Tue Feb 18 04:25:27 UTC 2025 I: starting to build pkcs11-provider/trixie/arm64 on jenkins on '2025-02-18 04:25' Tue Feb 18 04:25:27 UTC 2025 I: The jenkins build log is/was available at https://jenkins.debian.net/userContent/reproducible/debian/build_service/arm64_6/79896/console.log Tue Feb 18 04:25:27 UTC 2025 I: Downloading source for trixie/pkcs11-provider=1.0-1 --2025-02-18 04:25:28-- http://deb.debian.org/debian/pool/main/p/pkcs11-provider/pkcs11-provider_1.0-1.dsc Connecting to 46.16.76.132:3128... connected. Proxy request sent, awaiting response... 200 OK Length: 2213 (2.2K) [text/prs.lines.tag] Saving to: ‘pkcs11-provider_1.0-1.dsc’ 0K .. 100% 349M=0s 2025-02-18 04:25:28 (349 MB/s) - ‘pkcs11-provider_1.0-1.dsc’ saved [2213/2213] Tue Feb 18 04:25:28 UTC 2025 I: pkcs11-provider_1.0-1.dsc -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 3.0 (quilt) Source: pkcs11-provider Binary: pkcs11-provider Architecture: any Version: 1.0-1 Maintainer: Luca Boccassi Homepage: https://github.com/latchset/pkcs11-provider Standards-Version: 4.7.0 Vcs-Browser: https://salsa.debian.org/debian/pkcs11-provider Vcs-Git: https://salsa.debian.org/debian/pkcs11-provider.git Build-Depends: debhelper-compat (= 13), dh-package-notes, libssl-dev (>= 3.0.7~), meson (>= 0.57~), pkgconf, expect , gnutls-bin , libnss3-dev , libp11-kit-dev , libstoken-dev , opensc , openssl , p11-kit , p11-kit-modules , softhsm2 Package-List: pkcs11-provider deb libs optional arch=any Checksums-Sha1: c1f7deab3a3af9fa2c3ef63ed95536c7c5a52707 210633 pkcs11-provider_1.0.orig.tar.gz 3c408dc6896465991fcdbf8f1c8e88b5490138d6 2452 pkcs11-provider_1.0-1.debian.tar.xz Checksums-Sha256: f62771642f24525305233fab01df361a0893912b7e92d2f550f26f131a7b36c2 210633 pkcs11-provider_1.0.orig.tar.gz 54a837067294fae1d3a92370734be1942f3d257a8c89d93e8e92aab7d9573383 2452 pkcs11-provider_1.0-1.debian.tar.xz Files: 2933ec36edff8ab9c132e82f04cbd4dd 210633 pkcs11-provider_1.0.orig.tar.gz 9dee0c01916770d74c9120a1e7a11e10 2452 pkcs11-provider_1.0-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQJFBAEBCgAvFiEErCSqx93EIPGOymuRKGv37813JB4FAmerpDoRHGJsdWNhQGRl Ymlhbi5vcmcACgkQKGv37813JB7uNA//ce7UaVSahTVkrp7Dd/U1RyjboJeO8lVU r7/Vtayph/LBC6iZOKWvsM5XpJSWYfZtJGj3cLKbyICbKbmLD3x3+xQv8cJSv5gL 4vbvvseAAbDSnhs4igu2VKHVW5dykdSfoisCMOCFiPvKI9rhvBElcZr1oboHq3RH fRjlzRpg5Z9dHunuhhYaBGtgivJRhu03Y2A32mTN7uxvPMHJ0Vd74OSv1yEpaF4E CmZCKw8cHJObFA9nB3iv16rX9AEGdrRoGkGGG3hApwA/q1ksdmGKmyTDbwKWqo/K pg2GpFon1TOqGTHckWnLoPWrcyD9idBBsiCcSSulqF+BVVXpIgr/7YNpeD1QxbXC Rx5EHAFQAZXmoXkMbwPqaApzo25mTmrx5gFe4gUlsD/sDMPIw8YP0BecwmMLJiCO wlXpcHrQKUTy/W2sXQjH2CvPSuRU4DaCtSfu6vH2kPTv1/aB5vmieUjPMBRfGTGO kJ0swWtCw/stz4w3OqVp+Wu5rcU1ZqraAJ+kuRlhufFuGdQWHSoqJxf6CWwYiCN2 Y0EZKICoxvTn+GY+Lq1cQLXbg3igQ9DWNUOHlk1/7Q9P6BC+wpdrJe8zLJiLJeGg KxhTaqkUnd38cjSOjj3V+rlnELQONbOLCZIIqZy2VzQkIdEFepC0PPnoZtWauxpd MTZ7rP/uDjE= =8rIG -----END PGP SIGNATURE----- Tue Feb 18 04:25:28 UTC 2025 I: Checking whether the package is not for us Tue Feb 18 04:25:28 UTC 2025 I: Starting 1st build on remote node codethink03-arm64.debian.net. Tue Feb 18 04:25:28 UTC 2025 I: Preparing to do remote build '1' on codethink03-arm64.debian.net. Tue Feb 18 04:27:54 UTC 2025 I: Deleting $TMPDIR on codethink03-arm64.debian.net. I: pbuilder: network access will be disabled during build I: Current time: Sun Mar 22 22:48:29 -12 2026 I: pbuilder-time-stamp: 1774262909 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/trixie-reproducible-base.tgz] I: copying local configuration W: --override-config is not set; not updating apt.conf Read the manpage for details. I: mounting /proc filesystem I: mounting /sys filesystem I: creating /{dev,run}/shm I: mounting /dev/pts filesystem I: redirecting /dev/ptmx to /dev/pts/ptmx I: policy-rc.d already exists I: Copying source file I: copying [pkcs11-provider_1.0-1.dsc] I: copying [./pkcs11-provider_1.0.orig.tar.gz] I: copying [./pkcs11-provider_1.0-1.debian.tar.xz] I: Extracting source dpkg-source: warning: cannot verify inline signature for ./pkcs11-provider_1.0-1.dsc: unsupported subcommand dpkg-source: info: extracting pkcs11-provider in pkcs11-provider-1.0 dpkg-source: info: unpacking pkcs11-provider_1.0.orig.tar.gz dpkg-source: info: unpacking pkcs11-provider_1.0-1.debian.tar.xz I: Not using root during the build. I: Installing the build-deps I: user script /srv/workspace/pbuilder/1369869/tmp/hooks/D02_print_environment starting I: set BUILDDIR='/build/reproducible-path' BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' BUILDUSERNAME='pbuilder1' BUILD_ARCH='arm64' DEBIAN_FRONTEND='noninteractive' DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=12 ' DISTRIBUTION='trixie' HOME='/root' HOST_ARCH='arm64' IFS=' ' INVOCATION_ID='874801d4bdcb4fd0810cff5de1b896e2' LANG='C' LANGUAGE='en_US:en' LC_ALL='C' MAIL='/var/mail/root' OPTIND='1' PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' PBCURRENTCOMMANDLINEOPERATION='build' PBUILDER_OPERATION='build' PBUILDER_PKGDATADIR='/usr/share/pbuilder' PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' PBUILDER_SYSCONFDIR='/etc' PPID='1369869' PS1='# ' PS2='> ' PS4='+ ' PWD='/' SHELL='/bin/bash' SHLVL='2' SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/pbuilderrc_h0Ks --distribution trixie --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/b1 --logfile b1/build.log pkcs11-provider_1.0-1.dsc' SUDO_GID='109' SUDO_UID='104' SUDO_USER='jenkins' TERM='unknown' TZ='/usr/share/zoneinfo/Etc/GMT+12' USER='root' _='/usr/bin/systemd-run' http_proxy='http://192.168.101.4:3128' I: uname -a Linux codethink03-arm64 6.1.0-31-cloud-arm64 #1 SMP Debian 6.1.128-1 (2025-02-07) aarch64 GNU/Linux I: ls -l /bin lrwxrwxrwx 1 root root 7 Nov 22 2024 /bin -> usr/bin I: user script /srv/workspace/pbuilder/1369869/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy Version: 0.invalid.0 Architecture: arm64 Maintainer: Debian Pbuilder Team Description: Dummy package to satisfy dependencies with aptitude - created by pbuilder This package was created automatically by pbuilder to satisfy the build-dependencies of the package being currently built. Depends: debhelper-compat (= 13), dh-package-notes, libssl-dev (>= 3.0.7~), meson (>= 0.57~), pkgconf, expect, gnutls-bin, libnss3-dev, libp11-kit-dev, libstoken-dev, opensc, openssl, p11-kit, p11-kit-modules, softhsm2 dpkg-deb: building package 'pbuilder-satisfydepends-dummy' in '/tmp/satisfydepends-aptitude/pbuilder-satisfydepends-dummy.deb'. Selecting previously unselected package pbuilder-satisfydepends-dummy. (Reading database ... 19923 files and directories currently installed.) Preparing to unpack .../pbuilder-satisfydepends-dummy.deb ... Unpacking pbuilder-satisfydepends-dummy (0.invalid.0) ... dpkg: pbuilder-satisfydepends-dummy: dependency problems, but configuring anyway as you requested: pbuilder-satisfydepends-dummy depends on debhelper-compat (= 13); however: Package debhelper-compat is not installed. pbuilder-satisfydepends-dummy depends on dh-package-notes; however: Package dh-package-notes is not installed. pbuilder-satisfydepends-dummy depends on libssl-dev (>= 3.0.7~); however: Package libssl-dev is not installed. pbuilder-satisfydepends-dummy depends on meson (>= 0.57~); however: Package meson is not installed. pbuilder-satisfydepends-dummy depends on pkgconf; however: Package pkgconf is not installed. pbuilder-satisfydepends-dummy depends on expect; however: Package expect is not installed. pbuilder-satisfydepends-dummy depends on gnutls-bin; however: Package gnutls-bin is not installed. pbuilder-satisfydepends-dummy depends on libnss3-dev; however: Package libnss3-dev is not installed. pbuilder-satisfydepends-dummy depends on libp11-kit-dev; however: Package libp11-kit-dev is not installed. pbuilder-satisfydepends-dummy depends on libstoken-dev; however: Package libstoken-dev is not installed. pbuilder-satisfydepends-dummy depends on opensc; however: Package opensc is not installed. pbuilder-satisfydepends-dummy depends on openssl; however: Package openssl is not installed. pbuilder-satisfydepends-dummy depends on p11-kit; however: Package p11-kit is not installed. pbuilder-satisfydepends-dummy depends on p11-kit-modules; however: Package p11-kit-modules is not installed. pbuilder-satisfydepends-dummy depends on softhsm2; however: Package softhsm2 is not installed. Setting up pbuilder-satisfydepends-dummy (0.invalid.0) ... Reading package lists... Building dependency tree... Reading state information... Initializing package states... Writing extended state information... Building tag database... pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) The following NEW packages will be installed: autoconf{a} automake{a} autopoint{a} autotools-dev{a} bsdextrautils{a} debhelper{a} dh-autoreconf{a} dh-package-notes{a} dh-strip-nondeterminism{a} dwz{a} expect{a} file{a} gettext{a} gettext-base{a} gnutls-bin{a} groff-base{a} intltool-debian{a} libarchive-zip-perl{a} libdebhelper-perl{a} libeac3{a} libelf1t64{a} libevent-2.1-7t64{a} libexpat1{a} libffi8{a} libfile-stripnondeterminism-perl{a} libglib2.0-0t64{a} libgnutls-dane0t64{a} libgnutls30t64{a} libicu72{a} libidn2-0{a} libmagic-mgc{a} libmagic1t64{a} libnspr4{a} libnspr4-dev{a} libnss3{a} libnss3-dev{a} libp11-kit-dev{a} libp11-kit0{a} libpipeline1{a} libpkgconf3{a} libproc2-0{a} libpython3-stdlib{a} libpython3.13-minimal{a} libpython3.13-stdlib{a} libreadline8t64{a} libsofthsm2{a} libssl-dev{a} libstoken-dev{a} libstoken1t64{a} libtasn1-6{a} libtcl8.6{a} libtext-charwidth-perl{a} libtext-wrapi18n-perl{a} libtomcrypt-dev{a} libtomcrypt1{a} libtommath1{a} libtool{a} libuchardet0{a} libunbound8{a} libunistring5{a} libxml2{a} m4{a} man-db{a} media-types{a} meson{a} netbase{a} ninja-build{a} opensc{a} opensc-pkcs11{a} openssl{a} p11-kit{a} p11-kit-modules{a} pkgconf{a} pkgconf-bin{a} po-debconf{a} procps{a} python3{a} python3-autocommand{a} python3-inflect{a} python3-jaraco.context{a} python3-jaraco.functools{a} python3-jaraco.text{a} python3-minimal{a} python3-more-itertools{a} python3-pkg-resources{a} python3-setuptools{a} python3-typeguard{a} python3-typing-extensions{a} python3-zipp{a} python3.13{a} python3.13-minimal{a} readline-common{a} sensible-utils{a} softhsm2{a} softhsm2-common{a} tcl-expect{a} tcl8.6{a} tzdata{a} ucf{a} The following packages are RECOMMENDED but will NOT be installed: ca-certificates curl libarchive-cpio-perl libglib2.0-data libltdl-dev libmail-sendmail-perl linux-sysctl-defaults lynx pcscd psmisc shared-mime-info wget xdg-user-dirs 0 packages upgraded, 99 newly installed, 0 to remove and 0 not upgraded. Need to get 46.7 MB of archives. After unpacking 184 MB will be used. Writing extended state information... Get: 1 http://deb.debian.org/debian trixie/main arm64 libpython3.13-minimal arm64 3.13.2-1 [853 kB] Get: 2 http://deb.debian.org/debian trixie/main arm64 libexpat1 arm64 2.6.4-1 [90.7 kB] Get: 3 http://deb.debian.org/debian trixie/main arm64 python3.13-minimal arm64 3.13.2-1 [1997 kB] Get: 4 http://deb.debian.org/debian trixie/main arm64 python3-minimal arm64 3.13.1-2 [27.0 kB] Get: 5 http://deb.debian.org/debian trixie/main arm64 media-types all 10.1.0 [26.9 kB] Get: 6 http://deb.debian.org/debian trixie/main arm64 netbase all 6.4 [12.8 kB] Get: 7 http://deb.debian.org/debian trixie/main arm64 tzdata all 2024b-6 [257 kB] Get: 8 http://deb.debian.org/debian trixie/main arm64 libffi8 arm64 3.4.7-1 [21.2 kB] Get: 9 http://deb.debian.org/debian trixie/main arm64 readline-common all 8.2-6 [69.4 kB] Get: 10 http://deb.debian.org/debian trixie/main arm64 libreadline8t64 arm64 8.2-6 [159 kB] Get: 11 http://deb.debian.org/debian trixie/main arm64 libpython3.13-stdlib arm64 3.13.2-1 [1914 kB] Get: 12 http://deb.debian.org/debian trixie/main arm64 python3.13 arm64 3.13.2-1 [745 kB] Get: 13 http://deb.debian.org/debian trixie/main arm64 libpython3-stdlib arm64 3.13.1-2 [9952 B] Get: 14 http://deb.debian.org/debian trixie/main arm64 python3 arm64 3.13.1-2 [28.0 kB] Get: 15 http://deb.debian.org/debian trixie/main arm64 libproc2-0 arm64 2:4.0.4-7 [62.4 kB] Get: 16 http://deb.debian.org/debian trixie/main arm64 procps arm64 2:4.0.4-7 [868 kB] Get: 17 http://deb.debian.org/debian trixie/main arm64 sensible-utils all 0.0.24 [24.8 kB] Get: 18 http://deb.debian.org/debian trixie/main arm64 libmagic-mgc arm64 1:5.45-3+b1 [314 kB] Get: 19 http://deb.debian.org/debian trixie/main arm64 libmagic1t64 arm64 1:5.45-3+b1 [102 kB] Get: 20 http://deb.debian.org/debian trixie/main arm64 file arm64 1:5.45-3+b1 [43.4 kB] Get: 21 http://deb.debian.org/debian trixie/main arm64 gettext-base arm64 0.23.1-1 [241 kB] Get: 22 http://deb.debian.org/debian trixie/main arm64 libuchardet0 arm64 0.0.8-1+b2 [69.2 kB] Get: 23 http://deb.debian.org/debian trixie/main arm64 groff-base arm64 1.23.0-7 [1129 kB] Get: 24 http://deb.debian.org/debian trixie/main arm64 bsdextrautils arm64 2.40.4-3 [92.0 kB] Get: 25 http://deb.debian.org/debian trixie/main arm64 libpipeline1 arm64 1.5.8-1 [40.2 kB] Get: 26 http://deb.debian.org/debian trixie/main arm64 man-db arm64 2.13.0-1 [1404 kB] Get: 27 http://deb.debian.org/debian trixie/main arm64 libtext-charwidth-perl arm64 0.04-11+b4 [9652 B] Get: 28 http://deb.debian.org/debian trixie/main arm64 libtext-wrapi18n-perl all 0.06-10 [8808 B] Get: 29 http://deb.debian.org/debian trixie/main arm64 ucf all 3.0049 [42.5 kB] Get: 30 http://deb.debian.org/debian trixie/main arm64 m4 arm64 1.4.19-5 [284 kB] Get: 31 http://deb.debian.org/debian trixie/main arm64 autoconf all 2.72-3 [493 kB] Get: 32 http://deb.debian.org/debian trixie/main arm64 autotools-dev all 20220109.1 [51.6 kB] Get: 33 http://deb.debian.org/debian trixie/main arm64 automake all 1:1.17-3 [862 kB] Get: 34 http://deb.debian.org/debian trixie/main arm64 autopoint all 0.23.1-1 [770 kB] Get: 35 http://deb.debian.org/debian trixie/main arm64 libdebhelper-perl all 13.24.1 [90.9 kB] Get: 36 http://deb.debian.org/debian trixie/main arm64 libtool all 2.5.4-3 [539 kB] Get: 37 http://deb.debian.org/debian trixie/main arm64 dh-autoreconf all 20 [17.1 kB] Get: 38 http://deb.debian.org/debian trixie/main arm64 libarchive-zip-perl all 1.68-1 [104 kB] Get: 39 http://deb.debian.org/debian trixie/main arm64 libfile-stripnondeterminism-perl all 1.14.1-2 [19.7 kB] Get: 40 http://deb.debian.org/debian trixie/main arm64 dh-strip-nondeterminism all 1.14.1-2 [8620 B] Get: 41 http://deb.debian.org/debian trixie/main arm64 libelf1t64 arm64 0.192-4 [189 kB] Get: 42 http://deb.debian.org/debian trixie/main arm64 dwz arm64 0.15-1+b1 [102 kB] Get: 43 http://deb.debian.org/debian trixie/main arm64 libunistring5 arm64 1.3-1 [449 kB] Get: 44 http://deb.debian.org/debian trixie/main arm64 libicu72 arm64 72.1-6 [9239 kB] Get: 45 http://deb.debian.org/debian trixie/main arm64 libxml2 arm64 2.12.7+dfsg+really2.9.14-0.2+b1 [630 kB] Get: 46 http://deb.debian.org/debian trixie/main arm64 gettext arm64 0.23.1-1 [1610 kB] Get: 47 http://deb.debian.org/debian trixie/main arm64 intltool-debian all 0.35.0+20060710.6 [22.9 kB] Get: 48 http://deb.debian.org/debian trixie/main arm64 po-debconf all 1.0.21+nmu1 [248 kB] Get: 49 http://deb.debian.org/debian trixie/main arm64 debhelper all 13.24.1 [920 kB] Get: 50 http://deb.debian.org/debian trixie/main arm64 dh-package-notes all 0.15 [6692 B] Get: 51 http://deb.debian.org/debian trixie/main arm64 libtcl8.6 arm64 8.6.16+dfsg-1 [984 kB] Get: 52 http://deb.debian.org/debian trixie/main arm64 tcl8.6 arm64 8.6.16+dfsg-1 [121 kB] Get: 53 http://deb.debian.org/debian trixie/main arm64 tcl-expect arm64 5.45.4-3+b1 [123 kB] Get: 54 http://deb.debian.org/debian trixie/main arm64 expect arm64 5.45.4-3+b1 [159 kB] Get: 55 http://deb.debian.org/debian trixie/main arm64 libidn2-0 arm64 2.3.7-2+b1 [127 kB] Get: 56 http://deb.debian.org/debian trixie/main arm64 libp11-kit0 arm64 0.25.5-3 [409 kB] Get: 57 http://deb.debian.org/debian trixie/main arm64 libtasn1-6 arm64 4.20.0-2 [47.3 kB] Get: 58 http://deb.debian.org/debian trixie/main arm64 libgnutls30t64 arm64 3.8.9-2 [1374 kB] Get: 59 http://deb.debian.org/debian trixie/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10+b1 [170 kB] Get: 60 http://deb.debian.org/debian trixie/main arm64 libunbound8 arm64 1.22.0-1+b1 [553 kB] Get: 61 http://deb.debian.org/debian trixie/main arm64 libgnutls-dane0t64 arm64 3.8.9-2 [452 kB] Get: 62 http://deb.debian.org/debian trixie/main arm64 gnutls-bin arm64 3.8.9-2 [673 kB] Get: 63 http://deb.debian.org/debian trixie/main arm64 libeac3 arm64 1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3 [48.1 kB] Get: 64 http://deb.debian.org/debian trixie/main arm64 libglib2.0-0t64 arm64 2.83.3-2 [1421 kB] Get: 65 http://deb.debian.org/debian trixie/main arm64 libnspr4 arm64 2:4.36-1 [102 kB] Get: 66 http://deb.debian.org/debian trixie/main arm64 libnspr4-dev arm64 2:4.36-1 [203 kB] Get: 67 http://deb.debian.org/debian trixie/main arm64 libnss3 arm64 2:3.107-1 [1289 kB] Get: 68 http://deb.debian.org/debian trixie/main arm64 libnss3-dev arm64 2:3.107-1 [250 kB] Get: 69 http://deb.debian.org/debian trixie/main arm64 libp11-kit-dev arm64 0.25.5-3 [208 kB] Get: 70 http://deb.debian.org/debian trixie/main arm64 libpkgconf3 arm64 1.8.1-4 [35.3 kB] Get: 71 http://deb.debian.org/debian trixie/main arm64 softhsm2-common arm64 2.6.1-2.2+b3 [12.4 kB] Get: 72 http://deb.debian.org/debian trixie/main arm64 libsofthsm2 arm64 2.6.1-2.2+b3 [218 kB] Get: 73 http://deb.debian.org/debian trixie/main arm64 libssl-dev arm64 3.4.0-2 [3234 kB] Get: 74 http://deb.debian.org/debian trixie/main arm64 libtommath1 arm64 1.3.0-1 [64.5 kB] Get: 75 http://deb.debian.org/debian trixie/main arm64 libtomcrypt1 arm64 1.18.2+dfsg-7+b2 [410 kB] Get: 76 http://deb.debian.org/debian trixie/main arm64 libstoken1t64 arm64 0.92-1.1+b2 [28.1 kB] Get: 77 http://deb.debian.org/debian trixie/main arm64 libtomcrypt-dev arm64 1.18.2+dfsg-7+b2 [1277 kB] Get: 78 http://deb.debian.org/debian trixie/main arm64 libstoken-dev arm64 0.92-1.1+b2 [8196 B] Get: 79 http://deb.debian.org/debian trixie/main arm64 ninja-build arm64 1.12.1-1+b1 [130 kB] Get: 80 http://deb.debian.org/debian trixie/main arm64 python3-autocommand all 2.2.2-3 [13.6 kB] Get: 81 http://deb.debian.org/debian trixie/main arm64 python3-more-itertools all 10.6.0-1 [65.3 kB] Get: 82 http://deb.debian.org/debian trixie/main arm64 python3-typing-extensions all 4.12.2-2 [73.0 kB] Get: 83 http://deb.debian.org/debian trixie/main arm64 python3-typeguard all 4.4.1-1 [37.0 kB] Get: 84 http://deb.debian.org/debian trixie/main arm64 python3-inflect all 7.3.1-2 [32.4 kB] Get: 85 http://deb.debian.org/debian trixie/main arm64 python3-jaraco.context all 6.0.0-1 [7984 B] Get: 86 http://deb.debian.org/debian trixie/main arm64 python3-jaraco.functools all 4.1.0-1 [12.0 kB] Get: 87 http://deb.debian.org/debian trixie/main arm64 python3-pkg-resources all 75.6.0-1 [222 kB] Get: 88 http://deb.debian.org/debian trixie/main arm64 python3-jaraco.text all 4.0.0-1 [11.4 kB] Get: 89 http://deb.debian.org/debian trixie/main arm64 python3-zipp all 3.21.0-1 [10.6 kB] Get: 90 http://deb.debian.org/debian trixie/main arm64 python3-setuptools all 75.6.0-1 [720 kB] Get: 91 http://deb.debian.org/debian trixie/main arm64 meson all 1.7.0-1 [639 kB] Get: 92 http://deb.debian.org/debian trixie/main arm64 opensc-pkcs11 arm64 0.26.0-1 [799 kB] Get: 93 http://deb.debian.org/debian trixie/main arm64 opensc arm64 0.26.0-1 [394 kB] Get: 94 http://deb.debian.org/debian trixie/main arm64 openssl arm64 3.4.0-2 [1385 kB] Get: 95 http://deb.debian.org/debian trixie/main arm64 p11-kit-modules arm64 0.25.5-3 [253 kB] Get: 96 http://deb.debian.org/debian trixie/main arm64 p11-kit arm64 0.25.5-3 [400 kB] Get: 97 http://deb.debian.org/debian trixie/main arm64 pkgconf-bin arm64 1.8.1-4 [29.6 kB] Get: 98 http://deb.debian.org/debian trixie/main arm64 pkgconf arm64 1.8.1-4 [26.1 kB] Get: 99 http://deb.debian.org/debian trixie/main arm64 softhsm2 arm64 2.6.1-2.2+b3 [152 kB] Fetched 46.7 MB in 0s (123 MB/s) Preconfiguring packages ... Selecting previously unselected package libpython3.13-minimal:arm64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19923 files and directories currently installed.) Preparing to unpack .../libpython3.13-minimal_3.13.2-1_arm64.deb ... Unpacking libpython3.13-minimal:arm64 (3.13.2-1) ... Selecting previously unselected package libexpat1:arm64. Preparing to unpack .../libexpat1_2.6.4-1_arm64.deb ... Unpacking libexpat1:arm64 (2.6.4-1) ... Selecting previously unselected package python3.13-minimal. Preparing to unpack .../python3.13-minimal_3.13.2-1_arm64.deb ... Unpacking python3.13-minimal (3.13.2-1) ... Setting up libpython3.13-minimal:arm64 (3.13.2-1) ... Setting up libexpat1:arm64 (2.6.4-1) ... Setting up python3.13-minimal (3.13.2-1) ... Selecting previously unselected package python3-minimal. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 20257 files and directories currently installed.) Preparing to unpack .../0-python3-minimal_3.13.1-2_arm64.deb ... Unpacking python3-minimal (3.13.1-2) ... Selecting previously unselected package media-types. Preparing to unpack .../1-media-types_10.1.0_all.deb ... Unpacking media-types (10.1.0) ... Selecting previously unselected package netbase. Preparing to unpack .../2-netbase_6.4_all.deb ... Unpacking netbase (6.4) ... Selecting previously unselected package tzdata. Preparing to unpack .../3-tzdata_2024b-6_all.deb ... Unpacking tzdata (2024b-6) ... Selecting previously unselected package libffi8:arm64. Preparing to unpack .../4-libffi8_3.4.7-1_arm64.deb ... Unpacking libffi8:arm64 (3.4.7-1) ... Selecting previously unselected package readline-common. Preparing to unpack .../5-readline-common_8.2-6_all.deb ... Unpacking readline-common (8.2-6) ... Selecting previously unselected package libreadline8t64:arm64. Preparing to unpack .../6-libreadline8t64_8.2-6_arm64.deb ... Adding 'diversion of /lib/aarch64-linux-gnu/libhistory.so.8 to /lib/aarch64-linux-gnu/libhistory.so.8.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/aarch64-linux-gnu/libhistory.so.8.2 to /lib/aarch64-linux-gnu/libhistory.so.8.2.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/aarch64-linux-gnu/libreadline.so.8 to /lib/aarch64-linux-gnu/libreadline.so.8.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/aarch64-linux-gnu/libreadline.so.8.2 to /lib/aarch64-linux-gnu/libreadline.so.8.2.usr-is-merged by libreadline8t64' Unpacking libreadline8t64:arm64 (8.2-6) ... Selecting previously unselected package libpython3.13-stdlib:arm64. Preparing to unpack .../7-libpython3.13-stdlib_3.13.2-1_arm64.deb ... Unpacking libpython3.13-stdlib:arm64 (3.13.2-1) ... Selecting previously unselected package python3.13. Preparing to unpack .../8-python3.13_3.13.2-1_arm64.deb ... Unpacking python3.13 (3.13.2-1) ... Selecting previously unselected package libpython3-stdlib:arm64. Preparing to unpack .../9-libpython3-stdlib_3.13.1-2_arm64.deb ... Unpacking libpython3-stdlib:arm64 (3.13.1-2) ... Setting up python3-minimal (3.13.1-2) ... Selecting previously unselected package python3. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 21267 files and directories currently installed.) Preparing to unpack .../00-python3_3.13.1-2_arm64.deb ... Unpacking python3 (3.13.1-2) ... Selecting previously unselected package libproc2-0:arm64. Preparing to unpack .../01-libproc2-0_2%3a4.0.4-7_arm64.deb ... Unpacking libproc2-0:arm64 (2:4.0.4-7) ... Selecting previously unselected package procps. Preparing to unpack .../02-procps_2%3a4.0.4-7_arm64.deb ... Unpacking procps (2:4.0.4-7) ... Selecting previously unselected package sensible-utils. Preparing to unpack .../03-sensible-utils_0.0.24_all.deb ... Unpacking sensible-utils (0.0.24) ... Selecting previously unselected package libmagic-mgc. Preparing to unpack .../04-libmagic-mgc_1%3a5.45-3+b1_arm64.deb ... Unpacking libmagic-mgc (1:5.45-3+b1) ... Selecting previously unselected package libmagic1t64:arm64. Preparing to unpack .../05-libmagic1t64_1%3a5.45-3+b1_arm64.deb ... Unpacking libmagic1t64:arm64 (1:5.45-3+b1) ... Selecting previously unselected package file. Preparing to unpack .../06-file_1%3a5.45-3+b1_arm64.deb ... Unpacking file (1:5.45-3+b1) ... Selecting previously unselected package gettext-base. Preparing to unpack .../07-gettext-base_0.23.1-1_arm64.deb ... Unpacking gettext-base (0.23.1-1) ... Selecting previously unselected package libuchardet0:arm64. Preparing to unpack .../08-libuchardet0_0.0.8-1+b2_arm64.deb ... Unpacking libuchardet0:arm64 (0.0.8-1+b2) ... Selecting previously unselected package groff-base. Preparing to unpack .../09-groff-base_1.23.0-7_arm64.deb ... Unpacking groff-base (1.23.0-7) ... Selecting previously unselected package bsdextrautils. Preparing to unpack .../10-bsdextrautils_2.40.4-3_arm64.deb ... Unpacking bsdextrautils (2.40.4-3) ... Selecting previously unselected package libpipeline1:arm64. Preparing to unpack .../11-libpipeline1_1.5.8-1_arm64.deb ... Unpacking libpipeline1:arm64 (1.5.8-1) ... Selecting previously unselected package man-db. Preparing to unpack .../12-man-db_2.13.0-1_arm64.deb ... Unpacking man-db (2.13.0-1) ... Selecting previously unselected package libtext-charwidth-perl:arm64. Preparing to unpack .../13-libtext-charwidth-perl_0.04-11+b4_arm64.deb ... Unpacking libtext-charwidth-perl:arm64 (0.04-11+b4) ... Selecting previously unselected package libtext-wrapi18n-perl. Preparing to unpack .../14-libtext-wrapi18n-perl_0.06-10_all.deb ... Unpacking libtext-wrapi18n-perl (0.06-10) ... Selecting previously unselected package ucf. Preparing to unpack .../15-ucf_3.0049_all.deb ... Moving old data out of the way Unpacking ucf (3.0049) ... Selecting previously unselected package m4. Preparing to unpack .../16-m4_1.4.19-5_arm64.deb ... Unpacking m4 (1.4.19-5) ... Selecting previously unselected package autoconf. Preparing to unpack .../17-autoconf_2.72-3_all.deb ... Unpacking autoconf (2.72-3) ... Selecting previously unselected package autotools-dev. Preparing to unpack .../18-autotools-dev_20220109.1_all.deb ... Unpacking autotools-dev (20220109.1) ... Selecting previously unselected package automake. Preparing to unpack .../19-automake_1%3a1.17-3_all.deb ... Unpacking automake (1:1.17-3) ... Selecting previously unselected package autopoint. Preparing to unpack .../20-autopoint_0.23.1-1_all.deb ... Unpacking autopoint (0.23.1-1) ... Selecting previously unselected package libdebhelper-perl. Preparing to unpack .../21-libdebhelper-perl_13.24.1_all.deb ... Unpacking libdebhelper-perl (13.24.1) ... Selecting previously unselected package libtool. Preparing to unpack .../22-libtool_2.5.4-3_all.deb ... Unpacking libtool (2.5.4-3) ... Selecting previously unselected package dh-autoreconf. Preparing to unpack .../23-dh-autoreconf_20_all.deb ... Unpacking dh-autoreconf (20) ... Selecting previously unselected package libarchive-zip-perl. Preparing to unpack .../24-libarchive-zip-perl_1.68-1_all.deb ... Unpacking libarchive-zip-perl (1.68-1) ... Selecting previously unselected package libfile-stripnondeterminism-perl. Preparing to unpack .../25-libfile-stripnondeterminism-perl_1.14.1-2_all.deb ... Unpacking libfile-stripnondeterminism-perl (1.14.1-2) ... Selecting previously unselected package dh-strip-nondeterminism. Preparing to unpack .../26-dh-strip-nondeterminism_1.14.1-2_all.deb ... Unpacking dh-strip-nondeterminism (1.14.1-2) ... Selecting previously unselected package libelf1t64:arm64. Preparing to unpack .../27-libelf1t64_0.192-4_arm64.deb ... Unpacking libelf1t64:arm64 (0.192-4) ... Selecting previously unselected package dwz. Preparing to unpack .../28-dwz_0.15-1+b1_arm64.deb ... Unpacking dwz (0.15-1+b1) ... Selecting previously unselected package libunistring5:arm64. Preparing to unpack .../29-libunistring5_1.3-1_arm64.deb ... Unpacking libunistring5:arm64 (1.3-1) ... Selecting previously unselected package libicu72:arm64. Preparing to unpack .../30-libicu72_72.1-6_arm64.deb ... Unpacking libicu72:arm64 (72.1-6) ... Selecting previously unselected package libxml2:arm64. Preparing to unpack .../31-libxml2_2.12.7+dfsg+really2.9.14-0.2+b1_arm64.deb ... Unpacking libxml2:arm64 (2.12.7+dfsg+really2.9.14-0.2+b1) ... Selecting previously unselected package gettext. Preparing to unpack .../32-gettext_0.23.1-1_arm64.deb ... Unpacking gettext (0.23.1-1) ... Selecting previously unselected package intltool-debian. Preparing to unpack .../33-intltool-debian_0.35.0+20060710.6_all.deb ... Unpacking intltool-debian (0.35.0+20060710.6) ... Selecting previously unselected package po-debconf. Preparing to unpack .../34-po-debconf_1.0.21+nmu1_all.deb ... Unpacking po-debconf (1.0.21+nmu1) ... Selecting previously unselected package debhelper. Preparing to unpack .../35-debhelper_13.24.1_all.deb ... Unpacking debhelper (13.24.1) ... Selecting previously unselected package dh-package-notes. Preparing to unpack .../36-dh-package-notes_0.15_all.deb ... Unpacking dh-package-notes (0.15) ... Selecting previously unselected package libtcl8.6:arm64. Preparing to unpack .../37-libtcl8.6_8.6.16+dfsg-1_arm64.deb ... Unpacking libtcl8.6:arm64 (8.6.16+dfsg-1) ... Selecting previously unselected package tcl8.6. Preparing to unpack .../38-tcl8.6_8.6.16+dfsg-1_arm64.deb ... Unpacking tcl8.6 (8.6.16+dfsg-1) ... Selecting previously unselected package tcl-expect:arm64. Preparing to unpack .../39-tcl-expect_5.45.4-3+b1_arm64.deb ... Unpacking tcl-expect:arm64 (5.45.4-3+b1) ... Selecting previously unselected package expect. Preparing to unpack .../40-expect_5.45.4-3+b1_arm64.deb ... Unpacking expect (5.45.4-3+b1) ... Selecting previously unselected package libidn2-0:arm64. Preparing to unpack .../41-libidn2-0_2.3.7-2+b1_arm64.deb ... Unpacking libidn2-0:arm64 (2.3.7-2+b1) ... Selecting previously unselected package libp11-kit0:arm64. Preparing to unpack .../42-libp11-kit0_0.25.5-3_arm64.deb ... Unpacking libp11-kit0:arm64 (0.25.5-3) ... Selecting previously unselected package libtasn1-6:arm64. Preparing to unpack .../43-libtasn1-6_4.20.0-2_arm64.deb ... Unpacking libtasn1-6:arm64 (4.20.0-2) ... Selecting previously unselected package libgnutls30t64:arm64. Preparing to unpack .../44-libgnutls30t64_3.8.9-2_arm64.deb ... Unpacking libgnutls30t64:arm64 (3.8.9-2) ... Selecting previously unselected package libevent-2.1-7t64:arm64. Preparing to unpack .../45-libevent-2.1-7t64_2.1.12-stable-10+b1_arm64.deb ... Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10+b1) ... Selecting previously unselected package libunbound8:arm64. Preparing to unpack .../46-libunbound8_1.22.0-1+b1_arm64.deb ... Unpacking libunbound8:arm64 (1.22.0-1+b1) ... Selecting previously unselected package libgnutls-dane0t64:arm64. Preparing to unpack .../47-libgnutls-dane0t64_3.8.9-2_arm64.deb ... Unpacking libgnutls-dane0t64:arm64 (3.8.9-2) ... Selecting previously unselected package gnutls-bin. Preparing to unpack .../48-gnutls-bin_3.8.9-2_arm64.deb ... Unpacking gnutls-bin (3.8.9-2) ... Selecting previously unselected package libeac3:arm64. Preparing to unpack .../49-libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3_arm64.deb ... Unpacking libeac3:arm64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ... Selecting previously unselected package libglib2.0-0t64:arm64. Preparing to unpack .../50-libglib2.0-0t64_2.83.3-2_arm64.deb ... Unpacking libglib2.0-0t64:arm64 (2.83.3-2) ... Selecting previously unselected package libnspr4:arm64. Preparing to unpack .../51-libnspr4_2%3a4.36-1_arm64.deb ... Unpacking libnspr4:arm64 (2:4.36-1) ... Selecting previously unselected package libnspr4-dev. Preparing to unpack .../52-libnspr4-dev_2%3a4.36-1_arm64.deb ... Unpacking libnspr4-dev (2:4.36-1) ... Selecting previously unselected package libnss3:arm64. Preparing to unpack .../53-libnss3_2%3a3.107-1_arm64.deb ... Unpacking libnss3:arm64 (2:3.107-1) ... Selecting previously unselected package libnss3-dev:arm64. Preparing to unpack .../54-libnss3-dev_2%3a3.107-1_arm64.deb ... Unpacking libnss3-dev:arm64 (2:3.107-1) ... Selecting previously unselected package libp11-kit-dev:arm64. Preparing to unpack .../55-libp11-kit-dev_0.25.5-3_arm64.deb ... Unpacking libp11-kit-dev:arm64 (0.25.5-3) ... Selecting previously unselected package libpkgconf3:arm64. Preparing to unpack .../56-libpkgconf3_1.8.1-4_arm64.deb ... Unpacking libpkgconf3:arm64 (1.8.1-4) ... Selecting previously unselected package softhsm2-common. Preparing to unpack .../57-softhsm2-common_2.6.1-2.2+b3_arm64.deb ... Unpacking softhsm2-common (2.6.1-2.2+b3) ... Selecting previously unselected package libsofthsm2. Preparing to unpack .../58-libsofthsm2_2.6.1-2.2+b3_arm64.deb ... Unpacking libsofthsm2 (2.6.1-2.2+b3) ... Selecting previously unselected package libssl-dev:arm64. Preparing to unpack .../59-libssl-dev_3.4.0-2_arm64.deb ... Unpacking libssl-dev:arm64 (3.4.0-2) ... Selecting previously unselected package libtommath1:arm64. Preparing to unpack .../60-libtommath1_1.3.0-1_arm64.deb ... Unpacking libtommath1:arm64 (1.3.0-1) ... Selecting previously unselected package libtomcrypt1:arm64. Preparing to unpack .../61-libtomcrypt1_1.18.2+dfsg-7+b2_arm64.deb ... Unpacking libtomcrypt1:arm64 (1.18.2+dfsg-7+b2) ... Selecting previously unselected package libstoken1t64:arm64. Preparing to unpack .../62-libstoken1t64_0.92-1.1+b2_arm64.deb ... Unpacking libstoken1t64:arm64 (0.92-1.1+b2) ... Selecting previously unselected package libtomcrypt-dev. Preparing to unpack .../63-libtomcrypt-dev_1.18.2+dfsg-7+b2_arm64.deb ... Unpacking libtomcrypt-dev (1.18.2+dfsg-7+b2) ... Selecting previously unselected package libstoken-dev:arm64. Preparing to unpack .../64-libstoken-dev_0.92-1.1+b2_arm64.deb ... Unpacking libstoken-dev:arm64 (0.92-1.1+b2) ... Selecting previously unselected package ninja-build. Preparing to unpack .../65-ninja-build_1.12.1-1+b1_arm64.deb ... Unpacking ninja-build (1.12.1-1+b1) ... Selecting previously unselected package python3-autocommand. Preparing to unpack .../66-python3-autocommand_2.2.2-3_all.deb ... Unpacking python3-autocommand (2.2.2-3) ... Selecting previously unselected package python3-more-itertools. Preparing to unpack .../67-python3-more-itertools_10.6.0-1_all.deb ... Unpacking python3-more-itertools (10.6.0-1) ... Selecting previously unselected package python3-typing-extensions. Preparing to unpack .../68-python3-typing-extensions_4.12.2-2_all.deb ... Unpacking python3-typing-extensions (4.12.2-2) ... Selecting previously unselected package python3-typeguard. Preparing to unpack .../69-python3-typeguard_4.4.1-1_all.deb ... Unpacking python3-typeguard (4.4.1-1) ... Selecting previously unselected package python3-inflect. Preparing to unpack .../70-python3-inflect_7.3.1-2_all.deb ... Unpacking python3-inflect (7.3.1-2) ... Selecting previously unselected package python3-jaraco.context. Preparing to unpack .../71-python3-jaraco.context_6.0.0-1_all.deb ... Unpacking python3-jaraco.context (6.0.0-1) ... Selecting previously unselected package python3-jaraco.functools. Preparing to unpack .../72-python3-jaraco.functools_4.1.0-1_all.deb ... Unpacking python3-jaraco.functools (4.1.0-1) ... Selecting previously unselected package python3-pkg-resources. Preparing to unpack .../73-python3-pkg-resources_75.6.0-1_all.deb ... Unpacking python3-pkg-resources (75.6.0-1) ... Selecting previously unselected package python3-jaraco.text. Preparing to unpack .../74-python3-jaraco.text_4.0.0-1_all.deb ... Unpacking python3-jaraco.text (4.0.0-1) ... Selecting previously unselected package python3-zipp. Preparing to unpack .../75-python3-zipp_3.21.0-1_all.deb ... Unpacking python3-zipp (3.21.0-1) ... Selecting previously unselected package python3-setuptools. Preparing to unpack .../76-python3-setuptools_75.6.0-1_all.deb ... Unpacking python3-setuptools (75.6.0-1) ... Selecting previously unselected package meson. Preparing to unpack .../77-meson_1.7.0-1_all.deb ... Unpacking meson (1.7.0-1) ... Selecting previously unselected package opensc-pkcs11:arm64. Preparing to unpack .../78-opensc-pkcs11_0.26.0-1_arm64.deb ... Unpacking opensc-pkcs11:arm64 (0.26.0-1) ... Selecting previously unselected package opensc. Preparing to unpack .../79-opensc_0.26.0-1_arm64.deb ... Unpacking opensc (0.26.0-1) ... Selecting previously unselected package openssl. Preparing to unpack .../80-openssl_3.4.0-2_arm64.deb ... Unpacking openssl (3.4.0-2) ... Selecting previously unselected package p11-kit-modules:arm64. Preparing to unpack .../81-p11-kit-modules_0.25.5-3_arm64.deb ... Unpacking p11-kit-modules:arm64 (0.25.5-3) ... Selecting previously unselected package p11-kit. Preparing to unpack .../82-p11-kit_0.25.5-3_arm64.deb ... Unpacking p11-kit (0.25.5-3) ... Selecting previously unselected package pkgconf-bin. Preparing to unpack .../83-pkgconf-bin_1.8.1-4_arm64.deb ... Unpacking pkgconf-bin (1.8.1-4) ... Selecting previously unselected package pkgconf:arm64. Preparing to unpack .../84-pkgconf_1.8.1-4_arm64.deb ... Unpacking pkgconf:arm64 (1.8.1-4) ... Selecting previously unselected package softhsm2. Preparing to unpack .../85-softhsm2_2.6.1-2.2+b3_arm64.deb ... Unpacking softhsm2 (2.6.1-2.2+b3) ... Setting up media-types (10.1.0) ... Setting up libpipeline1:arm64 (1.5.8-1) ... Setting up libtext-charwidth-perl:arm64 (0.04-11+b4) ... Setting up libicu72:arm64 (72.1-6) ... Setting up bsdextrautils (2.40.4-3) ... Setting up libmagic-mgc (1:5.45-3+b1) ... Setting up libarchive-zip-perl (1.68-1) ... Setting up libtommath1:arm64 (1.3.0-1) ... Setting up libdebhelper-perl (13.24.1) ... Setting up libmagic1t64:arm64 (1:5.45-3+b1) ... Setting up gettext-base (0.23.1-1) ... Setting up m4 (1.4.19-5) ... Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10+b1) ... Setting up file (1:5.45-3+b1) ... Setting up libtext-wrapi18n-perl (0.06-10) ... Setting up ninja-build (1.12.1-1+b1) ... Setting up libelf1t64:arm64 (0.192-4) ... Setting up libeac3:arm64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ... Setting up tzdata (2024b-6) ... Current default time zone: 'Etc/UTC' Local time is now: Mon Mar 23 10:49:16 UTC 2026. Universal Time is now: Mon Mar 23 10:49:16 UTC 2026. Run 'dpkg-reconfigure tzdata' if you wish to change it. Setting up autotools-dev (20220109.1) ... Setting up libunbound8:arm64 (1.22.0-1+b1) ... Setting up libpkgconf3:arm64 (1.8.1-4) ... Setting up libnspr4:arm64 (2:4.36-1) ... Setting up libproc2-0:arm64 (2:4.0.4-7) ... Setting up libunistring5:arm64 (1.3-1) ... Setting up libssl-dev:arm64 (3.4.0-2) ... Setting up libtcl8.6:arm64 (8.6.16+dfsg-1) ... Setting up autopoint (0.23.1-1) ... Setting up pkgconf-bin (1.8.1-4) ... Setting up autoconf (2.72-3) ... Setting up libffi8:arm64 (3.4.7-1) ... Setting up dwz (0.15-1+b1) ... Setting up sensible-utils (0.0.24) ... Setting up libuchardet0:arm64 (0.0.8-1+b2) ... Setting up procps (2:4.0.4-7) ... Setting up libtasn1-6:arm64 (4.20.0-2) ... Setting up netbase (6.4) ... Setting up openssl (3.4.0-2) ... Setting up readline-common (8.2-6) ... Setting up libxml2:arm64 (2.12.7+dfsg+really2.9.14-0.2+b1) ... Setting up libtomcrypt1:arm64 (1.18.2+dfsg-7+b2) ... Setting up automake (1:1.17-3) ... update-alternatives: using /usr/bin/automake-1.17 to provide /usr/bin/automake (automake) in auto mode Setting up libfile-stripnondeterminism-perl (1.14.1-2) ... Setting up libnspr4-dev (2:4.36-1) ... Setting up tcl8.6 (8.6.16+dfsg-1) ... Setting up gettext (0.23.1-1) ... Setting up libtool (2.5.4-3) ... Setting up tcl-expect:arm64 (5.45.4-3+b1) ... Setting up libidn2-0:arm64 (2.3.7-2+b1) ... Setting up libnss3:arm64 (2:3.107-1) ... Setting up pkgconf:arm64 (1.8.1-4) ... Setting up intltool-debian (0.35.0+20060710.6) ... Setting up libstoken1t64:arm64 (0.92-1.1+b2) ... Setting up dh-autoreconf (20) ... Setting up libtomcrypt-dev (1.18.2+dfsg-7+b2) ... Setting up libglib2.0-0t64:arm64 (2.83.3-2) ... No schema files found: doing nothing. Setting up libstoken-dev:arm64 (0.92-1.1+b2) ... Setting up libp11-kit0:arm64 (0.25.5-3) ... Setting up ucf (3.0049) ... Setting up libreadline8t64:arm64 (8.2-6) ... Setting up dh-strip-nondeterminism (1.14.1-2) ... Setting up libnss3-dev:arm64 (2:3.107-1) ... Setting up groff-base (1.23.0-7) ... Setting up libpython3.13-stdlib:arm64 (3.13.2-1) ... Setting up libp11-kit-dev:arm64 (0.25.5-3) ... Setting up libpython3-stdlib:arm64 (3.13.1-2) ... Setting up libgnutls30t64:arm64 (3.8.9-2) ... Setting up softhsm2-common (2.6.1-2.2+b3) ... Creating config file /etc/softhsm/softhsm2.conf with new version Setting up python3.13 (3.13.2-1) ... Setting up po-debconf (1.0.21+nmu1) ... Setting up expect (5.45.4-3+b1) ... Setting up python3 (3.13.1-2) ... Setting up python3-zipp (3.21.0-1) ... Setting up python3-autocommand (2.2.2-3) ... Setting up man-db (2.13.0-1) ... Not building database; man-db/auto-update is not 'true'. Setting up opensc-pkcs11:arm64 (0.26.0-1) ... Setting up p11-kit-modules:arm64 (0.25.5-3) ... Setting up libgnutls-dane0t64:arm64 (3.8.9-2) ... Setting up python3-typing-extensions (4.12.2-2) ... Setting up p11-kit (0.25.5-3) ... Setting up gnutls-bin (3.8.9-2) ... Setting up python3-more-itertools (10.6.0-1) ... Setting up libsofthsm2 (2.6.1-2.2+b3) ... Setting up softhsm2 (2.6.1-2.2+b3) ... Setting up python3-jaraco.functools (4.1.0-1) ... Setting up python3-jaraco.context (6.0.0-1) ... Setting up opensc (0.26.0-1) ... Setting up python3-typeguard (4.4.1-1) ... Setting up debhelper (13.24.1) ... Setting up python3-inflect (7.3.1-2) ... Setting up python3-jaraco.text (4.0.0-1) ... Setting up python3-pkg-resources (75.6.0-1) ... Setting up dh-package-notes (0.15) ... Setting up python3-setuptools (75.6.0-1) ... Setting up meson (1.7.0-1) ... Processing triggers for libc-bin (2.40-6) ... Reading package lists... Building dependency tree... Reading state information... Reading extended state information... Initializing package states... Writing extended state information... Building tag database... -> Finished parsing the build-deps I: Building the package I: Running cd /build/reproducible-path/pkcs11-provider-1.0/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../pkcs11-provider_1.0-1_source.changes dpkg-buildpackage: info: source package pkcs11-provider dpkg-buildpackage: info: source version 1.0-1 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Luca Boccassi dpkg-source --before-build . dpkg-buildpackage: info: host architecture arm64 debian/rules clean dh clean --buildsystem=meson dh_auto_clean -O--buildsystem=meson dh_autoreconf_clean -O--buildsystem=meson dh_clean -O--buildsystem=meson debian/rules binary dh binary --buildsystem=meson dh_update_autotools_config -O--buildsystem=meson dh_autoreconf -O--buildsystem=meson dh_auto_configure -O--buildsystem=meson cd obj-aarch64-linux-gnu && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 meson setup .. --wrap-mode=nodownload --buildtype=plain --prefix=/usr --sysconfdir=/etc --localstatedir=/var --libdir=lib/aarch64-linux-gnu -Dpython.bytecompile=-1 The Meson build system Version: 1.7.0 Source dir: /build/reproducible-path/pkcs11-provider-1.0 Build dir: /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu Build type: native build Project name: pkcs11-provider Project version: 1.0 C compiler for the host machine: cc (gcc 14.2.0 "cc (Debian 14.2.0-16) 14.2.0") C linker for the host machine: cc ld.bfd 2.44 Host machine cpu family: aarch64 Host machine cpu: aarch64 Compiler for C supports arguments -Wwrite-strings: YES Compiler for C supports arguments -Wpointer-arith: YES Compiler for C supports arguments -Wno-missing-field-initializers: YES Compiler for C supports arguments -Wformat: YES Compiler for C supports arguments -Wshadow: YES Compiler for C supports arguments -Wno-unused-parameter: YES Compiler for C supports arguments -Werror=implicit-function-declaration: YES Compiler for C supports arguments -Werror=missing-prototypes: YES Compiler for C supports arguments -Werror=format-security: YES Compiler for C supports arguments -Werror=parentheses: YES Compiler for C supports arguments -Werror=implicit: YES Compiler for C supports arguments -Werror=strict-prototypes: YES Compiler for C supports arguments -fno-strict-aliasing: YES Compiler for C supports arguments -fno-delete-null-pointer-checks: YES Compiler for C supports arguments -fdiagnostics-show-option: YES Found pkg-config: YES (/usr/bin/pkg-config) 1.8.1 Run-time dependency libcrypto found: YES 3.4.0 Run-time dependency libssl found: YES 3.4.0 Run-time dependency p11-kit-1 found: YES 0.25.5 Has header "dlfcn.h" : YES Configuring config.h using configuration Compiler for C supports link arguments -Wl,--version-script,/build/reproducible-path/pkcs11-provider-1.0/src/provider.map: YES Did not find CMake 'cmake' Found CMake: NO Run-time dependency nss-softokn found: NO (tried pkgconfig and cmake) Run-time dependency nss found: YES 3.107 Program setup.sh found: YES (/build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh) Program valgrind found: NO Program test-wrapper found: YES (/build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper) Build targets in project: 12 pkcs11-provider 1.0 User defined options buildtype : plain libdir : lib/aarch64-linux-gnu localstatedir : /var prefix : /usr python.bytecompile: -1 sysconfdir : /etc wrap_mode : nodownload Found ninja-1.12.1 at /usr/bin/ninja dh_auto_build -O--buildsystem=meson cd obj-aarch64-linux-gnu && LC_ALL=C.UTF-8 ninja -j12 -v [1/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/pk11_uri.c.o -MF src/pkcs11.so.p/pk11_uri.c.o.d -o src/pkcs11.so.p/pk11_uri.c.o -c ../src/pk11_uri.c [2/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/debug.c.o -MF src/pkcs11.so.p/debug.c.o.d -o src/pkcs11.so.p/debug.c.o -c ../src/debug.c [3/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/decoder.c.o -MF src/pkcs11.so.p/decoder.c.o.d -o src/pkcs11.so.p/decoder.c.o -c ../src/decoder.c [4/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/digests.c.o -MF src/pkcs11.so.p/digests.c.o.d -o src/pkcs11.so.p/digests.c.o -c ../src/digests.c [5/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/asymmetric_cipher.c.o -MF src/pkcs11.so.p/asymmetric_cipher.c.o.d -o src/pkcs11.so.p/asymmetric_cipher.c.o -c ../src/asymmetric_cipher.c [6/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/exchange.c.o -MF src/pkcs11.so.p/exchange.c.o.d -o src/pkcs11.so.p/exchange.c.o -c ../src/exchange.c [7/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/kdf.c.o -MF src/pkcs11.so.p/kdf.c.o.d -o src/pkcs11.so.p/kdf.c.o -c ../src/kdf.c [8/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/random.c.o -MF src/pkcs11.so.p/random.c.o.d -o src/pkcs11.so.p/random.c.o -c ../src/random.c [9/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/encoder.c.o -MF src/pkcs11.so.p/encoder.c.o.d -o src/pkcs11.so.p/encoder.c.o -c ../src/encoder.c [10/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/tls.c.o -MF src/pkcs11.so.p/tls.c.o.d -o src/pkcs11.so.p/tls.c.o -c ../src/tls.c [11/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/slot.c.o -MF src/pkcs11.so.p/slot.c.o.d -o src/pkcs11.so.p/slot.c.o -c ../src/slot.c [12/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/store.c.o -MF src/pkcs11.so.p/store.c.o.d -o src/pkcs11.so.p/store.c.o -c ../src/store.c [13/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/session.c.o -MF src/pkcs11.so.p/session.c.o.d -o src/pkcs11.so.p/session.c.o -c ../src/session.c [14/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/keymgmt.c.o -MF src/pkcs11.so.p/keymgmt.c.o.d -o src/pkcs11.so.p/keymgmt.c.o -c ../src/keymgmt.c [15/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/interface.c.o -MF src/pkcs11.so.p/interface.c.o.d -o src/pkcs11.so.p/interface.c.o -c ../src/interface.c [16/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/util.c.o -MF src/pkcs11.so.p/util.c.o.d -o src/pkcs11.so.p/util.c.o -c ../src/util.c [17/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/signature.c.o -MF src/pkcs11.so.p/signature.c.o.d -o src/pkcs11.so.p/signature.c.o -c ../src/signature.c [18/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/objects.c.o -MF src/pkcs11.so.p/objects.c.o.d -o src/pkcs11.so.p/objects.c.o -c ../src/objects.c [19/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/provider.c.o -MF src/pkcs11.so.p/provider.c.o.d -o src/pkcs11.so.p/provider.c.o -c ../src/provider.c [20/20] cc -o src/pkcs11.so src/pkcs11.so.p/asymmetric_cipher.c.o src/pkcs11.so.p/debug.c.o src/pkcs11.so.p/encoder.c.o src/pkcs11.so.p/decoder.c.o src/pkcs11.so.p/digests.c.o src/pkcs11.so.p/exchange.c.o src/pkcs11.so.p/kdf.c.o src/pkcs11.so.p/keymgmt.c.o src/pkcs11.so.p/pk11_uri.c.o src/pkcs11.so.p/interface.c.o src/pkcs11.so.p/objects.c.o src/pkcs11.so.p/provider.c.o src/pkcs11.so.p/random.c.o src/pkcs11.so.p/session.c.o src/pkcs11.so.p/signature.c.o src/pkcs11.so.p/slot.c.o src/pkcs11.so.p/store.c.o src/pkcs11.so.p/tls.c.o src/pkcs11.so.p/util.c.o -Wl,--as-needed -Wl,--allow-shlib-undefined -shared -fPIC -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--version-script,/build/reproducible-path/pkcs11-provider-1.0/src/provider.map /usr/lib/aarch64-linux-gnu/libcrypto.so dh_auto_test -O--buildsystem=meson cd obj-aarch64-linux-gnu && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 MESON_TESTTHREADS=12 meson test --verbose ninja: Entering directory `/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu' [1/29] Compiling C object tests/tsession.p/tsession.c.o [2/29] Compiling C object tests/tdigests.p/tdigests.c.o [3/29] Compiling C object tests/tlssetkey.p/tlssetkey.c.o [4/29] Compiling C object tests/tcmpkeys.p/tcmpkeys.c.o [5/29] Compiling C object tests/tlsctx.p/util.c.o [6/29] Compiling C object tests/treadkeys.p/treadkeys.c.o [7/29] Compiling C object tests/tpkey.p/tpkey.c.o [8/29] Compiling C object tests/tlsctx.p/tlsctx.c.o [9/29] Compiling C object tests/tgenkey.p/util.c.o [10/29] Compiling C object tests/tcmpkeys.p/util.c.o [11/29] Compiling C object tests/ccerts.p/ccerts.c.o [12/29] Linking target tests/treadkeys [13/29] Compiling C object tests/pincache.p/pincache.c.o [14/29] Compiling C object tests/tlssetkey.p/util.c.o [15/29] Compiling C object tests/tfork.p/tfork.c.o [16/29] Linking target tests/tdigests [17/29] Linking target tests/tsession [18/29] Compiling C object tests/tpkey.p/util.c.o [19/29] Compiling C object tests/tfork.p/util.c.o [20/29] Compiling C object tests/tgenkey.p/tgenkey.c.o [21/29] Linking target tests/tlsctx [22/29] Linking target tests/tcmpkeys [23/29] Linking target tests/pincache [24/29] Linking target tests/tlssetkey [25/29] Compiling C object tests/ccerts.p/util.c.o [26/29] Linking target tests/tfork [27/29] Linking target tests/tpkey [28/29] Linking target tests/tgenkey [29/29] Linking target tests/ccerts 1/92 pkcs11-provider:softokn / setup RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 SHARED_EXT=.so LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src MALLOC_PERTURB_=223 SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softokn ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests ++ helper_emit=1 ++ grep -q 'GNU sed' ++ sed --version ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=softokn + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' softokn == softhsm ']' + '[' softokn == softokn ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/softokn-init.sh ++ title SECTION 'Setup NSS Softokn' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Setup NSS Softokn' ++ echo '' ++ command -v certutil ++ echo 'NSS'\''s certutil command is required' ++ exit 0 ######################################## ## Setup NSS Softokn NSS's certutil command is required ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 1/92 pkcs11-provider:softokn / setup OK 0.17s 2/92 pkcs11-provider:softhsm / setup RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 SHARED_EXT=.so MALLOC_PERTURB_=31 LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softhsm ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=softhsm + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' softhsm == softhsm ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/softhsm-init.sh ++ title SECTION 'Searching for SoftHSM PKCS#11 library' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Searching for SoftHSM PKCS#11 library' ++ echo '' ++ command -v softhsm2-util ######################################## ## Searching for SoftHSM PKCS#11 library +++++ type -p softhsm2-util ++++ dirname /usr/bin/softhsm2-util +++ dirname /usr/bin ++ softhsm_prefix=/usr ++ find_softhsm /usr/lib64/softhsm/libsofthsm2.so /usr/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/local/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ++ for _lib in "$@" ++ test -f /usr/lib64/softhsm/libsofthsm2.so ++ for _lib in "$@" ++ test -f /usr/lib/softhsm/libsofthsm2.so ++ echo 'Using softhsm path /usr/lib/softhsm/libsofthsm2.so' ++ P11LIB=/usr/lib/softhsm/libsofthsm2.so ++ return ++ export P11LIB ++ title SECTION 'Set up testing system' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Set up testing system' ++ echo '' ++ cat Using softhsm path /usr/lib/softhsm/libsofthsm2.so ######################################## ## Set up testing system ++ export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf ++ SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf ++ export 'TOKENLABEL=SoftHSM Token' ++ TOKENLABEL='SoftHSM Token' ++ export TOKENLABELURI=SoftHSM%20Token ++ TOKENLABELURI=SoftHSM%20Token ++ softhsm2-util --init-token --label 'SoftHSM Token' --free --pin 12345678 --so-pin 12345678 Slot 0 has a free/uninitialized token. The token has been initialized and is reassigned to slot 576291950 ++ export 'TOKENOPTIONS=\npkcs11-module-quirks = no-deinit no-operation-state' ++ TOKENOPTIONS='\npkcs11-module-quirks = no-deinit no-operation-state' ++ export 'TOKENCONFIGVARS=export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf' ++ TOKENCONFIGVARS='export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf' ++ export TESTPORT=32000 ++ TESTPORT=32000 ++ export SUPPORT_ALLOWED_MECHANISMS=1 ++ SUPPORT_ALLOWED_MECHANISMS=1 + SEEDFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/noisefile.bin + dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/noisefile.bin bs=2048 count=1 + RAND64FILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/64krandom.bin + dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/64krandom.bin bs=2048 count=32 ++ uname + '[' Linux == Darwin ']' ++ type -p certtool + certtool=/usr/bin/certtool + '[' -z /usr/bin/certtool ']' + P11DEFARGS=("--module=${P11LIB}" "--login" "--pin=${PINVALUE}" "--token-label=${TOKENLABEL}") + cat + SERIAL=1 + title LINE 'Creating new Self Sign CA' + case "$1" in + shift 1 + echo 'Creating new Self Sign CA' + KEYID=0000 + URIKEYID=%00%00 + CACRTN=caCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=caCert --id=0000 Creating new Self Sign CA Key pair generated: Private Key Object; RSA label: caCert ID: 0000 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=private Public Key Object; RSA 2048 bits label: caCert ID: 0000 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=public + crt_selfsign caCert Issuer 0000 + LABEL=caCert + CN=Issuer + KEYID=0000 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = Issuer|g' -e 's|serial = .