6rdoTSaQRMMdmS1QcZgx4L2oE1tazoCSxHUxIox7eLz3pj mNq/hYHG66m5QBv70bCk5m25QKaGK6Qc3ikiywNVhVO25HMG/Xiv3cVE/AcKdTMp Mc79Mk0VWN3NKQnvSPhFUqfWusOyWBH+kvPMesOjSHokMRgXrBPIRNWmCjbD4Pff 0chZw8x4HcbAo4vB77Qop9e75LT6BD5VEPxV3EGDTjg3tSCAKIO5NgXPeyrHzfpg tHq3UeU+5GBjbOkWCND7sdEoZi7mmfLvCSHPcHlbfSE2BbRyDu851aZY+8BeaTa3 UoXd6eWFaaHMaVLLilImJ6dO36KeatN7jIm7xiOc9Q8E3+01liYBNB82fACWC2fg ZxwdP0OkEeK6gyhymmAzp/k4IVWRWQExrLlBxQ== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 2011 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 3096 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 8261853788F87C419B4C3A408B693F2B677C38D332E627C9AF43B255889CEE39 Session-ID-ctx: Resumption PSK: 5450FCAE3AA7674344CFF3472636CEA3F8D3B55817A9D155A4BB6140413A1EFBA4F59542F3DD810ED35949C03B9A3431 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 41 db 70 2a 2c c2 5d 84-0c 92 3d 1d 02 5b 7c ba A.p*,.]...=..[|. 0010 - ee 1e 45 9e 1a 43 50 cd-b8 12 38 88 f4 52 96 84 ..E..CP...8..R.. 0020 - e7 c7 63 87 af 3d 86 e8-54 54 c7 61 d1 a9 39 4c ..c..=..TT.a..9L 0030 - 9c 14 7c b1 68 a6 b7 0e-50 5e 25 73 70 b6 9c 7f ..|.h...P^%sp... 0040 - 72 1b 44 9a 2e ee 17 40-e6 fa 93 ab 1d 98 f9 48 r.D....@.......H 0050 - 61 70 85 35 b9 e0 c3 12-b3 26 de ae 43 3a 3e 00 ap.5.....&..C:>. 0060 - ce e3 68 07 f3 4c 47 5f-b5 11 5f b2 3d 7b fd 94 ..h..LG_.._.={.. 0070 - 94 26 49 f2 75 b5 a8 f4-45 94 43 b9 ed c0 f1 a5 .&I.u...E.C..... 0080 - 9f 79 00 ee 6e 5e 7d 11-6a 4e 13 30 01 3e 9f d2 .y..n^}.jN.0.>.. 0090 - e8 9c 44 40 59 42 9e b4-a4 e3 a9 5a 51 7c db ca ..D@YB.....ZQ|.. 00a0 - 0e 8f ba 0d 56 72 86 88-dc 74 81 09 44 dc 0c 89 ....Vr...t..D... 00b0 - f0 aa 7c 80 3b 14 e4 cd-86 03 a1 a5 db a1 7d cf ..|.;.........}. 00c0 - 15 55 7b 2b e5 9b 5f 6a-36 88 d0 20 70 68 fc 2d .U{+.._j6.. ph.- Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 38148B8BEF85DA4BEB226FA1E5E681092AD0BC2B92FB31643CE3F457D5625147 Session-ID-ctx: Resumption PSK: EC3F4C72A67FCC432D9C298F96A916652C244F24B152A948C3AB5B2E48F010632996814192DD9E7EAA0ABEDD744CB128 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 41 db 70 2a 2c c2 5d 84-0c 92 3d 1d 02 5b 7c ba A.p*,.]...=..[|. 0010 - af 73 bc fd 46 13 da 11-65 44 62 80 f2 5f c0 36 .s..F...eDb.._.6 0020 - 72 37 d3 3d 7c 20 60 fe-06 98 4e 95 86 48 7e 22 r7.=| `...N..H~" 0030 - 60 22 a4 1f d7 5a 53 1d-c9 e8 84 fd 02 58 a6 6d `"...ZS......X.m 0040 - c6 61 ed e7 61 72 66 4f-42 bb 67 50 3d 88 21 b5 .a..arfOB.gP=.!. 0050 - 51 ab f9 7a 39 07 8b 50-10 20 af 49 f0 6f 23 bb Q..z9..P. .I.o#. 0060 - 31 4e a6 fe 3d a4 8e 24-b2 19 73 0a dc 86 3d 4d 1N..=..$..s...=M 0070 - ec ef 68 35 49 07 18 91-82 03 10 e9 64 0e 06 55 ..h5I.......d..U 0080 - 47 21 ad ba a0 6c 18 5e-6b 69 cc ac fd 8c 78 63 G!...l.^ki....xc 0090 - dc cc 08 bb a2 c7 3a c3-b4 9d 02 6b ce 7e f1 d8 ......:....k.~.. 00a0 - 97 b6 e0 37 35 b5 49 df-61 3e e2 b2 31 ff 71 22 ...75.I.a>..1.q" 00b0 - e7 b8 3d fd 0f 65 15 07-67 ce f2 ed be 84 76 91 ..=..e..g.....v. 00c0 - 72 94 6a 30 eb aa 5b ee-f0 05 c5 47 43 5c 03 fc r.j0..[....GC\.. Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 407966F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/rsapss-sha256.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIEu9YEGcrFPPmFHXOQ6i9MlC2GRAsBPGCPuscR9RgrfX BDDsP0xypn/MQy2cKY+WqRZlLCRPJLFSqUjDq1suSPAQYymWgUGS3Z5+qgq+3XRM sSihBgIEabuskqIEAgIcIKQGBAQBAAAArgcCBQDeriLoswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (ECDSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQPl808v/YZvgYGnLX2ens38Zp/Ik0lX7xErIV+Br1J7Tli fzsjYHi797l4O78GRi6zRtXxN9DURVFQaVxLX63Ro4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFDRS2jQV4EDu7gMWcLzfygwazpSAMB8GA1UdIwQYMBaAFHKQ 60jta42e9CSHdsh4XuCyqEQyMA0GCSqGSIb3DQEBCwUAA4IBAQAL45XJ7y2i+uYv 4vL7i2muGGaTrmbfko44GBY1hHxXIqfGUFgT0oBRtOnXc0Ia/wHYtSjHZf4lcx9u qAcJY368k9wZOA4V7BhC6/eU1qkVctqQuZ7dzFgGDtLF5xW2V+U0TXGKKg38f+cn DyitlqVUXw08z4O9jgSV8aqUlt2Kmf9MQ/Tii4HXHNDSvv773qYma5tkAkq/SH4D nOVoKlGRxAFCJ73snQoWiz/CT+pfs023PgTai/5Ur2FFSHervVJmdSMpbylN6T3L XldyGZqr1uyqvXFkCCV3cdcAjLeSFRhxZr24ckv/mavRikhNYDkKqdpVHmxb8xkY eHu1Rpzl -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1000 bytes and written 391 bytes Verification error: unspecified certificate verification error --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 1 (unspecified certificate verification error) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 4174ACD841435AC93A8096416F525A8FEEB7FCBE45B2D4A62C0F965EFE246386 Session-ID-ctx: Resumption PSK: 311E2CD4E2C5439E4CAF721BEB647378BE75F36D2153339480DB4D131B9BDFC65B02E696D2387DED98CDB03FC8BDFFD0 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 7a 6e 08 c3 18 2e f7 78-e0 48 6f 2e 06 8d b9 26 zn.....x.Ho....