Sat Mar 29 15:59:00 UTC 2025 I: starting to build pkcs11-provider/unstable/arm64 on jenkins on '2025-03-29 15:58' Sat Mar 29 15:59:00 UTC 2025 I: The jenkins build log is/was available at https://jenkins.debian.net/userContent/reproducible/debian/build_service/arm64_3/84528/console.log Sat Mar 29 15:59:00 UTC 2025 I: Downloading source for unstable/pkcs11-provider=1.0-2 --2025-03-29 15:59:00-- http://deb.debian.org/debian/pool/main/p/pkcs11-provider/pkcs11-provider_1.0-2.dsc Connecting to 46.16.76.132:3128... connected. Proxy request sent, awaiting response... 200 OK Length: 2214 (2.2K) [text/prs.lines.tag] Saving to: ‘pkcs11-provider_1.0-2.dsc’ 0K .. 100% 354M=0s 2025-03-29 15:59:00 (354 MB/s) - ‘pkcs11-provider_1.0-2.dsc’ saved [2214/2214] Sat Mar 29 15:59:00 UTC 2025 I: pkcs11-provider_1.0-2.dsc -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 3.0 (quilt) Source: pkcs11-provider Binary: pkcs11-provider Architecture: any Version: 1.0-2 Maintainer: Luca Boccassi Homepage: https://github.com/latchset/pkcs11-provider Standards-Version: 4.7.2 Vcs-Browser: https://salsa.debian.org/debian/pkcs11-provider Vcs-Git: https://salsa.debian.org/debian/pkcs11-provider.git Build-Depends: debhelper-compat (= 13), dh-package-notes, libssl-dev (>= 3.0.7~), meson (>= 0.57~), pkgconf, expect , gnutls-bin , libnss3-dev , libp11-kit-dev , libstoken-dev , opensc , openssl , p11-kit , p11-kit-modules , softhsm2 Package-List: pkcs11-provider deb libs optional arch=any Checksums-Sha1: c1f7deab3a3af9fa2c3ef63ed95536c7c5a52707 210633 pkcs11-provider_1.0.orig.tar.gz a8cda47def2b47ce68f39af30d979e0666e9fc30 2708 pkcs11-provider_1.0-2.debian.tar.xz Checksums-Sha256: f62771642f24525305233fab01df361a0893912b7e92d2f550f26f131a7b36c2 210633 pkcs11-provider_1.0.orig.tar.gz cb5076ff1c06ed191e99bea6ae6c947a987845bfdee569ce03b5acf64d27745c 2708 pkcs11-provider_1.0-2.debian.tar.xz Files: 2933ec36edff8ab9c132e82f04cbd4dd 210633 pkcs11-provider_1.0.orig.tar.gz 150356658678552ec13e9329603a734c 2708 pkcs11-provider_1.0-2.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQJFBAEBCgAvFiEErCSqx93EIPGOymuRKGv37813JB4FAmfnTy4RHGJsdWNhQGRl Ymlhbi5vcmcACgkQKGv37813JB4rdg/9Ffx6jGzHlH9kWONaEHY5n8i5o8GsHryb +XY+KbRylOUC54kjcp9SUKNn+QVZaiUiGnliiWEJd1zQGMJdwkCoNi/np9D+UcsM HNaAn5zJoWbf36c/nHHTcy1RRovaN3LOoru7wnaCEhMy6axE33cSS79LxXoH8e8p LwJWbZIEZFcIQFuA7iLc8WXf1dAR1E65TEo+7ZK9objKeP5O4lIuY7OS3KUYJMLz /IyhAhN2qWOXNQk/NJ9iml3I0Y0H3+x/0ftPetyocO1uqEPD8fWlAxV5JPYVEkyu MGCwNmXxZIm0M/MzwphJeODJCc+E/tg0nMTEsCv6dS7V2xYxpx6sT3eQ4R5/uOL5 EQL2cP0NKbGQ7fGkJnCwqoQOCveKxo5wJ9/0DpulFX6fyhxnPkVY+5rMekvBdk3o p+qhS9ELD8ztIl+3T+7KOsQX8deoyN5LarZfsX66YXwHlSu5wBge78geJDZnrmNE HH9kduyGffUwfVCACbVFbIc+WSRsQWfY+wCxkE3/it5H2ZrMPLBrkBAmvOeeRSDY u+8czL721y5imQyjdUv4wlk0zk/1tnMDIey3LqLWOZqwJsAjcBtr31KqF98+9SFr I3Zjip/b23c+UF2tMrD/dG6lK3sChLctjy6gsMJGi6gYqxGAu4AySU7lIWIHPABv 73Eb386K3W4= =daLd -----END PGP SIGNATURE----- Sat Mar 29 15:59:00 UTC 2025 I: Checking whether the package is not for us Sat Mar 29 15:59:00 UTC 2025 I: Starting 1st build on remote node codethink03-arm64.debian.net. Sat Mar 29 15:59:00 UTC 2025 I: Preparing to do remote build '1' on codethink03-arm64.debian.net. Sat Mar 29 16:00:54 UTC 2025 I: Deleting $TMPDIR on codethink03-arm64.debian.net. I: pbuilder: network access will be disabled during build I: Current time: Fri May 1 10:22:01 -12 2026 I: pbuilder-time-stamp: 1777674121 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/unstable-reproducible-base.tgz] I: copying local configuration W: --override-config is not set; not updating apt.conf Read the manpage for details. I: mounting /proc filesystem I: mounting /sys filesystem I: creating /{dev,run}/shm I: mounting /dev/pts filesystem I: redirecting /dev/ptmx to /dev/pts/ptmx I: policy-rc.d already exists I: Copying source file I: copying [pkcs11-provider_1.0-2.dsc] I: copying [./pkcs11-provider_1.0.orig.tar.gz] I: copying [./pkcs11-provider_1.0-2.debian.tar.xz] I: Extracting source dpkg-source: warning: cannot verify inline signature for ./pkcs11-provider_1.0-2.dsc: unsupported subcommand dpkg-source: info: extracting pkcs11-provider in pkcs11-provider-1.0 dpkg-source: info: unpacking pkcs11-provider_1.0.orig.tar.gz dpkg-source: info: unpacking pkcs11-provider_1.0-2.debian.tar.xz I: Not using root during the build. I: Installing the build-deps I: user script /srv/workspace/pbuilder/1050553/tmp/hooks/D02_print_environment starting I: set BUILDDIR='/build/reproducible-path' BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' BUILDUSERNAME='pbuilder1' BUILD_ARCH='arm64' DEBIAN_FRONTEND='noninteractive' DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=12 ' DISTRIBUTION='unstable' HOME='/root' HOST_ARCH='arm64' IFS=' ' INVOCATION_ID='2822133323a84fafa0470f856a1388cc' LANG='C' LANGUAGE='en_US:en' LC_ALL='C' MAIL='/var/mail/root' OPTIND='1' PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' PBCURRENTCOMMANDLINEOPERATION='build' PBUILDER_OPERATION='build' PBUILDER_PKGDATADIR='/usr/share/pbuilder' PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' PBUILDER_SYSCONFDIR='/etc' PPID='1050553' PS1='# ' PS2='> ' PS4='+ ' PWD='/' SHELL='/bin/bash' SHLVL='2' SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.Q6pCuKA5/pbuilderrc_x6TM --distribution unstable --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.Q6pCuKA5/b1 --logfile b1/build.log pkcs11-provider_1.0-2.dsc' SUDO_GID='109' SUDO_UID='104' SUDO_USER='jenkins' TERM='unknown' TZ='/usr/share/zoneinfo/Etc/GMT+12' USER='root' _='/usr/bin/systemd-run' http_proxy='http://192.168.101.4:3128' I: uname -a Linux codethink03-arm64 6.1.0-32-cloud-arm64 #1 SMP Debian 6.1.129-1 (2025-03-06) aarch64 GNU/Linux I: ls -l /bin lrwxrwxrwx 1 root root 7 Mar 4 2025 /bin -> usr/bin I: user script /srv/workspace/pbuilder/1050553/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy Version: 0.invalid.0 Architecture: arm64 Maintainer: Debian Pbuilder Team Description: Dummy package to satisfy dependencies with aptitude - created by pbuilder This package was created automatically by pbuilder to satisfy the build-dependencies of the package being currently built. Depends: debhelper-compat (= 13), dh-package-notes, libssl-dev (>= 3.0.7~), meson (>= 0.57~), pkgconf, expect, gnutls-bin, libnss3-dev, libp11-kit-dev, libstoken-dev, opensc, openssl, p11-kit, p11-kit-modules, softhsm2 dpkg-deb: building package 'pbuilder-satisfydepends-dummy' in '/tmp/satisfydepends-aptitude/pbuilder-satisfydepends-dummy.deb'. Selecting previously unselected package pbuilder-satisfydepends-dummy. (Reading database ... 19919 files and directories currently installed.) Preparing to unpack .../pbuilder-satisfydepends-dummy.deb ... Unpacking pbuilder-satisfydepends-dummy (0.invalid.0) ... dpkg: pbuilder-satisfydepends-dummy: dependency problems, but configuring anyway as you requested: pbuilder-satisfydepends-dummy depends on debhelper-compat (= 13); however: Package debhelper-compat is not installed. pbuilder-satisfydepends-dummy depends on dh-package-notes; however: Package dh-package-notes is not installed. pbuilder-satisfydepends-dummy depends on libssl-dev (>= 3.0.7~); however: Package libssl-dev is not installed. pbuilder-satisfydepends-dummy depends on meson (>= 0.57~); however: Package meson is not installed. pbuilder-satisfydepends-dummy depends on pkgconf; however: Package pkgconf is not installed. pbuilder-satisfydepends-dummy depends on expect; however: Package expect is not installed. pbuilder-satisfydepends-dummy depends on gnutls-bin; however: Package gnutls-bin is not installed. pbuilder-satisfydepends-dummy depends on libnss3-dev; however: Package libnss3-dev is not installed. pbuilder-satisfydepends-dummy depends on libp11-kit-dev; however: Package libp11-kit-dev is not installed. pbuilder-satisfydepends-dummy depends on libstoken-dev; however: Package libstoken-dev is not installed. pbuilder-satisfydepends-dummy depends on opensc; however: Package opensc is not installed. pbuilder-satisfydepends-dummy depends on openssl; however: Package openssl is not installed. pbuilder-satisfydepends-dummy depends on p11-kit; however: Package p11-kit is not installed. pbuilder-satisfydepends-dummy depends on p11-kit-modules; however: Package p11-kit-modules is not installed. pbuilder-satisfydepends-dummy depends on softhsm2; however: Package softhsm2 is not installed. Setting up pbuilder-satisfydepends-dummy (0.invalid.0) ... Reading package lists... Building dependency tree... Reading state information... Initializing package states... Writing extended state information... Building tag database... pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) pbuilder-satisfydepends-dummy is already installed at the requested version (0.invalid.0) The following NEW packages will be installed: autoconf{a} automake{a} autopoint{a} autotools-dev{a} bsdextrautils{a} debhelper{a} dh-autoreconf{a} dh-package-notes{a} dh-strip-nondeterminism{a} dwz{a} expect{a} file{a} gettext{a} gettext-base{a} gnutls-bin{a} groff-base{a} intltool-debian{a} libarchive-zip-perl{a} libdebhelper-perl{a} libeac3{a} libelf1t64{a} libevent-2.1-7t64{a} libexpat1{a} libffi8{a} libfile-stripnondeterminism-perl{a} libglib2.0-0t64{a} libgnutls-dane0t64{a} libgnutls30t64{a} libidn2-0{a} libmagic-mgc{a} libmagic1t64{a} libnspr4{a} libnspr4-dev{a} libnss3{a} libnss3-dev{a} libp11-kit-dev{a} libp11-kit0{a} libpipeline1{a} libpkgconf3{a} libproc2-0{a} libpython3-stdlib{a} libpython3.13-minimal{a} libpython3.13-stdlib{a} libreadline8t64{a} libsofthsm2{a} libssl-dev{a} libstoken-dev{a} libstoken1t64{a} libtasn1-6{a} libtcl8.6{a} libtext-charwidth-perl{a} libtext-wrapi18n-perl{a} libtomcrypt-dev{a} libtomcrypt1{a} libtommath1{a} libtool{a} libuchardet0{a} libunbound8{a} libunistring5{a} libxml2{a} m4{a} man-db{a} media-types{a} meson{a} netbase{a} ninja-build{a} opensc{a} opensc-pkcs11{a} openssl{a} p11-kit{a} p11-kit-modules{a} pkgconf{a} pkgconf-bin{a} po-debconf{a} procps{a} python3{a} python3-autocommand{a} python3-inflect{a} python3-jaraco.context{a} python3-jaraco.functools{a} python3-jaraco.text{a} python3-minimal{a} python3-more-itertools{a} python3-pkg-resources{a} python3-setuptools{a} python3-typeguard{a} python3-typing-extensions{a} python3-zipp{a} python3.13{a} python3.13-minimal{a} readline-common{a} sensible-utils{a} softhsm2{a} softhsm2-common{a} tcl-expect{a} tcl8.6{a} tzdata{a} ucf{a} The following packages are RECOMMENDED but will NOT be installed: ca-certificates curl libarchive-cpio-perl libglib2.0-data libltdl-dev libmail-sendmail-perl linux-sysctl-defaults lynx pcscd psmisc shared-mime-info wget xdg-user-dirs 0 packages upgraded, 98 newly installed, 0 to remove and 0 not upgraded. Need to get 37.5 MB of archives. After unpacking 149 MB will be used. Writing extended state information... Get: 1 http://deb.debian.org/debian unstable/main arm64 libpython3.13-minimal arm64 3.13.2-2 [853 kB] Get: 2 http://deb.debian.org/debian unstable/main arm64 libexpat1 arm64 2.7.1-1 [93.3 kB] Get: 3 http://deb.debian.org/debian unstable/main arm64 python3.13-minimal