*|serial = 2|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg + /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=public' --outder Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 02 Validity: Not Before: Mon Mar 23 10:50:02 UTC 2026 Not After: Tue Mar 23 10:50:02 UTC 2027 Subject: CN=Issuer Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:b1:61:4f:c5:83:05:ee:0f:de:54:5e:51:e4:a7:58 2b:a5:26:30:39:43:13:10:f3:bc:a3:b6:84:1a:0e:c2 79:f5:4d:ec:2d:8d:56:08:04:85:38:b6:ed:fd:6e:1d 28:dc:0e:4d:65:2e:12:c1:9b:ff:db:83:cd:e6:d1:79 7e:1c:ea:22:8b:05:a9:97:8a:dc:4f:24:1d:3a:75:51 5c:ee:10:5b:0f:5b:5a:2b:c1:64:0e:5f:4a:35:6d:1a 07:0b:b7:8a:c3:7c:aa:c5:68:99:75:71:e8:18:11:f5 b3:15:b9:13:53:a7:62:3f:d7:2b:66:38:ce:25:d7:16 f3:35:3e:47:19:ea:c1:74:c3:f2:dc:0c:45:19:03:ae 32:02:63:ce:bd:0b:93:66:23:03:c3:6c:72:52:39:dd e6:5d:fb:f3:d8:56:e5:cb:1f:94:2c:43:3d:b3:ad:4a fe:ef:bd:e8:8e:59:91:2a:fc:6c:b7:ff:7d:76:a7:77 76:c5:ff:2e:2a:65:28:73:dc:ae:22:6c:1e:8b:ea:c3 a7:88:3c:f4:25:1e:5a:da:0f:49:68:15:a9:2e:20:b7 b0:7d:4c:f2:87:76:c2:9e:47:c3:95:e0:e2:6b:72:8a e3:b0:c8:a9:d7:9f:28:b3:6d:78:f0:5f:05:a0:c2:89 0f Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Certificate signing. Subject Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:64e304a56ab2514967dc59f4f0d7035e89b33c89 sha256:2114568dcf452580d1c04e30e59cf7ebee543423ee2ee382859a73ef0c792e32 Public Key PIN: pin-sha256:IRRWjc9FJYDRwE4w5Zz36+5UNCPuLuOChZpz7wx5LjI= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --type=cert --id=0000 --label=caCert Created certificate: Certificate Object; type = X.509 cert label: caCert subject: DN: CN=Issuer serial: 02 ID: 0000 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert + CACRT_PEM=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem + CACRT=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt + openssl x509 -inform DER -in /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt -outform PEM -out /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem + CABASEURIWITHPINVALUE='pkcs11:id=%00%00?pin-value=12345678' + CABASEURIWITHPINSOURCE='pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + CABASEURI=pkcs11:id=%00%00 + CAPUBURI='pkcs11:type=public;id=%00%00' + CAPRIURI='pkcs11:type=private;id=%00%00' + CACRTURI='pkcs11:type=cert;object=caCert' + title LINE 'RSA PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA PKCS11 URIS' + echo 'pkcs11:id=%00%00?pin-value=12345678' + echo 'pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%00 + echo 'pkcs11:type=public;id=%00%00' + echo 'pkcs11:type=private;id=%00%00' + echo 'pkcs11:type=cert;object=caCert' + echo '' + cat /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg RSA PKCS11 URIS pkcs11:id=%00%00?pin-value=12345678 pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%00 pkcs11:type=public;id=%00%00 pkcs11:type=private;id=%00%00 pkcs11:type=cert;object=caCert + echo 'organization = "PKCS11 Provider"' + sed -e '/^cert_signing_key$/d' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + KEYID=0001 + URIKEYID=%00%01 + TSTCRTN=testCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert --id=0001 Key pair generated: Private Key Object; RSA label: testCert ID: 0001 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=private Public Key Object; RSA 2048 bits label: testCert ID: 0001 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=public + ca_sign testCert 'My Test Cert' 0001 + LABEL=testCert + CN='My Test Cert' + KEYID=0001 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Test Cert|g' -e 's|serial = .*|serial = 3|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Mon Mar 22 22:50:03 2027 CA expiration time: Mon Mar 22 22:50:02 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 03 Validity: Not Before: Mon Mar 23 10:50:03 UTC 2026 Not After: Tue Mar 23 10:50:03 UTC 2027 Subject: CN=My Test Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:c9:a1:92:0e:78:39:ca:3d:b9:03:e5:1a:c7:a2:66 69:32:23:e2:de:61:06:96:f7:bc:58:dd:af:e9:ae:ee 6c:e1:0c:2b:80:26:a8:6f:ca:f4:61:c9:51:72:26:da 79:c2:d9:e2:e8:3a:f2:1a:0a:62:eb:53:90:0c:2a:a8 ff:a1:a2:48:92:8b:5d:48:06:ce:9f:bc:6b:ee:85:49 8c:d5:ba:a6:5f:a0:f9:28:3d:a6:ef:17:45:38:92:32 c1:2d:86:a7:bf:6a:0d:58:dc:5c:35:7c:94:9b:5f:a9 d8:89:5f:86:68:e5:49:14:7d:64:76:74:8c:be:d9:c1 03:81:a3:45:80:40:65:7c:a2:95:4c:78:38:da:e1:09 87:6e:e0:6e:5d:cb:5e:4e:9d:24:55:07:a4:78:13:c2 c8:e1:e1:e8:f6:fa:11:03:24:bc:d7:8a:b7:62:a2:7a a8:f5:40:f3:14:c9:af:f9:76:00:af:73:e1:79:49:93 e1:8e:15:c5:e3:3a:ef:9e:8f:63:41:aa:cf:94:7f:0b 20:79:4f:fb:01:13:62:d9:64:13:01:29:c0:52:77:1c 5d:85:fa:24:85:ab:da:a6:74:ad:b0:5f:48:fe:03:72 8d:ae:69:c9:da:7b:84:d1:16:ff:12:ca:11:7a:07:ae ab Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): 86eb59b538d367ebf9a5878c798f47c7d8bed8e0 Authority Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:86eb59b538d367ebf9a5878c798f47c7d8bed8e0 sha256:f5fde55e92f2d51d2aa8320437ede9e3301c8e6cfdd8f64b02b69a7f5dfef503 Public Key PIN: pin-sha256:9f3lXpLy1R0qqDIEN+3p4zAcjmz92PZLAraaf13+9QM= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert.crt --type=cert --id=0001 --label=testCert Created certificate: Certificate Object; type = X.509 cert label: testCert subject: DN: O=PKCS11 Provider, CN=My Test Cert serial: 03 ID: 0001 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert RSA PKCS11 URIS pkcs11:id=%00%01?pin-value=12345678 pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%01 pkcs11:type=public;id=%00%01 pkcs11:type=private;id=%00%01 pkcs11:type=cert;object=testCert + BASEURIWITHPINVALUE='pkcs11:id=%00%01?pin-value=12345678' + BASEURIWITHPINSOURCE='pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + BASEURI=pkcs11:id=%00%01 + PUBURI='pkcs11:type=public;id=%00%01' + PRIURI='pkcs11:type=private;id=%00%01' + CRTURI='pkcs11:type=cert;object=testCert' + title LINE 'RSA PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA PKCS11 URIS' + echo 'pkcs11:id=%00%01?pin-value=12345678' + echo 'pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%01 + echo 'pkcs11:type=public;id=%00%01' + echo 'pkcs11:type=private;id=%00%01' + echo 'pkcs11:type=cert;object=testCert' + echo '' + KEYID=0002 + URIKEYID=%00%02 + ECCRTN=ecCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecCert --id=0002 Key pair generated: Private Key Object; EC label: ecCert ID: 0002 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private Public Key Object; EC EC_POINT 256 bits EC_POINT: 044104305860d036925c61c5d7c1734aa021145aaa5d4562214244bff714bf32896046b5f9b6c3741eceffeb30a47fdf99a78c49a4a916ebe7a6dcd53321b0acdbbdc7 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecCert ID: 0002 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public + ca_sign ecCert 'My EC Cert' 0002 + LABEL=ecCert + CN='My EC Cert' + KEYID=0002 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert|g' -e 's|serial = .*|serial = 4|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Mon Mar 22 22:50:03 2027 CA expiration time: Mon Mar 22 22:50:02 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 04 Validity: Not Before: Mon Mar 23 10:50:03 UTC 2026 Not After: Tue Mar 23 10:50:03 UTC 2027 Subject: CN=My EC Cert,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: 30:58:60:d0:36:92:5c:61:c5:d7:c1:73:4a:a0:21:14 5a:aa:5d:45:62:21:42:44:bf:f7:14:bf:32:89:60:46 Y: 00:b5:f9:b6:c3:74:1e:ce:ff:eb:30:a4:7f:df:99:a7 8c:49:a4:a9:16:eb:e7:a6:dc:d5:33:21:b0:ac:db:bd c7 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 7c933f4ef94dbbc667d06feebe48dbce2d7cae82 Authority Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:7c933f4ef94dbbc667d06feebe48dbce2d7cae82 sha256:b779e1f13e7e9bfc96a9693deb62eff671b003e81d626e8d777f0b9ecc026f11 Public Key PIN: pin-sha256:t3nh8T5+m/yWqWk962Lv9nGwA+gdYm6Nd38LnswCbxE= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert.crt --type=cert --id=0002 --label=ecCert Created certificate: Certificate Object; type = X.509 cert label: ecCert subject: DN: O=PKCS11 Provider, CN=My EC Cert serial: 04 ID: 0002 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert + ECBASEURIWITHPINVALUE='pkcs11:id=%00%02?pin-value=12345678' + ECBASEURIWITHPINSOURCE='pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ECBASEURI=pkcs11:id=%00%02 + ECPUBURI='pkcs11:type=public;id=%00%02' + ECPRIURI='pkcs11:type=private;id=%00%02' + ECCRTURI='pkcs11:type=cert;object=ecCert' + KEYID=0003 + URIKEYID=%00%03 + ECPEERCRTN=ecPeerCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecPeerCert --id=0003 Key pair generated: Private Key Object; EC label: ecPeerCert ID: 0003 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private Public Key Object; EC EC_POINT 256 bits EC_POINT: 044104e3143bf6e8d9112ac816c42dda653429746b7dc2e41e32e8e09b9ac9cc8b6d97ff6be05e1db5be8f741c98805e58245eeb3fae3739db63614055ab60db3e22ac EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecPeerCert ID: 0003 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public + crt_selfsign ecPeerCert 'My Peer EC Cert' 0003 + LABEL=ecPeerCert + CN='My Peer EC Cert' + KEYID=0003 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Peer EC Cert|g' -e 's|serial = .*|serial = 5|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg + /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecPeerCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=public' --outder Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 05 Validity: Not Before: Mon Mar 23 10:50:03 UTC 2026 Not After: Tue Mar 23 10:50:03 UTC 2027 Subject: CN=My Peer EC Cert Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: 00:e3:14:3b:f6:e8:d9:11:2a:c8:16:c4:2d:da:65:34 29:74:6b:7d:c2:e4:1e:32:e8:e0:9b:9a:c9:cc:8b:6d 97 Y: 00:ff:6b:e0:5e:1d:b5:be:8f:74:1c:98:80:5e:58:24 5e:eb:3f:ae:37:39:db:63:61:40:55:ab:60:db:3e:22 ac Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Certificate signing. Subject Key Identifier (not critical): 5d6dc27a5d71c08f9edc93fb50fceff3da070669 Other Information: Public Key ID: sha1:5d6dc27a5d71c08f9edc93fb50fceff3da070669 sha256:eb5fc7999f2e27b798722ecdd5ea99b016ceb62fd9abef2f53a72c666d999112 Public Key PIN: pin-sha256:61/HmZ8uJ7eYci7N1eqZsBbOti/Zq+8vU6csZm2ZkRI= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecPeerCert.crt --type=cert --id=0003 --label=ecPeerCert Created certificate: Certificate Object; type = X.509 cert label: ecPeerCert subject: DN: CN=My Peer EC Cert serial: 05 ID: 0003 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert + ECPEERBASEURIWITHPINVALUE='pkcs11:id=%00%03?pin-value=12345678' + ECPEERBASEURIWITHPINSOURCE='pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ECPEERBASEURI=pkcs11:id=%00%03 + ECPEERPUBURI='pkcs11:type=public;id=%00%03' + ECPEERPRIURI='pkcs11:type=private;id=%00%03' + ECPEERCRTURI='pkcs11:type=cert;object=ecPeerCert' + title LINE 'EC PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC PKCS11 URIS' + echo 'pkcs11:id=%00%02?pin-value=12345678' + echo 'pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%02 + echo 'pkcs11:type=public;id=%00%02' + echo 'pkcs11:type=private;id=%00%02' + echo 'pkcs11:type=cert;object=ecCert' + echo 'pkcs11:id=%00%03?pin-value=12345678' + echo 'pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%03 + echo 'pkcs11:type=public;id=%00%03' + echo 'pkcs11:type=private;id=%00%03' + echo 'pkcs11:type=cert;object=ecPeerCert' + echo '' + '[' 1 -eq 1 ']' + KEYID=0004 + URIKEYID=%00%04 + EDCRTN=edCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:edwards25519 --label=edCert --id=0004 EC PKCS11 URIS pkcs11:id=%00%02?pin-value=12345678 pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%02 pkcs11:type=public;id=%00%02 pkcs11:type=private;id=%00%02 pkcs11:type=cert;object=ecCert pkcs11:id=%00%03?pin-value=12345678 pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%03 pkcs11:type=public;id=%00%03 pkcs11:type=private;id=%00%03 pkcs11:type=cert;object=ecPeerCert Key pair generated: Private Key Object; EC_EDWARDS label: edCert ID: 0004 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=private Public Key Object; EC_EDWARDS EC_POINT 272 bits EC_POINT: 042040d62083bf5aba84da330314d8c966c0243ef103f7883b3f4ea80c3deebb8a96 EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) label: edCert ID: 0004 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=public + ca_sign edCert 'My ED25519 Cert' 0004 + LABEL=edCert + CN='My ED25519 Cert' + KEYID=0004 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My ED25519 Cert|g' -e 's|serial = .*|serial = 6|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/edCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Mon Mar 22 22:50:03 2027 CA expiration time: Mon Mar 22 22:50:02 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 06 Validity: Not Before: Mon Mar 23 10:50:03 UTC 2026 Not After: Tue Mar 23 10:50:03 UTC 2027 Subject: CN=My ED25519 Cert,O=PKCS11 Provider Subject Public Key Algorithm: EdDSA (Ed25519) Algorithm Security Level: High (256 bits) Curve: Ed25519 X: 40:d6:20:83:bf:5a:ba:84:da:33:03:14:d8:c9:66:c0 24:3e:f1:03:f7:88:3b:3f:4e:a8:0c:3d:ee:bb:8a:96 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 643c9c3dd50a7a4d1dcaab030d0f6202ad51f0b4 Authority Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:643c9c3dd50a7a4d1dcaab030d0f6202ad51f0b4 sha256:902057f8864bb92becef5eca392774ea73236becbc58ce4b165476b2389fed78 Public Key PIN: pin-sha256:kCBX+IZLuSvs717KOSd06nMja+y8WM5LFlR2sjif7Xg= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/edCert.crt --type=cert --id=0004 --label=edCert Created certificate: Certificate Object; type = X.509 cert label: edCert subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert serial: 06 ID: 0004 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert + EDBASEURIWITHPINVALUE='pkcs11:id=%00%04;pin-value=12345678' + EDBASEURIWITHPINSOURCE='pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + EDBASEURI=pkcs11:id=%00%04 + EDPUBURI='pkcs11:type=public;id=%00%04' + EDPRIURI='pkcs11:type=private;id=%00%04' + EDCRTURI='pkcs11:type=cert;object=edCert' + title LINE 'ED25519 PKCS11 URIS' + case "$1" in + shift 1 + echo 'ED25519 PKCS11 URIS' + echo 'pkcs11:id=%00%04;pin-value=12345678' + echo 'pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%04 + echo 'pkcs11:type=public;id=%00%04' + echo 'pkcs11:type=private;id=%00%04' + echo 'pkcs11:type=cert;object=edCert' + '[' 1 -eq 1 ']' + KEYID=0009 + URIKEYID=%00%09 + ED2CRTN=ed2Cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:Ed448 --label=ed2Cert --id=0009 ED25519 PKCS11 URIS pkcs11:id=%00%04;pin-value=12345678 pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%04 pkcs11:type=public;id=%00%04 pkcs11:type=private;id=%00%04 pkcs11:type=cert;object=edCert Key pair generated: Private Key Object; EC_EDWARDS label: ed2Cert ID: 0009 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private Public Key Object; EC_EDWARDS EC_POINT 472 bits EC_POINT: 04393441a7d2d9d2d8562d467ca8c876381a2a48c703821afe59bf36cde5f4bbcacfac7cb9553ef741e12b308bab9e0b49ba4dbdbe2a5ea43f9000 EC_PARAMS: 06032b6571 (OID 1.3.101.113) label: ed2Cert ID: 0009 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public + ca_sign ed2Cert 'My ED448 Cert' 0009 + LABEL=ed2Cert + CN='My ED448 Cert' + KEYID=0009 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My ED448 Cert|g' -e 's|serial = .*|serial = 7|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ed2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Mon Mar 22 22:50:04 2027 CA expiration time: Mon Mar 22 22:50:02 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 07 Validity: Not Before: Mon Mar 23 10:50:04 UTC 2026 Not After: Tue Mar 23 10:50:04 UTC 2027 Subject: CN=My ED448 Cert,O=PKCS11 Provider Subject Public Key Algorithm: EdDSA (Ed448) Algorithm Security Level: Ultra (456 bits) Curve: Ed448 X: 34:41:a7:d2:d9:d2:d8:56:2d:46:7c:a8:c8:76:38:1a 2a:48:c7:03:82:1a:fe:59:bf:36:cd:e5:f4:bb:ca:cf ac:7c:b9:55:3e:f7:41:e1:2b:30:8b:ab:9e:0b:49:ba 4d:bd:be:2a:5e:a4:3f:90:00 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 9e7a85bb609d3f595404cbfff56384c4d6a4b460 Authority Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:9e7a85bb609d3f595404cbfff56384c4d6a4b460 sha256:ff474d7b8cef34d4d6ab51e043f079189330e26f53325133a14286b7559df64f Public Key PIN: pin-sha256:/0dNe4zvNNTWq1HgQ/B5GJMw4m9TMlEzoUKGt1Wd9k8= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ed2Cert.crt --type=cert --id=0009 --label=ed2Cert Created certificate: Certificate Object; type = X.509 cert label: ed2Cert subject: DN: O=PKCS11 Provider, CN=My ED448 Cert serial: 07 ID: 0009 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert + ED2BASEURIWITHPINVALUE='pkcs11:id=%00%09;pin-value=12345678' + ED2BASEURIWITHPINSOURCE='pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ED2BASEURI=pkcs11:id=%00%09 + ED2PUBURI='pkcs11:type=public;id=%00%09' + ED2PRIURI='pkcs11:type=private;id=%00%09' + ED2CRTURI='pkcs11:type=cert;object=ed2Cert' + title LINE 'ED448 PKCS11 URIS' + case "$1" in + shift 1 + echo 'ED448 PKCS11 URIS' + echo 'pkcs11:id=%00%09;pin-value=12345678' + echo 'pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%09 + echo 'pkcs11:type=public;id=%00%09' + echo 'pkcs11:type=private;id=%00%09' + echo 'pkcs11:type=cert;object=ed2Cert' + title PARA 'generate RSA key pair, self-signed certificate, remove public key' + case "$1" in + shift 1 + echo '' + echo '## generate RSA key pair, self-signed certificate, remove public key' + '[' -f '' ']' + KEYID=0005 + URIKEYID=%00%05 + TSTCRTN=testCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert2 --id=0005 ED448 PKCS11 URIS pkcs11:id=%00%09;pin-value=12345678 pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%09 pkcs11:type=public;id=%00%09 pkcs11:type=private;id=%00%09 pkcs11:type=cert;object=ed2Cert ## generate RSA key pair, self-signed certificate, remove public key Key pair generated: Private Key Object; RSA label: testCert2 ID: 0005 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private Public Key Object; RSA 2048 bits label: testCert2 ID: 0005 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=public + ca_sign testCert2 'My Test Cert 2' 0005 + LABEL=testCert2 + CN='My Test Cert 2' + KEYID=0005 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Test Cert 2|g' -e 's|serial = .*|serial = 8|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Mon Mar 22 22:50:04 2027 CA expiration time: Mon Mar 22 22:50:02 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 08 Validity: Not Before: Mon Mar 23 10:50:04 UTC 2026 Not After: Tue Mar 23 10:50:04 UTC 2027 Subject: CN=My Test Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:9d:f5:79:91:1e:d0:5e:bc:b3:02:9f:d3:f5:30:58 1a:98:8d:6d:56:59:6b:b7:85:91:b7:b4:d7:09:34:b8 63:3d:0b:f7:fb:27:62:98:7f:c3:e7:c9:e3:2e:36:0b f9:30:5d:35:93:e1:54:1c:e4:0d:db:1d:f4:ca:06:96 26:10:0a:fb:67:9d:b6:92:10:86:94:b5:52:e2:7d:3f 16:93:ee:c7:26:b2:c1:7d:0a:4a:8b:bb:35:24:de:dd a7:92:c8:91:9b:f7:5f:d2:25:fd:b4:e3:f4:ce:08:d3 36:b2:af:61:94:99:ce:14:8e:91:53:01:02:3f:8b:32 7d:96:77:8f:af:07:b6:68:e6:1d:f4:c8:53:a4:15:7e 6a:9e:4d:45:65:d8:db:eb:04:69:39:00:1a:fc:79:53 ad:47:e8:5e:46:78:6a:77:b5:83:66:0c:55:0b:bf:90 77:b6:94:97:ad:ef:a3:d3:cb:18:c3:de:dd:6a:23:41 ed:77:25:3b:ba:a0:9e:41:47:b5:bc:ec:65:1f:b6:41 f6:68:d6:50:e4:26:19:a2:7b:70:3e:9e:76:d1:fd:c5 df:be:ff:f1:32:a2:b6:6f:76:ef:1c:d3:e3:59:d0:06 ce:8a:d0:b8:ba:4e:01:2d:6f:6b:90:c0:a0:b3:9a:63 cf Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): 948e3880f0e8bd37ba368ff8728232589b3c1959 Authority Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:948e3880f0e8bd37ba368ff8728232589b3c1959 sha256:b968bf6b3689e9ecf6600f42598a62696d182b80f41022efab0f4a5099e71e0e Public Key PIN: pin-sha256:uWi/azaJ6ez2YA9CWYpiaW0YK4D0ECLvqw9KUJnnHg4= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert2.crt --type=cert --id=0005 --label=testCert2 Created certificate: Certificate Object; type = X.509 cert label: testCert2 subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 serial: 08 ID: 0005 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0005 + BASE2URIWITHPINVALUE='pkcs11:id=%00%05?pin-value=12345678' + BASE2URIWITHPINSOURCE='pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + BASE2URI=pkcs11:id=%00%05 + PRI2URI='pkcs11:type=private;id=%00%05' + CRT2URI='pkcs11:type=cert;object=testCert2' + title LINE 'RSA2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA2 PKCS11 URIS' + echo 'pkcs11:id=%00%05?pin-value=12345678' + echo 'pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%05 + echo 'pkcs11:type=private;id=%00%05' + echo 'pkcs11:type=cert;object=testCert2' + echo '' + title PARA 'generate EC key pair, self-signed certificate, remove public key' + case "$1" in + shift 1 + echo '' + echo '## generate EC key pair, self-signed certificate, remove public key' + '[' -f '' ']' + KEYID=0006 + URIKEYID=%00%06 + TSTCRTN=ecCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp384r1 --label=ecCert2 --id=0006 RSA2 PKCS11 URIS pkcs11:id=%00%05?pin-value=12345678 pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%05 pkcs11:type=private;id=%00%05 pkcs11:type=cert;object=testCert2 ## generate EC key pair, self-signed certificate, remove public key Key pair generated: Private Key Object; EC label: ecCert2 ID: 0006 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private Public Key Object; EC EC_POINT 384 bits EC_POINT: 0461047784d86eaeb52448ef0097e1b827b62b1e65782c369ba78119ac155ee27b06273cadee092645c5f15202cf9fb849af64dfe4251538cb723cdcbc20336e8dfc44cd5db8c826f96930daf693c9f7f7d125910d2f11fbdea4f41895ef0a63de8db2 EC_PARAMS: 06052b81040022 (OID 1.3.132.0.34) label: ecCert2 ID: 0006 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=public + ca_sign ecCert2 'My EC Cert 2' 0006 + LABEL=ecCert2 + CN='My EC Cert 2' + KEYID=0006 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert 2|g' -e 's|serial = .*|serial = 9|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Mon Mar 22 22:50:05 2027 CA expiration time: Mon Mar 22 22:50:02 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 09 Validity: Not Before: Mon Mar 23 10:50:05 UTC 2026 Not After: Tue Mar 23 10:50:05 UTC 2027 Subject: CN=My EC Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Ultra (384 bits) Curve: SECP384R1 X: 77:84:d8:6e:ae:b5:24:48:ef:00:97:e1:b8:27:b6:2b 1e:65:78:2c:36:9b:a7:81:19:ac:15:5e:e2:7b:06:27 3c:ad:ee:09:26:45:c5:f1:52:02:cf:9f:b8:49:af:64 Y: 00:df:e4:25:15:38:cb:72:3c:dc:bc:20:33:6e:8d:fc 44:cd:5d:b8:c8:26:f9:69:30:da:f6:93:c9:f7:f7:d1 25:91:0d:2f:11:fb:de:a4:f4:18:95:ef:0a:63:de:8d b2 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): daa4c211e2bd40386b25f0ad5915b8d93e3543a1 Authority Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:daa4c211e2bd40386b25f0ad5915b8d93e3543a1 sha256:37d50106c0302c8694fe61a4d0ec2852960ebaaacc7c2c68386f14491c40ffe2 Public Key PIN: pin-sha256:N9UBBsAwLIaU/mGk0OwoUpYOuqrMfCxoOG8USRxA/+I= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert2.crt --type=cert --id=0006 --label=ecCert2 Created certificate: Certificate Object; type = X.509 cert label: ecCert2 subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 serial: 09 ID: 0006 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0006 + ECBASE2URIWITHPINVALUE='pkcs11:id=%00%06?pin-value=12345678' + ECBASE2URIWITHPINSOURCE='pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ECBASE2URI=pkcs11:id=%00%06 + ECPRI2URI='pkcs11:type=private;id=%00%06' + ECCRT2URI='pkcs11:type=cert;object=ecCert2' + title LINE 'EC2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC2 PKCS11 URIS' + echo 'pkcs11:id=%00%06?pin-value=12345678' + echo 'pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%06 + echo 'pkcs11:type=private;id=%00%06' + echo 'pkcs11:type=cert;object=ecCert2' + echo '' + '[' -z '' ']' + title PARA 'explicit EC unsupported' + case "$1" in + shift 1 + echo '' + echo '## explicit EC unsupported' + '[' -f '' ']' + title PARA 'generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' + case "$1" in + shift 1 + echo '' + echo '## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' + '[' -f '' ']' + KEYID=0008 + URIKEYID=%00%08 + TSTCRTN=ecCert3 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp521r1 --label=ecCert3 --id=0008 --always-auth EC2 PKCS11 URIS pkcs11:id=%00%06?pin-value=12345678 pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%06 pkcs11:type=private;id=%00%06 pkcs11:type=cert;object=ecCert2 ## explicit EC unsupported ## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate Key pair generated: Private Key Object; EC label: ecCert3 ID: 0008 Usage: decrypt, sign, signRecover, unwrap, derive Access: always authenticate, sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private Public Key Object; EC EC_POINT 528 bits EC_POINT: 0481850400fa5ae811f88d992a2dc5a8b9289cb1224233dacb601eb26715ab9538b35a19a22569397450985c78a9ee99186bfd22fc1f39c1714f152effc32b49ab75c07ca5ab0024360ed325b19e806076df0b34004b07b51d304506116072e2dc7647a725c64ccd83be3ccf0f9395530cfab0a37de89777d330cbce4c3cff5046f1f12cc83d0d3c EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) label: ecCert3 ID: 0008 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public + ca_sign ecCert3 'My EC Cert 3' 0008 + LABEL=ecCert3 + CN='My EC Cert 3' + KEYID=0008 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert 3|g' -e 's|serial = .*|serial = 10|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert3.