& 0010 - de 01 34 40 db 11 cb 0b-99 0e d0 f8 79 5a c3 ba ..4@........yZ.. 0020 - c1 fd 15 f3 f0 ea ca a8-62 9c 54 f4 69 62 a2 e9 ........b.T.ib.. 0030 - eb 10 8f c7 96 e3 0e a8-2e 6a 1c 68 16 ac 26 0e .........j.h..&. 0040 - e7 a0 4c b3 db 80 bb ab-e6 d7 77 d8 66 b8 70 4c ..L.......w.f.pL 0050 - 9c 6d b7 56 ce 3a fa 7b-1d bb 59 e6 9a cb f5 b3 .m.V.:.{..Y..... 0060 - 19 b5 7c f9 3a 24 64 87-94 68 53 e4 ee 20 f6 13 ..|.:$d..hS.. .. 0070 - cb e3 cd 03 5e 41 e0 7b-f4 6c 8c 45 b5 26 73 55 ....^A.{.l.E.&sU 0080 - 0e ed 42 a9 08 32 79 27-0e bf 41 22 c4 31 87 bb ..B..2y'..A".1.. 0090 - a1 cf f1 b7 91 f7 ba d6-f4 cb f9 9a 7b 61 45 f1 ............{aE. 00a0 - 6a 2a 63 38 d2 c4 a7 6c-e6 61 f6 28 c8 25 b1 81 j*c8...l.a.(.%.. 00b0 - 51 22 94 d2 5b 82 41 18-02 b6 be f6 64 4c f9 6d Q"..[.A.....dL.m 00c0 - 27 23 5e a8 e5 b0 11 f4-61 5b 9d 4d 7b 1a 58 34 '#^.....a[.M{.X4 Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: C2D12F18F8195287ABD330CB2EC432F9C7D50EC587D4EFDA02A043FC47C2265D Session-ID-ctx: Resumption PSK: 4442DDB784EBCB63AF2A3AA356E7524E71C552CDF74032BC8F939E76FCD513D9FB75A8A9DD54A7A084DB83B1C19744F8 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 7a 6e 08 c3 18 2e f7 78-e0 48 6f 2e 06 8d b9 26 zn.....x.Ho....& 0010 - 9f c8 e2 e5 77 c6 e5 3b-f8 33 b9 ab 99 61 b3 b4 ....w..;.3...a.. 0020 - d5 31 ff a5 62 1c f7 42-45 d6 be de cc 3d 0e 08 .1..b..BE....=.. 0030 - 7e a5 fe ae 98 ca d3 c3-2b 3c 38 47 8c f7 dd 1c ~.......+<8G.... 0040 - 50 1a 08 0f 1e d3 28 ca-a9 05 62 bb 39 fd 33 b5 P.....(...b.9.3. 0050 - c1 92 0c 29 54 a4 da db-e1 cf 89 0a cb e5 f0 da ...)T........... 0060 - ca a8 79 06 af 9a 1a ab-e1 ad eb 6a 74 1a 79 53 ..y........jt.yS 0070 - 20 85 af ad 8b 14 5f b2-c0 f2 20 d0 f9 33 82 43 ....._... ..3.C 0080 - 9f f8 fe ac 60 7c 69 7b-77 98 66 a9 0c 1a 73 97 ....`|i{w.f...s. 0090 - e7 ba cd a8 8b 11 0e 99-56 86 39 03 78 86 de 82 ........V.9.x... 00a0 - 29 75 13 7b 04 24 38 1a-aa c4 95 fa 7b c8 9b 54 )u.{.$8.....{..T 00b0 - 14 1e 26 37 27 e5 cb 65-f3 f4 90 b4 dd f5 6c 68 ..&7'..e......lh 00c0 - 12 d4 23 7c c8 d0 8c 85-38 ff fb f2 21 06 49 ee ..#|....8...!.I. Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40D968F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIJICRi2kDZV/JLFBJZJ1DigrTCSJ1DC0WwUxWsB9aGRh BDBEQt23hOvLY68qOqNW51JOccVSzfdAMryPk552/NUT2ft1qKndVKeghNuDscGX RPihBgIEabuskqIEAgIcIKQGBAQBAAAArgcCBQDCFeYSswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed25519) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED25519 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED25519 Cert i:CN=Issuer a:PKEY: ED25519, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICSDCCATCgAwIBAgIBBjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjA0MRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxGDAWBgNVBAMTD015IEVEMjU1MTkgQ2VydDAqMAUGAytl cAMhADM5qpZ56E36TH7BMmXJt0aK68rfSUQ7z+248tDOH1H0o4GBMH8wDAYDVR0T AQH/BAIwADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8B Af8EBAMCB4AwHQYDVR0OBBYEFAF/+eKMxIPVoSnESsgqAxyYIFfCMB8GA1UdIwQY MBaAFHKQ60jta42e9CSHdsh4XuCyqEQyMA0GCSqGSIb3DQEBCwUAA4IBAQBsAMu+ 27lknrMlrNqiGCq8aYvWBBsnGCqL3M7BXN0S9782lQCEiQE6kot6GHl+tBgJqhzj 6fi7CggnfVcX/1jPneXFAr/AKauriPgHCjsfwZaejBr8iMYegwEWN9gmAxgTWvft SP0zC0Doxr0OsWI1+w34zkSuw8f668vmgpbj4ps04dI48Ey9Utr/34/etk9l4ARc jOHnQUxDbqqZJCb1FyJiSKsWqlBGGcMJNEgYwwVBpHA/PSb7xOyaN4vjkEW6buDl PNGZ/+DANmg4y6fEMds6v8ScznpomCQ3uhnY7K1x4+V3tDeU3+BMI5+3qQhoEGtO IiqB1ddxEbohGAnu -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED25519 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: ed25519 Server Temp Key: X25519, 253 bits --- SSL handshake has read 952 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 298390E7AF1F9710B65828B9FB34E7E706506A6D70B6C40BC033B9C4A13BFD56 Session-ID-ctx: Resumption PSK: 4AA92CCA74E97E6EF9BE94BB272A4AE0EA3C25A4BE3AB15889D0D6665919B9577537A54E2E07B71007C0A0CF1CE15B52 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - ed c6 d9 09 34 a8 83 20-bf 72 2f 5f ac 80 0f 3c ....4.. .r/_...< 0010 - ce cf 85 2a 27 3a 15 d6-16 27 61 08 6a 13 3c ea ...*':...'a.j.<. 0020 - d0 d1 4c de 8e 86 9d 60-86 da 1a b0 57 8d 5d 0b ..L....`....W.]. 0030 - 72 ad 7e ea c7 17 a9 25-5c 30 cb 17 dd 31 55 fc r.~....%\0...1U. 0040 - d0 56 6b 5f 3d 72 00 9d-69 86 12 8b b8 8c 2b af .Vk_=r..i.....+. 0050 - a5 f9 b9 b7 b4 fc 6c 7e-ab 8f e3 9f 6d 02 c8 36 ......l~....m..6 0060 - f7 a7 c4 c2 2b 4b 1b 2d-86 1e e5 ad 24 2a fb b7 ....+K.-....$*.. 0070 - 3e c8 d3 11 8b 11 ba d8-71 7f 46 13 f9 6d a6 df >.......q.F..m.. 0080 - 45 d1 88 df 56 3a 9f 77-47 48 a7 0a 98 33 95 04 E...V:.wGH...3.. 0090 - 38 dd c2 c4 2c 7e 2e 6a-a6 a7 b9 01 93 e0 d2 5c 8...,~.j.......