arm64 3.13.2-2 [1995 kB] Get: 4 http://deb.debian.org/debian unstable/main arm64 python3-minimal arm64 3.13.2-2 [27.1 kB] Get: 5 http://deb.debian.org/debian unstable/main arm64 media-types all 13.0.0 [29.3 kB] Get: 6 http://deb.debian.org/debian unstable/main arm64 netbase all 6.5 [12.4 kB] Get: 7 http://deb.debian.org/debian unstable/main arm64 tzdata all 2025b-1 [259 kB] Get: 8 http://deb.debian.org/debian unstable/main arm64 libffi8 arm64 3.4.7-1 [21.2 kB] Get: 9 http://deb.debian.org/debian unstable/main arm64 readline-common all 8.2-6 [69.4 kB] Get: 10 http://deb.debian.org/debian unstable/main arm64 libreadline8t64 arm64 8.2-6 [159 kB] Get: 11 http://deb.debian.org/debian unstable/main arm64 libpython3.13-stdlib arm64 3.13.2-2 [1888 kB] Get: 12 http://deb.debian.org/debian unstable/main arm64 python3.13 arm64 3.13.2-2 [746 kB] Get: 13 http://deb.debian.org/debian unstable/main arm64 libpython3-stdlib arm64 3.13.2-2 [10.1 kB] Get: 14 http://deb.debian.org/debian unstable/main arm64 python3 arm64 3.13.2-2 [28.1 kB] Get: 15 http://deb.debian.org/debian unstable/main arm64 libproc2-0 arm64 2:4.0.4-7 [62.4 kB] Get: 16 http://deb.debian.org/debian unstable/main arm64 procps arm64 2:4.0.4-7 [868 kB] Get: 17 http://deb.debian.org/debian unstable/main arm64 sensible-utils all 0.0.24 [24.8 kB] Get: 18 http://deb.debian.org/debian unstable/main arm64 libmagic-mgc arm64 1:5.46-4 [337 kB] Get: 19 http://deb.debian.org/debian unstable/main arm64 libmagic1t64 arm64 1:5.46-4 [103 kB] Get: 20 http://deb.debian.org/debian unstable/main arm64 file arm64 1:5.46-4 [43.6 kB] Get: 21 http://deb.debian.org/debian unstable/main arm64 gettext-base arm64 0.23.1-1 [241 kB] Get: 22 http://deb.debian.org/debian unstable/main arm64 libuchardet0 arm64 0.0.8-1+b2 [69.2 kB] Get: 23 http://deb.debian.org/debian unstable/main arm64 groff-base arm64 1.23.0-7 [1129 kB] Get: 24 http://deb.debian.org/debian unstable/main arm64 bsdextrautils arm64 2.40.4-5 [92.0 kB] Get: 25 http://deb.debian.org/debian unstable/main arm64 libpipeline1 arm64 1.5.8-1 [40.2 kB] Get: 26 http://deb.debian.org/debian unstable/main arm64 man-db arm64 2.13.0-1 [1404 kB] Get: 27 http://deb.debian.org/debian unstable/main arm64 libtext-charwidth-perl arm64 0.04-11+b4 [9652 B] Get: 28 http://deb.debian.org/debian unstable/main arm64 libtext-wrapi18n-perl all 0.06-10 [8808 B] Get: 29 http://deb.debian.org/debian unstable/main arm64 ucf all 3.0050 [42.7 kB] Get: 30 http://deb.debian.org/debian unstable/main arm64 m4 arm64 1.4.19-7 [285 kB] Get: 31 http://deb.debian.org/debian unstable/main arm64 autoconf all 2.72-3 [493 kB] Get: 32 http://deb.debian.org/debian unstable/main arm64 autotools-dev all 20240727.1 [60.2 kB] Get: 33 http://deb.debian.org/debian unstable/main arm64 automake all 1:1.17-4 [862 kB] Get: 34 http://deb.debian.org/debian unstable/main arm64 autopoint all 0.23.1-1 [770 kB] Get: 35 http://deb.debian.org/debian unstable/main arm64 libdebhelper-perl all 13.24.2 [90.9 kB] Get: 36 http://deb.debian.org/debian unstable/main arm64 libtool all 2.5.4-4 [539 kB] Get: 37 http://deb.debian.org/debian unstable/main arm64 dh-autoreconf all 20 [17.1 kB] Get: 38 http://deb.debian.org/debian unstable/main arm64 libarchive-zip-perl all 1.68-1 [104 kB] Get: 39 http://deb.debian.org/debian unstable/main arm64 libfile-stripnondeterminism-perl all 1.14.1-2 [19.7 kB] Get: 40 http://deb.debian.org/debian unstable/main arm64 dh-strip-nondeterminism all 1.14.1-2 [8620 B] Get: 41 http://deb.debian.org/debian unstable/main arm64 libelf1t64 arm64 0.192-4 [189 kB] Get: 42 http://deb.debian.org/debian unstable/main arm64 dwz arm64 0.15-1+b1 [102 kB] Get: 43 http://deb.debian.org/debian unstable/main arm64 libunistring5 arm64 1.3-2 [453 kB] Get: 44 http://deb.debian.org/debian unstable/main arm64 libxml2 arm64 2.12.7+dfsg+really2.9.14-0.4 [629 kB] Get: 45 http://deb.debian.org/debian unstable/main arm64 gettext arm64 0.23.1-1 [1610 kB] Get: 46 http://deb.debian.org/debian unstable/main arm64 intltool-debian all 0.35.0+20060710.6 [22.9 kB] Get: 47 http://deb.debian.org/debian unstable/main arm64 po-debconf all 1.0.21+nmu1 [248 kB] Get: 48 http://deb.debian.org/debian unstable/main arm64 debhelper all 13.24.2 [919 kB] Get: 49 http://deb.debian.org/debian unstable/main arm64 dh-package-notes all 0.15 [6692 B] Get: 50 http://deb.debian.org/debian unstable/main arm64 libtcl8.6 arm64 8.6.16+dfsg-1 [984 kB] Get: 51 http://deb.debian.org/debian unstable/main arm64 tcl8.6 arm64 8.6.16+dfsg-1 [121 kB] Get: 52 http://deb.debian.org/debian unstable/main arm64 tcl-expect arm64 5.45.4-4 [123 kB] Get: 53 http://deb.debian.org/debian unstable/main arm64 expect arm64 5.45.4-4 [158 kB] Get: 54 http://deb.debian.org/debian unstable/main arm64 libidn2-0 arm64 2.3.8-2 [107 kB] Get: 55 http://deb.debian.org/debian unstable/main arm64 libp11-kit0 arm64 0.25.5-3 [409 kB] Get: 56 http://deb.debian.org/debian unstable/main arm64 libtasn1-6 arm64 4.20.0-2 [47.3 kB] Get: 57 http://deb.debian.org/debian unstable/main arm64 libgnutls30t64 arm64 3.8.9-2 [1374 kB] Get: 58 http://deb.debian.org/debian unstable/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10+b1 [170 kB] Get: 59 http://deb.debian.org/debian unstable/main arm64 libunbound8 arm64 1.22.0-1+b1 [553 kB] Get: 60 http://deb.debian.org/debian unstable/main arm64 libgnutls-dane0t64 arm64 3.8.9-2 [452 kB] Get: 61 http://deb.debian.org/debian unstable/main arm64 gnutls-bin arm64 3.8.9-2 [673 kB] Get: 62 http://deb.debian.org/debian unstable/main arm64 libeac3 arm64 