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Mon Mar 22 22:50:05 2027 CA expiration time: Mon Mar 22 22:50:02 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0a Validity: Not Before: Mon Mar 23 10:50:05 UTC 2026 Not After: Tue Mar 23 10:50:05 UTC 2027 Subject: CN=My EC Cert 3,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Future (528 bits) Curve: SECP521R1 X: 00:fa:5a:e8:11:f8:8d:99:2a:2d:c5:a8:b9:28:9c:b1 22:42:33:da:cb:60:1e:b2:67:15:ab:95:38:b3:5a:19 a2:25:69:39:74:50:98:5c:78:a9:ee:99:18:6b:fd:22 fc:1f:39:c1:71:4f:15:2e:ff:c3:2b:49:ab:75:c0:7c a5:ab Y: 24:36:0e:d3:25:b1:9e:80:60:76:df:0b:34:00:4b:07 b5:1d:30:45:06:11:60:72:e2:dc:76:47:a7:25:c6:4c cd:83:be:3c:cf:0f:93:95:53:0c:fa:b0:a3:7d:e8:97 77:d3:30:cb:ce:4c:3c:ff:50:46:f1:f1:2c:c8:3d:0d 3c Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): bff03c43c6a852ed4114a597c946c2f05328307a Authority Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:bff03c43c6a852ed4114a597c946c2f05328307a sha256:3c70e57dfe6cfcb158129fd6683773cd9fbc009a4f9f7e217a20837a8d4cda76 Public Key PIN: pin-sha256:PHDlff5s/LFYEp/WaDdzzZ+8AJpPn34heiCDeo1M2nY= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert3.crt --type=cert --id=0008 --label=ecCert3 Created certificate: Certificate Object; type = X.509 cert label: ecCert3 subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 serial: 0A ID: 0008 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert + ECBASE3URIWITHPINVALUE='pkcs11:id=%00%08?pin-value=12345678' + ECBASE3URIWITHPINSOURCE='pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ECBASE3URI=pkcs11:id=%00%08 + ECPUB3URI='pkcs11:type=public;id=%00%08' + ECPRI3URI='pkcs11:type=private;id=%00%08' + ECCRT3URI='pkcs11:type=cert;object=ecCert3' + title LINE 'EC3 PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC3 PKCS11 URIS' + echo 'pkcs11:id=%00%08?pin-value=12345678' + echo 'pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%08 + echo 'pkcs11:type=public;id=%00%08' + echo 'pkcs11:type=private;id=%00%08' + echo 'pkcs11:type=cert;object=ecCert3' + echo '' + '[' 1 -eq 1 ']' + KEYID=0010 + URIKEYID=%00%10 + TSTCRTN=testRsaPssCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testRsaPssCert --id=0010 --allowed-mechanisms RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS EC3 PKCS11 URIS pkcs11:id=%00%08?pin-value=12345678 pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%08 pkcs11:type=public;id=%00%08 pkcs11:type=private;id=%00%08 pkcs11:type=cert;object=ecCert3 Key pair generated: Private Key Object; RSA label: testRsaPssCert ID: 0010 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private Public Key Object; RSA 2048 bits label: testRsaPssCert ID: 0010 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public + ca_sign testRsaPssCert 'My RsaPss Cert' 0010 --sign-params=RSA-PSS + LABEL=testRsaPssCert + CN='My RsaPss Cert' + KEYID=0010 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My RsaPss Cert|g' -e 's|serial = .*|serial = 11|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPssCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS Generating a signed certificate... Expiration time: Mon Mar 22 22:50:05 2027 CA expiration time: Mon Mar 22 22:50:02 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0b Validity: Not Before: Mon Mar 23 10:50:05 UTC 2026 Not After: Tue Mar 23 10:50:05 UTC 2027 Subject: CN=My RsaPss Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:c0:17:ee:00:1a:07:97:62:26:b4:06:3a:ce:d6:1b 6b:46:93:e0:49:bb:02:0a:74:a8:84:a1:da:1e:83:4b 6a:22:19:0a:29:d8:74:ec:fd:e6:56:7a:d4:52:70:ab e2:46:d3:f2:82:2a:80:8e:f4:48:95:04:ad:f3:05:b9 a3:f3:76:e8:b2:d0:67:c3:80:b8:c0:aa:de:78:66:1e 79:05:81:77:1b:2d:38:c5:af:ce:4b:63:fd:cd:60:86 1a:89:5e:64:48:08:f0:e0:6f:ea:2d:6c:d1:d1:40:27 54:3b:d7:56:09:e1:18:4d:a4:d7:27:3f:c8:02:50:e8 5b:03:6b:90:49:fb:03:e0:e2:97:5c:9c:83:8b:3b:d5 01:33:14:8a:e8:45:0f:6e:6f:f9:ee:72:42:41:0c:d9 60:1e:f3:32:63:e5:39:9b:f0:fa:68:53:26:2d:a1:44 0b:39:bc:1e:ed:03:92:48:65:7b:c3:91:3c:38:43:ae 3c:13:a6:dd:3a:ab:13:fc:7d:96:2a:52:70:ad:d6:c9 63:85:6c:41:82:22:67:78:35:7f:93:99:9e:50:d3:04 5c:d6:8f:cc:53:54:2b:e0:01:d5:7f:e3:dc:d1:b8:39 11:d4:c8:3a:65:e5:bf:b5:99:a3:6f:4f:ed:40:b7:c6 bf Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): e92b35e03eae8b1a4ca9bbb428214e79fe367c8b Authority Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:e92b35e03eae8b1a4ca9bbb428214e79fe367c8b sha256:76c8169eb2c63e9ae71a0fb1f09c3d546623f20711962318141ee534fe79d97a Public Key PIN: pin-sha256:dsgWnrLGPprnGg+x8Jw9VGYj8gcRliMYFB7lNP552Xo= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPssCert.crt --type=cert --id=0010 --label=testRsaPssCert Created certificate: Certificate Object; type = X.509 cert label: testRsaPssCert subject: DN: O=PKCS11 Provider, CN=My RsaPss Cert serial: 0B ID: 0010 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert + RSAPSSBASEURIWITHPINVALUE='pkcs11:id=%00%10?pin-value=12345678' + RSAPSSBASEURIWITHPINSOURCE='pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + RSAPSSBASEURI=pkcs11:id=%00%10 + RSAPSSPUBURI='pkcs11:type=public;id=%00%10' + RSAPSSPRIURI='pkcs11:type=private;id=%00%10' + RSAPSSCRTURI='pkcs11:type=cert;object=testRsaPssCert' + title LINE 'RSA-PSS PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA-PSS PKCS11 URIS' + echo 'pkcs11:id=%00%10?pin-value=12345678' + echo 'pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%10 + echo 'pkcs11:type=public;id=%00%10' + echo 'pkcs11:type=private;id=%00%10' + echo 'pkcs11:type=cert;object=testRsaPssCert' + echo '' + KEYID=0011 + URIKEYID=%00%11 + TSTCRTN=testRsaPss2Cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:3092 --label=testRsaPss2Cert --id=0011 --allowed-mechanisms SHA256-RSA-PKCS-PSS RSA-PSS PKCS11 URIS pkcs11:id=%00%10?pin-value=12345678 pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%10 pkcs11:type=public;id=%00%10 pkcs11:type=private;id=%00%10 pkcs11:type=cert;object=testRsaPssCert Key pair generated: Private Key Object; RSA label: testRsaPss2Cert ID: 0011 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: SHA256-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private Public Key Object; RSA 3092 bits label: testRsaPss2Cert ID: 0011 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public + ca_sign testRsaPss2Cert 'My RsaPss2 Cert' 0011 --sign-params=RSA-PSS --hash=SHA256 + LABEL=testRsaPss2Cert + CN='My RsaPss2 Cert' + KEYID=0011 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My RsaPss2 Cert|g' -e 's|serial = .*|serial = 12|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPss2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS --hash=SHA256 Generating a signed certificate... Expiration time: Mon Mar 22 22:50:09 2027 CA expiration time: Mon Mar 22 22:50:02 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0c Validity: Not Before: Mon Mar 23 10:50:09 UTC 2026 Not After: Tue Mar 23 10:50:09 UTC 2027 Subject: CN=My RsaPss2 Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: High (3092 bits) Modulus (bits 3092): 0c:82:b6:32:43:26:81:46:d9:a4:bd:8c:8b:67:03:10 62:2b:42:60:fa:21:42:d6:14:d3:45:ea:6b:72:b3:92 6e:bf:1b:dd:fa:2e:2c:8e:bc:40:52:23:89:e6:84:99 1c:06:2f:fa:79:bc:9e:4c:b2:de:c7:79:4f:06:bb:6f a3:1c:fd:de:f8:be:d8:62:21:81:4d:41:3a:a8:a7:c5 71:c4:27:36:ff:11:df:2f:9e:a0:cf:a6:af:66:b1:97 62:dd:46:ee:5f:14:b9:05:25:b7:c5:01:0c:88:63:95 3d:4d:31:dd:85:05:19:84:65:75:83:13:d3:be:bb:29 52:48:d8:33:e1:0d:00:57:ec:52:78:6e:ca:6f:b0:82 5f:59:02:c0:99:01:86:9c:d1:ef:9c:ca:7d:82:87:63 b0:18:5b:01:29:b1:5b:32:01:d1:89:57:e5:e2:77:13 b2:a8:84:20:e1:24:8a:4a:b8:a5:41:c8:7b:b5:9f:fb 17:d0:aa:cf:c4:ce:0b:08:ec:27:5b:2c:e2:7a:22:d2 31:f3:4d:3a:9a:6f:57:ba:d1:53:88:c8:a5:57:3c:f2 04:65:b9:d6:28:61:be:9a:ef:7b:01:7c:e9:53:a1:b3 fa:12:96:bd:70:2b:7c:a2:f1:01:97:f1:ab:a1:7c:1e a7:32:a6:77:b2:1b:22:ca:a9:00:45:37:4e:61:03:e7 5e:29:63:13:64:a3:05:0c:93:2a:2f:d6:d5:0e:76:a4 56:71:2b:06:79:72:96:4c:ae:13:29:7f:1c:89:27:a7 17:c2:c7:c3:6a:f1:af:e3:0a:36:d5:f0:ca:ef:42:3b 76:58:92:cb:9f:29:77:af:21:e7:2e:ac:75:de:88:cc 7a:59:40:2f:f0:55:28:e9:9e:fb:4d:f3:b3:c6:09:d6 ec:5d:83:e6:53:7a:9e:dc:79:22:ed:64:76:15:46:4b c8:13:f0:34:b7:9d:f3:1e:f7:69:de:7a:14:79:4e:32 5b:d6:8d Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): 50ba22eff9c95c7cae472f9e7e4a20642845c050 Authority Key Identifier (not critical): 64e304a56ab2514967dc59f4f0d7035e89b33c89 Other Information: Public Key ID: sha1:50ba22eff9c95c7cae472f9e7e4a20642845c050 sha256:4a0789bf16a8a815c9294946a4596fa72072f84901e1be9c567cf1666a736d74 Public Key PIN: pin-sha256:SgeJvxaoqBXJKUlGpFlvpyBy+EkB4b6cVnzxZmpzbXQ= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPss2Cert.crt --type=cert --id=0011 --label=testRsaPss2Cert Created certificate: Certificate Object; type = X.509 cert label: testRsaPss2Cert subject: DN: O=PKCS11 Provider, CN=My RsaPss2 Cert serial: 0C ID: 0011 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert + RSAPSS2BASEURIWITHPINVALUE='pkcs11:id=%00%11?pin-value=12345678' + RSAPSS2BASEURIWITHPINSOURCE='pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + RSAPSS2BASEURI=pkcs11:id=%00%11 + RSAPSS2PUBURI='pkcs11:type=public;id=%00%11' + RSAPSS2PRIURI='pkcs11:type=private;id=%00%11' + RSAPSS2CRTURI='pkcs11:type=cert;object=testRsaPss2Cert' + title LINE 'RSA-PSS 2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA-PSS 2 PKCS11 URIS' + echo 'pkcs11:id=%00%11?pin-value=12345678' + echo 'pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%11 + echo 'pkcs11:type=public;id=%00%11' + echo 'pkcs11:type=private;id=%00%11' + echo 'pkcs11:type=cert;object=testRsaPss2Cert' + echo '' + title PARA 'Show contents of softhsm token' + case "$1" in + shift 1 + echo '' + echo '## Show contents of softhsm token' + '[' -f '' ']' + echo ' ----------------------------------------------------------------------------------------------------' + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' -O RSA-PSS 2 PKCS11 URIS pkcs11:id=%00%11?pin-value=12345678 pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%11 pkcs11:type=public;id=%00%11 pkcs11:type=private;id=%00%11 pkcs11:type=cert;object=testRsaPss2Cert ## Show contents of softhsm token ---------------------------------------------------------------------------------------------------- Private Key Object; RSA label: caCert ID: 0000 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=private Public Key Object; RSA 2048 bits label: testCert ID: 0001 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=public Public Key Object; EC EC_POINT 256 bits EC_POINT: 044104e3143bf6e8d9112ac816c42dda653429746b7dc2e41e32e8e09b9ac9cc8b6d97ff6be05e1db5be8f741c98805e58245eeb3fae3739db63614055ab60db3e22ac EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecPeerCert ID: 0003 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public Certificate Object; type = X.509 cert label: ecCert3 subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 serial: 0A ID: 0008 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert Public Key Object; EC EC_POINT 256 bits EC_POINT: 044104305860d036925c61c5d7c1734aa021145aaa5d4562214244bff714bf32896046b5f9b6c3741eceffeb30a47fdf99a78c49a4a916ebe7a6dcd53321b0acdbbdc7 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecCert ID: 0002 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public Private Key Object; EC label: ecCert2 ID: 0006 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private Certificate Object; type = X.509 cert label: testCert2 subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 serial: 08 ID: 0005 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert Private Key Object; EC_EDWARDS label: edCert ID: 0004 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=private Certificate Object; type = X.509 cert label: ecCert subject: DN: O=PKCS11 Provider, CN=My EC Cert serial: 04 ID: 0002 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert Private Key Object; RSA label: testCert2 ID: 0005 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private Certificate Object; type = X.509 cert label: ed2Cert subject: DN: O=PKCS11 Provider, CN=My ED448 Cert serial: 07 ID: 0009 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert Public Key Object; EC_EDWARDS EC_POINT 472 bits EC_POINT: 04393441a7d2d9d2d8562d467ca8c876381a2a48c703821afe59bf36cde5f4bbcacfac7cb9553ef741e12b308bab9e0b49ba4dbdbe2a5ea43f9000 EC_PARAMS: 06032b6571 (OID 1.3.101.113) label: ed2Cert ID: 0009 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public Certificate Object; type = X.509 cert label: ecCert2 subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 serial: 09 ID: 0006 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert Certificate Object; type = X.509 cert label: ecPeerCert subject: DN: CN=My Peer EC Cert serial: 05 ID: 0003 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert Private Key Object; RSA label: testRsaPssCert ID: 0010 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private Private Key Object; EC label: ecCert ID: 0002 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private Private Key Object; RSA label: testRsaPss2Cert ID: 0011 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: SHA256-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private Certificate Object; type = X.509 cert label: testCert subject: DN: O=PKCS11 Provider, CN=My Test Cert serial: 03 ID: 0001 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert Private Key Object; EC label: ecCert3 ID: 0008 Usage: decrypt, sign, signRecover, unwrap, derive Access: always authenticate, sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private Public Key Object; EC_EDWARDS EC_POINT 272 bits EC_POINT: 042040d62083bf5aba84da330314d8c966c0243ef103f7883b3f4ea80c3deebb8a96 EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) label: edCert ID: 0004 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=public Private Key Object; EC_EDWARDS label: ed2Cert ID: 0009 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private Private Key Object; EC label: ecPeerCert ID: 0003 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private Public Key Object; EC EC_POINT 528 bits EC_POINT: 0481850400fa5ae811f88d992a2dc5a8b9289cb1224233dacb601eb26715ab9538b35a19a22569397450985c78a9ee99186bfd22fc1f39c1714f152effc32b49ab75c07ca5ab0024360ed325b19e806076df0b34004b07b51d304506116072e2dc7647a725c64ccd83be3ccf0f9395530cfab0a37de89777d330cbce4c3cff5046f1f12cc83d0d3c EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) label: ecCert3 ID: 0008 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public Public Key Object; RSA 3092 bits label: testRsaPss2Cert ID: 0011 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public Certificate Object; type = X.509 cert label: edCert subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert serial: 06 ID: 0004 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert Certificate Object; type = X.509 cert label: caCert subject: DN: CN=Issuer serial: 02 ID: 0000 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert Public Key Object; RSA 2048 bits label: caCert ID: 0000 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0000;object=caCert;type=public Certificate Object; type = X.509 cert label: testRsaPss2Cert subject: DN: O=PKCS11 Provider, CN=My RsaPss2 Cert serial: 0C ID: 0011 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert Private Key Object; RSA label: testCert ID: 0001 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0001;object=testCert;type=private Public Key Object; RSA 2048 bits label: testRsaPssCert ID: 0010 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public Certificate Object; type = X.509 cert label: testRsaPssCert subject: DN: O=PKCS11 Provider, CN=My RsaPss Cert serial: 0B ID: 0010 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert + echo ' ----------------------------------------------------------------------------------------------------' + title PARA 'Output configurations' + case "$1" in + shift 1 + echo '' + echo '## Output configurations' + '[' -f '' ']' + OPENSSL_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf + title LINE 'Generate openssl config file' + case "$1" in + shift 1 + echo 'Generate openssl config file' + sed -e 's|@libtoollibs@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src|g' -e 's|@testsblddir@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests|g' -e 's|@testsdir@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm|g' -e 's|@SHARED_EXT@|.so|g' -e 's|@PINFILE@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt|g' -e 's|##TOKENOPTIONS|\npkcs11-module-quirks = no-deinit no-operation-state|g' /build/reproducible-path/pkcs11-provider-1.0/tests/openssl.cnf.in ---------------------------------------------------------------------------------------------------- ## Output configurations Generate openssl config file + title LINE 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars' + case "$1" in + shift 1 + echo 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars' + cat Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars + '[' -n pkcs11:id=%00%04 ']' + cat + '[' -n pkcs11:id=%00%09 ']' + cat + '[' -n '' ']' + '[' -n pkcs11:id=%00%10 ']' + cat + cat + gen_unsetvars + sed -e s/export/unset/ -e 's/=.*$//' + grep '^export' /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars + title ENDSECTION + case "$1" in + echo '' + echo ' ##' + echo '########################################' + echo '' ## ######################################## ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 2/92 pkcs11-provider:softhsm / setup OK 7.74s 3/92 pkcs11-provider:kryoptic / setup RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=128 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 SHARED_EXT=.so LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=kryoptic + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' kryoptic == softhsm ']' + '[' kryoptic == softokn ']' + '[' kryoptic == kryoptic ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh ++ title SECTION 'Searching for Kryoptic module' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Searching for Kryoptic module' ++ echo '' ++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /target/debug/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /target/release/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so ++ for _lib in "$@" ++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ echo 'skipped: Unable to find kryoptic PKCS#11 library' ++ exit 0 ######################################## ## Searching for Kryoptic module skipped: Unable to find kryoptic PKCS#11 library ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 3/92 pkcs11-provider:kryoptic / setup OK 0.14s 4/92 pkcs11-provider:kryoptic.nss / setup RUNNING >>> UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=73 SHARED_EXT=.so LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic.nss ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=kryoptic.nss + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ grep OpenSC ++ opensc-tool -i ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' kryoptic.nss == softhsm ']' + '[' kryoptic.nss == softokn ']' + '[' kryoptic.nss == kryoptic ']' + '[' kryoptic.nss == kryoptic.nss ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic.nss-init.sh ++ export KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/kryoptic.conf ++ KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/kryoptic.conf ++ cat ++ export 'TOKENLABEL=Kryoptic Soft Token' ++ TOKENLABEL='Kryoptic Soft Token' ++ export TOKENLABELURI=Kryoptic%20Soft%20Token ++ TOKENLABELURI=Kryoptic%20Soft%20Token ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh +++ title SECTION 'Searching for Kryoptic module' +++ case "$1" in +++ shift 1 +++ echo '########################################' +++ echo '## Searching for Kryoptic module' +++ echo '' +++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /target/debug/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /target/release/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so +++ for _lib in "$@" +++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ echo 'skipped: Unable to find kryoptic PKCS#11 library' +++ exit 0 ######################################## ## Searching for Kryoptic module skipped: Unable to find kryoptic PKCS#11 library ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 4/92 pkcs11-provider:kryoptic.nss / setup OK 0.14s 5/92 pkcs11-provider:softokn / basic RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 5/92 pkcs11-provider:softokn / basic SKIP 0.05s exit status 77 6/92 pkcs11-provider:softhsm / basic RUNNING >>> MALLOC_PERTURB_=8 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tbasic ## Raw Sign check error openssl pkeyutl -sign -inkey "${BASEURI}" -pkeyopt pad-mode:none -in ${TMPPDIR}/64Brandom.bin -out ${TMPPDIR}/raw-sig.bin Public Key operation error 40AC0296FFFF0000:error:0200007A:rsa routines:p11prov_sig_operate:data too small for key size:../src/signature.c:971: ## Sign and Verify with provided Hash and RSA openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## Sign and Verify with provided Hash and RSA with DigestInfo struct openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -pkeyopt digest:sha256 -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pkeyopt digest:sha256 -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## DigestSign and DigestVerify with RSA openssl pkeyutl -sign -inkey "${BASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully RSA basic encrypt and decrypt openssl pkeyutl -encrypt -inkey "${PUBURI}" -pubin -in ${SECRETFILE} -out ${SECRETFILE}.enc openssl pkeyutl -decrypt -inkey "${PRIURI}" -in ${SECRETFILE}.enc -out ${SECRETFILE}.dec ## Test Disallow Public Export openssl pkey -in $PUBURI -pubin -pubout -text ## Test CSR generation from RSA private keys openssl req -new -batch -key "${PRIURI}" -out ${TMPPDIR}/rsa_csr.pem openssl req -in ${TMPPDIR}/rsa_csr.pem -verify -noout Certificate request self-signature verify OK ## Test fetching public keys without PIN in config files openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/rsa.pub.nopin.pem openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ec.pub.nopin.pem openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/ed.pub.nopin.pem ## Test fetching public keys with a PIN in URI openssl pkey -in $BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripin.pem openssl pkey -in $ECBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripin.pem openssl pkey -in $EDBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripin.pem openssl pkey -in $ED2BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripin.pem ## Test fetching public keys with a PIN source in URI openssl pkey -in $BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripinsource.pem openssl pkey -in $ECBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripinsource.pem openssl pkey -in $EDBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripinsource.pem openssl pkey -in $ED2BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripinsource.pem ## Test prompting without PIN in config files ## Test EVP_PKEY_eq on public RSA key both on token ## Test EVP_PKEY_eq on public EC key both on token ## Test EVP_PKEY_eq on public RSA key via import ## Match private RSA key against public key ## Match private RSA key against public key (commutativity) ## Test EVP_PKEY_eq on public EC key via import ## Match private EC key against public key ## Match private EC key against public key (commutativity) ## Test EVP_PKEY_eq with key exporting disabled ## Test RSA key ## Test EC key ## Test PIN caching Prompt: "Enter pass phrase for PKCS#11 Token (Slot 576291950 - SoftHSM slot ID 0x2259846e):" Returning: 12345678 Child Done ALL A-OK! Prompt: "Enter pass phrase for PKCS#11 Token (Slot 576291950 - SoftHSM slot ID 0x2259846e):" Returning: 12345678 Child Done ALL A-OK! ## Test interactive Login on key without ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ## Test interactive Login repeated for operation on key with ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ## Test Key generation Performed tests: 4 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 6/92 pkcs11-provider:softhsm / basic OK 9.50s 7/92 pkcs11-provider:kryoptic / basic RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=244 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 7/92 pkcs11-provider:kryoptic / basic SKIP 0.07s exit status 77 8/92 pkcs11-provider:kryoptic.nss / basic RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=69 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 8/92 pkcs11-provider:kryoptic.nss / basic SKIP 0.06s exit status 77 9/92 pkcs11-provider:softokn / pubkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=75 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 9/92 pkcs11-provider:softokn / pubkey SKIP 0.05s exit status 77 10/92 pkcs11-provider:softhsm / pubkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=93 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tpubkey ## Export RSA Public key to a file openssl pkey -in $BASEURI -pubin -pubout -out ${TMPPDIR}/baseout.pub Export Public key to a file (pub-uri) openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/pubout.pub Print Public key from private openssl pkey -in $PRIURI -pubout -text ## Export Public check error openssl pkey -in pkcs11:id=%de%ad -pubin -pubout -out ${TMPPDIR}/pubout-invlid.pub Could not find private key of Public Key from pkcs11:id=%de%ad ## Export EC Public key to a file openssl pkey -in $ECBASEURI -pubin -pubout -out ${TMPPDIR}/baseecout.pub Export EC Public key to a file (pub-uri) openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/pubecout.pub Print EC Public key from private openssl pkey -in $ECPRIURI -pubout -text ## Check we can get RSA public keys from certificate objects Export Public key to a file (priv-uri) openssl pkey -in $PRI2URI -pubout -out ${TMPPDIR}/priv-cert.pub Export Public key to a file (base-uri) openssl pkey -in $BASE2URI -pubout -out ${TMPPDIR}/base-cert.pub ## Check we can get EC public keys from certificate objects Export Public EC key to a file (priv-uri) openssl pkey -in $ECPRI2URI -pubout -out ${TMPPDIR}/ec-priv-cert.pub Export Public key to a file (base-uri) openssl pkey -in $ECBASE2URI -pubout -out ${TMPPDIR}/ec-base-cert.pub ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 10/92 pkcs11-provider:softhsm / pubkey OK 0.92s 11/92 pkcs11-provider:kryoptic / pubkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=143 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 11/92 pkcs11-provider:kryoptic / pubkey SKIP 0.06s exit status 77 12/92 pkcs11-provider:kryoptic.nss / pubkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=233 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 12/92 pkcs11-provider:kryoptic.nss / pubkey SKIP 0.07s exit status 77 13/92 pkcs11-provider:softokn / certs RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=233 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 13/92 pkcs11-provider:softokn / certs SKIP 0.07s exit status 77 14/92 pkcs11-provider:softhsm / certs RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=176 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tcerts ## Check we can fetch certifiatce objects openssl x509 -in ${CRTURI} -subject -out ${TMPPDIR}/crt-subj.txt openssl x509 -in ${ECCRTURI} -subject -out ${TMPPDIR}/eccrt-subj.txt ## Use storeutl command to match specific certs via params openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate ## Test fetching certificate without PIN in config files openssl x509 -in $CRTURI -subject -out ${TMPPDIR}/crt-subj-nopin.txt ## Test fetching certificate via STORE api Cert load successfully ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 14/92 pkcs11-provider:softhsm / certs OK 0.68s 15/92 pkcs11-provider:kryoptic / certs RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=80 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 