\ 00a0 - 51 9c 9b 9b 8e ed 8d 1e-91 c0 fb a8 ef 0a ce 6b Q..............k 00b0 - 47 9c 6f 3c 7a 5e 7b 79-67 ab 3f b6 f2 77 b8 05 G.oTBI.cq.. 00a0 - 5c d1 29 9e 81 77 35 88-0b 41 f6 01 31 e6 4c 44 \.)..w5..A..1.LD 00b0 - e4 98 b3 27 35 f2 b2 0c-d2 47 02 a5 e4 63 d2 15 ...'5....G...c.. 00c0 - b9 7c ca 5f 32 08 a8 ff-75 30 e4 06 0e a6 31 47 .|._2...u0....1G Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40596BF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIMujw8DiwzLJxJxenpGPI0n/dtvBVIHFaj0Ardq49G1E BDDP0XB90nFje535KI+oWn1GXMjv500oC4GIdEYlVz58+ffQyXxxoLL3Ps4Aj2Mx VsuhBgIEabuskqIEAgIcIKQGBAQBAAAArgcCBQCEaun4swMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 TLS SUCCESSFUL This TLS version forbids renegotiation. Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed448) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED448 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED448 Cert i:CN=Issuer a:PKEY: ED448, 456 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICXzCCAUegAwIBAgIBBzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjAyMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFjAUBgNVBAMTDU15IEVENDQ4IENlcnQwQzAFBgMrZXED OgALZLjx2ckYyIkHgdemcVeTBIR2dCkLDPogPbRT+m8MaMndnZIfGl40twbT2jdi 1Zco8bAED+qUCoCjgYEwfzAMBgNVHRMBAf8EAjAAMB8GA1UdEQQYMBaBFHRlc3Rj ZXJ0QGV4YW1wbGUub3JnMA4GA1UdDwEB/wQEAwIHgDAdBgNVHQ4EFgQUO4kxUTLT G7CCMRiyBCJToVcLeuUwHwYDVR0jBBgwFoAUcpDrSO1rjZ70JId2yHhe4LKoRDIw DQYJKoZIhvcNAQELBQADggEBAF8SMPbprNnJba813F069O0bZyKsEYC3wWwJvSG1 VOKZd41YEGS4wI1I4Whd6fBZ4MDPRU+dtpuir0WX1jt+1didZ/bfP0Y1S6dgQNeJ MgCsZ6LZp/VOzFAaH/SZI07bfdmwivuppWrI8lj/tmIH7aSawLs9OxxV6DS2URu1 0xf8ToCXgWcb3NlQrHq+mLh+mYK8Y78qJpgneOef19Z+YJ/swxlR/Vftd75TOM6b f9JLqbqwd4HXjZ2IMzqHjqNHCo9i2jHxdPAOUVXNiVB/ClOsGkGbBH7RoN+b1OsI 5xEJqPRyHFrUivh3zC+6rUMIFzu7UNjStduVvYQm1x6ZUO0= -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED448 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: ed448 Server Temp Key: X25519, 253 bits --- SSL handshake has read 1025 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 456 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: DC9901087F307C9A051D286171DAFF6002279DC917EB4938A5D39A698B390AEE Session-ID-ctx: Resumption PSK: C0B8D2AFB8E79F76914AF792616F9ED4E631F06CA993512A46C8631D9ECA3792C6BB31A229D83BADF32E6EF155528D80 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 78 cb 86 bd 2c 6a 74 ed-8d 77 7d 3f a6 8a bf 76 x...,jt..w}?...v 0010 - a3 ff a8 00 f7 d9 c9 00-60 23 90 72 39 cd 15 82 ........`#.r9... 0020 - 58 03 f8 b6 eb 08 3b 16-60 f5 ae 00 59 00 b7 a9 X.....;.`...Y... 0030 - a2 3b a3 fe 86 3d d0 d7-e2 e4 0a 97 41 95 aa 60 .;...=......A..` 0040 - 44 51 fe d2 bf 3b 84 6f-f6 89 ec 59 b1 61 a4 c5 DQ...;.o...Y.a.. 0050 - 63 76 97 b6 87 02 af 9b-85 6c 5c e7 2b 57 3a 6a cv.......l\.+W:j 0060 - 7b 2c 4d 9d 80 0e 01 b0-73 85 16 71 86 ae 77 15 {,M.....s..q..w. 0070 - 3e 48 0f b3 f6 a2 72 e2-eb e6 7d 14 55 45 f4 7e >H....r...}.UE.~ 0080 - 6a 40 26 28 74 1d 80 7f-56 f2 81 07 03 70 9d 40 j@&(t...V....p.@ 0090 - e2 f1 f0 76 fa 8c 8e 41-e4 7b ec 03 8d 99 82 fc ...v...A.{...... 00a0 - 4d 0d ca 95 52 4a 6f aa-4f b5 cd f6 9c 3e 4b bf M...RJo.O....>K. 00b0 - 12 c8 9d 56 f9 aa f9 39-6d 1b 71 72 2f 9f fa 58 ...V...9m.qr/..X 00c0 - 0c be 34 80 95 62 46 d9-a3 40 59 91 3b e1 60 bc ..4..bF..@Y.;.`. Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 30F3778E69E8934BC105E5BAD3D8114CD9F99E421B61F741E28313D45A0E7C93 Session-ID-ctx: Resumption PSK: D62CFA6654533F248F5EBB65CAB18BD10D9716AC99D3AAB278ACF75165ADC71389F5EC8F05AC81EE6FD43B9227A7F235 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 78 cb 86 bd 2c 6a 74 ed-8d 77 7d 3f a6 8a bf 76 x...,jt..w}?...v 0010 - 50 ff 90 c3 17 4e 57 e4-23 b3 cf 40 a4 55 25 5f P....NW.#..@.U%_ 0020 - a4 19 ee 9e fb b1 e2 3a-9d c0 9b a0 6a f7 f0 61 .......:....j..a 0030 - 5b 3c 37 2f 4b 99 bf 12-a9 da e2 a6 2a 30 e9 42 [<7/K.......*0.B 0040 - ce 96 bc f5 90 8d bd 2a-c6 00 20 a9 9f 21 ca 6f .......*.. ..!.o 0050 - 6c a1 56 78 b5 7b b1 86-24 d0 7e 2e 14 c2 c5 26 l.Vx.{..$.~....& 0060 - 2b 8d aa 99 54 b4 3f 91-1e fa 86 a9 5f d3 5d c0 +...T.?....._.]. 0070 - 7e 15 b5 06 7e 37 f0 28-b7 8e c1 7b fe a4 b4 67 ~...~7.(...{...g 0080 - b9 43 0d cb c1 0b 02 96-ce c0 12 4a 52 ff 54 0b .C.........JR.T. 0090 - 44 64 bb fa 53 b5 3d 25-e8 be ff 24 ef b2 4f 76 Dd..S.=%...$..Ov 00a0 - 3c 6c 70 48 64 1b f8 81-0e 57 81 9e 91 3b 64 2e ;S.hq.4.......7 0010 - ee 42 21 d0 89 4f a2 c3-f5 58 2f 0f 8f 91 c9 43 .B!..O...X/....C 0020 - 7c 8d 01 74 a8 af a2 44-ba 31 6d 56 7a ec e1 24 |..t...D.1mVz..$ 0030 - 41 be da 46 22 5b 26 83-b2 8d 4f 6d f8 e2 34 97 A..F"[&...Om..4. 