1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3 [48.1 kB] Get: 63 http://deb.debian.org/debian unstable/main arm64 libglib2.0-0t64 arm64 2.84.0-2 [1424 kB] Get: 64 http://deb.debian.org/debian unstable/main arm64 libnspr4 arm64 2:4.36-1 [102 kB] Get: 65 http://deb.debian.org/debian unstable/main arm64 libnspr4-dev arm64 2:4.36-1 [203 kB] Get: 66 http://deb.debian.org/debian unstable/main arm64 libnss3 arm64 2:3.109-1 [1291 kB] Get: 67 http://deb.debian.org/debian unstable/main arm64 libnss3-dev arm64 2:3.109-1 [250 kB] Get: 68 http://deb.debian.org/debian unstable/main arm64 libp11-kit-dev arm64 0.25.5-3 [208 kB] Get: 69 http://deb.debian.org/debian unstable/main arm64 libpkgconf3 arm64 1.8.1-4 [35.3 kB] Get: 70 http://deb.debian.org/debian unstable/main arm64 softhsm2-common arm64 2.6.1-2.2+b3 [12.4 kB] Get: 71 http://deb.debian.org/debian unstable/main arm64 libsofthsm2 arm64 2.6.1-2.2+b3 [218 kB] Get: 72 http://deb.debian.org/debian unstable/main arm64 libssl-dev arm64 3.4.1-1 [3232 kB] Get: 73 http://deb.debian.org/debian unstable/main arm64 libtommath1 arm64 1.3.0-1 [64.5 kB] Get: 74 http://deb.debian.org/debian unstable/main arm64 libtomcrypt1 arm64 1.18.2+dfsg-7+b2 [410 kB] Get: 75 http://deb.debian.org/debian unstable/main arm64 libstoken1t64 arm64 0.92-1.1+b2 [28.1 kB] Get: 76 http://deb.debian.org/debian unstable/main arm64 libtomcrypt-dev arm64 1.18.2+dfsg-7+b2 [1277 kB] Get: 77 http://deb.debian.org/debian unstable/main arm64 libstoken-dev arm64 0.92-1.1+b2 [8196 B] Get: 78 http://deb.debian.org/debian unstable/main arm64 ninja-build arm64 1.12.1-1+b1 [130 kB] Get: 79 http://deb.debian.org/debian unstable/main arm64 python3-autocommand all 2.2.2-3 [13.6 kB] Get: 80 http://deb.debian.org/debian unstable/main arm64 python3-more-itertools all 10.6.0-1 [65.3 kB] Get: 81 http://deb.debian.org/debian unstable/main arm64 python3-typing-extensions all 4.12.2-2 [73.0 kB] Get: 82 http://deb.debian.org/debian unstable/main arm64 python3-typeguard all 4.4.2-1 [37.3 kB] Get: 83 http://deb.debian.org/debian unstable/main arm64 python3-inflect all 7.3.1-2 [32.4 kB] Get: 84 http://deb.debian.org/debian unstable/main arm64 python3-jaraco.context all 6.0.1-1 [8276 B] Get: 85 http://deb.debian.org/debian unstable/main arm64 python3-jaraco.functools all 4.1.0-1 [12.0 kB] Get: 86 http://deb.debian.org/debian unstable/main arm64 python3-pkg-resources all 75.8.0-1 [222 kB] Get: 87 http://deb.debian.org/debian unstable/main arm64 python3-jaraco.text all 4.0.0-1 [11.4 kB] Get: 88 http://deb.debian.org/debian unstable/main arm64 python3-zipp all 3.21.0-1 [10.6 kB] Get: 89 http://deb.debian.org/debian unstable/main arm64 python3-setuptools all 75.8.0-1 [724 kB] Get: 90 http://deb.debian.org/debian unstable/main arm64 meson all 1.7.0-1 [639 kB] Get: 91 http://deb.debian.org/debian unstable/main arm64 opensc-pkcs11 arm64 0.26.1-1 [800 kB] Get: 92 http://deb.debian.org/debian unstable/main arm64 opensc arm64 0.26.1-1 [394 kB] Get: 93 http://deb.debian.org/debian unstable/main arm64 openssl arm64 3.4.1-1 [1390 kB] Get: 94 http://deb.debian.org/debian unstable/main arm64 p11-kit-modules arm64 0.25.5-3 [253 kB] Get: 95 http://deb.debian.org/debian unstable/main arm64 p11-kit arm64 0.25.5-3 [400 kB] Get: 96 http://deb.debian.org/debian unstable/main arm64 pkgconf-bin arm64 1.8.1-4 [29.6 kB] Get: 97 http://deb.debian.org/debian unstable/main arm64 pkgconf arm64 1.8.1-4 [26.1 kB] Get: 98 http://deb.debian.org/debian unstable/main arm64 softhsm2 arm64 2.6.1-2.2+b3 [152 kB] Fetched 37.5 MB in 0s (100.0 MB/s) Preconfiguring packages ... Selecting previously unselected package libpython3.13-minimal:arm64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19919 files and directories currently installed.) Preparing to unpack .../libpython3.13-minimal_3.13.2-2_arm64.deb ... Unpacking libpython3.13-minimal:arm64 (3.13.2-2) ... Selecting previously unselected package libexpat1:arm64. Preparing to unpack .../libexpat1_2.7.1-1_arm64.deb ... Unpacking libexpat1:arm64 (2.7.1-1) ... Selecting previously unselected package python3.13-minimal. Preparing to unpack .../python3.13-minimal_3.13.2-2_arm64.deb ... Unpacking python3.13-minimal (3.13.2-2) ... Setting up libpython3.13-minimal:arm64 (3.13.2-2) ... Setting up libexpat1:arm64 (2.7.1-1) ... Setting up python3.13-minimal (3.13.2-2) ... Selecting previously unselected package python3-minimal. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 20253 files and directories currently installed.) Preparing to unpack .../0-python3-minimal_3.13.2-2_arm64.deb ... Unpacking python3-minimal (3.13.2-2) ... Selecting previously unselected package media-types. Preparing to unpack .../1-media-types_13.0.0_all.deb ... Unpacking media-types (13.0.0) ... Selecting previously unselected package netbase. Preparing to unpack .../2-netbase_6.5_all.deb ... Unpacking netbase (6.5) ... Selecting previously unselected package tzdata. Preparing to unpack .../3-tzdata_2025b-1_all.deb ... Unpacking tzdata (2025b-1) ... Selecting previously unselected package libffi8:arm64. Preparing to unpack .../4-libffi8_3.4.7-1_arm64.deb ... Unpacking libffi8:arm64 (3.4.7-1) ... Selecting previously unselected package readline-common. Preparing to unpack .../5-readline-common_8.2-6_all.deb ... Unpacking readline-common (8.2-6) ... Selecting previously unselected package libreadline8t64:arm64. Preparing to unpack .../6-libreadline8t64_8.2-6_arm64.deb ... Adding 'diversion of /lib/aarch64-linux-gnu/libhistory.so.8 to /lib/aarch64-linux-gnu/libhistory.so.8.