15/92 pkcs11-provider:kryoptic / certs SKIP 0.05s exit status 77 16/92 pkcs11-provider:kryoptic.nss / certs RUNNING >>> MALLOC_PERTURB_=216 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 16/92 pkcs11-provider:kryoptic.nss / certs SKIP 0.07s exit status 77 17/92 pkcs11-provider:softokn / ecc RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=72 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 17/92 pkcs11-provider:softokn / ecc SKIP 0.07s exit status 77 18/92 pkcs11-provider:softhsm / ecc RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=149 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecc ## Export EC Public key to a file openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ecout.pub Print EC Public key from private openssl pkey -in $ECPRIURI -pubout -text ## Sign and Verify with provided Hash and EC openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${ECBASEURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-ecsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${TMPPDIR}/ecout.pub" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-256) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-384) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-512) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha512-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-256) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-384) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-512) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-512-ecdgstsig.bin Signature Verified Successfully ## Test CSR generation from private ECC keys openssl req -new -batch -key "${ECPRIURI}" -out ${TMPPDIR}/ecdsa_csr.pem openssl req -in ${TMPPDIR}/ecdsa_csr.pem -verify -noout Certificate request self-signature verify OK ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 18/92 pkcs11-provider:softhsm / ecc OK 1.33s 19/92 pkcs11-provider:kryoptic / ecc RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=115 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 19/92 pkcs11-provider:kryoptic / ecc SKIP 0.06s exit status 77 20/92 pkcs11-provider:kryoptic.nss / ecc RUNNING >>> MALLOC_PERTURB_=159 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 20/92 pkcs11-provider:kryoptic.nss / ecc SKIP 0.06s exit status 77 21/92 pkcs11-provider:softhsm / edwards RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=127 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tedwards ## Export ED25519 Public key to a file openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/edout.pub Print ED25519 Public key from private openssl pkey -in $EDPRIURI -pubout -text ## DigestSign and DigestVerify with ED25519 openssl pkeyutl -sign -inkey "${EDBASEURI}" -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-eddgstsig.bin openssl pkeyutl -verify -inkey "${EDBASEURI}" -pubin -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-eddgstsig.bin Signature Verified Successfully ## Test CSR generation from private ED25519 keys openssl req -new -batch -key "${EDPRIURI}" -out ${TMPPDIR}/ed25519_csr.pem openssl req -in ${TMPPDIR}/ed25519_csr.pem -verify -noout Certificate request self-signature verify OK ## Test EVP_PKEY_eq on public Edwards key both on token ## Test EVP_PKEY_eq on public ED key via import ## Match private ED key against public key ## Match private ED key against public key (commutativity) ## Test Key generation Performed tests: 1 ## Export ED448 Public key to a file openssl pkey -in $ED2PUBURI -pubin -pubout -out ${TMPPDIR}/ed2out.pub Print ED448 Public key from private openssl pkey -in $ED2PRIURI -pubout -text ## DigestSign and DigestVerify with ED448 openssl pkeyutl -sign -inkey "${ED2BASEURI}" -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-eddgstsig.bin openssl pkeyutl -verify -inkey "${ED2BASEURI}" -pubin -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-eddgstsig.bin Signature Verified Successfully ## Test CSR generation from private ED448 keys openssl req -new -batch -key "${ED2PRIURI}" -out ${TMPPDIR}/ed448_csr.pem openssl req -in ${TMPPDIR}/ed448_csr.pem -verify -noout Certificate request self-signature verify OK ## Test EVP_PKEY_eq on public Edwards key both on token ## Test EVP_PKEY_eq on public ED448 key via import ## Match private ED448 key against public key ## Match private ED448 key against public key (commutativity) ## Test Ed448 Key generation Performed tests: 1 ## Test interactive Login on key without ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 21/92 pkcs11-provider:softhsm / edwards OK 2.02s 22/92 pkcs11-provider:kryoptic / edwards RUNNING >>> MALLOC_PERTURB_=8 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 22/92 pkcs11-provider:kryoptic / edwards SKIP 0.06s exit status 77 23/92 pkcs11-provider:kryoptic.nss / edwards RUNNING >>> MALLOC_PERTURB_=144 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 23/92 pkcs11-provider:kryoptic.nss / edwards SKIP 0.07s exit status 77 24/92 pkcs11-provider:softokn / ecdh RUNNING >>> MALLOC_PERTURB_=210 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 24/92 pkcs11-provider:softokn / ecdh SKIP 0.06s exit status 77 25/92 pkcs11-provider:kryoptic / ecdh RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=98 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 25/92 pkcs11-provider:kryoptic / ecdh SKIP 0.06s exit status 77 26/92 pkcs11-provider:kryoptic.nss / ecdh RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=19 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 26/92 pkcs11-provider:kryoptic.nss / ecdh SKIP 0.06s exit status 77 27/92 pkcs11-provider:softokn / democa RUNNING >>> MALLOC_PERTURB_=237 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 27/92 pkcs11-provider:softokn / democa SKIP 0.07s exit status 77 28/92 pkcs11-provider:softhsm / democa RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=114 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdemoca ## Set up demoCA ## Generating CA cert if needed openssl req -batch -noenc -x509 -new -key ${PRIURI} -out ${DEMOCA}/cacert.pem ## Generating a new CSR with key in file openssl req -batch -noenc -newkey rsa:2048 -subj "/CN=testing-csr-signing/O=PKCS11 Provider/C=US" -keyout ${DEMOCA}/cert.key -out ${DEMOCA}/cert.csr ....+.......+++++++++++++++++++++++++++++++++++++++*......+.+...........+++++++++++++++++++++++++++++++++++++++*.+.................+......+.++++++ .................+.+......+.....+....+..+.......+.....+......+.+...+......+.....+.......+++++++++++++++++++++++++++++++++++++++*...+..+...+.+...+..+..........+.....+....+............+..+...+.......+...........+......+++++++++++++++++++++++++++++++++++++++*.....+..+.+........+.+........+......+......+.+.....+...+......+.+.....+.......+......+..+.........+.........+.+...+.....+......................+.....+.+...+..+....+...+..+..........+.........+............+..+..........+......+............+..+...+..........+...+.....+.........+...+...+....+..+.+............+..................+...+......+...+......+..+.............+......+...............+.....+......+...+.+...+.....+.......+...+..+....+..+...++++++ ----- ## Signing the new certificate openssl ca -batch -in ${DEMOCA}/cert.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-csr-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 23 10:50:25 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing RSA key in token openssl req -batch -noenc -new -key ${PRIURI} -subj "/CN=testing-rsa-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa.csr ## Signing the new RSA key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsa-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing EC key in token openssl req -batch -noenc -new -key ${ECPRIURI} -subj "/CN=testing-ec-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ec.csr ## Signing the new EC key certificate openssl ca -batch -in ${DEMOCA}/cert-ec.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ec-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing ED key in token openssl req -batch -noenc -new -key ${EDPRIURI} -subj "/CN=testing-ed-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ed.csr ## Signing the new ED key certificate openssl ca -batch -in ${DEMOCA}/cert-ed.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ed-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing ED448 key in token openssl req -batch -noenc -new -key ${ED2PRIURI} -subj "/CN=testing-ed2-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ed2.csr ## Signing the new ED448 key certificate openssl ca -batch -in ${DEMOCA}/cert-ed2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ed2-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing RSA-PSS key in token openssl req -batch -noenc -new -key ${RSAPSSPRIURI} -sigopt rsa_padding_mode:pss -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US" -sigopt rsa_padding_mode:pss -out ${DEMOCA}/cert-rsa-pss.csr ## Signing the new RSA-PSS key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsapss-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days) Write out database with 1 new entries Database updated openssl x509 -text -in ${DEMOCA}/cert.pem ## Generating a new CSR with existing SHA256 restricted RSA-PSS key in token openssl req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss -subj "/CN=testing-rsapss-sha2-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa-pss2.csr -sigopt rsa_padding_mode:pss -sigopt digest:sha256 ## Signing the new SHA256 restricted RSA-PSS key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa-pss2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsapss-sha2-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 23 10:50:26 2027 GMT (365 days) Write out database with 1 new entries Database updated openssl x509 -text -in ${DEMOCA}/cert.pem ## Generating a new CSR with existing RSA-PSS key in token openssl req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa-pss2.csr -sigopt rsa_padding_mode:pss -sigopt digest:sha256 -sigopt rsa_pss_saltlen:-2 ## Signing the new RSA-PSS key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsapss-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 23 10:50:27 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Set up OCSP openssl req -batch -noenc -new -subj "/CN=OCSP/O=PKCS11 Provider/C=US" -key ${PRIURI} -out ${DEMOCA}/ocspSigning.csr openssl ca -batch -keyfile ${PRIURI} -cert ${DEMOCA}/cacert.pem -in ${DEMOCA}/ocspSigning.csr -out ${DEMOCA}/ocspSigning.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'OCSP' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until Mar 23 10:50:27 2027 GMT (365 days) Write out database with 1 new entries Database updated ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 28/92 pkcs11-provider:softhsm / democa OK 1.78s 29/92 pkcs11-provider:kryoptic / democa RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=123 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 29/92 pkcs11-provider:kryoptic / democa SKIP 0.04s exit status 77 30/92 pkcs11-provider:kryoptic.nss / democa RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=243 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 30/92 pkcs11-provider:kryoptic.nss / democa SKIP 0.05s exit status 77 31/92 pkcs11-provider:softokn / digest RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=56 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 31/92 pkcs11-provider:softokn / digest SKIP 0.06s exit status 77 32/92 pkcs11-provider:softhsm / digest RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=6 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdigest ## Test Digests support sha512-224: Unsupported by pkcs11 token sha512-256: Unsupported by pkcs11 token sha3-224: Unsupported by pkcs11 token sha3-256: Unsupported by pkcs11 token sha3-384: Unsupported by pkcs11 token sha3-512: Unsupported by pkcs11 token PASSED ## Test Digests Blocked No digest available for testing pkcs11 provider Digest operations failed as expected ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 32/92 pkcs11-provider:softhsm / digest OK 0.23s 33/92 pkcs11-provider:kryoptic / digest RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=182 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 33/92 pkcs11-provider:kryoptic / digest SKIP 0.06s exit status 77 34/92 pkcs11-provider:kryoptic.nss / digest RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=20 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 34/92 pkcs11-provider:kryoptic.nss / digest SKIP 0.06s exit status 77 35/92 pkcs11-provider:softokn / fork RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=178 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 35/92 pkcs11-provider:softokn / fork SKIP 0.05s exit status 77 36/92 pkcs11-provider:softhsm / fork RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=15 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tfork Child Done Child Done ALL A-OK! ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 36/92 pkcs11-provider:softhsm / fork OK 1.58s 37/92 pkcs11-provider:kryoptic / fork RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=27 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 37/92 pkcs11-provider:kryoptic / fork SKIP 0.06s exit status 77 38/92 pkcs11-provider:kryoptic.nss / fork RUNNING >>> MALLOC_PERTURB_=78 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 38/92 pkcs11-provider:kryoptic.nss / fork SKIP 0.07s exit status 77 39/92 pkcs11-provider:softokn / oaepsha2 RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=41 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 39/92 pkcs11-provider:softokn / oaepsha2 SKIP 0.06s exit status 77 40/92 pkcs11-provider:kryoptic / oaepsha2 RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=134 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 40/92 pkcs11-provider:kryoptic / oaepsha2 SKIP 0.07s exit status 77 41/92 pkcs11-provider:kryoptic.nss / oaepsha2 RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=2 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 41/92 pkcs11-provider:kryoptic.nss / oaepsha2 SKIP 0.07s exit status 77 42/92 pkcs11-provider:softokn / hkdf RUNNING >>> MALLOC_PERTURB_=225 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 42/92 pkcs11-provider:softokn / hkdf SKIP 0.07s exit status 77 43/92 pkcs11-provider:kryoptic / hkdf RUNNING >>> MALLOC_PERTURB_=79 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 43/92 pkcs11-provider:kryoptic / hkdf SKIP 0.05s exit status 77 44/92 pkcs11-provider:kryoptic.nss / hkdf RUNNING >>> MALLOC_PERTURB_=36 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 44/92 pkcs11-provider:kryoptic.nss / hkdf SKIP 0.07s exit status 77 45/92 pkcs11-provider:softokn / imported RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=96 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 45/92 pkcs11-provider:softokn / imported SKIP 0.05s exit status 77 46/92 pkcs11-provider:kryoptic / imported RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=220 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 46/92 pkcs11-provider:kryoptic / imported SKIP 0.06s exit status 77 47/92 pkcs11-provider:kryoptic.nss / imported RUNNING >>> MALLOC_PERTURB_=225 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 47/92 pkcs11-provider:kryoptic.nss / imported SKIP 0.05s exit status 77 48/92 pkcs11-provider:softokn / rsapss RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=134 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 48/92 pkcs11-provider:softokn / rsapss SKIP 0.07s exit status 77 49/92 pkcs11-provider:softhsm / rsapss RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MESON_TEST_ITERATION=1 MALLOC_PERTURB_=43 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapss ## DigestSign and DigestVerify with RSA PSS openssl pkeyutl -sign -inkey "${BASEURI}" -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully Re-verify using OpenSSL default provider openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with RSA PSS with default params openssl pkeyutl -sign -inkey "${BASEURI}" -pkeyopt pad-mode:pss -in ${RAND64FILE} -rawin -out ${TMPPDIR}/def-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -pkeyopt pad-mode:pss -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/def-dgstsig.bin Signature Verified Successfully Re-verify using OpenSSL default provider openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -pkeyopt pad-mode:pss -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/def-dgstsig.bin Signature Verified Successfully ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 49/92 pkcs11-provider:softhsm / rsapss OK 0.54s 50/92 pkcs11-provider:kryoptic / rsapss RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=86 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 50/92 pkcs11-provider:kryoptic / rsapss SKIP 0.07s exit status 77 51/92 pkcs11-provider:kryoptic.nss / rsapss RUNNING >>> MALLOC_PERTURB_=79 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 51/92 pkcs11-provider:kryoptic.nss / rsapss SKIP 0.06s exit status 77 52/92 pkcs11-provider:softhsm / rsapssam RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=156 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapssam ## DigestSign and DigestVerify with RSA PSS (SHA256 restriction) openssl pkeyutl -sign -inkey "${RSAPSS2PRIURI}" -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin openssl pkeyutl -verify -inkey "${RSAPSS2PUBURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin Signature Verified Successfully ## Fail DigestSign with RSA PSS because of restricted Digest openssl pkeyutl -sign -inkey "${RSAPSS2PRIURI}" -digest sha384 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha384 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-rsapps-genpkey-dgstsig.bin 2>&1 ## Fail Signing with RSA PKCS1 mech and RSA-PSS key openssl pkeyutl -sign -inkey "${RSAPSSPRIURI}" -digest sha256 -pkeyopt rsa_padding_mode:pkcs1 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-rsa-not-rsapss-sig.bin 2>&1 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 52/92 pkcs11-provider:softhsm / rsapssam OK 0.51s 53/92 pkcs11-provider:kryoptic / rsapssam RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=254 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 53/92 pkcs11-provider:kryoptic / rsapssam SKIP 0.07s exit status 77 54/92 pkcs11-provider:softokn / genkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=107 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 54/92 pkcs11-provider:softokn / genkey SKIP 0.08s exit status 77 55/92 pkcs11-provider:softhsm / genkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=206 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tgenkey Performed tests: 0 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 55/92 pkcs11-provider:softhsm / genkey OK 0.11s 56/92 pkcs11-provider:kryoptic / genkey RUNNING >>> MALLOC_PERTURB_=136 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 56/92 pkcs11-provider:kryoptic / genkey SKIP 0.06s exit status 77 57/92 pkcs11-provider:kryoptic.nss / genkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=248 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 57/92 pkcs11-provider:kryoptic.nss / genkey SKIP 0.06s exit status 77 58/92 pkcs11-provider:softokn / pkey RUNNING >>> MALLOC_PERTURB_=145 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 58/92 pkcs11-provider:softokn / pkey SKIP 0.07s exit status 77 59/92 pkcs11-provider:softhsm / pkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=39 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tpkey ALL A-OK! ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 59/92 pkcs11-provider:softhsm / pkey OK 0.35s 60/92 pkcs11-provider:kryoptic / pkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=41 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 60/92 pkcs11-provider:kryoptic / pkey SKIP 0.06s exit status 77 61/92 pkcs11-provider:kryoptic.nss / pkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=101 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 61/92 pkcs11-provider:kryoptic.nss / pkey SKIP 0.07s exit status 77 62/92 pkcs11-provider:softokn / session RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=89 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 62/92 pkcs11-provider:softokn / session SKIP 0.07s exit status 77 63/92 pkcs11-provider:softhsm / session RUNNING >>> MALLOC_PERTURB_=122 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tsession ALL A-OK!―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 63/92 pkcs11-provider:softhsm / session OK 0.52s 64/92 pkcs11-provider:kryoptic / session RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=147 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 64/92 pkcs11-provider:kryoptic / session SKIP 0.07s exit status 77 65/92 pkcs11-provider:kryoptic.nss / session RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=212 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 65/92 pkcs11-provider:kryoptic.nss / session SKIP 0.07s exit status 77 66/92 pkcs11-provider:softokn / rand RUNNING >>> MALLOC_PERTURB_=225 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 66/92 pkcs11-provider:softokn / rand SKIP 0.07s exit status 77 67/92 pkcs11-provider:softhsm / rand RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=226 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trand ## Test PKCS11 RNG openssl rand 1 40DCBE8DFFFF0000:error:0308010C:digital envelope routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:355:Global default library context, Algorithm (PKCS11-RAND : 0), Properties () 40DCBE8DFFFF0000:error:12000090:random number generator:rand_new_drbg:unable to fetch drbg:../crypto/rand/rand_lib.c:660: openssl rand 1 ì ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 67/92 pkcs11-provider:softhsm / rand OK 0.29s 68/92 pkcs11-provider:kryoptic / rand RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=228 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 68/92 pkcs11-provider:kryoptic / rand SKIP 0.07s exit status 77 69/92 pkcs11-provider:kryoptic.nss / rand RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=70 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 69/92 pkcs11-provider:kryoptic.nss / rand SKIP 0.07s exit status 77 70/92 pkcs11-provider:softokn / readkeys RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=57 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 70/92 pkcs11-provider:softokn / readkeys SKIP 0.07s exit status 77 71/92 pkcs11-provider:softhsm / readkeys RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=114 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/treadkeys ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 71/92 pkcs11-provider:softhsm / readkeys OK 0.14s 72/92 pkcs11-provider:kryoptic / readkeys RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=4 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 72/92 pkcs11-provider:kryoptic / readkeys SKIP 0.08s exit status 77 73/92 pkcs11-provider:kryoptic.nss / readkeys RUNNING >>> MALLOC_PERTURB_=32 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 73/92 pkcs11-provider:kryoptic.nss / readkeys SKIP 0.06s exit status 77 74/92 pkcs11-provider:softokn / tls RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=174 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 74/92 pkcs11-provider:softokn / tls SKIP 0.06s exit status 77 75/92 pkcs11-provider:softhsm / tls RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=94 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttls ## Test SSL_CTX creation SSL Context works! ## Test setting cert/keys on TLS Context Cert and Key successfully set on TLS Context! ## Test setting cert/keys on TLS Context w/o pub key Cert and Key successfully set on TLS Context! ## Test an actual TLS connection ######################################## ## TLS with key in provider ## Run sanity test with default values (RSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMmhkg54Oco9uQPlGseiZmkyI+LeYQaW97xY 3a/pru5s4QwrgCaob8r0YclRcibaecLZ4ug68hoKYutTkAwqqP+hokiSi11IBs6f vGvuhUmM1bqmX6D5KD2m7xdFOJIywS2Gp79qDVjcXDV8lJtfqdiJX4Zo5UkUfWR2 dIy+2cEDgaNFgEBlfKKVTHg42uEJh27gbl3LXk6dJFUHpHgTwsjh4ej2+hEDJLzX irdionqo9UDzFMmv+XYAr3PheUmT4Y4VxeM6756PY0Gqz5R/CyB5T/sBE2LZZBMB KcBSdxxdhfokhavapnStsF9I/gNyja5pydp7hNEW/xLKEXoHrqsCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSG61m1ONNn6/mlh4x5j0fH2L7Y4DAf BgNVHSMEGDAWgBRk4wSlarJRSWfcWfTw1wNeibM8iTANBgkqhkiG9w0BAQsFAAOC AQEAUAlYq8HkmFZ20aSUavFZGjFTp8IfYFnAtMJPAWbfJCQoO1NpoklBTHiNbwS3 tm3VjGPaOFgphnLEwWY0oy8nUPu3Q8yWRelH60QfOpIRvxK+V98BOioOLGEmIhnA kFiscTY19RWXgVmi9DfhQox2/klpm48dv0v9nQmX4zfFGtz6HX9PP44SFM9nfuu4 oNj6GQ+EyAuvHgVRtyIBjXGWIasVhL//xaJkn1USBM/f7pQ7vsgNzFZ2fzTdQtst kyFrhxGDlvbuiH696i8/VSUphdLB80igxde1FwnVevm1etYcjXKKs0Zjk/gaB6tQ PTGnp0RjdPaIBsvyaEt2ib4Ufg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: D81C518D845E674E1E0EED4ACD47935F52C9A66A808F5CFDB35EDF5E12743C46 Session-ID-ctx: Resumption PSK: CDFD6D28B0204B7C223C78F2A9F7DF7E188CFF1355C682D338FA2486BE956162EA3A051515576B1F62E98F637E301F04 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - b0 53 ae 8d a2 a6 4f 11-a2 f8 2d 53 a9 f1 c7 39 .S....O...-S...9 0010 - 88 f2 22 36 5c 2b b3 05-4c 5b f1 03 61 05 a4 14 .."6\+..L[..a... 0020 - 7f 4d f8 b5 c7 76 64 ba-a3 fe d9 91 ff 35 9a 42 .M...vd......5.B 0030 - 97 d1 8f f0 55 b2 7a 1b-d4 87 fa 5f 53 80 14 f4 ....U.z...._S... 0040 - 66 7a c3 a8 02 c6 90 da-cc dc b2 10 c2 dc 8f 15 fz.............. 0050 - c7 2d 68 88 4c 99 a5 d5-56 72 a1 84 4c 27 18 c2 .-h.L...Vr..L'.. 0060 - 85 98 28 eb 75 8e 0e 51-4d 36 f0 c4 51 85 c0 0f ..(.u..QM6..Q... 0070 - 42 83 36 ac 68 13 5f 68-de d0 0a c7 51 a8 b6 44 B.6.h._h....Q..D 0080 - d0 28 d5 06 9b b9 c0 69-89 50 67 8f ce 27 18 8f .(.....i.Pg..'.. 0090 - ac c2 71 eb 5f 86 de b8-b6 2f 1a bf 9a 6b 78 63 ..q._..../...kxc 00a0 - 95 8b 33 ce d9 d7 74 6e-69 d2 53 4e 78 64 99 e4 ..3...tni.SNxd.. 00b0 - 42 8d c5 2d 06 d0 55 49-2c c1 8d e1 e6 27 51 77 B..-..UI,....'Qw 00c0 - 5b ea 2e b4 bf 6d ba de-57 7a b4 57 d4 99 48 f7 [....m..Wz.W..H. Start Time: 1774263034 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 2626141E3E3B894CC0222037587514A9C3F3F85E4E7C6A0D8F27988603407DF0 Session-ID-ctx: Resumption PSK: 530BEB79DDE68A01D35BA155BA6C94B9D7BFDD01BB71868B83F5EFAE36BBD338A042C54C844AD792D744571136354A41 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - b0 53 ae 8d a2 a6 4f 11-a2 f8 2d 53 a9 f1 c7 39 .S....O...-S...9 0010 - eb b3 9c a2 38 43 3f 65-20 80 e9 71 0d 8a 0a 85 ....8C?e ..q.... 0020 - 75 c5 9e b0 f2 57 67 6d-e5 50 de 43 9a 70 e3 05 u....Wgm.P.C.p.. 0030 - f2 31 f5 ab 79 e7 32 85-ac f8 a7 a6 e5 f5 bc ea .1..y.2......... 0040 - fb 39 f3 41 78 93 0e 12-d3 6d 6c c0 18 63 32 fc .9.Ax....ml..c2. 0050 - 3e 6d 01 d0 fe 9b 3a db-2b df e2 a3 e8 92 41 ac >m....:.+.....A. 0060 - eb 4d 63 0d ef fa e8 4c-eb 19 ed 8d de 9c 51 54 .Mc....L......QT 0070 - fd c7 56 66 ff 02 51 b8-58 ab 4c 49 91 ab 7f d2 ..Vf..Q.X.LI.... 0080 - 95 0e 53 39 f5 68 f5 af-6a 79 b0 a1 7e 35 93 11 ..S9.h..jy..~5.. 0090 - 6d 60 cb 8c 90 09 d4 3d-c5 2e 62 36 53 66 ab 23 m`.....=..b6Sf.# 00a0 - 66 57 8e 39 82 6a c2 0f-31 68 07 16 2f fc d0 20 fW.9.j..1h../.. 