0040 - 59 5a 06 54 bb 9c 34 7d-b8 eb 5f b5 39 c5 d6 21 YZ.T..4}.._.9..! 0050 - 98 cd c2 c1 33 9c 28 62-8c ee 5d 1a a0 f5 19 ba ....3.(b..]..... 0060 - a7 68 e7 76 54 41 df 6d-9e 3c 9f 4e 29 36 31 91 .h.vTA.m.<.N)61. 0070 - fa 5d 79 5b f4 7b 3b ad-5d d7 35 12 86 27 83 14 .]y[.{;.].5..'.. 0080 - d0 00 b7 96 ec 3c e4 25-9e 35 52 24 50 b6 eb fe .....<.%.5R$P... 0090 - 33 4f d1 ed 24 07 78 b9-d3 49 fc 24 81 df dd b2 3O..$.x..I.$.... 00a0 - 93 ce 48 e3 58 34 6b e9-53 f3 98 05 1e 68 31 8b ..H.X4k.S....h1. Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 40E96BF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAMAQABDCh9iiIw4tN4jcyxn9yCsqQWHsTKSNsXnrh3PV8PnOc msoatGe0YgSmnSMFJxcFo1yhBgIEabuskqIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-RSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with explicit TLS 1.3 spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem -tls1_3 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:51 2026 GMT; NotAfter: Mar 19 07:57:51 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUxWhcNMjcwMzE5MDc1NzUxWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMTMF4dTlfnRg0ljE2IpSmUhil6AAJd96p7t FHoj6g6huZT8MQSA9yXNerkERSJUBJn6NHrp0PPOvSzNj0DQaRvbll7b5hYEqGqy t0w9qsukwReaFQe7AsMB3NJ8u3vYHeOx/ZHySx2kidjlBgIla/cEXwO0gk3l401K +osR8ZHlRt75/56s+EreIZnLk/Hx5+pe+ucMQlSBYoejeqEn9rbp7AmuhK6X/K6W SBNQDzAz75cyfR+/rPQkzVuzgneJiF4zQA39bd0iHG1myQS4nKXlY5Se494SsR8w iRFeDSKTGTVOhuKgBCHXb0wd122TjwNtOaDza8LnTc7lbAhG00MCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBQTDEV2JxmJsdzPJBZr7LEvp1/1GTAf BgNVHSMEGDAWgBRykOtI7WuNnvQkh3bIeF7gsqhEMjANBgkqhkiG9w0BAQsFAAOC AQEAjx4xKvHXZkNSNbtUCYmvJycOlffFq/LDPGqhC+kn+5hi3GuEMVASf6EId9wi DKOBc9UCEFN7djA0QNt3PPchVtF/PE1wud9GemNlCFpi6+HkFg4kxyyOs2DHjsbK GwyrjTEB56n/V256uEt1BD9XXliwOcuTwSmXHvwKrJYmhjIsKnmyT6PIW2MQZBNR 2jbAdQSVFnrzygFVOEwwuNZOymkK/5AdLx39xh38nrpionDg77fzOyq/Ut35Z52k cGKL3bQi2q9yk6xzCTNKCxd4BQHQOIBHGS1JEeMA/bf5R9KK2p91hw6tD6/LssUi ABMgtSvMmiJ5Bj4I7TtHiopimg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 318 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: BAA31C9FB84E28A9A467583080D58834F351CABBDD0BC775E0A2F0470EF4C995 Session-ID-ctx: Resumption PSK: 36F5F6C6345D559D09EB76AA18FE2B81DF5476C508E4C952BF527C035A634EE46C764EDE8F9D5DD32F736B1C6F59688F PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - af 98 6c a1 df bf 0d 0b-14 22 19 ce 6e 1b 4e 70 ..l......"..n.Np 0010 - 91 b6 be e0 f1 43 63 21-23 e3 54 96 ac 9d 56 0f .....Cc!#.T...V. 0020 - 5b a4 40 2f b6 da af 3c-27 f3 20 8a 11 78 af 75 [.@/...<'. ..x.u 0030 - 3a b0 0c 8c dd b2 80 bb-8b af 25 53 2d f3 24 3a :.........%S-.$: 0040 - a5 e2 dc 40 5a 63 92 16-d4 2e a0 f4 ba 12 37 27 ...@Zc........7' 0050 - f8 32 0d 69 b8 de 7a 64-b3 b8 10 ed de c9 99 16 .2.i..zd........ 0060 - e8 dd bb 52 1c e2 56 9d-f3 ee 1d 5e 2e 05 ee c5 ...R..V....^.... 0070 - cd b0 af 44 17 b4 b7 5e-6e 37 53 c2 04 03 9a 01 ...D...^n7S..... 0080 - c5 59 32 00 89 49 c5 a2-de d0 c9 db 83 33 46 90 .Y2..I.......3F. 0090 - f0 73 e8 6f fe c4 1d c3-23 32 b1 20 bc 56 2e 84 .s.o....#2. .V.. 00a0 - dc de ff 49 5d 9b b9 01-cc 18 83 2b 54 c9 f4 05 ...I]......+T... 00b0 - 98 8c ef d6 d1 e4 f8 56-a8 6f 8c d2 e8 0d f5 d2 .......V.o...... 00c0 - ac 0c 23 e1 21 9a 6a 3a-7b e6 9e f2 23 bf 3f ce ..#.!.j:{...#.?. Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 94B61AD42C54E1C293396C667C2D3A8ABE5E7664F95CFC6262EE4E23623CE605 Session-ID-ctx: Resumption PSK: E468DA476619CE1CCCA07102AD6F499F0CE228F033D61F74C132BC9B7497C6AB5C7D493689B4D2D330D1643B4B52F2DE PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - af 98 6c a1 df bf 0d 0b-14 22 19 ce 6e 1b 4e 70 ..l......"..n.Np 0010 - 55 57 e4 8a 94 2c 99 50-22 67 bd da 78 d6 48 95 UW...,.P"g..x.H. 0020 - 17 6d c6 f4 03 f9 bc da-65 7e 67 0b f0 3f 54 cd .m......e~g..?T. 0030 - 0b d3 48 dc a7 30 2e d8-6d 35 00 7a 4b 4d 45 6c ..H..0..m5.zKMEl 0040 - 10 05 cc 29 59 3c b7 8f-59 bd 71 c0 cb 94 f9 d9 ...)Y<..Y.q..... 0050 - 97 0f fd 2c e8 3b f9 be-a5 36 e5 fb 66 eb 7a 8a ...,.;...6..f.z. 0060 - be 6a 20 aa ee fc e8 68-b0 19 87 ee b1 dd 1d b4 .j ....h........ 0070 - a2 89 ac 33 a4 75 1d a3-74 aa a1 eb bd 51 50 90 ...3.u..t....QP. 0080 - 91 27 fd 9f 1e eb c9 99-c8 5f b8 0b f7 cd 93 69 .'......._.....i 0090 - 25 5e a5 ff f6 b7 0f 73-40 09 d0 ac c5 14 be 46 %^.....s@......F 00a0 - 02 96 2f 86 05 f1 bd 96-f8 d2 af c4 03 bd aa 25 ../............% 00b0 - be c7 69 15 6e e8 cd 13-5b 51 60 0f c4 f1 cb 63 ..i.n...[Q`....c 00c0 - c7 d8 d5 d8 b2 a8 3c 37-32 1a 26 8b 6d de 30 10 ......<72.&.m.0. Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 405965F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEILwVAuLRFVnNVQbP5t1u99p/gUaEexZ4svoHWUTQKgnU BDDkaNpHZhnOHMygcQKtb0mfDOIo8DPWH3TBMrybdJfGq1x9STaJtNLTMNFkO0tS 8t6hBgIEabuskqIEAgIcIKQGBAQBAAAArgcCBQCt6u1SswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 TThis TLS version forbids renegotiation. LS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 (ECDSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQPl808v/YZvgYGnLX2ens38Zp/Ik0lX7xErIV+Br1J7Tli fzsjYHi797l4O78GRi6zRtXxN9DURVFQaVxLX63Ro4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFDRS2jQV4EDu7gMWcLzfygwazpSAMB8GA1UdIwQYMBaAFHKQ 60jta42e9CSHdsh4XuCyqEQyMA0GCSqGSIb3DQEBCwUAA4IBAQAL45XJ7y2i+uYv 4vL7i2muGGaTrmbfko44GBY1hHxXIqfGUFgT0oBRtOnXc0Ia/wHYtSjHZf4lcx9u qAcJY368k9wZOA4V7BhC6/eU1qkVctqQuZ7dzFgGDtLF5xW2V+U0TXGKKg38f+cn DyitlqVUXw08z4O9jgSV8aqUlt2Kmf9MQ/Tii4HXHNDSvv773qYma5tkAkq/SH4D nOVoKlGRxAFCJ73snQoWiz/CT+pfs023PgTai/5Ur2FFSHervVJmdSMpbylN6T3L XldyGZqr1uyqvXFkCCV3cdcAjLeSFRhxZr24ckv/mavRikhNYDkKqdpVHmxb8xkY eHu1Rpzl -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1086 bytes and written 290 bytes Verification error: unspecified certificate verification error --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 Session-ID: 8E683AFC8C5B21B2272737E9267232070B5C693F2F2C15083DBCFDC1417BAC76 Session-ID-ctx: Master-Key: 5E7EF77F09035ED799E64300F6692E0BA14247E906C1C563E8C696206C0BC9CB805CCA8E87E83676A21906E787B0304E PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - fd 0c 50 bc 49 3d a9 55-d8 b4 c3 78 83 f0 a4 57 ..P.I=.U...x...W 0010 - cb 8e 51 26 18 f2 c9 f1-e4 08 1e 26 91 98 fb 1c ..Q&.......&.... 0020 - 13 54 8c cf 0b 3f 55 5b-52 15 72 0b 90 19 c3 3b .T...?U[R.r....; 0030 - 7f 4d ec 65 84 ff 04 ec-f4 f5 f7 bc 8a bf 0e 23 .M.e...........# 0040 - 46 27 1a 13 66 a7 df 5f-f9 73 30 ff 5c 1f d3 b2 F'..f.._.s0.\... 0050 - 00 13 9b 8d 2d 84 6f b9-b4 bb 6d a4 ef 13 43 79 ....-.o...m...Cy 0060 - 8d 7d b2 34 7e c9 59 2d-87 bf 80 3e f3 91 35 d9 .}.4~.Y-...>..5. 0070 - 30 69 4d 53 7a 3f 36 bf-61 8c e8 8e 3c f1 02 0c 0iMSz?6.a...<... 0080 - 37 9e 17 2b 46 0d 75 85-42 25 dd 31 f6 da ab 1d 7..+F.u.B%.1.... 0090 - 0a 93 3e 62 a5 9e eb 31-d5 fd e1 d5 5f 86 94 e0 ..>b...1...._... 00a0 - 7b d9 b0 9f 42 49 bb bd-a0 fc c8 36 e3 cc 55 7a {...BI.....6..Uz Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: yes --- TLS SUCCESSFUL 40596CF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2 Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALALAQABDBefvd/CQNe15nmQwD2aS4LoUJH6QbBxWPoxpYgbAvJ y4Bcyo6H6DZ2ohkG54ewME6hBgIEabuskqIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384 TLS SUCCESSFUL Q Secure Renegotiation IS supported DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 and ECDH spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQPl808v/YZvgYGnLX2ens38Zp/Ik0lX7xErIV+Br1J7Tli fzsjYHi797l4O78GRi6zRtXxN9DURVFQaVxLX63Ro4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFDRS2jQV4EDu7gMWcLzfygwazpSAMB8GA1UdIwQYMBaAFHKQ 60jta42e9CSHdsh4XuCyqEQyMA0GCSqGSIb3DQEBCwUAA4IBAQAL45XJ7y2i+uYv 4vL7i2muGGaTrmbfko44GBY1hHxXIqfGUFgT0oBRtOnXc0Ia/wHYtSjHZf4lcx9u qAcJY368k9wZOA4V7BhC6/eU1qkVctqQuZ7dzFgGDtLF5xW2V+U0TXGKKg38f+cn DyitlqVUXw08z4O9jgSV8aqUlt2Kmf9MQ/Tii4HXHNDSvv773qYma5tkAkq/SH4D nOVoKlGRxAFCJ73snQoWiz/CT+pfs023PgTai/5Ur2FFSHervVJmdSMpbylN6T3L XldyGZqr1uyqvXFkCCV3cdcAjLeSFRhxZr24ckv/mavRikhNYDkKqdpVHmxb8xkY eHu1Rpzl -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1119 bytes and written 263 bytes Verification error: unspecified certificate verification error --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES128-GCM-SHA256 Session-ID: ABCCF5974B40987DD0AE72C539F2E43C6BE3C2769128403344B9E5DD248A9FF7 Session-ID-ctx: Master-Key: 8A756F501E45BD165A2E0408F2BE697A4AE267C210E421A5275312DB15D9407C74B958FB8A4825B168736273253BDF9D PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 05 21 3c 96 2e ba 01 d0-30 63 dc 4c 09 e6 15 54 .!<.....0c.L...T 0010 - f7 06 65 67 93 13 5f 20-ea 97 bf 54 2c 0c 4e c4 ..eg.._ ...T,.N. 0020 - 81 33 38 f5 3d 19 f9 4d-fe 49 6a cd 9f 1b 26 94 .38.=..M.Ij...&. 0030 - e9 d4 35 c9 46 f3 6b 23-6e fe b8 65 01 d5 0c 8d ..5.F.k#n..e.... 0040 - 38 ae 61 34 4e 9b 10 69-13 81 2c 89 54 06 d4 fb 8.a4N..i..,.T... 0050 - fd 6a 07 3b fc 00 53 23-38 28 b8 13 cf c9 bc 33 .j.;..S#8(.....3 0060 - 40 78 82 b9 68 41 30 2e-38 21 13 2a 43 2d a5 07 @x..hA0.8!.*C-.. 0070 - 8b 1f eb 54 f2 dd 07 54-3c 8c 95 5d 80 c1 61 ee ...T...T<..]..a. 0080 - 6b b1 b4 4a 5e 4d 0d cf-cf 0c 68 41 88 b1 f0 05 k..J^M....hA.... 0090 - cb 02 4e 1b 75 49 a4 0c-08 af 61 62 9b 43 bf 9a ..N.uI....ab.C.. 00a0 - 10 07 62 bd 98 c9 99 16-cb 5f 1d c6 75 c5 55 27 ..b......