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/aarch64-linux-gnu/libhistory.so.8.2 to /lib/aarch64-linux-gnu/libhistory.so.8.2.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/aarch64-linux-gnu/libreadline.so.8 to /lib/aarch64-linux-gnu/libreadline.so.8.usr-is-merged by libreadline8t64' Adding 'diversion of /lib/aarch64-linux-gnu/libreadline.so.8.2 to /lib/aarch64-linux-gnu/libreadline.so.8.2.usr-is-merged by libreadline8t64' Unpacking libreadline8t64:arm64 (8.2-6) ... Selecting previously unselected package libpython3.13-stdlib:arm64. Preparing to unpack .../7-libpython3.13-stdlib_3.13.2-2_arm64.deb ... Unpacking libpython3.13-stdlib:arm64 (3.13.2-2) ... Selecting previously unselected package python3.13. Preparing to unpack .../8-python3.13_3.13.2-2_arm64.deb ... Unpacking python3.13 (3.13.2-2) ... Selecting previously unselected package libpython3-stdlib:arm64. Preparing to unpack .../9-libpython3-stdlib_3.13.2-2_arm64.deb ... Unpacking libpython3-stdlib:arm64 (3.13.2-2) ... Setting up python3-minimal (3.13.2-2) ... Selecting previously unselected package python3. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 21264 files and directories currently installed.) Preparing to unpack .../00-python3_3.13.2-2_arm64.deb ... Unpacking python3 (3.13.2-2) ... Selecting previously unselected package libproc2-0:arm64. Preparing to unpack .../01-libproc2-0_2%3a4.0.4-7_arm64.deb ... Unpacking libproc2-0:arm64 (2:4.0.4-7) ... Selecting previously unselected package procps. Preparing to unpack .../02-procps_2%3a4.0.4-7_arm64.deb ... Unpacking procps (2:4.0.4-7) ... Selecting previously unselected package sensible-utils. Preparing to unpack .../03-sensible-utils_0.0.24_all.deb ... Unpacking sensible-utils (0.0.24) ... Selecting previously unselected package libmagic-mgc. Preparing to unpack .../04-libmagic-mgc_1%3a5.46-4_arm64.deb ... Unpacking libmagic-mgc (1:5.46-4) ... Selecting previously unselected package libmagic1t64:arm64. Preparing to unpack .../05-libmagic1t64_1%3a5.46-4_arm64.deb ... Unpacking libmagic1t64:arm64 (1:5.46-4) ... Selecting previously unselected package file. Preparing to unpack .../06-file_1%3a5.46-4_arm64.deb ... Unpacking file (1:5.46-4) ... Selecting previously unselected package gettext-base. Preparing to unpack .../07-gettext-base_0.23.1-1_arm64.deb ... Unpacking gettext-base (0.23.1-1) ... Selecting previously unselected package libuchardet0:arm64. Preparing to unpack .../08-libuchardet0_0.0.8-1+b2_arm64.deb ... Unpacking libuchardet0:arm64 (0.0.8-1+b2) ... Selecting previously unselected package groff-base. Preparing to unpack .../09-groff-base_1.23.0-7_arm64.deb ... Unpacking groff-base (1.23.0-7) ... Selecting previously unselected package bsdextrautils. Preparing to unpack .../10-bsdextrautils_2.40.4-5_arm64.deb ... Unpacking bsdextrautils (2.40.4-5) ... Selecting previously unselected package libpipeline1:arm64. Preparing to unpack .../11-libpipeline1_1.5.8-1_arm64.deb ... Unpacking libpipeline1:arm64 (1.5.8-1) ... Selecting previously unselected package man-db. Preparing to unpack .../12-man-db_2.13.0-1_arm64.deb ... Unpacking man-db (2.13.0-1) ... Selecting previously unselected package libtext-charwidth-perl:arm64. Preparing to unpack .../13-libtext-charwidth-perl_0.04-11+b4_arm64.deb ... Unpacking libtext-charwidth-perl:arm64 (0.04-11+b4) ... Selecting previously unselected package libtext-wrapi18n-perl. Preparing to unpack .../14-libtext-wrapi18n-perl_0.06-10_all.deb ... Unpacking libtext-wrapi18n-perl (0.06-10) ... Selecting previously unselected package ucf. Preparing to unpack .../15-ucf_3.0050_all.deb ... Moving old data out of the way Unpacking ucf (3.0050) ... Selecting previously unselected package m4. Preparing to unpack .../16-m4_1.4.19-7_arm64.deb ... Unpacking m4 (1.4.19-7) ... Selecting previously unselected package autoconf. Preparing to unpack .../17-autoconf_2.72-3_all.deb ... Unpacking autoconf (2.72-3) ... Selecting previously unselected package autotools-dev. Preparing to unpack .../18-autotools-dev_20240727.1_all.deb ... Unpacking autotools-dev (20240727.1) ... Selecting previously unselected package automake. Preparing to unpack .../19-automake_1%3a1.17-4_all.deb ... Unpacking automake (1:1.17-4) ... Selecting previously unselected package autopoint. Preparing to unpack .../20-autopoint_0.23.1-1_all.deb ... Unpacking autopoint (0.23.1-1) ... Selecting previously unselected package libdebhelper-perl. Preparing to unpack .../21-libdebhelper-perl_13.24.2_all.deb ... Unpacking libdebhelper-perl (13.24.2) ... Selecting previously unselected package libtool. Preparing to unpack .../22-libtool_2.5.4-4_all.deb ... Unpacking libtool (2.5.4-4) ... Selecting previously unselected package dh-autoreconf. Preparing to unpack .../23-dh-autoreconf_20_all.deb ... Unpacking dh-autoreconf (20) ... Selecting previously unselected package libarchive-zip-perl. Preparing to unpack .../24-libarchive-zip-perl_1.68-1_all.deb ... Unpacking libarchive-zip-perl (1.68-1) ... Selecting previously unselected package libfile-stripnondeterminism-perl. Preparing to unpack .../25-libfile-stripnondeterminism-perl_1.14.1-2_all.deb ... Unpacking libfile-stripnondeterminism-perl (1.14.1-2) ... Selecting previously unselected package dh-strip-nondeterminism. Preparing to unpack .../26-dh-strip-nondeterminism_1.14.1-2_all.deb ... Unpacking dh-strip-nondeterminism (1.14.1-2) ... Selecting previously unselected package libelf1t64:arm64. Preparing to unpack .../27-libelf1t64_0.192-4_arm64.deb ... Unpacking