00b0 - c9 5b f6 f7 19 91 17 1f-1e 23 ca e5 be 46 1e aa .[.......#...F.. 00c0 - 05 c2 31 a0 e7 2d 27 09-c4 25 1f 5e 84 e5 90 45 ..1..-'..%.^...E Start Time: 1774263034 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 405CF6BAFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIBWejOI5RUGnObP8XZSH5NZlBYUZqKMYKPrDFK/RGMcs BDBTC+t53eaKAdNboVW6bJS517/dAbtxhouD9e+uNrvTOKBCxUyESteS10RXETY1 SkGhBgIEacEa+qIEAgIcIKQGBAQBAAAArgcCBQDasdsNswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (RSA-PSS) ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%10 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 2048 (bit); sigalg: RSASSA-PSS v:NotBefore: Mar 23 10:50:34 2026 GMT; NotAfter: Apr 22 10:50:34 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIEIzCCAtugAwIBAgIUT+PTasCvIybptoFPIRw5BBinJN8wPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwMzIzMTA1MDM0WhcNMjYwNDIyMTA1MDM0WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCASAwCwYJKoZIhvcNAQEKA4IBDwAwggEKAoIBAQDAF+4AGgeXYia0BjrO 1htrRpPgSbsCCnSohKHaHoNLaiIZCinYdOz95lZ61FJwq+JG0/KCKoCO9EiVBK3z Bbmj83bostBnw4C4wKreeGYeeQWBdxstOMWvzktj/c1ghhqJXmRICPDgb+otbNHR QCdUO9dWCeEYTaTXJz/IAlDoWwNrkEn7A+Dil1ycg4s71QEzFIroRQ9ub/nuckJB DNlgHvMyY+U5m/D6aFMmLaFECzm8Hu0Dkkhle8ORPDhDrjwTpt06qxP8fZYqUnCt 1sljhWxBgiJneDV/k5meUNMEXNaPzFNUK+AB1X/j3NG4ORHUyDpl5b+1maNvT+1A t8a/AgMBAAGjaTBnMB0GA1UdDgQWBBRArDRUa004tVWoc6pwjt2urtDdoDAfBgNV HSMEGDAWgBRArDRUa004tVWoc6pwjt2urtDdoDAPBgNVHRMBAf8EBTADAQH/MAkG A1UdEQQCMAAwCQYDVR0SBAIwADA9BgkqhkiG9w0BAQowMKANMAsGCWCGSAFlAwQC AaEaMBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgGiAwIBIAOCAQEAXwAdy1MEJ8Nj Wi3yjC9gsTM/bUJq/ZaBX+rsRhDPmwp4ms9WVcwthU945ClEZhCuJHAlpNiIdCT1 d1vweMcBXWqUohN1S5PxMkaam6/vMbcgezRQ0Jek3ABkRH6l1xs+wYU1wK5SfBOO h+S7pegtLtOICp7+2Mv5voU2kGFUo1g+HGI+oUXRGlw054ISGlw5JJPmT0+3IwsL rEcnDUFYCf2AResSJtg+ctRMIGvTtN56Ma5Hiozo4UkDshW37siB5sU+hnpxVvam zAbYv8qDcCN0AtorVm0iRutothElQ0AOg1+SXamgh8ZhzhwTaJdX2wmh+LCJ1hVX dyUHIVl6OA== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1619 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 6ACC3896E07AC3071BFE88F219D9AF2B7D61F73525E7A5B23D88039CE2423D55 Session-ID-ctx: Resumption PSK: DD6BF83F05D1CE4B9AA3B2F3E75F841785C66B9B764A86516C56854D147F9DE3B06491DE62D55F7647DA817143CBE619 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 3c e6 e6 02 e6 19 63 23-d5 cd dc ac cc ad 99 0d <.....c#........ 0010 - d6 77 23 db f0 96 fa cb-12 d8 68 c3 38 5b 6a f8 .w#.......h.8[j. 0020 - a0 37 b9 da 1d 83 11 9c-cf 33 e9 d4 4e 6a 25 a9 .7.......3..Nj%. 0030 - 38 44 e1 ca a0 ca f1 1b-a2 ac b8 b6 58 eb 02 11 8D..........X... 0040 - 07 5b 95 a1 25 b5 fa 86-5d 31 4d ff cf 06 d7 a9 .[..%...]1M..... 0050 - 0c ab 2b a4 d3 19 da cb-24 57 68 8a e2 47 80 c9 ..+.....$Wh..G.. 0060 - 2b 88 29 0f b1 f8 88 1a-c3 96 01 ce d2 62 cc f0 +.)..........b.. 0070 - 86 3c d0 e1 4f ca 9f de-d9 e3 14 30 81 53 ea af .<..O......0.S.. 0080 - 61 49 f0 ce a4 1b c5 07-b6 f9 de 0f 73 e3 d7 e2 aI..........s... 0090 - 88 48 87 69 ac ac 85 de-50 9c 7a 5a b4 34 f5 7f .H.i....P.zZ.4.. 00a0 - 88 12 d6 05 8e 47 47 72-e3 86 b9 4f 2f c2 32 cf .....GGr...O/.2. 00b0 - a3 38 48 13 aa 70 d9 d9-66 fb 55 ab 1b 0e 63 47 .8H..p..f.U...cG 00c0 - 6e 87 bd b3 a3 9e 15 8f-b8 55 f3 ea 91 65 20 68 n........U...e h Start Time: 1774263034 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 78F66FA2ACF3D725D7C8D5D077877DA85537A35669C90F0BC2697B9260CB5576 Session-ID-ctx: Resumption PSK: 15B423F12A52C70C53E859B079AFE7A9C3985011E895690FCA9D3EF83B348BBD10526609A3083EE052481D5CA030B77C PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 3c e6 e6 02 e6 19 63 23-d5 cd dc ac cc ad 99 0d <.....c#........ 0010 - 4d c3 cc 96 ff e6 88 9c-45 18 76 3d 3b a5 92 d5 M.......E.v=;... 0020 - 43 6a 7b ab 49 87 59 6d-f0 5a f4 51 c6 09 0d cb Cj{.I.Ym.Z.Q.... 0030 - 8d 01 36 34 5b 5a 58 92-ac 98 7f 67 b4 ca c5 f8 ..64[ZX....g.... 0040 - a8 2e 94 30 b8 30 d0 c9-44 7b 40 1c 77 bf 5d 38 ...0.0..D{@.w.]8 0050 - 26 d1 54 1b 1b ee 30 f1-20 f3 67 02 ef 90 e3 9c &.T...0. .g..... 0060 - 8e d9 1f 11 9a 72 aa 68-22 41 fb da ea 55 8a 6b .....r.h"A...U.k 0070 - f2 f4 bf d2 b6 ff 89 eb-d7 2c cf 5a 0d 7b 21 66 .........,.Z.{!f 0080 - 33 ac df ce 6d 95 4a aa-02 20 88 b3 10 96 32 44 3...m.J.. ....2D 0090 - a1 2b 05 7c 06 80 12 43-e6 3e 6b 4c 3d 12 e1 c4 .+.|...C.>kL=... 00a0 - 61 c4 7d fe 2b cc 20 2e-a4 c2 bd cd 62 a0 46 8b a.}.+. .....b.F. 00b0 - bd 20 60 4c a8 90 04 e3-dc e9 b7 86 f0 70 26 b0 . `L.........p&. 00c0 - b2 b2 68 3c 15 b9 ac d7-e9 fc 82 7b 3e a3 ea 2c ..h<.......{>.., Start Time: 1774263034 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40DC08AFFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-default.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEII0G/z7RKfyMD+KfucZfyO2qSsp9ZTbTkxVExquqX0dB BDAVtCPxKlLHDFPoWbB5r+epw5hQEeiVaQ/KnT74OzSLvRBSZgmjCD7gUkgdXKAw t3yhBgIEacEa+qIEAgIcIKQGBAQBAAAArgcCBQC8dqnsswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with RSA-PSS and SHA256 ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 3092 (bit); sigalg: RSASSA-PSS v:NotBefore: Mar 23 10:50:35 2026 GMT; NotAfter: Apr 22 10:50:35 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIFKDCCA12gAwIBAgIUFD1ya7qiCezAMq6/fGQ3/mNzJBUwPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwMzIzMTA1MDM1WhcNMjYwNDIyMTA1MDM1WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgwyCtjJDJoFG2aS9jItn AxBiK0Jg+iFC1hTTReprcrOSbr8b3fouLI68QFIjieaEmRwGL/p5vJ5Mst7HeU8G u2+jHP3e+L7YYiGBTUE6qKfFccQnNv8R3y+eoM+mr2axl2LdRu5fFLkFJbfFAQyI Y5U9TTHdhQUZhGV1gxPTvrspUkjYM+ENAFfsUnhuym+wgl9ZAsCZAYac0e+cyn2C h2OwGFsBKbFbMgHRiVfl4ncTsqiEIOEkikq4pUHIe7Wf+xfQqs/EzgsI7CdbLOJ6 ItIx8006mm9XutFTiMilVzzyBGW51ihhvprvewF86VOhs/oSlr1wK3yi8QGX8auh fB6nMqZ3shsiyqkARTdOYQPnXiljE2SjBQyTKi/W1Q52pFZxKwZ5cpZMrhMpfxyJ J6cXwsfDavGv4wo21fDK70I7dliSy58pd68h5y6sdd6IzHpZQC/wVSjpnvtN87PG CdbsXYPmU3qe3Hki7WR2FUZLyBPwNLed8x73ad56FHlOMlvWjQIDAQABo2kwZzAd BgNVHQ4EFgQUWNa4hGl5YEQfmSg+qNJBjwuQZU0wHwYDVR0jBBgwFoAUWNa4hGl5 YEQfmSg+qNJBjwuQZU0wDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B AQgwCwYJYIZIAWUDBAIBogMCASADggGEAAQxVS0qrx38WRTd5Pl4LvXOpJ1kpOri sviGV8LfRzcUrL8Vu31+wbakCwVB0cL76T0aA0K0NP/0jWV4XmRP6ZmchkbmECP0 V37xsMyvMrc1vcNXL8po3i3hrKL6WeLFsV/9BD9uwdX7huTbpH97GUptrhYpZAme WCXoDJ5ZdkUnOuC4vnR4FHL6rSbJtVDsdJ401v6HpYN0HtFMwlnnCyn8ecrG3Oqj 3R0AGLb0Ef8LXhIe+dzlkmYoUcvmIAek8cIGGQp+ImDVSmx5EcAdD2iTK4/j+cc5 FrtN4HQfNjF+xbyTfnyQ1uUwGZbWGqZKIJm0Jo2z86clOvs6RkmUtn1A00TO/Q+0 sl3qxXMAZTXCBsSII1JwHoHcTT5V1RlMjrx3B0DA8E0W0w8ZLjE3/q4ixDOU9lTA UreoMm8QJH+uAYxbK7MyThhssoqdlVx1CpifxSRqcrw9/bAIlswue5FRdWhLaHan 1cMtTgUb3DmTZ20g+jF9FGq+DmhFXO5vAiTB9A== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 2011 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 3092 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: C980536EA57325BAA6E0CE294A6D9617A7263DBAB30AF995E6D86796478B8849 Session-ID-ctx: Resumption PSK: 3A53F72943B100EA1C5851A4073915A502848826D2C2EF97C4416884110E6F49F2D03926B80A16FA6FEEEED594F92A7A PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - aa b6 ec fe 94 5d 6f 9e-b5 25 0e c9 b6 cd 47 78 .....]o..%....Gx 0010 - 2c ad 1f 27 a2 60 67 c9-9d 6d e1 13 cf 86 ac 63 ,..'.`g..m.....c 0020 - 70 63 a7 b2 e0 da b3 8e-66 9c 1f ea c3 de 80 58 pc......f......X 0030 - c6 36 29 37 bc b3 73 46-b6 b3 9c 00 4f 0d a2 59 .6)7..sF....O..Y 0040 - d1 63 97 25 88 34 a3 fe-17 16 0b cb e7 ef cf 4b .c.%.4.........K 0050 - 6e b9 2f a1 3b e6 c0 e6-0b 12 1a fd fb f6 ed ad n./.;........... 0060 - e5 2c 57 ff 23 12 bc fc-14 17 84 4a 28 c8 fc 7e .,W.#......J(..~ 0070 - 0a 1e be 74 21 8e 29 83-6e e5 ee c2 db bf 4c cc ...t!.).n.....L. 0080 - 30 8b 63 71 83 8c 77 3a-a3 c5 af da b1 51 73 2f 0.cq..w:.....Qs/ 0090 - 47 5d 6c 04 9f 27 9d c3-f8 d6 3a c9 1a 8b dd 89 G]l..'....:..... 00a0 - 8c 29 a4 55 43 32 8d 53-d1 4d 5f 06 e1 50 05 09 .).UC2.S.M_..P.. 00b0 - 35 1c 89 22 07 a8 4b bd-19 00 89 52 b8 ee 91 75 5.."..K....R...u 00c0 - 61 b7 c9 d4 19 b5 6f d5-45 5d cd 5e 77 7e 8d 0f a.....o.E].^w~.. Start Time: 1774263035 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 23A44EC8F313B365E0B63EF4EFDB16540136F463CC47CB13786E8A076B60BBFA Session-ID-ctx: Resumption PSK: 6400B17739057E245F87CF1F993D30C3F1E51D39061D20C5118B339B8745547DCFCEF7C386848E70A42B77BEC5DF5C79 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - aa b6 ec fe 94 5d 6f 9e-b5 25 0e c9 b6 cd 47 78 .....]o..%....Gx 0010 - 99 f8 c1 5d 9a 9a 0b 1c-f1 27 00 39 25 f4 65 27 ...].....'.9%.e' 0020 - 5e f5 f6 6b e2 c7 af 2c-4b f6 f2 0d ef 97 7c 47 ^..k...,K.....|G 0030 - ae b3 76 d6 0e ff 51 de-b0 aa b4 d3 be 35 c3 37 ..v...Q......5.7 0040 - 2c 51 39 43 4c 35 78 86-37 ad 19 d4 0c b5 0a 8b ,Q9CL5x.7....... 0050 - 58 41 2e be 1e 9e 7e b2-b2 6d e7 7d d6 90 01 40 XA....~..m.}...@ 0060 - 2f bb a6 f3 33 2c 11 56-02 5a b4 ce 4c dc 2c ce /...3,.V.Z..L.,. 0070 - fa e9 d7 74 4f ef 1a ed-c0 9a c4 92 b6 df 8f f2 ...tO........... 0080 - f3 88 e4 6c 33 c8 ac 39-03 61 22 de 49 ea e9 1e ...l3..9.a".I... 0090 - 1d 1f f6 b5 ae 31 b0 08-f5 54 03 0c d5 5d 3f da .....1...T...]?. 00a0 - e1 5f 40 e1 ee 16 f5 27-43 e8 2e c2 bf b9 d3 4d ._@....'C......M 00b0 - e2 cd e9 1e 86 82 0e 95-14 d5 b6 39 78 18 42 14 ...........9x.B. 00c0 - 64 62 72 da 96 9e 84 7d-ef 04 25 e1 3b cb 2a d9 dbr....}..%.;.*. Start Time: 1774263035 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 408CFA8CFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-sha256.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEII+v24omZXsUUVa02zpZM/bP6nRmQgf3Cu4xsFjZnROx BDBkALF3OQV+JF+Hzx+ZPTDD8eUdOQYdIMURizObh0VUfc/O98OGhI5wpCt3vsXf XHmhBgIEacEa+6IEAgIcIKQGBAQBAAAArgcCBQCJ5+ynswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (ECDSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5 tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK 4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB hS/cPUmv -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1002 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 7889BA80126C5AB5AF9141F861000B473BEF5353D4FBA174BDFBCE4776CDF121 Session-ID-ctx: Resumption PSK: 4B7A5D1FC897940581956DD5A7857FA8DDEAEA99A6B711FA3306E069B922876F266BA7D3E91A5B493F5D647D2F2FD66C PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 27 70 2b 92 b7 ed de a9-02 31 00 21 cf 60 27 0f 'p+......1.!.`'. 0010 - ab 93 94 9c ee 5b cc 4a-2e 56 11 80 58 ab 3d df .....[.J.V..X.=. 0020 - 9e 93 4d b2 bc 84 9a fa-bc b4 af 29 45 4a 2a 6d ..M........)EJ*m 0030 - fd fb c1 d9 58 16 42 1c-12 73 c8 73 9b 52 fe 8a ....X.B..s.s.R.. 0040 - 1d c3 bb 63 40 01 91 ff-f4 96 29 e8 29 17 47 1e ...c@.....).).G. 0050 - bd fa 18 0e 2e 86 25 01-d4 fb 11 7a 27 bf 48 61 ......%....z'.Ha 0060 - 35 6d e3 54 19 54 d2 cd-e2 d5 3a 8a 05 35 55 44 5m.T.T....:..5UD 0070 - 6f 75 57 76 6e 35 b8 9d-e9 ac 7e 0d 9a 43 65 6a ouWvn5....~..Cej 0080 - 83 40 ea 8d 41 1f 71 b3-fb 75 d8 c8 7b 26 c3 b3 .@..A.q..u..{&.. 0090 - 29 21 2d a3 7e 3d cd 9b-40 de af af 06 c0 fa 8b )!-.~=..@....... 00a0 - 9d cc af 24 99 51 76 99-cd ee c5 ab 81 6a 80 91 ...$.Qv......j.. 00b0 - 66 23 97 89 6c da 7c 48-be ba 73 a7 50 13 7d 7e f#..l.|H..s.P.}~ 00c0 - 2c d9 1e 90 1f a9 ff d3-44 fd 6e d2 45 53 2f 03 ,.......D.n.ES/. Start Time: 1774263035 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 69EEFCA4454E58210209C427816FAF8A807D1B0A8832E6C8E917CA0244DEFA1A Session-ID-ctx: Resumption PSK: 98445460CABA1255454DD60432D277F6803631A2126BC8D19CEBE91CA516E9A31A18C638944603F035F7D1908B906DDC PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 27 70 2b 92 b7 ed de a9-02 31 00 21 cf 60 27 0f 'p+......1.!.`'. 0010 - ed dc 91 30 56 04 1e fd-ad 9b 69 e7 86 94 e9 15 ...0V.....i..... 0020 - 07 d9 4b f8 fb 28 88 4f-ab 9e 6f 2e 96 aa 86 a1 ..K..(.O..o..... 0030 - d2 14 81 35 a3 6e 3d 41-fc 6b 40 06 9a ac 48 3c ...5.n=A.k@...H< 0040 - 1f a8 f9 1a ea b1 69 5f-7a 5d 28 4f 7a fb bb 5d ......i_z](Oz..] 0050 - 64 79 1e 64 56 f9 f2 21-60 47 ba e9 ba 5d de 77 dy.dV..!`G...].w 0060 - 9e 29 6d dc fc a0 21 33-55 98 dc 4d 5e 12 34 c2 .)m...!3U..M^.4. 0070 - e0 22 82 ed ee fb 7d 32-ca 60 41 5c 17 0e e1 f9 ."....}2.`A\.... 0080 - 5b 3b c9 f2 3c 17 c0 b2-a3 4e e8 bf 98 3e 03 4d [;..<....N...>.M 0090 - c5 b7 f8 8c 8c 9d 5e d4-94 d8 02 d5 a8 5a 81 cb ......^......Z.. 00a0 - 2c 40 48 91 1a e0 f4 ce-6c 3e 24 23 5a 68 8e 8a ,@H.....l>$#Zh.. 00b0 - f8 e3 2b d4 65 0d 7b 7f-09 6d f5 1a 20 73 fb 53 ..+.e.{..m.. s.S 00c0 - 91 03 59 cd 32 12 4f b9-d6 ed 0a 59 c6 b0 95 e3 ..Y.2.O....Y.... Start Time: 1774263035 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40DC1495FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIIONiLE3D7DHCUsr3pEZBDbzp29Ei+XRktRsHkWliMzG BDCYRFRgyroSVUVN1gQy0nf2gDYxohJryNGc6+kcpRbpoxoYxjiURgPwNffRkIuQ bdyhBgIEacEa+6IEAgIcIKQGBAQBAAAArgYCBEp45Y2zAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed25519) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED25519 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED25519 Cert i:CN=Issuer a:PKEY: ED25519, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICSDCCATCgAwIBAgIBBjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjA0MRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxGDAWBgNVBAMTD015IEVEMjU1MTkgQ2VydDAqMAUGAytl cAMhAEDWIIO/WrqE2jMDFNjJZsAkPvED94g7P06oDD3uu4qWo4GBMH8wDAYDVR0T AQH/BAIwADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8B Af8EBAMCB4AwHQYDVR0OBBYEFGQ8nD3VCnpNHcqrAw0PYgKtUfC0MB8GA1UdIwQY MBaAFGTjBKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQAnViDz TQJQbAZnvFFs7E/cIseIAbHT+3VyUKz0+tBjqO7aw0ojfFOiR8GHbRLIKKzDGY6/ yKTYu5PU2jw1l/n8IYV9+UGaeE5FDHDMh4octb5hluVtc2ESkSvOKNDYnE4Oelhc PzO33kACe0axGKxNvxatWCpqskjrC4Yh0d4h8qveQAhtXSk++sWJoGd/t3mu8at+ 8PyatBEMKbeD6Bu/5VECaQo4fm7kXlDOOGlNvAj7sI9uYiY+MXl8IEvCKs8heYik hCV6++lfXCuZfjemNnanBqYSmQ8axxKsU1YHX7zbeNSV/7lcHsHpmcJJ+ws1dGbs EhI5gCaCfYH6yWea -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED25519 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: Ed25519 Server Temp Key: X25519, 253 bits --- SSL handshake has read 952 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 800D55AF5E080E74E02ADBFE67ABEE6A717B48FC2B59EE3786B91080D6647A7D Session-ID-ctx: Resumption PSK: 1B03A03C5DC32258551E66AEE1195BBB228AFB4B9D14CCDB5D8537C5F64E5FB0678F193D7B75FEBEE61F7B5C01590D91 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - cd 93 cf 47 e7 69 10 fd-b8 1a 71 0d 09 27 a7 04 ...G.i....q..'.. 0010 - 5b a4 38 85 31 89 d4 5d-2f 82 8a fa a1 d6 4f ec [.8.1..]/.....O. 0020 - b4 a2 30 8e 8b b2 85 07-84 52 6b 06 e4 44 22 28 ..0......Rk..D"( 0030 - 97 5b 14 62 cb 5c 7f 75-e9 ee 2b b2 0f 98 b1 87 .[.b.\.u..+..... 0040 - 92 b7 e2 ac c4 9d 94 80-b9 d7 7f af 0c a8 1b 44 ...............D 0050 - de aa 92 34 2d 50 43 70-47 82 d9 c8 e6 7f a1 2e ...4-PCpG....... 0060 - 84 a7 df be 93 9f 7c ba-10 58 4a b4 af 23 87 8d ......|..XJ..#.. 0070 - fa e9 26 23 28 c6 bc 0b-78 6a fa 62 b7 80 5c c5 ..&#(...xj.b..\. 0080 - 34 57 a0 47 a0 a9 34 83-9f 6d f9 dd b9 9d 9a 8b 4W.G..4..m...... 0090 - 6f 0b ab 81 bd 29 16 53-f3 56 38 32 b8 02 60 52 o....).S.V82..`R 00a0 - 54 04 44 9b 39 88 29 f4-dd e0 73 86 50 f2 46 23 T.D.9.)...s.P.F# 00b0 - d2 01 b7 96 26 57 d3 8f-9f 37 c1 8b f8 f5 3a dd ....&W...7....:. 00c0 - d0 af 7f 01 ec 5c ca dc-7f 8e 74 4c 83 59 6d f5 .....\....tL.Ym. Start Time: 1774263035 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 3411B0ED199DA07D9B79F6B7C11A8BAA4784B89249A5B32842E00901EFD3636D Session-ID-ctx: Resumption PSK: 372697034CD7917549241095FF0BE379C6D34FBD7BE92E3C8C4E425C1906088A46E536B3E84415262FB6C5BD113EE423 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - cd 93 cf 47 e7 69 10 fd-b8 1a 71 0d 09 27 a7 04 ...G.i....q..'.. 0010 - f3 ab 72 a8 0d 66 96 ef-b2 3f 8c 86 9d 33 40 90 ..r..f...?...3@. 0020 - 94 30 88 47 2a 42 3c 02-a1 4d f9 10 47 1b ff 54 .0.G*B<..M..G..T 0030 - 41 2f f2 74 50 6f e6 dc-0a 3e 56 87 03 60 f5 d0 A/.tPo...>V..`.. 0040 - 5a 68 8a fc 55 00 32 ef-02 0e 99 99 45 56 9d 12 Zh..U.2.....EV.. 0050 - 9c 32 c6 f1 7f 18 eb f8-d7 b3 2c 74 26 3a 08 2d .2........,t&:.- 0060 - 96 1d 86 6d aa 23 b3 4f-14 ca e9 f1 da 03 b9 7b ...m.#.O.......{ 0070 - 52 14 87 d1 5e c9 80 de-58 b6 32 26 e8 78 9c 64 R...^...X.2&.x.d 0080 - 81 0c e3 d8 b2 60 f6 73-9b b8 19 02 a0 d0 f4 1a .....`.s........ 0090 - 83 d7 72 29 79 79 49 40-de fb 03 d2 24 5a 8c ec ..r)yyI@....$Z.. 00a0 - 68 79 be 8c fc ec 05 78-39 c0 a9 c3 95 7c f7 3a hy.....x9....|.: 00b0 - a2 34 1a 05 a9 63 7d 5a-45 22 19 aa 25 20 1a c5 .4...c}ZE"..% .. 00c0 - c8 03 90 69 c1 88 96 01-e2 ac c4 af 0f c5 d2 04 ...i............ Start Time: 1774263035 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 402C0AA9FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIPlMCfEu/+ExkdVUcwC+hf6ffFuSFdbHd9RpPrwLwp9Z BDA3JpcDTNeRdUkkEJX/C+N5xtNPvXvpLjyMTkJcGQYIikblNrPoRBUmL7bFvRE+ 5COhBgIEacEa+6IEAgIcIKQGBAQBAAAArgcCBQDoF6jZswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed448) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED448 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED448 Cert i:CN=Issuer a:PKEY: ED448, 456 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:04 2026 GMT; NotAfter: Mar 23 10:50:04 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICXzCCAUegAwIBAgIBBzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDA0WhcNMjcwMzIzMTA1MDA0WjAyMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFjAUBgNVBAMTDU15IEVENDQ4IENlcnQwQzAFBgMrZXED OgA0QafS2dLYVi1GfKjIdjgaKkjHA4Ia/lm/Ns3l9LvKz6x8uVU+90HhKzCLq54L SbpNvb4qXqQ/kACjgYEwfzAMBgNVHRMBAf8EAjAAMB8GA1UdEQQYMBaBFHRlc3Rj ZXJ0QGV4YW1wbGUub3JnMA4GA1UdDwEB/wQEAwIHgDAdBgNVHQ4EFgQUnnqFu2Cd P1lUBMv/9WOExNaktGAwHwYDVR0jBBgwFoAUZOMEpWqyUUln3Fn08NcDXomzPIkw DQYJKoZIhvcNAQELBQADggEBAB3QY0GCoIeiwwBotMbB1e8U7gMaaV6QEodA/Ztf mYqtAu/vxdYZyiWaBOB9GUYbOVgfqQJSdRQxhah0wT9g4503bUkkVAP5ZI6PWNJ1 PbHFnDIgOKwqrOD4mIUoNXzHyGWLWNzf3bZC5ENLObjWoUOyg7CbEdraZRjUdCNO HvdA3JrrqyzumDTS/9PJGtr2IYfcPorkUPw37MF7Ut4Lo9QtuBimuCJIE5iJYWkT kVv/mXriH9qMnvHbJ3hiOmebS5L+XCX30N/s4lb71s+k33PCUPx6TyuR5dO+WI3A Mc20Ja+Lr31HAVyqoc/1ElWDPn/QGIP18d2XKknXe6sI33w= -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED448 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: Ed448 Server Temp Key: X25519, 253 bits --- SSL handshake has read 1025 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 456 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 9605322B3EF53A934F8D9294DE7BE987C26612EF2F2E423A63FEF5A5E6B922D3 Session-ID-ctx: Resumption PSK: 8F34E0CCAD8C25EACF3F7E793C0741CF704E3A163F57D46D90960E09CE02130E286DF770CA67DEC89A261561E9DD7894 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 41 32 bd 41 ff b4 12 17-24 02 d3 13 8a 4b 96 69 A2.A....$....K.i 0010 - 59 8c 61 4d 79 e0 dc 02-3a 69 62 53 59 f6 8e 8f Y.aMy...:ibSY... 0020 - f0 4a d0 b0 27 40 a9 b8-4e 2f 92 17 61 2c 5a 1b .J..'@..N/..a,Z. 0030 - 87 44 10 01 82 79 a0 ff-67 68 20 33 34 24 7b f5 .D...y..gh 34${. 0040 - aa b7 2f 19 d6 e6 8a ff-6f 8e b8 3e 1b 62 d0 3b ../.....o..>.b.; 0050 - 2b e7 74 47 ae 9a 9b ea-0e ff 35 6d 4e b9 ef 56 +.tG......5mN..V 0060 - 5b 14 d5 71 36 13 ef 83-60 0f 83 44 c6 ad cc 90 [..q6...`..D.... 0070 - 1b b2 dc af 63 97 1f e9-d9 5a 21 c1 d5 c4 17 04 ....c....Z!..... 0080 - b4 35 16 bc 8c 50 d9 fb-db 5b e1 94 73 a6 72 db .5...P...[..s.r. 0090 - 15 79 9e 22 9c be 6c 98-9f 5e 5f 40 68 21 d3 ca .y."..l..^_@h!.. 00a0 - 71 31 ff 54 92 41 58 38-57 0a 8b ed 57 a9 d4 de q1.T.AX8W...W... 00b0 - d4 0c 7b 41 2c 8a cf 28-d3 58 f1 6b 00 a7 e4 1f ..{A,..(.X.k.... 00c0 - 40 d0 88 71 22 f4 57 5e-b0 99 9f 69 a9 4d 8e 8a @..q".W^...i.M.. Start Time: 1774263036 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 9D18F39343CE3158FCDD6FC9F8EFF3AFE174E7E41832E12F14DA4404A0309D03 Session-ID-ctx: Resumption PSK: 546512EAC4C95CC75F3C95824EEA25F6C134B1FE3E51FD43D6F8DACC250DC9CAAA58F3AD13FB54CB710DDBE51B7705ED PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 41 32 bd 41 ff b4 12 17-24 02 d3 13 8a 4b 96 69 A2.A....$....K.i 0010 - 52 29 a7 4c 91 75 7e 9b-84 ac d4 87 e7 11 30 5c R).L.u~.......0\ 0020 - ef ab db fc 50 bc 56 f7-17 2e 25 96 11 59 47 28 ....P.V...%..YG( 0030 - a2 21 b8 a3 a5 e4 42 12-f5 22 79 a0 b0 7f a0 8e .!....B.."y..... 0040 - 8a d4 41 65 25 a1 71 f7-c6 f7 e3 69 12 cf 62 e5 ..Ae%.q....i..b. 0050 - dc 05 f6 c7 14 d8 39 e0-12 4f ec ac 19 24 32 e8 ......9..O...$2. 0060 - 55 b2 2e e4 db fb 02 32-ac d1 9c 69 a5 03 4e 13 U......2...i..N. 0070 - dd d1 27 f7 fb 47 cb 39-18 0d bc 1c 25 c8 06 88 ..'..G.9....%... 0080 - e1 ba c3 e4 9e 1d dc eb-df 93 34 6f 12 32 02 7e ..........4o.2.~ 0090 - b7 c0 df 58 0d 9e 1a 75-d5 64 95 75 da 89 0d 58 ...X...u.d.u...X 00a0 - 0e a0 a6 74 46 33 ee 87-69 70 f5 a2 90 36 71 57 ...tF3..ip...6qW 00b0 - 9e c6 fe 7d 8e 74 7f 97-09 d8 9e 9e c4 a5 39 32 ...}.t........92 00c0 - 54 2f 4d f2 66 50 2c f0-7e 26 4b c8 83 b6 3b c2 T/M.fP,.~&K...;. Start Time: 1774263036 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 406CF0B7FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%09 -cert pkcs11:type=cert;object=ed2Cert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEICJiAO/KZp0QtHgdzRqpXhUv3KLf74fx7ln8sjwOgL3F BDBUZRLqxMlcx188lYJO6iX2wTSx/j5R/UPW+NrMJQ3JyqpY860T+1TLcQ3b5Rt3 Be2hBgIEacEa/KIEAgIcIKQGBAQBAAAArgcCBQCtBuN9swMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMmhkg54Oco9uQPlGseiZmkyI+LeYQaW97xY 3a/pru5s4QwrgCaob8r0YclRcibaecLZ4ug68hoKYutTkAwqqP+hokiSi11IBs6f vGvuhUmM1bqmX6D5KD2m7xdFOJIywS2Gp79qDVjcXDV8lJtfqdiJX4Zo5UkUfWR2 dIy+2cEDgaNFgEBlfKKVTHg42uEJh27gbl3LXk6dJFUHpHgTwsjh4ej2+hEDJLzX irdionqo9UDzFMmv+XYAr3PheUmT4Y4VxeM6756PY0Gqz5R/CyB5T/sBE2LZZBMB KcBSdxxdhfokhavapnStsF9I/gNyja5pydp7hNEW/xLKEXoHrqsCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSG61m1ONNn6/mlh4x5j0fH2L7Y4DAf BgNVHSMEGDAWgBRk4wSlarJRSWfcWfTw1wNeibM8iTANBgkqhkiG9w0BAQsFAAOC AQEAUAlYq8HkmFZ20aSUavFZGjFTp8IfYFnAtMJPAWbfJCQoO1NpoklBTHiNbwS3 tm3VjGPaOFgphnLEwWY0oy8nUPu3Q8yWRelH60QfOpIRvxK+V98BOioOLGEmIhnA kFiscTY19RWXgVmi9DfhQox2/klpm48dv0v9nQmX4zfFGtz6HX9PP44SFM9nfuu4 oNj6GQ+EyAuvHgVRtyIBjXGWIasVhL//xaJkn1USBM/f7pQ7vsgNzFZ2fzTdQtst kyFrhxGDlvbuiH696i8/VSUphdLB80igxde1FwnVevm1etYcjXKKs0Zjk/gaB6tQ PTGnp0RjdPaIBsvyaEt2ib4Ufg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1476 bytes and written 290 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: C108E226C24A8008BA5E8AE248D21C46A1E7E7AAD5407575D8200A0926865CF1 Session-ID-ctx: Master-Key: 76699832183FAF0A1AF9094CCC90981D0F8DCBC0038F377A2DB77DB5B25EF320DF8C59DB18F4DEB93AC6919D6322C6E1 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 04 41 6d dd 8e 36 94 34-84 f0 ba 0b 84 b5 60 c1 .Am..6.4......`. 0010 - 40 71 21 a4 09 a3 b1 be-83 0e 1f 6a 92 01 64 30 @q!........j..d0 0020 - 8d 9f 16 bd 55 dc 9a d9-fb 56 f8 41 50 1a 92 ec ....U....V.AP... 0030 - 15 ac b9 0b 5a 5b e3 3a-57 00 e0 a2 3d f8 63 f4 ....Z[.:W...=.c. 0040 - 5a 9e db 7c c7 93 93 cc-bd ba 67 87 da 82 b1 90 Z..|......g..... 0050 - 2e 40 02 5e 0a 90 6b 22-2e 3e 4c b2 68 5e ba a9 .@.^..k".>L.h^.. 0060 - 07 dd 34 29 ee 62 35 18-2f 15 87 93 3c bf 8b 0c ..4).b5./...<... 0070 - 6b c9 58 d8 99 6e 4a 49-c2 9e 4a 2d d6 f6 f1 71 k.X..nJI..J-...q 0080 - 02 93 c4 81 bb 8b 8a e1-8b 0e f8 c8 26 18 08 7b ............&..{ 0090 - c6 d2 6b 16 1f b1 3a 54-bc 65 af 94 f7 93 73 d9 ..k...:T.e....s. 00a0 - cd 72 b0 33 cd b8 91 80-f6 92 32 03 ee d1 15 f8 .r.3......2..... Start Time: 1774263036 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 404C96ACFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAMAQABDB2aZgyGD+vChr5CUzMkJgdD43LwAOPN3ott321sl7z IN+MWdsY9N65OsaRnWMixuGhBgIEacEa/KIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-RSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with explicit TLS 1.3 spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMmhkg54Oco9uQPlGseiZmkyI+LeYQaW97xY 3a/pru5s4QwrgCaob8r0YclRcibaecLZ4ug68hoKYutTkAwqqP+hokiSi11IBs6f vGvuhUmM1bqmX6D5KD2m7xdFOJIywS2Gp79qDVjcXDV8lJtfqdiJX4Zo5UkUfWR2 dIy+2cEDgaNFgEBlfKKVTHg42uEJh27gbl3LXk6dJFUHpHgTwsjh4ej2+hEDJLzX irdionqo9UDzFMmv+XYAr3PheUmT4Y4VxeM6756PY0Gqz5R/CyB5T/sBE2LZZBMB KcBSdxxdhfokhavapnStsF9I/gNyja5pydp7hNEW/xLKEXoHrqsCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSG61m1ONNn6/mlh4x5j0fH2L7Y4DAf BgNVHSMEGDAWgBRk4wSlarJRSWfcWfTw1wNeibM8iTANBgkqhkiG9w0BAQsFAAOC AQEAUAlYq8HkmFZ20aSUavFZGjFTp8IfYFnAtMJPAWbfJCQoO1NpoklBTHiNbwS3 tm3VjGPaOFgphnLEwWY0oy8nUPu3Q8yWRelH60QfOpIRvxK+V98BOioOLGEmIhnA kFiscTY19RWXgVmi9DfhQox2/klpm48dv0v9nQmX4zfFGtz6HX9PP44SFM9nfuu4 oNj6GQ+EyAuvHgVRtyIBjXGWIasVhL//xaJkn1USBM/f7pQ7vsgNzFZ2fzTdQtst kyFrhxGDlvbuiH696i8/VSUphdLB80igxde1FwnVevm1etYcjXKKs0Zjk/gaB6tQ PTGnp0RjdPaIBsvyaEt2ib4Ufg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 318 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 44051B1DE2830920978C97C2EE685771000126C5730EF71D0FBAB9924612D1C8 Session-ID-ctx: Resumption PSK: ADC5644F873E6B30AD59144265554C762B0C837A5D5D1FF5C731C3415F3BF5888AC617E33AC0F9476704EFDB550F363C PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - a1 72 37 40 17 00 a3 ae-78 1a 05 31 05 e5 92 ea .r7@....x..1.... 0010 - d1 10 ee 19 71 8f 18 c4-a1 a2 a1 51 fc 80 d2 c0 ....q......Q.... 0020 - 26 fe ea b6 c6 1c 11 d9-b8 b7 59 c6 51 49 a8 7b &.........Y.QI.{ 0030 - 04 02 66 0a 89 ea 7b 52-69 15 ea 0e 16 c4 a4 ab ..f...{Ri....... 0040 - f2 70 55 df 56 78 8b bc-db 9f ad 71 ac 58 b2 20 .pU.Vx.....q.X. 0050 - e5 57 bf d2 93 29 c9 fa-53 04 1d b7 4e 56 3c d2 .W...)..S...NV<. 0060 - 35 87 7d ba 3e 1c 39 bf-3c fa 0e d0 e4 fd e0 50 5.}.>.9.<......P 0070 - cb 47 8e 84 4f 57 e2 06-9a 9a 40 b5 c8 1e b4 8e .G..OW....@..... 0080 - 0b e6 26 25 c8 b7 24 26-a4 19 08 6b b2 d0 1d 37 ..&%..$&...k...7 0090 - f9 79 37 2e 93 f5 a9 29-62 34 a2 1e 33 f1 e3 5d .y7....)b4..3..] 00a0 - 7f d8 c8 02 34 dd fd b9-69 a3 1f 7d 74 5c 6c d9 ....4...i..}t\l. 00b0 - e2 6c ab a2 de 0a 60 45-57 14 a2 4c 4a 79 a5 16 .l....`EW..LJy.. 00c0 - 6b c0 c1 f1 5b f4 e4 b6-9c c0 41 37 50 a1 c8 81 k...[.....A7P... Start Time: 1774263036 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: CFB943A875593D7173C451FD7ECA57F87EA67CDD003C007B42078418405C782A Session-ID-ctx: Resumption PSK: 2C261AE7072B82B8A61A2EF36709EAC04A8B39C8679CD1C5E7D55C5E52F6903FD804E9C39ADB3B9841D56540CCD45D8E PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - a1 72 37 40 17 00 a3 ae-78 1a 05 31 05 e5 92 ea .r7@....x..1.... 0010 - 2a 7a 9a 2a bf 64 4b 04-4f af 63 8f 9a 16 37 25 *z.*.dK.O.c...7% 0020 - c4 da 14 45 ba 0d 0f f8-8b 6d 33 a4 78 d2 3c f8 ...E.....m3.x.<. 0030 - b9 18 94 19 9f 49 f2 b3-eb 8c 1e 52 36 37 91 43 .....I.....R67.C 0040 - bc 40 c7 c5 78 3e 41 71-14 b2 1d 32 15 4d 7f bc .@..x>Aq...2.M.. 0050 - 89 3a ac ae 88 27 bc 00-04 ed 3f 82 3d f2 5d 46 .:...'....?.=.]F 0060 - 50 1a 48 85 9e 3f f6 aa-cc 11 28 99 d5 34 5b 22 P.H..?....(..4[" 0070 - a1 e3 6e 50 80 54 9c 49-48 c0 62 e1 29 be fc 9b ..nP.T.IH.b.)... 0080 - 5f 45 7a fb 81 f4 c5 57-5e 85 f2 a0 56 57 4e ed _Ez....W^...VWN. 0090 - 6d 10 f9 64 eb 97 5c 6d-b4 39 68 17 33 32 9f d1 m..d..\m.9h.32.. 00a0 - e9 bb 2b 66 09 01 d4 66-64 24 0f 65 db de b0 54 ..