_..u.U' Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: yes --- TLS SUCCESSFUL 407966F7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAKwQABDCKdW9QHkW9FlouBAjyvml6SuJnwhDkIaUnUxLbFdlA fHS5WPuKSCWxaHNicyU7352hBgIEabuskqIEAgIcIKQGBAQBAAAArQMCAQGzAwIB Fw== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES128-GCM-SHA256 TLS SUCCESSFUL Q Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is ECDHE-ECDSA-AES128-GCM-SHA256 Secure Renegotiation IS supported DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.3 and specific suite spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests/softhsm/caCert.pem -tls1_3 -ciphersuites TLS_AES_256_GCM_SHA384 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 19 07:57:52 2026 GMT; NotAfter: Mar 19 07:57:52 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzE5MDc1NzUyWhcNMjcwMzE5MDc1NzUyWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQPl808v/YZvgYGnLX2ens38Zp/Ik0lX7xErIV+Br1J7Tli fzsjYHi797l4O78GRi6zRtXxN9DURVFQaVxLX63Ro4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFDRS2jQV4EDu7gMWcLzfygwazpSAMB8GA1UdIwQYMBaAFHKQ 60jta42e9CSHdsh4XuCyqEQyMA0GCSqGSIb3DQEBCwUAA4IBAQAL45XJ7y2i+uYv 4vL7i2muGGaTrmbfko44GBY1hHxXIqfGUFgT0oBRtOnXc0Ia/wHYtSjHZf4lcx9u qAcJY368k9wZOA4V7BhC6/eU1qkVctqQuZ7dzFgGDtLF5xW2V+U0TXGKKg38f+cn DyitlqVUXw08z4O9jgSV8aqUlt2Kmf9MQ/Tii4HXHNDSvv773qYma5tkAkq/SH4D nOVoKlGRxAFCJ73snQoWiz/CT+pfs023PgTai/5Ur2FFSHervVJmdSMpbylN6T3L XldyGZqr1uyqvXFkCCV3cdcAjLeSFRhxZr24ckv/mavRikhNYDkKqdpVHmxb8xkY eHu1Rpzl -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, ?, 0 bits --- SSL handshake has read 1059 bytes and written 329 bytes Verification error: unspecified certificate verification error --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 1 (unspecified certificate verification error) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: CC7D8BBADC27079C25E06A217BFC0172B22ACAD185E41ECF3CDB12D028E765BB Session-ID-ctx: Resumption PSK: 37B5502E9D265975D37BC19986480525C84879C4BA57020A3DFC32C1BF32E6F7AF14AB594DE24175FF34D746C51BB664 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 29 27 40 4e a8 fc 60 8e-80 ef e3 e8 dc f2 d0 33 )'@N..`........3 0010 - 9a 11 26 a6 7f 6b 13 c6-93 06 e1 66 b0 65 4f ca ..&..k.....f.eO. 0020 - ff 45 ac 6a f2 39 2d 7e-1e b6 c1 dc 13 0f 25 ff .E.j.9-~......%. 0030 - 09 bf 1e 2c 31 9c 9b b3-de 99 53 09 3d 85 59 6c ...,1.....S.=.Yl 0040 - 3d e4 6b 0a f8 99 08 39-67 8d 91 36 3a 2d be a8 =.k....9g..6:-.. 0050 - 84 e9 68 ce 45 1f 9e 46-6d 33 00 85 78 81 73 65 ..h.E..Fm3..x.se 0060 - 6f 08 9b 33 d2 be 60 e5-ab 3d 1d 81 5d 58 ad 79 o..3..`..=..]X.y 0070 - 8d c2 2f 79 0e f9 59 4d-d2 8a 2e 7a 27 71 6e f2 ../y..YM...z'qn. 0080 - 94 82 80 da 89 2f 7d 4d-35 ea b6 74 62 fb 12 6b ...../}M5..tb..k 0090 - 64 2f bb d8 fc cd 23 9c-a2 c7 c8 ad ae cc 79 a2 d/....#.......y. 00a0 - b9 14 7c 5f a9 7d 8a 3d-96 d4 fb 6e f4 52 10 7a ..|_.}.=...n.R.z 00b0 - e3 99 0b 85 c9 4b 1b bc-f6 55 d0 42 16 9f 19 57 .....K...U.B...W 00c0 - c4 55 03 5e e7 c1 ac e9-a2 af 6c 7a 09 cb 28 bd .U.^......lz..(. Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: F124042B4517587CFFCC75122DEE2CCC1FB423C4A179A09FD2E5375D32AAB5B9 Session-ID-ctx: Resumption PSK: F8E348E57121A794D046BA89ED6C3CD226C68AEDD92578B13F8A4697EF03E651FA2C2EE0E607569C0FFCBB5E089B147B PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 29 27 40 4e a8 fc 60 8e-80 ef e3 e8 dc f2 d0 33 )'@N..`........3 0010 - c2 2a ab 42 3b 56 ad c9-a8 d1 22 ef a1 20 39 e7 .*.B;V....".. 9. 0020 - 26 f0 ef a4 7c 16 1a 65-ea 52 55 85 e2 fb 40 09 &...|..e.RU...@. 0030 - 46 35 30 a6 d1 d8 d8 24-e4 00 c6 bd 71 29 bb ae F50....$....q).. 0040 - e9 8f bc 5f 6b c9 cb 42-62 25 ca 7a 64 da 88 8e ..._k..Bb%.zd... 0050 - 8b 4d ce 74 6e b3 24 13-81 13 d1 eb b0 dc 1a ac .M.tn.$......... 0060 - 38 4b 76 21 5f 96 0c a8-8e 58 b8 53 3c a5 32 60 8Kv!_....X.S<.2` 0070 - 59 75 0c 47 7c a0 07 b3-ee 11 da 72 25 a5 5c 4b Yu.G|......r%.\K 0080 - ca 93 95 26 69 68 73 ba-6d c5 7f 03 60 99 86 02 ...&ihs.m...`... 0090 - d2 99 81 81 cc 6b c7 06-62 79 fa 97 1e 9e 87 3c .....k..by.....< 00a0 - 81 ce bb 1c ad 39 fb 73-73 3c 16 c3 ca 29 19 f0 .....9.ss<...).. 00b0 - d0 14 09 ab 60 75 2c 90-a1 df f9 8b b1 93 87 8f ....`u,......... 00c0 - 8b a4 89 bf 4b 2a 60 ff-3e 7e b1 b3 7e 9f c6 12 ....K*`.>~..