libelf1t64:arm64 (0.192-4) ... Selecting previously unselected package dwz. Preparing to unpack .../28-dwz_0.15-1+b1_arm64.deb ... Unpacking dwz (0.15-1+b1) ... Selecting previously unselected package libunistring5:arm64. Preparing to unpack .../29-libunistring5_1.3-2_arm64.deb ... Unpacking libunistring5:arm64 (1.3-2) ... Selecting previously unselected package libxml2:arm64. Preparing to unpack .../30-libxml2_2.12.7+dfsg+really2.9.14-0.4_arm64.deb ... Unpacking libxml2:arm64 (2.12.7+dfsg+really2.9.14-0.4) ... Selecting previously unselected package gettext. Preparing to unpack .../31-gettext_0.23.1-1_arm64.deb ... Unpacking gettext (0.23.1-1) ... Selecting previously unselected package intltool-debian. Preparing to unpack .../32-intltool-debian_0.35.0+20060710.6_all.deb ... Unpacking intltool-debian (0.35.0+20060710.6) ... Selecting previously unselected package po-debconf. Preparing to unpack .../33-po-debconf_1.0.21+nmu1_all.deb ... Unpacking po-debconf (1.0.21+nmu1) ... Selecting previously unselected package debhelper. Preparing to unpack .../34-debhelper_13.24.2_all.deb ... Unpacking debhelper (13.24.2) ... Selecting previously unselected package dh-package-notes. Preparing to unpack .../35-dh-package-notes_0.15_all.deb ... Unpacking dh-package-notes (0.15) ... Selecting previously unselected package libtcl8.6:arm64. Preparing to unpack .../36-libtcl8.6_8.6.16+dfsg-1_arm64.deb ... Unpacking libtcl8.6:arm64 (8.6.16+dfsg-1) ... Selecting previously unselected package tcl8.6. Preparing to unpack .../37-tcl8.6_8.6.16+dfsg-1_arm64.deb ... Unpacking tcl8.6 (8.6.16+dfsg-1) ... Selecting previously unselected package tcl-expect:arm64. Preparing to unpack .../38-tcl-expect_5.45.4-4_arm64.deb ... Unpacking tcl-expect:arm64 (5.45.4-4) ... Selecting previously unselected package expect. Preparing to unpack .../39-expect_5.45.4-4_arm64.deb ... Unpacking expect (5.45.4-4) ... Selecting previously unselected package libidn2-0:arm64. Preparing to unpack .../40-libidn2-0_2.3.8-2_arm64.deb ... Unpacking libidn2-0:arm64 (2.3.8-2) ... Selecting previously unselected package libp11-kit0:arm64. Preparing to unpack .../41-libp11-kit0_0.25.5-3_arm64.deb ... Unpacking libp11-kit0:arm64 (0.25.5-3) ... Selecting previously unselected package libtasn1-6:arm64. Preparing to unpack .../42-libtasn1-6_4.20.0-2_arm64.deb ... Unpacking libtasn1-6:arm64 (4.20.0-2) ... Selecting previously unselected package libgnutls30t64:arm64. Preparing to unpack .../43-libgnutls30t64_3.8.9-2_arm64.deb ... Unpacking libgnutls30t64:arm64 (3.8.9-2) ... Selecting previously unselected package libevent-2.1-7t64:arm64. Preparing to unpack .../44-libevent-2.1-7t64_2.1.12-stable-10+b1_arm64.deb ... Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10+b1) ... Selecting previously unselected package libunbound8:arm64. Preparing to unpack .../45-libunbound8_1.22.0-1+b1_arm64.deb ... Unpacking libunbound8:arm64 (1.22.0-1+b1) ... Selecting previously unselected package libgnutls-dane0t64:arm64. Preparing to unpack .../46-libgnutls-dane0t64_3.8.9-2_arm64.deb ... Unpacking libgnutls-dane0t64:arm64 (3.8.9-2) ... Selecting previously unselected package gnutls-bin. Preparing to unpack .../47-gnutls-bin_3.8.9-2_arm64.deb ... Unpacking gnutls-bin (3.8.9-2) ... Selecting previously unselected package libeac3:arm64. Preparing to unpack .../48-libeac3_1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3_arm64.deb ... Unpacking libeac3:arm64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ... Selecting previously unselected package libglib2.0-0t64:arm64. Preparing to unpack .../49-libglib2.0-0t64_2.84.0-2_arm64.deb ... Unpacking libglib2.0-0t64:arm64 (2.84.0-2) ... Selecting previously unselected package libnspr4:arm64. Preparing to unpack .../50-libnspr4_2%3a4.36-1_arm64.deb ... Unpacking libnspr4:arm64 (2:4.36-1) ... Selecting previously unselected package libnspr4-dev. Preparing to unpack .../51-libnspr4-dev_2%3a4.36-1_arm64.deb ... Unpacking libnspr4-dev (2:4.36-1) ... Selecting previously unselected package libnss3:arm64. Preparing to unpack .../52-libnss3_2%3a3.109-1_arm64.deb ... Unpacking libnss3:arm64 (2:3.109-1) ... Selecting previously unselected package libnss3-dev:arm64. Preparing to unpack .../53-libnss3-dev_2%3a3.109-1_arm64.deb ... Unpacking libnss3-dev:arm64 (2:3.109-1) ... Selecting previously unselected package libp11-kit-dev:arm64. Preparing to unpack .../54-libp11-kit-dev_0.25.5-3_arm64.deb ... Unpacking libp11-kit-dev:arm64 (0.25.5-3) ... Selecting previously unselected package libpkgconf3:arm64. Preparing to unpack .../55-libpkgconf3_1.8.1-4_arm64.deb ... Unpacking libpkgconf3:arm64 (1.8.1-4) ... Selecting previously unselected package softhsm2-common. Preparing to unpack .../56-softhsm2-common_2.6.1-2.2+b3_arm64.deb ... Unpacking softhsm2-common (2.6.1-2.2+b3) ... Selecting previously unselected package libsofthsm2. Preparing to unpack .../57-libsofthsm2_2.6.1-2.2+b3_arm64.deb ... Unpacking libsofthsm2 (2.6.1-2.2+b3) ... Selecting previously unselected package libssl-dev:arm64. Preparing to unpack .../58-libssl-dev_3.4.1-1_arm64.deb ... Unpacking libssl-dev:arm64 (3.4.1-1) ... Selecting previously unselected package libtommath1:arm64. Preparing to unpack .../59-libtommath1_1.3.0-1_arm64.deb ... Unpacking libtommath1:arm64 (1.3.0-1) ... Selecting previously unselected package libtomcrypt1:arm64. Preparing to unpack .../60-libtomcrypt1_1.18.2+dfsg-7+b2_arm64.deb ... Unpacking libtomcrypt1:arm64 (1.18.2+dfsg-7+b2) ... Selecting previously unselected package