+f...fd$.e...T 00b0 - 1a c7 55 e6 22 e7 f4 d2-cc c8 54 c2 e9 04 80 36 ..U.".....T....6 00c0 - 5f 15 de a7 f2 08 a6 10-e6 f4 15 66 89 f3 c8 a8 _..........f.... Start Time: 1774263036 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 408C9DAFFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIACh+5JbJdmfCLBNw628halb6ejdrZmtKL5KDb2C3av5 BDAsJhrnByuCuKYaLvNnCerASos5yGec0cXn1VxeUvaQP9gE6cOa2zuYQdVlQMzU XY6hBgIEacEa/KIEAgIcIKQGBAQBAAAArgcCBQCNjfi6swMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 (ECDSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5 tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK 4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB hS/cPUmv -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1086 bytes and written 290 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 Session-ID: 6795FC7DC4A67DEA44D6D78254D681F580C2323D1A0D33E64CB4E2BA8F8687C8 Session-ID-ctx: Master-Key: ED86ACDD62283C92D03C65F87880AA211960CB397927D431DE97000D548D56BB38DD61CA45E9E7D826D345A2BC1E81B0 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 6d 04 fa 1f 2c 1f 8c 12-9c f4 a4 72 07 71 2e b5 m...,......r.q.. 0010 - 88 ef dc 09 72 f4 a9 c1-fe 20 20 f0 2d 95 31 e2 ....r.... .-.1. 0020 - 8a 7b e5 23 1e bb 30 b5-94 b3 9d 7d 41 2e fe da .{.#..0....}A... 0030 - d6 62 a3 78 e7 01 67 3c-e9 ca c7 8f ad 85 41 f9 .b.x..g<......A. 0040 - 46 56 ba 65 fa dd bb 3e-40 6e fb 86 9d b3 a2 01 FV.e...>@n...... 0050 - 8d 69 a8 30 ca 5a 47 36-15 12 bc 18 d3 75 4e cc .i.0.ZG6.....uN. 0060 - e9 1e 15 37 e5 63 2f e7-ee c2 f1 a5 8d cc 47 5d ...7.c/.......G] 0070 - 37 cb d8 69 be 60 17 ab-7d f9 67 f7 89 68 0b fd 7..i.`..}.g..h.. 0080 - 85 6c 0d a0 6b 5b 3f 8b-03 52 d1 6b 7f 56 f9 78 .l..k[?..R.k.V.x 0090 - 5b 02 23 ec 02 14 65 16-83 d0 ab 06 56 b1 f3 71 [.#...e.....V..q 00a0 - 88 10 f2 ec d9 02 bf 89-e4 14 64 26 c6 4c 4c e1 ..........d&.LL. Start Time: 1774263037 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 40FC7FB5FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2 Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALALAQABDDthqzdYig8ktA8Zfh4gKohGWDLOXkn1DHelwANVI1W uzjdYcpF6efYJtNForwegbChBgIEacEa/KIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 and ECDH spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5 tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK 4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB hS/cPUmv -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1119 bytes and written 263 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES128-GCM-SHA256 Session-ID: F8071523DC9AF6F8DEC574953B62785C2F0F7612B04C7685B475941988C8C318 Session-ID-ctx: Master-Key: 058609D5F67B531E8E2ED45F0E3112FBF1CFC5C0A8E4195EF3A7FD87AAC7BC8BB05F3B1E3779C91B76A6FE94679700A0 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - eb 36 df 13 9a 1f 33 af-f5 61 9e cb 81 e2 3e c2 .6....3..a....>. 0010 - 86 65 6e 30 00 6d c2 25-c1 c2 bd be 0f ab fc 3f .en0.m.%.......? 0020 - b0 55 62 18 87 ef cf 97-53 b1 71 8e b1 c0 0c a0 .Ub.....S.q..... 0030 - fe 80 4b 7a 20 50 16 4b-27 6a 82 83 e7 56 d9 00 ..Kz P.K'j...V.. 0040 - f9 d5 17 f0 79 59 69 59-60 32 a3 1d aa 53 35 70 ....yYiY`2...S5p 0050 - 99 2e a9 c5 03 45 3c 94-27 4f e7 db 3e be dd d3 .....E<.'O..>... 0060 - a2 04 51 0c cb 17 9f 8c-b1 f3 28 89 39 6e 34 94 ..Q.......(.9n4. 0070 - 30 7b a9 51 5a 7b e1 3b-b9 3c c1 d8 0c 7e a5 f0 0{.QZ{.;.<...~.. 0080 - 3e 8f 80 9c bc f4 85 de-79 c9 01 fe 6b fa 15 ef >.......y...k... 0090 - bf be c5 53 c5 25 17 bf-ea 15 b0 2a c7 52 20 9c ...S.%.....*.R . 00a0 - 29 a5 8b 89 15 d2 97 b5-c0 38 7d d2 d0 fb a5 d1 )........8}..... Start Time: 1774263037 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 404C1C82FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAKwQABDAFhgnV9ntTHo4u1F8OMRL78c/FwKjkGV7zp/2Hqse8 i7BfOx43eckbdqb+lGeXAKChBgIEacEa/aIEAgIcIKQGBAQBAAAArQMCAQGzAwIB Fw== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES128-GCM-SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is ECDHE-ECDSA-AES128-GCM-SHA256 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.3 and specific suite spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3 -ciphersuites TLS_AES_256_GCM_SHA384 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5 tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK 4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB hS/cPUmv -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1059 bytes and written 329 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: E49F2525C1E58F20AE987044C4F5116F91B3EFD67A68611B4318B2D6A070AAF5 Session-ID-ctx: Resumption PSK: EA339FABECFBCBB92001F84C2545948B5A99EADA670A2FEC07CB46874458809BC761D9826D87D26EF997B853D42E9BF3 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 03 ac c2 e5 a2 9e 27 11-e5 f4 34 b9 98 df 08 d7 ......'...4..... 0010 - 65 1c d8 c3 23 87 99 09-14 fc 58 f2 d5 53 5c cc e...#.....X..S\. 0020 - 5c eb fc 24 3f 07 60 01-7b 48 2b 4d 8f d1 ba d6 \..$?.`.{H+M.... 0030 - c3 ab 5c b8 06 89 17 10-a9 98 88 d6 46 3a eb e9 ..\.........F:.. 0040 - bf 31 a4 a9 7a 12 10 c8-c0 b9 e7 15 50 2a d3 97 .1..z.......P*.. 0050 - 3d de 11 8a 3a 7e 06 39-25 6f 44 44 15 5d 8c 8d =...:~.9%oDD.].. 0060 - db 65 31 75 ce f8 67 34-eb c5 9d c8 43 40 61 71 .e1u..g4....C@aq 0070 - 48 3a f8 c8 60 1b 8f 09-70 79 02 05 52 49 ed 1d H:..`...py..RI.. 0080 - 59 31 6d 3a 4d 15 c8 53-02 72 5c 6e 97 93 1d 3a Y1m:M..S.r\n...: 0090 - 11 19 03 88 0a f5 1f bc-64 a7 dc 66 4e 2f 95 3f ........d..fN/.? 00a0 - 7f 6f ab 0c 44 92 2d 8e-2f 30 78 82 d0 2f a8 dd .o..D.-./0x../.. 00b0 - 59 c8 d5 32 26 69 86 e6-06 95 5c 29 0a 2f 88 cc Y..2&i....\)./.. 00c0 - 04 82 80 c1 2b 5b a4 a4-18 de 43 1d 2b a8 a8 bb ....+[....C.+... Start Time: 1774263037 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: EB1754D362744C0B1446CE32065C0D385486D424B487276849E5F8975F14A0D3 Session-ID-ctx: Resumption PSK: DE06016129FE281246F60B20A216E58B3A15259536BC1A3D46DF7CFCB9C472307077E28A6CEDA83C5FB15F77D1596FC0 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 03 ac c2 e5 a2 9e 27 11-e5 f4 34 b9 98 df 08 d7 ......'...4..... 0010 - 97 1e 5f 00 65 b5 fd b2-b6 a4 c7 eb 6a ed 5b d8 .._.e.......j.[. 0020 - 6a 7b 0c c3 6c 29 7e a8-a9 97 ea 57 81 fa 01 2e j{..l)~....W.... 0030 - 84 e5 09 b9 f7 4d 9d 20-8b aa a8 ae df 17 0d a0 .....M. ........ 0040 - 52 89 99 82 53 e3 6d 2f-bd 37 9f 88 9d 47 40 e9 R...S.m/.7...G@. 0050 - 88 27 b4 95 9d d8 e5 d5-25 df 82 99 ef 6b 17 72 .'......%....k.r 0060 - 58 0e 62 56 50 59 f4 36-38 bc 48 42 35 dd 42 6e X.bVPY.68.HB5.Bn 0070 - 1d f2 b3 31 0b 81 ce ec-0e bf bf 08 46 5d ba 14 ...1........F].. 0080 - ba 84 d6 e0 12 f3 cf b2-4a 81 cb 5e f3 09 42 5b ........J..^..B[ 0090 - 15 c3 1f 04 8b a0 d2 48-e4 44 5b 86 94 5b d3 e3 .......H.D[..[.. 00a0 - 51 6a 24 27 08 26 75 9e-5f b0 5f 6c e5 1e 42 87 Qj$'.&u._._l..B. 00b0 - 52 16 ef 26 18 10 ee 2d-ca 63 84 2b d7 d7 46 85 R..&...-.c.+..F. 00c0 - 07 a4 8c ee 4b 13 be fa-1a f9 ec 69 e0 74 f2 0e ....K......i.t.. Start Time: 1774263037 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40FCD09CFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIBhzYBBbwTQDx73iRVoSlXgjKPIa9Gnnc0AsaSJcjf4y BDDeBgFhKf4oEkb2CyCiFuWLOhUllTa8Gj1G33z8ucRyMHB34ops7ag8X7Ffd9FZ b8ChBgIEacEa/aIEAgIcIKQGBAQBAAAArgcCBQDLD22ZswMCARc= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## ######################################## ######################################## ## Forcing the provider for all server operations ## Run sanity test with default values (RSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMmhkg54Oco9uQPlGseiZmkyI+LeYQaW97xY 3a/pru5s4QwrgCaob8r0YclRcibaecLZ4ug68hoKYutTkAwqqP+hokiSi11IBs6f vGvuhUmM1bqmX6D5KD2m7xdFOJIywS2Gp79qDVjcXDV8lJtfqdiJX4Zo5UkUfWR2 dIy+2cEDgaNFgEBlfKKVTHg42uEJh27gbl3LXk6dJFUHpHgTwsjh4ej2+hEDJLzX irdionqo9UDzFMmv+XYAr3PheUmT4Y4VxeM6756PY0Gqz5R/CyB5T/sBE2LZZBMB KcBSdxxdhfokhavapnStsF9I/gNyja5pydp7hNEW/xLKEXoHrqsCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSG61m1ONNn6/mlh4x5j0fH2L7Y4DAf BgNVHSMEGDAWgBRk4wSlarJRSWfcWfTw1wNeibM8iTANBgkqhkiG9w0BAQsFAAOC AQEAUAlYq8HkmFZ20aSUavFZGjFTp8IfYFnAtMJPAWbfJCQoO1NpoklBTHiNbwS3 tm3VjGPaOFgphnLEwWY0oy8nUPu3Q8yWRelH60QfOpIRvxK+V98BOioOLGEmIhnA kFiscTY19RWXgVmi9DfhQox2/klpm48dv0v9nQmX4zfFGtz6HX9PP44SFM9nfuu4 oNj6GQ+EyAuvHgVRtyIBjXGWIasVhL//xaJkn1USBM/f7pQ7vsgNzFZ2fzTdQtst kyFrhxGDlvbuiH696i8/VSUphdLB80igxde1FwnVevm1etYcjXKKs0Zjk/gaB6tQ PTGnp0RjdPaIBsvyaEt2ib4Ufg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: DA438A123C23CA20FB1BBAF09E78573181F758598D4280D66217AA648729AED6 Session-ID-ctx: Resumption PSK: 29C2F0627C05B00EECDEB95CBE18C6E04EE115EB74CEFE0576F8429BD187A8E22835C79462B2212C5696708FBC9E9686 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - d1 64 c4 69 10 da b1 02-b8 8c b1 05 d8 79 61 ab .d.i.........ya. 0010 - 70 73 bb fb 2d 69 05 b9-a1 b8 3e cb 35 d3 ff 08 ps..-i....>.5... 0020 - 13 2e f5 12 f2 3e 6a 73-6d 17 37 e3 0d ff a1 31 .....>jsm.7....1 0030 - c0 45 51 59 b4 71 06 c8-88 36 31 25 3f 55 a6 2e .EQY.q...61%?U.. 0040 - 3c 05 1a 50 47 ba 59 54-72 25 ea 2a a7 b9 21 9d <..PG.YTr%.*..!. 0050 - 95 af 8e 9d 19 60 e1 2f-cd 99 07 f8 b5 ff ad 6c .....`./.......l 0060 - 98 40 76 0a 68 7c ac 54-4c 58 03 94 0c a5 0f 8e .@v.h|.TLX...... 0070 - 20 5c 07 a1 dc e9 b8 56-09 e4 c8 62 ed ea 4c f5 \.....V...b..L. 0080 - 3a cc 8a 87 f0 aa 7a 70-e8 15 a5 8f d9 de 96 e7 :.....zp........ 0090 - 4e 5a d3 6c ae 01 84 13-17 07 07 ce 9d 4d dc 95 NZ.l.........M.. 00a0 - 32 05 d0 8c 2d 05 6f 5a-81 0e 7a e8 9c 50 12 4c 2...-.oZ..z..P.L 00b0 - 00 77 2f 97 06 59 d2 37-d9 8e 36 1d 1c b5 8a c9 .w/..Y.7..6..... 00c0 - fa a0 1c 1e 0c 1e c4 1c-33 92 bf 04 7c 6f bd e7 ........3...|o.. Start Time: 1774263037 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 6682E6B285F43BADAAC5CBDD1FE4D633DF7A4241793BAF8040B0E1D8226B14EE Session-ID-ctx: Resumption PSK: 0864C9487E814AB730E51249AFD1795F9F77D6C6E73E5FEC06D9173624C700AE9B33B961F042064056886E8E00C0D0FB PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - d1 64 c4 69 10 da b1 02-b8 8c b1 05 d8 79 61 ab .d.i.........ya. 0010 - 4f 5a a8 68 42 75 45 1b-f1 9b 7b b4 6b c5 88 6d OZ.hBuE...{.k..m 0020 - af 4e be 22 7e dd 70 95-32 54 76 57 9e ce 14 45 .N."~.p.2TvW...E 0030 - 39 b8 3e ae a3 27 fe 89-b2 ba 84 20 e1 8f 86 76 9.>..'..... ...v 0040 - e4 0b b1 76 cb 61 97 be-1b b1 d9 fa 37 a1 ad 46 ...v.a......7..F 0050 - ae 57 36 e8 88 4c e9 1d-24 db c4 47 b1 58 ec 75 .W6..L..$..G.X.u 0060 - b1 45 d0 5b 52 f3 7b 9a-78 84 c7 96 6d 94 9d b2 .E.[R.{.x...m... 0070 - 4e 9a 97 1c cd 2d 2a dc-4d a4 ba 4a e4 27 7e ac N....-*.M..J.'~. 0080 - 12 2a 0a 78 ef 45 e0 1b-56 be 07 3d d1 f1 f3 33 .*.x.E..V..=...3 0090 - 43 93 72 b4 bb ce c4 39-cc 1d 99 14 e2 5b 39 09 C.r....9.....[9. 00a0 - e2 30 4a 27 98 fe 5f e9-ae d4 8a b4 cd c8 d7 fb .0J'.._......... 00b0 - 4b 75 95 69 e0 41 94 15-0c ff e1 95 a5 3c 2a a3 Ku.i.A.......<*. 00c0 - 6b 15 53 8b 72 37 3a 48-54 e7 d1 6e db 47 06 5d k.S.r7:HT..n.G.] Start Time: 1774263037 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40ECAA8BFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIFlVtdUYtyILF2/qXMAgzQHsze9oobSCK93eS4MwZQ0o BDAIZMlIfoFKtzDlEkmv0Xlfn3fWxuc+X+wG2Rc2JMcArpszuWHwQgZAVohujgDA 0PuhBgIEacEa/aIEAgIcIKQGBAQBAAAArgYCBGZwYouzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (RSA-PSS) ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%10 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 2048 (bit); sigalg: RSASSA-PSS v:NotBefore: Mar 23 10:50:37 2026 GMT; NotAfter: Apr 22 10:50:37 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIEIzCCAtugAwIBAgIUa/y6gzQqTqQyoKlff5XVdw+QR3cwPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwMzIzMTA1MDM3WhcNMjYwNDIyMTA1MDM3WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCASAwCwYJKoZIhvcNAQEKA4IBDwAwggEKAoIBAQDAF+4AGgeXYia0BjrO 1htrRpPgSbsCCnSohKHaHoNLaiIZCinYdOz95lZ61FJwq+JG0/KCKoCO9EiVBK3z Bbmj83bostBnw4C4wKreeGYeeQWBdxstOMWvzktj/c1ghhqJXmRICPDgb+otbNHR QCdUO9dWCeEYTaTXJz/IAlDoWwNrkEn7A+Dil1ycg4s71QEzFIroRQ9ub/nuckJB DNlgHvMyY+U5m/D6aFMmLaFECzm8Hu0Dkkhle8ORPDhDrjwTpt06qxP8fZYqUnCt 1sljhWxBgiJneDV/k5meUNMEXNaPzFNUK+AB1X/j3NG4ORHUyDpl5b+1maNvT+1A t8a/AgMBAAGjaTBnMB0GA1UdDgQWBBRArDRUa004tVWoc6pwjt2urtDdoDAfBgNV HSMEGDAWgBRArDRUa004tVWoc6pwjt2urtDdoDAPBgNVHRMBAf8EBTADAQH/MAkG A1UdEQQCMAAwCQYDVR0SBAIwADA9BgkqhkiG9w0BAQowMKANMAsGCWCGSAFlAwQC AaEaMBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgGiAwIBIAOCAQEAUxLTR7RXhZas ed12u/gSFcErarFgW9KT/oppIxMqtjvx2SM4SpCWCoNUSzyUaByHWjD1MwiDdcGq VDzotW9fML8PJuE6DlGm0S4oAJvNqVa3mccaswYqb+tl5w+Ii3wULTzUjQCO9WGv TgNVKnMS+ecgbkK3EGYvgFz6lQptkMMljfERtHia9OW2iThZSLD1m9QIWXgHlWDH R6Pb+i12K5QD7pvTVR7hxVFFyWXOR3adDejV3ZzgyJDXLYmIuP60zEwC69sZHxtc CJlPdI4RHetQg7pYOrD0dcf6s4P9mTlmJMA39kIFwd5v8siuxinYEhuHuDzsUJ6C a6gWh/IotA== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1619 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: E25F99E5B1AA0C72F2D8A189BD2EDC278F71A681E3E7AD428757FF54DA5D866C Session-ID-ctx: Resumption PSK: 7809A922293842F0931FCD5EB1B478BC65C93395F9E07E0FD5F3581A0581D2A951EED8FB86213814C59D34AFEAD7EEFC PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 79 2d fc 0c 27 60 29 68-de 05 15 87 c2 ad 18 b2 y-..'`)h........ 0010 - ad 85 a0 66 26 fa 72 fd-8c f4 c7 28 37 81 08 53 ...f&.r....(7..S 0020 - eb cb 4b 22 4e 6b 31 ee-1e 6a bb 15 55 11 b3 aa ..K"Nk1..j..U... 0030 - 5f 9a 09 da cd 7c f6 39-5a 83 e4 f5 1d 56 e7 56 _....|.9Z....V.V 0040 - ba c1 1f 38 03 58 ca a5-1c 33 e1 5a a0 ea 21 9e ...8.X...3.Z..!. 0050 - 68 f1 54 25 6e d0 1a c5-e5 1e fa 99 26 95 2e 1e h.T%n.......&... 0060 - ee 72 28 8c 34 d5 09 a2-a8 cb 83 f8 5a 4b 03 44 .r(.4.......ZK.D 0070 - d4 53 b4 31 87 d5 18 82-e8 e9 0b f0 b4 9c 17 36 .S.1...........6 0080 - 4c 0c 25 2f 5f 67 92 5d-d7 64 a0 19 32 4b 64 0e L.%/_g.].d..2Kd. 0090 - 45 4c 13 24 33 23 58 bb-14 5c 2e 0d a8 66 b3 0e EL.$3#X..\...f.. 00a0 - 66 35 11 a3 ee f1 2a 99-0c 0a 0c 30 c8 fc 50 1f f5....*....0..P. 00b0 - d9 5e ec 12 3e e5 27 3d-9d e5 6d 9d d1 e0 e9 74 .^..>.'=..m....t 00c0 - c5 86 1f b5 b5 f2 5b b5-1c b4 ea 40 99 2c b6 73 ......[....@.,.s Start Time: 1774263038 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: FA178985B51790262B085F0BCEA1ECB5D55EE1B4F5D19B281B249C529C0EF6A1 Session-ID-ctx: Resumption PSK: E02FFE05656B3AA3F38E93612BAAE89D1DD7DE953AD8F203B83476EEC10E7001246F5274687E5DB1B8A14A45D62BFEBE PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 79 2d fc 0c 27 60 29 68-de 05 15 87 c2 ad 18 b2 y-..'`)h........ 0010 - 30 59 15 42 15 c7 5b cf-b6 27 08 e5 85 c5 7e ed 0Y.B..[..'....~. 0020 - 03 35 22 bf 9b c1 b0 e9-bf 33 b7 dc 81 96 18 52 .5"......3.....R 0030 - e1 b1 d8 b9 61 3a 03 1f-fb e6 5d aa 04 64 a8 ee ....a:....]..d.. 0040 - b5 70 dd c2 58 cc 17 f6-ba 01 7e 98 19 e6 a1 11 .p..X.....~..... 0050 - 90 af 14 22 07 96 80 d3-93 4a 99 cd 3d 08 28 3c ...".....J..=.(< 0060 - 50 aa 2e 83 02 40 79 e4-0d 3c ef 47 3b fd ea 11 P....@y..<.G;... 0070 - 39 b2 b6 bf fe e9 f2 c8-87 06 7d f3 fb 47 51 10 9.........}..GQ. 0080 - 58 17 49 fe 87 4d bd 1b-db af e4 b0 34 ed 3b 94 X.I..M......4.;. 0090 - 85 28 f4 c4 4f 26 13 74-6c 13 de 84 cf d9 54 54 .(..O&.tl.....TT 00a0 - 4f c0 d3 ec 44 bc 7d d1-e5 83 f5 74 09 e2 fd e1 O...D.}....t.... 00b0 - bb b9 5e 41 c8 18 07 8c-26 0b ac 0c fd 00 ad 87 ..^A....&....... 00c0 - ae b0 8e f9 b8 4e a6 19-cb c7 80 56 8e e0 23 e2 .....N.....V..#. Start Time: 1774263038 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 404C258DFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-default.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIJ/Ew2JDTZ2wI/ddTObFCjkVdauUMtpHJYIW0TGnD1/3 BDDgL/4FZWs6o/OOk2ErquidHdfelTrY8gO4NHbuwQ5wASRvUnRofl2xuKFKRdYr /r6hBgIEacEa/qIEAgIcIKQGBAQBAAAArgYCBHFNBsezAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with RSA-PSS and SHA256 ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 3096 (bit); sigalg: RSASSA-PSS v:NotBefore: Mar 23 10:50:38 2026 GMT; NotAfter: Apr 22 10:50:38 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIFKDCCA12gAwIBAgIUaTRVTUDT8USm2IFbLWhVwflRF14wPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwMzIzMTA1MDM4WhcNMjYwNDIyMTA1MDM4WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgwyCtjJDJoFG2aS9jItn AxBiK0Jg+iFC1hTTReprcrOSbr8b3fouLI68QFIjieaEmRwGL/p5vJ5Mst7HeU8G u2+jHP3e+L7YYiGBTUE6qKfFccQnNv8R3y+eoM+mr2axl2LdRu5fFLkFJbfFAQyI Y5U9TTHdhQUZhGV1gxPTvrspUkjYM+ENAFfsUnhuym+wgl9ZAsCZAYac0e+cyn2C h2OwGFsBKbFbMgHRiVfl4ncTsqiEIOEkikq4pUHIe7Wf+xfQqs/EzgsI7CdbLOJ6 ItIx8006mm9XutFTiMilVzzyBGW51ihhvprvewF86VOhs/oSlr1wK3yi8QGX8auh fB6nMqZ3shsiyqkARTdOYQPnXiljE2SjBQyTKi/W1Q52pFZxKwZ5cpZMrhMpfxyJ J6cXwsfDavGv4wo21fDK70I7dliSy58pd68h5y6sdd6IzHpZQC/wVSjpnvtN87PG CdbsXYPmU3qe3Hki7WR2FUZLyBPwNLed8x73ad56FHlOMlvWjQIDAQABo2kwZzAd BgNVHQ4EFgQUWNa4hGl5YEQfmSg+qNJBjwuQZU0wHwYDVR0jBBgwFoAUWNa4hGl5 YEQfmSg+qNJBjwuQZU0wDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B AQgwCwYJYIZIAWUDBAIBogMCASADggGEAANzPHnsLjTu+qX9dza1muGI+Fr2gznh 3bzRyshtTAlB5G3gZ7CZRlp7Wrn+HPVjmsPKiB0gO2L5/i7A3F/bZKTYiFktTZfT mOcXkVM6KJrX31FYnHfvSpYKllH2+FWNpyON2IRi5NmOZLCcfX3WB7cqhDiSpACO gkRwcfVI03w7/KjEJozHIC4Z1zwpoJjy3tV8rfMfoe/ksf5IcBftKEicr0cuA73a pMt0lh+0Ir8/DS9cydiBRg57R11dNDGURU/fTqtpamep/TmHcnvOqswE/GagWa0i nyHO93fAGgpl/f0VUKxkxatZqtijsGrHbDOoyRrkce6EbeCTsw+n4RB/j3r0lwPo jkHzVsb5+z3aFMyPE7XKsa5gGhbNmoYuHaPKYKuZP6d86fcZIP+ZqQiSAjF+Eu7/ ZzNVzxoWo+2BwUgqk3njM+6/1jeMRvj0LlQ34X4jMVcsT6gxsP3ePyTcJ4VOLkMu 6TpfOagbEMtgZJVMaCCc6/kkTcqRB9eQBt/zLg== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 2011 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 3096 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 2CC47058F60B2A939415D513ACCAFD5328EEA53ECC6C0E2C9C1C245DBF979A5D Session-ID-ctx: Resumption PSK: 9952E6B841CD1AC9547A777EDFCB479849808BC327C440F9FDB167142E9E19DB9F7E0A538B4CBFB20A1937765BDF7624 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 14 c1 7e da 19 2a a7 54-39 df 11 bb 33 b7 f2 6e ..~..*.T9...3..n 0010 - aa 16 5e 73 5f 52 3d f2-34 f7 e9 f7 a4 34 21 9a ..^s_R=.4....4!. 0020 - 91 3d 9d 3e 46 9f d3 84-30 3f 11 64 9a 83 b5 f8 .=.>F...0?.d.... 0030 - 09 b2 1f 8e ff 0f ec 2d-e5 fd 95 2c 19 b5 43 4f .......-...,..CO 0040 - 96 f5 96 fb 43 00 14 47-7a aa ee 84 2b 43 40 5e ....C..Gz...+C@^ 0050 - ec 3b 1d de 36 02 f4 1c-70 4e f7 cf ee 21 45 01 .;..6...pN...!E. 0060 - 26 3a 71 76 fc 0c 74 49-95 d8 15 96 75 8f 34 d5 &:qv..tI....u.4. 0070 - 16 58 16 2e d2 53 88 ff-27 f5 e9 3e 46 2f 0e 78 .X...S..'..>F/.x 0080 - 1d a7 66 23 fb 1a 2c 65-f1 a9 f6 06 bd 2c 31 32 ..f#..,e.....,12 0090 - ab 80 31 1d e4 ad 56 99-fe f8 97 61 2f e7 f4 f6 ..1...V....a/... 00a0 - bf 5d 14 b5 68 ff a8 f0-36 14 62 33 99 c0 36 7d .]..h...6.b3..6} 00b0 - d7 12 c1 aa b5 90 7a 89-44 b0 85 2b cf 56 a6 b5 ......z.D..+.V.. 00c0 - ca f5 59 7a 1e 21 01 79-47 04 67 e6 73 eb 68 fe ..Yz.!.yG.g.s.h. Start Time: 1774263038 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: CE8BF73D7033CB2E09F5B87E4B8F212AFBAA2298B0C43EF674C57F40DC61DB80 Session-ID-ctx: Resumption PSK: EB6A338DB4E50918B54D52146EB07F1505DB18C80C39B8C221D6D50FA90EC75F3F0E09BA75972F077D8F3A9E7A7821BF PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 14 c1 7e da 19 2a a7 54-39 df 11 bb 33 b7 f2 6e ..~..*.T9...3..n 0010 - 9f 22 85 96 bc 13 be 72-a6 56 de 70 80 d7 07 8a .".....r.V.p.... 0020 - 07 70 91 79 27 e6 40 ef-ba b2 68 03 0f 2e 0a ce .p.y'.@...h..... 0030 - 84 be 07 d5 d7 fa 4f 74-1a 06 a5 35 4e 66 1a da ......Ot...5Nf.. 0040 - a0 11 28 4a 6e d5 75 46-4e 15 23 1b 46 6f 48 6d ..(Jn.uFN.#.FoHm 0050 - 25 d4 ca a3 d1 77 4b 33-06 31 7b 4f ae f6 1e 4c %....wK3.1{O...L 0060 - 2c 4a d0 db 4c 59 37 a0-99 b5 9c 98 be 1c d9 c1 ,J..LY7......... 0070 - 81 74 39 87 c8 57 5e 5b-ab 3a 51 ef 05 84 4a 02 .t9..W^[.:Q...J. 0080 - 57 27 54 30 fb 8f 0e 2c-1e fc b7 61 ff d4 17 03 W'T0...,...a.... 0090 - f3 22 11 a1 d4 dd 1b 7f-e9 c4 eb a3 c5 82 1c 39 .".............9 00a0 - 92 e3 ed 6c ed db 55 b6-80 96 9b da 70 fc 18 09 ...l..U.....p... 00b0 - 0a 81 d7 73 a2 27 db 1b-a6 b0 d8 f5 cb 3a a0 0b ...s.'.......:.. 00c0 - 48 24 e5 fc 76 85 d4 23-60 24 14 98 50 d0 1a 0b H$..v..#`$..P... Start Time: 1774263038 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 402CA79AFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-sha256.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIDEgA58RE4tMUSmVMscaWg3L45YVajhcDCVwSQb5tNpx BDDrajONtOUJGLVNUhRusH8VBdsYyAw5uMIh1tUPqQ7HXz8OCbp1ly8HfY86nnp4 Ib+hBgIEacEa/qIEAgIcIKQGBAQBAAAArgcCBQCANni2swMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (ECDSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5 tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK 4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB hS/cPUmv -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1000 bytes and written 391 bytes Verification error: unspecified certificate verification error --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 1 (unspecified certificate verification error) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 12B567C24D053E6FAA946814D92FEB558BF1792D17D31C41C26F7324BB4F335B Session-ID-ctx: Resumption PSK: C83DCAF5C6A914A56F4532E00DB103B8E21225DD440EA235F85C3EDA6E96FE42E0757A5C67B28CA572601CAF27B7300D PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - ba 3a a9 e9 2c dc 32 f9-26 a3 52 85 86 2e 9a 98 .:..,.2.&.R..... 0010 - 79 0b cf 59 d0 07 56 01-4b cb ec bc 8f 8d a1 de y..Y..V.K....... 0020 - b3 38 07 b5 9d f3 69 02-e1 26 c3 68 04 fd 42 09 .8....i..&.h..B. 0030 - 9a 83 f1 3e 9a bb 8b 2f-6b 8a b8 65 ba a6 1e ee ...>.../k..e.... 0040 - 2f 5a ac e5 65 a6 f9 4e-14 79 0e 12 b8 5a ce 42 /Z..e..N.y...Z.B 0050 - 17 3b 46 66 f8 c1 e8 ed-16 70 3c d4 4b 1f 82 7f .;Ff.....p<.K... 0060 - 30 0c 47 5a b3 ae 95 2e-e2 e7 a9 de 70 41 f3 b5 0.GZ........pA.. 0070 - 66 42 8c 66 06 57 58 72-3c 62 c8 eb 58 17 df 52 fB.f.WXr..F~....O.% 0080 - 30 44 4f 04 e6 60 ef a6-c6 26 36 b0 e4 6e b2 30 0DO..`...&6..n.0 0090 - 04 5f 98 c0 30 b8 07 1c-0f ec 4c ab ab cd ce c8 ._..0.....L..... 00a0 - 19 30 1c 14 a8 2d c7 dc-6d 74 13 0e 6e 73 0a 20 .0...-..mt..ns. 00b0 - 7d 3a f0 c6 eb fb ee 78-76 3c 90 a2 16 43 32 9f }:.....xv<...C2. 00c0 - 0e 88 c5 6b d4 70 0e 08-91 b2 26 cd 73 80 74 79 ...k.p....&.s.ty Start Time: 1774263039 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 4DFB9B9ACD79E0C63522840CC983999281AA6EFFCF707E37D9AC6247003EC68D Session-ID-ctx: Resumption PSK: 916DE02132B5EA433AECCBDB552568C924D973799E11068930F67E37AC1C517C8AE01A16C2EDC694204A8500CA75546B PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 85 e2 b9 2c 61 33 c1 64-f4 13 83 ac 28 22 79 2f ...,a3.d....("y/ 0010 - f0 84 da d5 1a 5c 25 da-41 12 56 8c 24 a3 a0 b0 .....\%.A.V.$... 0020 - 1c 6e c5 ef e6 c9 47 01-cf bd 68 72 18 21 ec 38 .n....G...hr.!.8 0030 - 44 df e2 98 9b f6 1c a3-ee a2 0d 2c c7 57 95 f6 D..........,.W.. 0040 - 61 e7 0f 38 52 92 d0 fa-71 81 b5 c6 84 eb db 45 a..8R...q......E 0050 - f5 c0 d9 41 fd 55 75 5d-e4 72 27 f6 26 61 28 8e ...A.Uu].r'.&a(. 0060 - 7e 20 23 a7 2f 43 41 6e-93 bc c6 95 df 95 b4 30 ~ #./CAn.......0 0070 - 2d 8b 7e 64 30 4f 59 32-6d 7d 38 fa 5d 37 cf 53 -.~d0OY2m}8.]7.S 0080 - 8e 30 8f 3c 6a 3e 55 3f-c2 81 60 d2 3d c7 f2 ce .0.U?..`.=... 0090 - ef 47 f2 ab 8e 06 f0 0f-c6 3f 5b 23 80 e5 1c 94 .G.......?[#.... 00a0 - cd e8 fc 23 c2 d0 54 21-37 e6 53 6b b6 5a 36 5a ...#..T!7.Sk.Z6Z 00b0 - 9a 09 9a a9 8c c0 16 1c-66 fc d7 95 f1 06 ae 39 ........f......9 00c0 - b0 59 1f a2 ef f6 e4 db-0a c0 21 ed 36 2e 8e ab .Y........!.6... Start Time: 1774263039 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 403C84A5FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEICOqFb8r8iPH+qGuWxYjgBRgnoKkLU2TRU2VGiP6TQsR BDCRbeAhMrXqQzrsy9tVJWjJJNlzeZ4RBokw9n43rBxRfIrgGhbC7caUIEqFAMp1 VGuhBgIEacEa/6IEAgIcIKQGBAQBAAAArgYCBHKcLoyzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed448) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED448 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED448 Cert i:CN=Issuer a:PKEY: ED448, 456 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:04 2026 GMT; NotAfter: Mar 23 10:50:04 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICXzCCAUegAwIBAgIBBzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDA0WhcNMjcwMzIzMTA1MDA0WjAyMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFjAUBgNVBAMTDU15IEVENDQ4IENlcnQwQzAFBgMrZXED OgA0QafS2dLYVi1GfKjIdjgaKkjHA4Ia/lm/Ns3l9LvKz6x8uVU+90HhKzCLq54L SbpNvb4qXqQ/kACjgYEwfzAMBgNVHRMBAf8EAjAAMB8GA1UdEQQYMBaBFHRlc3Rj ZXJ0QGV4YW1wbGUub3JnMA4GA1UdDwEB/wQEAwIHgDAdBgNVHQ4EFgQUnnqFu2Cd P1lUBMv/9WOExNaktGAwHwYDVR0jBBgwFoAUZOMEpWqyUUln3Fn08NcDXomzPIkw DQYJKoZIhvcNAQELBQADggEBAB3QY0GCoIeiwwBotMbB1e8U7gMaaV6QEodA/Ztf mYqtAu/vxdYZyiWaBOB9GUYbOVgfqQJSdRQxhah0wT9g4503bUkkVAP5ZI6PWNJ1 PbHFnDIgOKwqrOD4mIUoNXzHyGWLWNzf3bZC5ENLObjWoUOyg7CbEdraZRjUdCNO HvdA3JrrqyzumDTS/9PJGtr2IYfcPorkUPw37MF7Ut4Lo9QtuBimuCJIE5iJYWkT kVv/mXriH9qMnvHbJ3hiOmebS5L+XCX30N/s4lb71s+k33PCUPx6TyuR5dO+WI3A Mc20Ja+Lr31HAVyqoc/1ElWDPn/QGIP18d2XKknXe6sI33w= -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED448 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: Ed448 Server Temp Key: X25519, 253 bits --- SSL handshake has read 1025 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 456 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 82F8838EB59169C8AF769FD5473B3BFC180FC3E408256F7BDB16952EA9073148 Session-ID-ctx: Resumption PSK: 41473C5C32C854CB99386E8D37C7DDE36E6DFA35BF6CC4B501C08E2E9BFE1A3B08504B8658161CFB24A79AD6E94C81AF PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 6c 13 cd 28 e7 3c 6a 19-e9 94 26 70 a8 98 ec c8 l..(.nd..l... 0040 - 45 e7 0b 4b 52 03 99 88-71 be 0c b1 11 fe ac 65 E..KR...q......e 0050 - 7f 99 60 d4 e5 44 ab 67-df 82 b8 22 26 30 07 c6 ..`..D.g..."&0.. 0060 - 73 59 8e b7 90 9c f5 7b-4a 2e 89 9b df 53 7c fe sY.....{J....S|. 0070 - 45 7b f6 95 e8 17 a5 62-94 b2 9b e3 69 ec 2d 86 E{.....b....i.-. 0080 - 1e 2b cb 15 00 56 19 64-3a 40 cc 96 4c fe 95 5b .+...V.d:@..L..[ 0090 - d1 df f5 f2 3d 72 11 fd-01 a7 ea 61 39 48 19 4a ....=r.....a9H.J 00a0 - b1 4c b4 28 9c a7 9d 00-1f 82 80 b1 21 f0 88 f8 .L.(........!... 00b0 - a4 50 e9 79 55 ce 5f 2f-7c 90 b4 1c e6 d0 dc d5 .P.yU._/|....... 00c0 - 59 bf 3f 3c ec c1 68 f4-a0 c9 9c 2f c6 8c 84 df Y.?<..h..../.... Start Time: 1774263039 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 77E791B6AFAB93E09EA364CD9DA2966D3482C5BE1BA668B54842770703F0FA76 Session-ID-ctx: Resumption PSK: 8A83F6E944A7B1541AB9ED9D31B09FD165FFAF953F6373D90AAA3EDFC3CCE6FA07D3B961FD00793105981E768E2F0BAC PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 6c 13 cd 28 e7 3c 6a 19-e9 94 26 70 a8 98 ec c8 l..(.... 0030 - 6b 1a 8b 85 8b e5 a3 4e-9a 65 03 a2 46 a5 af a6 k......N.e..F... 0040 - 74 17 13 b4 bb 13 39 4d-11 c6 c6 89 84 d6 c6 e1 t.....9M........ 0050 - 9a c4 2a b3 1c 64 ae 3b-33 22 64 3a a1 7b be 97 ..*..d.;3"d:.{.. 0060 - fa 45 8d d9 26 0c 83 5c-ef 83 58 0c 58 4f 6f 1d .E..&..\..X.XOo. 0070 - 16 93 4b ec bb 4f e3 11-e5 5b d9 22 e7 5b 9c 2a ..K..O...[.".[.* 0080 - e6 a2 90 5e 80 54 14 cf-64 19 c7 5f 9b 7f b4 13 ...^.T..d.._.... 0090 - 34 ae 04 31 d2 b9 be 61-4c 08 dd ed 50 b3 e6 a0 4..1...aL...P... 00a0 - bb 4b 9c f9 d0 c0 cd 20-f1 cc 83 66 48 85 bf cf .K..... ...fH... 00b0 - 55 94 6a 48 19 a4 05 05-9a 95 c3 5a 39 ca 80 f4 U.jH.......Z9... 00c0 - 17 47 2d b7 e6 fa 70 60-71 07 19 56 53 cd d6 24 .G-...p`q..VS..