~... Start Time: 1773907090 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40995FF7:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIO8nJkG1slWUhnouFFNlfMlK5e+R54gPMBDjapgl8Pio BDD440jlcSGnlNBGuontbDzSJsaK7dkleLE/ikaX7wPmUfosLuDmB1acD/y7Xgib FHuhBgIEabuskqIEAgIcIKQGBAQBAAAArgYCBDe4UlGzAwIBFw== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## ######################################## Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIO8nJkG1slWUhnouFFNlfMlK5e+R54gPMBDjapgl8Pio BDD440jlcSGnlNBGuontbDzSJsaK7dkleLE/ikaX7wPmUfosLuDmB1acD/y7Xgib FHuhBgIEabuskqIEAgIcIKQGBAQBAAAArgYCBDe4UlGzAwIBFw== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 75/92 pkcs11-provider:softhsm / tls OK 1.91s 76/92 pkcs11-provider:kryoptic / tls RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=171 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 76/92 pkcs11-provider:kryoptic / tls SKIP 0.01s exit status 77 77/92 pkcs11-provider:kryoptic.nss / tls RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=146 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 77/92 pkcs11-provider:kryoptic.nss / tls SKIP 0.01s exit status 77 78/92 pkcs11-provider:softokn / tlsfuzzer RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=184 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 78/92 pkcs11-provider:softokn / tlsfuzzer SKIP 0.01s exit status 77 79/92 pkcs11-provider:softhsm / tlsfuzzer RUNNING >>> MALLOC_PERTURB_=104 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttlsfuzzer TLS fuzzer is not available -- skipping ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 79/92 pkcs11-provider:softhsm / tlsfuzzer SKIP 0.01s exit status 77 80/92 pkcs11-provider:kryoptic / tlsfuzzer RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=21 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 80/92 pkcs11-provider:kryoptic / tlsfuzzer SKIP 0.01s exit status 77 81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=178 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer SKIP 0.01s exit status 77 82/92 pkcs11-provider:softokn / uri RUNNING >>> MALLOC_PERTURB_=109 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 82/92 pkcs11-provider:softokn / uri SKIP 0.01s exit status 77 83/92 pkcs11-provider:softhsm / uri RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=245 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/turi ## Check that storeutl returns URIs openssl storeutl -text pkcs11: ## Check returned URIs work to find objects $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%90%95%52%08%67%D2%92%7D%08%67%BC%F0%7C%ED%89%65;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%AA%97%4B%9D%3A%DC%11%56%57%43%AA%AA%E8%E6%65%B9;object=Fork-Test;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%03;object=ecPeerCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%00;object=caCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%5A%10%CC%36%22%12%21%D7%2E%AB%7D%6A%51%0E%B7%7A;object=Test-RSA-Key-Usage-5a10cc36;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%74%8E%37%66%09%25%8A%92%53%36%AF%2C%69%6A%28%6B;object=Pkey%20sigver%20Test;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%E6%C6%90%3E%5F%4F%A5%AD%A5%06%D0%39%B6%92%92%22;object=Test-RSA-PSS-gen-e6c6903e;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%02;object=ecCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%2E%2D%39%01%34%E8%61%8E%34%BF%99%6A%73%66%1A%34;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%08;object=ecCert3;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%DD%16%38%43%07%4E%DC%90%5E%55%C7%BD%39%34%CC%4C;object=Test-RSA-gen-dd163843;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%10;object=testRsaPssCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%0F%D6%53%00%F7%8F%71%B4%89%7A%5C%A3%4E%78%9E%C5;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%11;object=testRsaPss2Cert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%06;object=ecCert2;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%60%A0%5A%E7%46%19%3A%CD%C5%72%13%FB%C8%3D%59%F6;object=Test-Ed-gen-60a05ae7;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%09;object=ed2Cert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%05;object=testCert2;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%A5%0F%21%B6%5A%40%11%4B%61%27%90%06%B0%2C%E8%F4;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%04;object=edCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%B0%0C%78%37%35%8B%C9%65%16%68%8D%43%3F%73%46%94;object=Test-EC-gen-b00c7837;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%00%01;object=testCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=c558156ea30c54b3;token=SoftHSM%20Token;id=%95%B1%07%29%84%9C%36%1A%5E%05%8B%D8%C6%AB%72%64;object=Test-Ed-gen-95b10729;type=private openssl storeutl -text "$uri" ## Check each URI component is tested $cmp=pkcs11:model=SoftHSM%20v2 openssl storeutl -text "pkcs11:${cmp}" $cmp=manufacturer=SoftHSM%20project openssl storeutl -text "pkcs11:${cmp}" $cmp=serial=c558156ea30c54b3 openssl storeutl -text "pkcs11:${cmp}" $cmp=token=SoftHSM%20Token openssl storeutl -text "pkcs11:${cmp}" $cmp=id=%90%95%52%08%67%D2%92%7D%08%67%BC%F0%7C%ED%89%65 openssl storeutl -text "pkcs11:${cmp}" $cmp=type=private openssl storeutl -text "pkcs11:${cmp}" ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 83/92 pkcs11-provider:softhsm / uri OK 1.25s 84/92 pkcs11-provider:kryoptic / uri RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=89 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 84/92 pkcs11-provider:kryoptic / uri SKIP 0.01s exit status 77 85/92 pkcs11-provider:kryoptic.nss / uri RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=41 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 85/92 pkcs11-provider:kryoptic.nss / uri SKIP 0.01s exit status 77 86/92 pkcs11-provider:softhsm / ecxc RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=19 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecxc ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 86/92 pkcs11-provider:softhsm / ecxc SKIP 0.01s exit status 77 87/92 pkcs11-provider:kryoptic / ecxc RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=70 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 87/92 pkcs11-provider:kryoptic / ecxc SKIP 0.01s exit status 77 88/92 pkcs11-provider:kryoptic.nss / ecxc RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MALLOC_PERTURB_=170 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 88/92 pkcs11-provider:kryoptic.nss / ecxc SKIP 0.01s exit status 77 89/92 pkcs11-provider:softokn / cms RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=16 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 89/92 pkcs11-provider:softokn / cms SKIP 0.01s exit status 77 90/92 pkcs11-provider:kryoptic / cms RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=230 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 90/92 pkcs11-provider:kryoptic / cms SKIP 0.01s exit status 77 91/92 pkcs11-provider:kryoptic.nss / cms RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=228 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 91/92 pkcs11-provider:kryoptic.nss / cms SKIP 0.01s exit status 77 92/92 pkcs11-provider:kryoptic / pinlock RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 MALLOC_PERTURB_=24 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pinlock-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 92/92 pkcs11-provider:kryoptic / pinlock SKIP 0.01s exit status 77 Ok: 21 Expected Fail: 0 Fail: 0 Unexpected Pass: 0 Skipped: 71 Timeout: 0 Full log written to /build/reproducible-path/pkcs11-provider-1.0/obj-i686-linux-gnu/meson-logs/testlog.txt create-stamp debian/debhelper-build-stamp dh_testroot -O--buildsystem=meson dh_prep -O--buildsystem=meson dh_auto_install --destdir=debian/pkcs11-provider/ -O--buildsystem=meson cd obj-i686-linux-gnu && DESTDIR=/build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider LC_ALL=C.UTF-8 ninja install [0/1] Installing files Installing src/pkcs11.so to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/lib/i386-linux-gnu/ossl-modules Installing /build/reproducible-path/pkcs11-provider-1.0/docs/provider-pkcs11.7 to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/share/man/man7 dh_installdocs -O--buildsystem=meson dh_installchangelogs -O--buildsystem=meson dh_installman -O--buildsystem=meson dh_installsystemduser -O--buildsystem=meson dh_perl -O--buildsystem=meson dh_link -O--buildsystem=meson dh_strip_nondeterminism -O--buildsystem=meson dh_compress -O--buildsystem=meson dh_fixperms -O--buildsystem=meson dh_missing -O--buildsystem=meson dh_dwz -a -O--buildsystem=meson dh_strip -a -O--buildsystem=meson dh_makeshlibs -a -O--buildsystem=meson dh_shlibdeps -a -O--buildsystem=meson dh_installdeb -O--buildsystem=meson dh_gencontrol -O--buildsystem=meson dh_md5sums -O--buildsystem=meson dh_builddeb -O--buildsystem=meson dpkg-deb: building package 'pkcs11-provider' in '../pkcs11-provider_1.0-1_i386.deb'. dpkg-deb: building package 'pkcs11-provider-dbgsym' in '../pkcs11-provider-dbgsym_1.0-1_i386.deb'. dpkg-genbuildinfo --build=binary -O../pkcs11-provider_1.0-1_i386.buildinfo dpkg-genchanges --build=binary -O../pkcs11-provider_1.0-1_i386.changes dpkg-genchanges: info: binary-only upload (no source code included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: including full source code in upload I: copying local configuration I: user script /srv/workspace/pbuilder/123237/tmp/hooks/B01_cleanup starting I: user script /srv/workspace/pbuilder/123237/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env I: removing directory /srv/workspace/pbuilder/123237 and its subdirectories I: Current time: Thu Mar 19 21:58:16 +14 2026 I: pbuilder-time-stamp: 1773907096