libstoken1t64:arm64. Preparing to unpack .../61-libstoken1t64_0.92-1.1+b2_arm64.deb ... Unpacking libstoken1t64:arm64 (0.92-1.1+b2) ... Selecting previously unselected package libtomcrypt-dev. Preparing to unpack .../62-libtomcrypt-dev_1.18.2+dfsg-7+b2_arm64.deb ... Unpacking libtomcrypt-dev (1.18.2+dfsg-7+b2) ... Selecting previously unselected package libstoken-dev:arm64. Preparing to unpack .../63-libstoken-dev_0.92-1.1+b2_arm64.deb ... Unpacking libstoken-dev:arm64 (0.92-1.1+b2) ... Selecting previously unselected package ninja-build. Preparing to unpack .../64-ninja-build_1.12.1-1+b1_arm64.deb ... Unpacking ninja-build (1.12.1-1+b1) ... Selecting previously unselected package python3-autocommand. Preparing to unpack .../65-python3-autocommand_2.2.2-3_all.deb ... Unpacking python3-autocommand (2.2.2-3) ... Selecting previously unselected package python3-more-itertools. Preparing to unpack .../66-python3-more-itertools_10.6.0-1_all.deb ... Unpacking python3-more-itertools (10.6.0-1) ... Selecting previously unselected package python3-typing-extensions. Preparing to unpack .../67-python3-typing-extensions_4.12.2-2_all.deb ... Unpacking python3-typing-extensions (4.12.2-2) ... Selecting previously unselected package python3-typeguard. Preparing to unpack .../68-python3-typeguard_4.4.2-1_all.deb ... Unpacking python3-typeguard (4.4.2-1) ... Selecting previously unselected package python3-inflect. Preparing to unpack .../69-python3-inflect_7.3.1-2_all.deb ... Unpacking python3-inflect (7.3.1-2) ... Selecting previously unselected package python3-jaraco.context. Preparing to unpack .../70-python3-jaraco.context_6.0.1-1_all.deb ... Unpacking python3-jaraco.context (6.0.1-1) ... Selecting previously unselected package python3-jaraco.functools. Preparing to unpack .../71-python3-jaraco.functools_4.1.0-1_all.deb ... Unpacking python3-jaraco.functools (4.1.0-1) ... Selecting previously unselected package python3-pkg-resources. Preparing to unpack .../72-python3-pkg-resources_75.8.0-1_all.deb ... Unpacking python3-pkg-resources (75.8.0-1) ... Selecting previously unselected package python3-jaraco.text. Preparing to unpack .../73-python3-jaraco.text_4.0.0-1_all.deb ... Unpacking python3-jaraco.text (4.0.0-1) ... Selecting previously unselected package python3-zipp. Preparing to unpack .../74-python3-zipp_3.21.0-1_all.deb ... Unpacking python3-zipp (3.21.0-1) ... Selecting previously unselected package python3-setuptools. Preparing to unpack .../75-python3-setuptools_75.8.0-1_all.deb ... Unpacking python3-setuptools (75.8.0-1) ... Selecting previously unselected package meson. Preparing to unpack .../76-meson_1.7.0-1_all.deb ... Unpacking meson (1.7.0-1) ... Selecting previously unselected package opensc-pkcs11:arm64. Preparing to unpack .../77-opensc-pkcs11_0.26.1-1_arm64.deb ... Unpacking opensc-pkcs11:arm64 (0.26.1-1) ... Selecting previously unselected package opensc. Preparing to unpack .../78-opensc_0.26.1-1_arm64.deb ... Unpacking opensc (0.26.1-1) ... Selecting previously unselected package openssl. Preparing to unpack .../79-openssl_3.4.1-1_arm64.deb ... Unpacking openssl (3.4.1-1) ... Selecting previously unselected package p11-kit-modules:arm64. Preparing to unpack .../80-p11-kit-modules_0.25.5-3_arm64.deb ... Unpacking p11-kit-modules:arm64 (0.25.5-3) ... Selecting previously unselected package p11-kit. Preparing to unpack .../81-p11-kit_0.25.5-3_arm64.deb ... Unpacking p11-kit (0.25.5-3) ... Selecting previously unselected package pkgconf-bin. Preparing to unpack .../82-pkgconf-bin_1.8.1-4_arm64.deb ... Unpacking pkgconf-bin (1.8.1-4) ... Selecting previously unselected package pkgconf:arm64. Preparing to unpack .../83-pkgconf_1.8.1-4_arm64.deb ... Unpacking pkgconf:arm64 (1.8.1-4) ... Selecting previously unselected package softhsm2. Preparing to unpack .../84-softhsm2_2.6.1-2.2+b3_arm64.deb ... Unpacking softhsm2 (2.6.1-2.2+b3) ... Setting up media-types (13.0.0) ... Setting up libpipeline1:arm64 (1.5.8-1) ... Setting up libtext-charwidth-perl:arm64 (0.04-11+b4) ... Setting up bsdextrautils (2.40.4-5) ... Setting up libmagic-mgc (1:5.46-4) ... Setting up libarchive-zip-perl (1.68-1) ... Setting up libtommath1:arm64 (1.3.0-1) ... Setting up libdebhelper-perl (13.24.2) ... Setting up libmagic1t64:arm64 (1:5.46-4) ... Setting up gettext-base (0.23.1-1) ... Setting up m4 (1.4.19-7) ... Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10+b1) ... Setting up file (1:5.46-4) ... Setting up libtext-wrapi18n-perl (0.06-10) ... Setting up ninja-build (1.12.1-1+b1) ... Setting up libelf1t64:arm64 (0.192-4) ... Setting up libeac3:arm64 (1.1.2+ds+git20220117+453c3d6b03a0-1.1+b3) ... Setting up tzdata (2025b-1) ... Current default time zone: 'Etc/UTC' Local time is now: Fri May 1 22:22:43 UTC 2026. Universal Time is now: Fri May 1 22:22:43 UTC 2026. Run 'dpkg-reconfigure tzdata' if you wish to change it. Setting up autotools-dev (20240727.1) ... Setting up libunbound8:arm64 (1.22.0-1+b1) ... Setting up libpkgconf3:arm64 (1.8.1-4) ... Setting up libnspr4:arm64 (2:4.36-1) ... Setting up libproc2-0:arm64 (2:4.0.4-7) ... Setting up libunistring5:arm64 (1.3-2) ... Setting up libssl-dev:arm64 (3.4.1-1) ... Setting up libtcl8.6:arm64 (8.6.16+dfsg-1) ... Setting up autopoint (0.23.1-1) ... Setting up pkgconf-bin (1.8.1-4) ... Setting up autoconf (2.72-3) ... Setting up libffi8:arm64 (3.4.7-1) ... Setting up dwz (0.15-1+b1) ... Setting up sensible-utils (0.0.24) ... Setting up libuchardet0:arm64 (0.0.8-1+b2) ... Setting up procps (2:4.0.4-7) ... Setting