$ Start Time: 1774263039 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 405C4D9AFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%09 -cert pkcs11:type=cert;object=ed2Cert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIJfts4G5NB+L5uVMNAEFnZd4qSCnx9T+BnT0aZfVhP+9 BDCKg/bpRKexVBq57Z0xsJ/RZf+vlT9jc9kKqj7fw8zm+gfTuWH9AHkxBZgedo4v C6yhBgIEacEa/6IEAgIcIKQGBAQBAAAArgcCBQDVXb3GswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMmhkg54Oco9uQPlGseiZmkyI+LeYQaW97xY 3a/pru5s4QwrgCaob8r0YclRcibaecLZ4ug68hoKYutTkAwqqP+hokiSi11IBs6f vGvuhUmM1bqmX6D5KD2m7xdFOJIywS2Gp79qDVjcXDV8lJtfqdiJX4Zo5UkUfWR2 dIy+2cEDgaNFgEBlfKKVTHg42uEJh27gbl3LXk6dJFUHpHgTwsjh4ej2+hEDJLzX irdionqo9UDzFMmv+XYAr3PheUmT4Y4VxeM6756PY0Gqz5R/CyB5T/sBE2LZZBMB KcBSdxxdhfokhavapnStsF9I/gNyja5pydp7hNEW/xLKEXoHrqsCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSG61m1ONNn6/mlh4x5j0fH2L7Y4DAf BgNVHSMEGDAWgBRk4wSlarJRSWfcWfTw1wNeibM8iTANBgkqhkiG9w0BAQsFAAOC AQEAUAlYq8HkmFZ20aSUavFZGjFTp8IfYFnAtMJPAWbfJCQoO1NpoklBTHiNbwS3 tm3VjGPaOFgphnLEwWY0oy8nUPu3Q8yWRelH60QfOpIRvxK+V98BOioOLGEmIhnA kFiscTY19RWXgVmi9DfhQox2/klpm48dv0v9nQmX4zfFGtz6HX9PP44SFM9nfuu4 oNj6GQ+EyAuvHgVRtyIBjXGWIasVhL//xaJkn1USBM/f7pQ7vsgNzFZ2fzTdQtst kyFrhxGDlvbuiH696i8/VSUphdLB80igxde1FwnVevm1etYcjXKKs0Zjk/gaB6tQ PTGnp0RjdPaIBsvyaEt2ib4Ufg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1476 bytes and written 290 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 71D107B339F7F9E08CF4B90E7130CC2475D37B7E99AB500BC8D10123B38BF486 Session-ID-ctx: Master-Key: 5C379C60CB8927AC1C3B9DFD18BA729A425690A57591C24608A8BF265837E8096BEB1788C9D90DECD21B90B39B89356B PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 42 e5 87 d9 85 6c 6c 7d-7a 10 f5 1b 44 6e 89 f3 B....ll}z...Dn.. 0010 - 19 78 cf 0f bf a9 67 a8-19 e8 05 6a 4f 81 1d c5 .x....g....jO... 0020 - 75 db 90 9b 7a 76 43 74-ae a2 6a 4c 3e ef 7e 2c u...zvCt..jL>.~, 0030 - 78 44 00 e6 d9 0c 7f 0e-f8 97 8e 67 8f 72 92 8b xD.........g.r.. 0040 - bd 8b 67 08 7b 67 24 e3-ac ec 72 08 03 53 91 9d ..g.{g$...r..S.. 0050 - 31 bb 0f 47 28 bd 7a 98-32 68 03 d2 22 ef 76 d2 1..G(.z.2h..".v. 0060 - 16 99 53 56 86 10 70 8d-f1 9b 49 0d 31 4f 57 ff ..SV..p...I.1OW. 0070 - 4f 1d cd e6 ae e5 a4 ed-3c c1 f0 d8 b4 3e 17 dc O.......<....>.. 0080 - 5b 1c e6 6a 2d 21 20 c9-dc 44 73 d1 23 b7 57 b1 [..j-! ..Ds.#.W. 0090 - 27 a3 10 78 ca 76 32 63-06 a2 5d 9f 35 23 ba a2 '..x.v2c..].5#.. 00a0 - 67 b3 9b d6 c0 f5 28 4f-6d 0d e5 a9 f7 55 66 85 g.....(Om....Uf. Start Time: 1774263039 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 403C6299FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAMAQABDBcN5xgy4knrBw7nf0YunKaQlaQpXWRwkYIqL8mWDfo CWvrF4jJ2Q3s0huQs5uJNWuhBgIEacEa/6IEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-RSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with explicit TLS 1.3 spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAMmhkg54Oco9uQPlGseiZmkyI+LeYQaW97xY 3a/pru5s4QwrgCaob8r0YclRcibaecLZ4ug68hoKYutTkAwqqP+hokiSi11IBs6f vGvuhUmM1bqmX6D5KD2m7xdFOJIywS2Gp79qDVjcXDV8lJtfqdiJX4Zo5UkUfWR2 dIy+2cEDgaNFgEBlfKKVTHg42uEJh27gbl3LXk6dJFUHpHgTwsjh4ej2+hEDJLzX irdionqo9UDzFMmv+XYAr3PheUmT4Y4VxeM6756PY0Gqz5R/CyB5T/sBE2LZZBMB KcBSdxxdhfokhavapnStsF9I/gNyja5pydp7hNEW/xLKEXoHrqsCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBSG61m1ONNn6/mlh4x5j0fH2L7Y4DAf BgNVHSMEGDAWgBRk4wSlarJRSWfcWfTw1wNeibM8iTANBgkqhkiG9w0BAQsFAAOC AQEAUAlYq8HkmFZ20aSUavFZGjFTp8IfYFnAtMJPAWbfJCQoO1NpoklBTHiNbwS3 tm3VjGPaOFgphnLEwWY0oy8nUPu3Q8yWRelH60QfOpIRvxK+V98BOioOLGEmIhnA kFiscTY19RWXgVmi9DfhQox2/klpm48dv0v9nQmX4zfFGtz6HX9PP44SFM9nfuu4 oNj6GQ+EyAuvHgVRtyIBjXGWIasVhL//xaJkn1USBM/f7pQ7vsgNzFZ2fzTdQtst kyFrhxGDlvbuiH696i8/VSUphdLB80igxde1FwnVevm1etYcjXKKs0Zjk/gaB6tQ PTGnp0RjdPaIBsvyaEt2ib4Ufg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 318 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 22F4FB1FF2F2FB73B0C0E2D56D006DD9F010696E151005DF3502449F48987D31 Session-ID-ctx: Resumption PSK: D7E2D77AF7A2FE1BBCCAB4A8FF3DA667F5BE3EB5C46CC1FA0CF72B44AD057420234E6F08B1EBFA977D9CE3197EA9065D PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 67 65 ac f3 59 46 1e 29-0f 82 e5 65 14 fa a6 58 ge..YF.)...e...X 0010 - 1d b2 82 79 cb 4b a8 eb-29 e2 91 5a c2 0f 19 78 ...y.K..)..Z...x 0020 - d3 ef 40 f2 6e fe 37 c3-53 8d 15 88 93 14 60 21 ..@.n.7.S.....`! 0030 - 43 38 59 73 5b 17 e3 83-eb b7 09 bc 6c c4 96 da C8Ys[.......l... 0040 - 33 b5 53 55 0d d2 55 91-7f 71 95 ab 56 27 c4 1f 3.SU..U..q..V'.. 0050 - cd 6e a5 47 82 0b f9 f5-be bb e6 12 44 b6 85 98 .n.G........D... 0060 - de 9c bd 7f cb 80 6a 7c-c1 1c a5 18 83 aa ce 6f ......j|.......o 0070 - 10 a2 a6 2e 96 4a d3 0f-8d 9e 36 49 dd 7b 80 05 .....J....6I.{.. 0080 - 7a 76 ae 0e a6 16 a2 df-7c 4d 79 d9 d1 2d 96 ca zv......|My..-.. 0090 - 2c 88 8d 67 07 41 3a 3e-01 99 af b0 e2 85 ae e8 ,..g.A:>........ 00a0 - 1f 1a ca 3f 9b d8 66 4c-a7 50 47 89 37 46 32 54 ...?..fL.PG.7F2T 00b0 - aa 6d 7d cb 92 64 9c 4d-f3 0a 84 32 fd a3 fd cb .m}..d.M...2.... 00c0 - 9a 4b f0 b5 52 2f 2e 1b-8d c4 84 b8 57 64 4a 57 .K..R/......WdJW Start Time: 1774263040 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 0545DEA2C06FB44667D86B1B29EA5DC5061A457666BEAB09E29FBFE9F3F5BEBE Session-ID-ctx: Resumption PSK: 378A0213CA3C3D29896F74CF9288B1685D9DD872AD7039FEC21AFB44298B891DA89CCE40C54FA93278D51EEDC07C7ED7 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 67 65 ac f3 59 46 1e 29-0f 82 e5 65 14 fa a6 58 ge..YF.)...e...X 0010 - 95 83 1f 72 b1 8c e1 27-19 90 8f e3 d6 fe f3 ab ...r...'........ 0020 - fb 24 d0 e5 c1 b2 13 0c-85 14 dc ed 98 2e 66 18 .$............f. 0030 - b2 bf f6 59 cc 6e 9c b0-63 7f 3d 05 b0 3b 72 e1 ...Y.n..c.=..;r. 0040 - be 87 99 52 d6 0b d4 42-a6 44 ed 9f 73 4b 87 80 ...R...B.D..sK.. 0050 - 55 f4 96 de ad 9e 18 88-d5 fc 3b 5a 2f 21 e0 f2 U.........;Z/!.. 0060 - 21 ab ff 4f 31 8b 5f 73-df c8 7f 5c 60 00 e6 f7 !..O1._s...\`... 0070 - 12 93 e6 21 cc 8e 94 c1-6f 28 a7 4f a3 f6 5a 75 ...!....o(.O..Zu 0080 - 6b 8c f8 a1 b6 da 57 4c-c3 b2 60 bd 39 96 57 4a k.....WL..`.9.WJ 0090 - 12 e3 f8 4c 3c ff 03 38-26 0c c2 0a 8b 92 bc e4 ...L<..8&....... 00a0 - d1 4b 0d 3e 3c 1f c5 3c-7e 6e 8e de 7f c3 3e 15 .K.><..<~n....>. 00b0 - 2d 56 24 a7 97 3d 7a 2e-ef f5 09 38 65 60 22 79 -V$..=z....8e`"y 00c0 - fb 08 a5 d8 be 22 4a 03-e3 5a dd 1d a0 36 17 75 ....."J..Z...6.u Start Time: 1774263040 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 40DC0895FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIEUQ+He5xFGwLfXXj3kSQAaeJBA7Gv7IYSGN9z2JeXZP BDA3igITyjw9KYlvdM+SiLFoXZ3Ycq1wOf7CGvtEKYuJHaiczkDFT6kyeNUe7cB8 ftehBgIEacEbAKIEAgIcIKQGBAQBAAAArgYCBAmVvw6zAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 (ECDSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5 tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK 4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB hS/cPUmv -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1086 bytes and written 290 bytes Verification error: unspecified certificate verification error --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 Session-ID: 22E4FF1EE68AEC9D05149883B5F81FF604ADDD608E586BE741E7B46B37BADE34 Session-ID-ctx: Master-Key: 65489DF714466A50D52D9695BE5BDFCC8A31441F71238C12C3A45C5C5235DDD8FFF95C4D7D9627A4197DA356D92B1C62 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - b3 1a e1 9d a8 d1 7a cd-7e fb 28 da 59 a3 e2 76 ......z.~.(.Y..v 0010 - e1 3d 23 04 73 6b 06 cd-8c cd d1 8d b9 59 a1 47 .=#.sk.......Y.G 0020 - 9f 6b be 22 c5 87 4e 3b-48 a2 7e 23 44 e7 7a 42 .k."..N;H.~#D.zB 0030 - c0 aa 12 38 1d e8 6b 26-b4 59 df b5 0e d2 00 29 ...8..k&.Y.....) 0040 - c5 1c 09 4b 04 88 be 1a-0f eb 65 5f 3f 45 97 2c ...K......e_?E., 0050 - bd 51 00 ae 9f 7a 53 5d-21 ae 4a a8 e2 6b 21 0d .Q...zS]!.J..k!. 0060 - eb 36 1f 76 60 72 ff 2f-bd d1 e8 b4 95 d3 be 5a .6.v`r./.......Z 0070 - a2 1c da 27 c0 d2 31 f3-80 25 36 6e 58 6e 9f f3 ...'..1..%6nXn.. 0080 - cb e3 e2 f4 70 fe 43 8d-37 4b 4f c4 85 c2 39 95 ....p.C.7KO...9. 0090 - 51 87 c9 bb 84 6d e9 ec-73 ec 96 49 e8 e5 77 76 Q....m..s..I..wv 00a0 - 88 33 e7 30 ef 7a 0f 62-24 b6 3a 21 8a 71 2d 58 .3.0.z.b$.:!.q-X Start Time: 1774263040 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: yes --- TLS SUCCESSFUL 408C0399FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2 Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALALAQABDBlSJ33FEZqUNUtlpW+W9/MijFEH3EjjBLDpFxcUjXd 2P/5XE19liekGX2jVtkrHGKhBgIEacEbAKIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 and ECDH spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5 tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK 4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB hS/cPUmv -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1119 bytes and written 263 bytes Verification error: unspecified certificate verification error --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES128-GCM-SHA256 Session-ID: C2AFD7E7F6A5EF833E70A0DDE6C9FB4E8BDEB8AE2A90E6ACC8AB2421E1AD8B03 Session-ID-ctx: Master-Key: B4627B6B574C5D32407E229315D39B0C14A574EB61B3F68D027335BC89F19D7698CBBEC55F975527770E18BA17123427 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 8d 64 e0 a3 47 43 92 a9-0c c7 81 81 c8 6c 94 72 .d..GC.......l.r 0010 - ec 8e 24 29 1e f4 cc ef-59 4e 79 b7 d9 44 d9 9a ..$)....YNy..D.. 0020 - 1c 09 6a 76 29 57 d4 5d-06 b4 b0 ee 43 f4 c0 84 ..jv)W.]....C... 0030 - 5b bc ac 48 3b cb 86 00-ec c4 76 e7 d9 21 94 4f [..H;.....v..!.O 0040 - 96 6f ce 52 5f 28 0b 2a-e8 c9 c9 7d 21 7a ff aa .o.R_(.*...}!z.. 0050 - 30 7a 71 20 f6 fe 19 d5-0d 97 b3 9a ab 0d 8f b5 0zq ............ 0060 - a2 cb 3e a7 5f 89 ee db-99 6e e8 0c 59 cf 1f b9 ..>._....n..Y... 0070 - 5b 3d b3 20 e5 e4 b0 74-5a cc 2b 27 48 76 1a d2 [=. ...tZ.+'Hv.. 0080 - e4 95 4a d1 1a bc f5 31-bf c2 89 a0 6a 73 1d 08 ..J....1....js.. 0090 - 99 b0 e3 7c 40 ad 97 3d-12 dc 1f 92 b4 bb 64 9b ...|@..=......d. 00a0 - cc f3 24 04 37 a5 a0 11-ed 0a 29 99 9c 64 2e 54 ..$.7.....)..d.T Start Time: 1774263040 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: yes --- TLS SUCCESSFUL 408CBDB4FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAKwQABDC0YntrV0xdMkB+IpMV05sMFKV062Gz9o0CczW8ifGd dpjLvsVfl1Undw4YuhcSNCehBgIEacEbAKIEAgIcIKQGBAQBAAAArQMCAQGzAwIB Fw== -----END SSL SESSION PARAMETERS----- TLS SUCCESSFUL Q Shared ciphers:ECDHE-ECDSA-AES128-GCM-SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is ECDHE-ECDSA-AES128-GCM-SHA256 Secure Renegotiation IS supported DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.3 and specific suite spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3 -ciphersuites TLS_AES_256_GCM_SHA384 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: Mar 23 10:50:03 2026 GMT; NotAfter: Mar 23 10:50:03 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwMzIzMTA1MDAzWhcNMjcwMzIzMTA1MDAzWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQwWGDQNpJcYcXXwXNKoCEUWqpdRWIhQkS/9xS/MolgRrX5 tsN0Hs7/6zCkf9+Zp4xJpKkW6+em3NUzIbCs273Ho4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFHyTP075TbvGZ9Bv7r5I284tfK6CMB8GA1UdIwQYMBaAFGTj BKVqslFJZ9xZ9PDXA16JszyJMA0GCSqGSIb3DQEBCwUAA4IBAQBKZ7sdN728Ttxg OBNUlNZttk4UkpdpG8yjg+Rzs2Bb6pcCna7DankMc+DWJ8mMcVhxPuC0OMWXRW8P WVXCGMnaThp7kTBMSXA1v+2SP6NjYwUFCqiMC4z0mouG09oV9B3CHNjOmxZbeMrK 4Ml8wukxQeFVXmWpwDeovZOz436BEvNt71xaf3pom+bF1g5S41gtWISH0TE8zlGS fV5fp+2xUxNRrZkIh2v86RrCQTkIdrwtMv74zuEkgHNhlr1PTZCm4zYbofr65I1Z k7qZ4FjkxPxTK3kJ5Mpq0nqe8QNPae46iCNcxaUmgaP7x2L3hvakSWzliuvMdRTB hS/cPUmv -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, ?, 0 bits --- SSL handshake has read 1061 bytes and written 329 bytes Verification error: unspecified certificate verification error --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 1 (unspecified certificate verification error) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 6C356840B44AF27F3D00CE806275538D3A478315097EEB52F404B2E6F3690CA9 Session-ID-ctx: Resumption PSK: 39D1AAA74695DAEABE06440800F038CA0ED4C53C41C55A6B3963B1D24AC2FB0B50AB89398F046CE78B7DE63754D90870 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 2f e2 8b af e4 a5 c6 ec-fa f2 fa 20 d3 5d 71 ee /.......... .]q. 0010 - 1c d7 22 8c 54 a8 cd c7-49 4f a4 b5 1b 91 bd 2d ..".T...IO.....- 0020 - d3 87 6d d9 42 ba 0a 96-58 47 51 be 1a 35 8b 38 ..m.B...XGQ..5.8 0030 - b2 40 31 f5 14 08 50 ff-4b ba 07 5c 25 2e 85 07 .@1...P.K..\%... 0040 - 2c ef e1 cf 95 36 49 96-da d6 07 b9 3e 16 47 dc ,....6I.....>.G. 0050 - dc 58 bd e2 ef cd c4 6d-8f 6e 20 60 ff 5f 09 75 .X.....m.n `._.u 0060 - 06 09 ca 63 c7 f0 5c 11-69 28 7b 6d ba d9 92 12 ...c..\.i({m.... 0070 - 8e f8 de 59 27 00 b5 81-21 38 5f 90 80 37 cd 1d ...Y'...!8_..7.. 0080 - 3f 52 e7 ea f3 3a 3b 8a-a8 53 bf 6a f7 ed 44 e3 ?R...:;..S.j..D. 0090 - 22 77 0f e3 3e a9 6b 72-b4 5c 53 72 c5 a5 0d 96 "w..>.kr.\Sr.... 00a0 - e8 11 d5 75 2a 71 28 87-7e 0f c9 27 8e d6 4c a1 ...u*q(.~..'..L. 00b0 - d1 35 fb 8f c6 f7 ec 8a-95 92 2c 85 0c f4 d4 e5 .5........,..... 00c0 - 20 15 1a 94 9d fb 4f fe-bc f8 11 70 99 8c 6e b7 .....O....p..n. Start Time: 1774263040 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 69ED2CA38EB7FEA598B96F28B8B1C85FE0BD58ED7A594D5E273E600C8B4F5E37 Session-ID-ctx: Resumption PSK: DC7215F214184D1337071A28581E84D804A42957C6C8D9D094AFD9ABA88140BD454DBCE72A70062F167326BD9C428468 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 2f e2 8b af e4 a5 c6 ec-fa f2 fa 20 d3 5d 71 ee /.......... .]q. 0010 - c2 f1 bb 0f e4 76 a8 55-ec 43 49 39 e5 9f 72 a5 .....v.U.CI9..r. 0020 - 9a d9 e8 de 8c 00 74 5d-0d 5b fb ed 48 b1 63 61 ......t].[..H.ca 0030 - 51 76 d6 c1 b1 d3 7c 7a-99 51 9b 44 d6 2e f7 df Qv....|z.Q.D.... 0040 - 1a 65 a9 1c 2e 43 5e ba-94 cc 6b ac 08 a3 4f 1a .e...C^...k...O. 0050 - d8 e5 b0 e5 25 76 c1 1a-4a 89 92 1c 33 04 ad b0 ....%v..J...3... 0060 - 96 01 da 05 a1 9f 4d c6-d5 ea 4d 6d 16 23 34 a5 ......M...Mm.#4. 0070 - 0f fe 67 c1 72 a4 99 88-3a 30 0c 42 ad e7 22 a3 ..g.r...:0.B..". 0080 - b3 bf cc 42 86 34 06 9b-2f 05 97 03 75 fa 7b b9 ...B.4../...u.{. 0090 - 71 18 89 04 01 57 0b c2-3f d9 ea ba 56 2f f6 d9 q....W..?...V/.. 00a0 - 1f ee a0 32 77 6c 3a 0e-77 15 53 71 74 d0 4e 99 ...2wl:.w.Sqt.N. 00b0 - 78 f4 8e 76 26 5e d6 88-a8 a7 0d c8 46 b7 e7 35 x..v&^......F..5 00c0 - 8a 00 09 1d 46 97 3a 93-4b d6 8b 2b d8 3f 3e 50 ....F.:.K..+.?>P Start Time: 1774263040 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 404C8C9EFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIOs1eFRVvxmirJV2PkkrLdogJJk4mZObC1sQQVHkgfpr BDDcchXyFBhNEzcHGihYHoTYBKQpV8bI2dCUr9mrqIFAvUVNvOcqcAYvFnMmvZxC hGihBgIEacEbAKIEAgIcIKQGBAQBAAAArgcCBQCSf8AVswMCARc= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## ######################################## Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIOs1eFRVvxmirJV2PkkrLdogJJk4mZObC1sQQVHkgfpr BDDcchXyFBhNEzcHGihYHoTYBKQpV8bI2dCUr9mrqIFAvUVNvOcqcAYvFnMmvZxC hGihBgIEacEbAKIEAgIcIKQGBAQBAAAArgcCBQCSf8AVswMCARc= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 75/92 pkcs11-provider:softhsm / tls OK 7.03s 76/92 pkcs11-provider:kryoptic / tls RUNNING >>> MALLOC_PERTURB_=219 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 76/92 pkcs11-provider:kryoptic / tls SKIP 0.07s exit status 77 77/92 pkcs11-provider:kryoptic.nss / tls RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=224 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 77/92 pkcs11-provider:kryoptic.nss / tls SKIP 0.06s exit status 77 78/92 pkcs11-provider:softokn / tlsfuzzer RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=143 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 78/92 pkcs11-provider:softokn / tlsfuzzer SKIP 0.06s exit status 77 79/92 pkcs11-provider:softhsm / tlsfuzzer RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=192 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttlsfuzzer TLS fuzzer is not available -- skipping ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 79/92 pkcs11-provider:softhsm / tlsfuzzer SKIP 0.10s exit status 77 80/92 pkcs11-provider:kryoptic / tlsfuzzer RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=226 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 80/92 pkcs11-provider:kryoptic / tlsfuzzer SKIP 0.04s exit status 77 81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=245 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer SKIP 0.05s exit status 77 82/92 pkcs11-provider:softokn / uri RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=181 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 82/92 pkcs11-provider:softokn / uri SKIP 0.03s exit status 77 83/92 pkcs11-provider:softhsm / uri RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=45 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/turi ## Check that storeutl returns URIs openssl storeutl -text pkcs11: ## Check returned URIs work to find objects $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%00;object=caCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%B3%1B%1B%85%69%9C%67%CD%A7%01%48%57%5A%C3%85%10;object=Test-RSA-gen-b31b1b85;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%06;object=ecCert2;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%85%53%D1%39%73%B5%6E%11%2A%9C%2F%75%91%B9%1D%40;object=Fork-Test;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%04;object=edCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%05;object=testCert2;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%32%75%BC%A9%80%84%20%48%D6%1B%59%18%D9%13%B8%76;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%10;object=testRsaPssCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%02;object=ecCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%11;object=testRsaPss2Cert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%5D%BB%35%17%23%FE%43%55%DF%41%AF%9F%31%4C%9A%4D;object=Test-Ed-gen-5dbb3517;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%08;object=ecCert3;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%27%83%D1%AF%3E%C9%92%E4%01%53%AB%85%93%34%40%1A;object=Test-RSA-Key-Usage-2783d1af;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%F3%A2%7E%69%A6%B1%28%34%66%85%A7%0F%45%B9%B7%7F;object=Test-RSA-PSS-gen-f3a27e69;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%09;object=ed2Cert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%03;object=ecPeerCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%C6%BE%42%BE%66%5B%C8%6C%C1%B4%42%06%1F%66%42%16;object=Pkey%20sigver%20Test;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%E4%2B%A5%F6%CF%3C%B2%AE%BF%30%0A%22%7A%0C%56%18;object=Test-EC-gen-e42ba5f6;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%3F%8F%12%71%62%C8%28%92%D3%DE%77%44%3A%1B%88%C8;object=Test-Ed-gen-3f8f1271;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%5F%60%C7%EE%C1%F6%85%5C%05%B5%A8%94%D0%35%10%0F;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%00%01;object=testCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%A2%99%74%19%11%CD%A7%B2%B6%08%55%06%47%DB%1F%DD;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=0cc21e7e2259846e;token=SoftHSM%20Token;id=%32%73%CC%E5%3F%B3%BB%0A%1D%52%D2%70%FB%BB%82%96;type=private openssl storeutl -text "$uri" ## Check each URI component is tested $cmp=pkcs11:model=SoftHSM%20v2 openssl storeutl -text "pkcs11:${cmp}" $cmp=manufacturer=SoftHSM%20project openssl storeutl -text "pkcs11:${cmp}" $cmp=serial=0cc21e7e2259846e openssl storeutl -text "pkcs11:${cmp}" $cmp=token=SoftHSM%20Token openssl storeutl -text "pkcs11:${cmp}" $cmp=id=%00%00 openssl storeutl -text "pkcs11:${cmp}" $cmp=object=caCert openssl storeutl -text "pkcs11:${cmp}" $cmp=type=private openssl storeutl -text "pkcs11:${cmp}" ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 83/92 pkcs11-provider:softhsm / uri OK 3.42s 84/92 pkcs11-provider:kryoptic / uri RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=141 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 84/92 pkcs11-provider:kryoptic / uri SKIP 0.06s exit status 77 85/92 pkcs11-provider:kryoptic.nss / uri RUNNING >>> MALLOC_PERTURB_=34 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 85/92 pkcs11-provider:kryoptic.nss / uri SKIP 0.06s exit status 77 86/92 pkcs11-provider:softhsm / ecxc RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=232 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecxc ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 86/92 pkcs11-provider:softhsm / ecxc SKIP 0.08s exit status 77 87/92 pkcs11-provider:kryoptic / ecxc RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=52 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 87/92 pkcs11-provider:kryoptic / ecxc SKIP 0.06s exit status 77 88/92 pkcs11-provider:kryoptic.nss / ecxc RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=166 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 88/92 pkcs11-provider:kryoptic.nss / ecxc SKIP 0.05s exit status 77 89/92 pkcs11-provider:softokn / cms RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=248 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 89/92 pkcs11-provider:softokn / cms SKIP 0.06s exit status 77 90/92 pkcs11-provider:kryoptic / cms RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=180 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 90/92 pkcs11-provider:kryoptic / cms SKIP 0.06s exit status 77 91/92 pkcs11-provider:kryoptic.nss / cms RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=30 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 91/92 pkcs11-provider:kryoptic.nss / cms SKIP 0.05s exit status 77 92/92 pkcs11-provider:kryoptic / pinlock RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MESON_TEST_ITERATION=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=77 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pinlock-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 92/92 pkcs11-provider:kryoptic / pinlock SKIP 0.02s exit status 77 Ok: 21 Expected Fail: 0 Fail: 0 Unexpected Pass: 0 Skipped: 71 Timeout: 0 Full log written to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/meson-logs/testlog.txt create-stamp debian/debhelper-build-stamp dh_testroot -O--buildsystem=meson dh_prep -O--buildsystem=meson dh_auto_install --destdir=debian/pkcs11-provider/ -O--buildsystem=meson cd obj-aarch64-linux-gnu && DESTDIR=/build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider LC_ALL=C.UTF-8 ninja install [0/1] Installing files Installing src/pkcs11.so to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/lib/aarch64-linux-gnu/ossl-modules Installing /build/reproducible-path/pkcs11-provider-1.0/docs/provider-pkcs11.7 to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/share/man/man7 dh_installdocs -O--buildsystem=meson dh_installchangelogs -O--buildsystem=meson dh_installman -O--buildsystem=meson dh_installsystemduser -O--buildsystem=meson dh_perl -O--buildsystem=meson dh_link -O--buildsystem=meson dh_strip_nondeterminism -O--buildsystem=meson dh_compress -O--buildsystem=meson dh_fixperms -O--buildsystem=meson dh_missing -O--buildsystem=meson dh_dwz -a -O--buildsystem=meson dh_strip -a -O--buildsystem=meson dh_makeshlibs -a -O--buildsystem=meson dh_shlibdeps -a -O--buildsystem=meson dpkg-shlibdeps: warning: diversions involved - output may be incorrect diversion by libc6 from: /lib/ld-linux-aarch64.so.1 dpkg-shlibdeps: warning: diversions involved - output may be incorrect diversion by libc6 to: /lib/ld-linux-aarch64.so.1.usr-is-merged dh_installdeb -O--buildsystem=meson dh_gencontrol -O--buildsystem=meson dh_md5sums -O--buildsystem=meson dh_builddeb -O--buildsystem=meson dpkg-deb: building package 'pkcs11-provider-dbgsym' in '../pkcs11-provider-dbgsym_1.0-1_arm64.deb'. dpkg-deb: building package 'pkcs11-provider' in '../pkcs11-provider_1.0-1_arm64.deb'. dpkg-genbuildinfo --build=binary -O../pkcs11-provider_1.0-1_arm64.buildinfo dpkg-genchanges --build=binary -O../pkcs11-provider_1.0-1_arm64.changes dpkg-genchanges: info: binary-only upload (no source code included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: including full source code in upload I: copying local configuration I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env I: removing directory /srv/workspace/pbuilder/1369869 and its subdirectories I: Current time: Sun Mar 22 22:50:52 -12 2026 I: pbuilder-time-stamp: 1774263052 Tue Feb 18 04:27:55 UTC 2025 I: 1st build successful. Starting 2nd build on remote node codethink04-arm64.debian.net. Tue Feb 18 04:27:55 UTC 2025 I: Preparing to do remote build '2' on codethink04-arm64.debian.net. Tue Feb 18 04:29:10 UTC 2025 I: Deleting $TMPDIR on codethink04-arm64.debian.net. Tue Feb 18 04:29:11 UTC 2025 I: pkcs11-provider_1.0-1_arm64.changes: Format: 1.8 Date: Tue, 11 Feb 2025 19:09:10 +0000 Source: pkcs11-provider Binary: pkcs11-provider pkcs11-provider-dbgsym Architecture: arm64 Version: 1.0-1 Distribution: unstable Urgency: medium Maintainer: Luca Boccassi Changed-By: Luca Boccassi Description: pkcs11-provider - OpenSSL 3 provider for PKCS11 Changes: pkcs11-provider (1.0-1) unstable; urgency=medium . * Update upstream source from tag 'upstream/1.0' Checksums-Sha1: 64570700e29a35404723a046f82df0cb75bd1fb5 309752 pkcs11-provider-dbgsym_1.0-1_arm64.deb 09036d62af2e321fc2bf5f76f995748f2e162c21 7236 pkcs11-provider_1.0-1_arm64.buildinfo 07a922cf5dff1fd5e0e4a91fd3127d40d0051fd8 114052 pkcs11-provider_1.0-1_arm64.deb Checksums-Sha256: f03110724e6d9dcaefc85b2b88a6ad6d55b10c646d245840136d9ec2050f133d 309752 pkcs11-provider-dbgsym_1.0-1_arm64.deb 7ffa4a10d346dab025dda9a2156b8ca6330dbf845fa1322b8479b9e4c73f6006 7236 pkcs11-provider_1.0-1_arm64.buildinfo 7f10de1699ad3e535ac6ec24d73092ef8a7dfed8d34c039598c5ebfcad730312 114052 pkcs11-provider_1.0-1_arm64.deb Files: 6ac6331fd2a57cc71c2604ce8d04a9ab 309752 debug optional pkcs11-provider-dbgsym_1.0-1_arm64.deb 15f7991d7d92111a278d4f3b06067288 7236 libs optional pkcs11-provider_1.0-1_arm64.buildinfo ba1265b5038f3493c537966a1ec8e188 114052 libs optional pkcs11-provider_1.0-1_arm64.deb Tue Feb 18 04:29:12 UTC 2025 I: diffoscope 288 will be used to compare the two builds: Running as unit: rb-diffoscope-arm64_6-79896.service # Profiling output for: /usr/bin/diffoscope --timeout 7200 --html /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/pkcs11-provider_1.0-1.diffoscope.html --text /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/pkcs11-provider_1.0-1.diffoscope.txt --json /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/pkcs11-provider_1.0-1.diffoscope.json --profile=- /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/b1/pkcs11-provider_1.0-1_arm64.changes /srv/reproducible-results/rbuild-debian/r-b-build.ZUJ1KV65/b2/pkcs11-provider_1.0-1_arm64.changes ## command (total time: 0.000s) 0.000s 1 call cmp (internal) ## has_same_content_as (total time: 0.000s) 0.000s 1 call diffoscope.comparators.binary.FilesystemFile ## main (total time: 0.003s) 0.003s 2 calls outputs 0.000s 1 call cleanup Finished with result: success Main processes terminated with: code=exited/status=0 Service runtime: 212ms CPU time consumed: 213ms Tue Feb 18 04:29:13 UTC 2025 I: diffoscope 288 found no differences in the changes files, and a .buildinfo file also exists. Tue Feb 18 04:29:13 UTC 2025 I: pkcs11-provider from trixie built successfully and reproducibly on arm64. Tue Feb 18 04:29:13 UTC 2025 I: Submitting .buildinfo files to external archives: Tue Feb 18 04:29:13 UTC 2025 I: Submitting 8.0K b1/pkcs11-provider_1.0-1_arm64.buildinfo.asc Tue Feb 18 04:29:14 UTC 2025 I: Submitting 8.0K b2/pkcs11-provider_1.0-1_arm64.buildinfo.asc Tue Feb 18 04:29:15 UTC 2025 I: Done submitting .buildinfo files to http://buildinfo.debian.net/api/submit. Tue Feb 18 04:29:15 UTC 2025 I: Done submitting .buildinfo files. Tue Feb 18 04:29:15 UTC 2025 I: Removing signed pkcs11-provider_1.0-1_arm64.buildinfo.asc files: removed './b1/pkcs11-provider_1.0-1_arm64.buildinfo.asc' removed './b2/pkcs11-provider_1.0-1_arm64.buildinfo.asc'