up libtasn1-6:arm64 (4.20.0-2) ... Setting up netbase (6.5) ... Setting up openssl (3.4.1-1) ... Setting up readline-common (8.2-6) ... Setting up libxml2:arm64 (2.12.7+dfsg+really2.9.14-0.4) ... Setting up libtomcrypt1:arm64 (1.18.2+dfsg-7+b2) ... Setting up automake (1:1.17-4) ... update-alternatives: using /usr/bin/automake-1.17 to provide /usr/bin/automake (automake) in auto mode Setting up libfile-stripnondeterminism-perl (1.14.1-2) ... Setting up libnspr4-dev (2:4.36-1) ... Setting up tcl8.6 (8.6.16+dfsg-1) ... Setting up gettext (0.23.1-1) ... Setting up libtool (2.5.4-4) ... Setting up tcl-expect:arm64 (5.45.4-4) ... Setting up libidn2-0:arm64 (2.3.8-2) ... Setting up libnss3:arm64 (2:3.109-1) ... Setting up pkgconf:arm64 (1.8.1-4) ... Setting up intltool-debian (0.35.0+20060710.6) ... Setting up libstoken1t64:arm64 (0.92-1.1+b2) ... Setting up dh-autoreconf (20) ... Setting up libtomcrypt-dev (1.18.2+dfsg-7+b2) ... Setting up libglib2.0-0t64:arm64 (2.84.0-2) ... No schema files found: doing nothing. Setting up libstoken-dev:arm64 (0.92-1.1+b2) ... Setting up libp11-kit0:arm64 (0.25.5-3) ... Setting up ucf (3.0050) ... Setting up libreadline8t64:arm64 (8.2-6) ... Setting up dh-strip-nondeterminism (1.14.1-2) ... Setting up libnss3-dev:arm64 (2:3.109-1) ... Setting up groff-base (1.23.0-7) ... Setting up libpython3.13-stdlib:arm64 (3.13.2-2) ... Setting up libp11-kit-dev:arm64 (0.25.5-3) ... Setting up libpython3-stdlib:arm64 (3.13.2-2) ... Setting up libgnutls30t64:arm64 (3.8.9-2) ... Setting up softhsm2-common (2.6.1-2.2+b3) ... Creating config file /etc/softhsm/softhsm2.conf with new version Setting up python3.13 (3.13.2-2) ... Setting up po-debconf (1.0.21+nmu1) ... Setting up expect (5.45.4-4) ... Setting up python3 (3.13.2-2) ... Setting up python3-zipp (3.21.0-1) ... Setting up python3-autocommand (2.2.2-3) ... Setting up man-db (2.13.0-1) ... Not building database; man-db/auto-update is not 'true'. Setting up opensc-pkcs11:arm64 (0.26.1-1) ... Setting up p11-kit-modules:arm64 (0.25.5-3) ... Setting up libgnutls-dane0t64:arm64 (3.8.9-2) ... Setting up python3-typing-extensions (4.12.2-2) ... Setting up p11-kit (0.25.5-3) ... Setting up gnutls-bin (3.8.9-2) ... Setting up python3-more-itertools (10.6.0-1) ... Setting up libsofthsm2 (2.6.1-2.2+b3) ... Setting up softhsm2 (2.6.1-2.2+b3) ... Setting up python3-jaraco.functools (4.1.0-1) ... Setting up python3-jaraco.context (6.0.1-1) ... Setting up opensc (0.26.1-1) ... Setting up python3-typeguard (4.4.2-1) ... Setting up debhelper (13.24.2) ... Setting up python3-inflect (7.3.1-2) ... Setting up python3-jaraco.text (4.0.0-1) ... Setting up python3-pkg-resources (75.8.0-1) ... Setting up dh-package-notes (0.15) ... Setting up python3-setuptools (75.8.0-1) ... Setting up meson (1.7.0-1) ... Processing triggers for libc-bin (2.41-6) ... Reading package lists... Building dependency tree... Reading state information... Reading extended state information... Initializing package states... Writing extended state information... Building tag database... -> Finished parsing the build-deps I: Building the package I: Running cd /build/reproducible-path/pkcs11-provider-1.0/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../pkcs11-provider_1.0-2_source.changes dpkg-buildpackage: info: source package pkcs11-provider dpkg-buildpackage: info: source version 1.0-2 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Luca Boccassi dpkg-source --before-build . dpkg-buildpackage: info: host architecture arm64 debian/rules clean dh clean --buildsystem=meson dh_auto_clean -O--buildsystem=meson dh_autoreconf_clean -O--buildsystem=meson dh_clean -O--buildsystem=meson debian/rules binary dh binary --buildsystem=meson dh_update_autotools_config -O--buildsystem=meson dh_autoreconf -O--buildsystem=meson dh_auto_configure -O--buildsystem=meson cd obj-aarch64-linux-gnu && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 meson setup .. --wrap-mode=nodownload --buildtype=plain --prefix=/usr --sysconfdir=/etc --localstatedir=/var --libdir=lib/aarch64-linux-gnu -Dpython.bytecompile=-1 The Meson build system Version: 1.7.0 Source dir: /build/reproducible-path/pkcs11-provider-1.0 Build dir: /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu Build type: native build Project name: pkcs11-provider Project version: 1.0 C compiler for the host machine: cc (gcc 14.2.0 "cc (Debian 14.2.0-19) 14.2.0") C linker for the host machine: cc ld.bfd 2.44 Host machine cpu family: aarch64 Host machine cpu: aarch64 Compiler for C supports arguments -Wwrite-strings: YES Compiler for C supports arguments -Wpointer-arith: YES Compiler for C supports arguments -Wno-missing-field-initializers: YES Compiler for C supports arguments -Wformat: YES Compiler for C supports arguments -Wshadow: YES Compiler for C supports arguments -Wno-unused-parameter: YES Compiler for C supports arguments -Werror=implicit-function-declaration: YES Compiler for C supports arguments -Werror=missing-prototypes: YES Compiler for C supports arguments -Werror=format-security: YES Compiler for C supports arguments -Werror=parentheses: YES Compiler for C supports arguments -Werror=implicit: YES Compiler for C supports arguments -Werror=strict-prototypes: YES Compiler for C supports arguments -fno-strict-aliasing: YES Compiler for C supports arguments -fno-delete-null-pointer-checks: YES Compiler for C supports arguments -fdiagnostics-show-option: YES Found pkg-config: YES (/usr/bin/pkg-config) 1.8.1 Run-time dependency libcrypto found: YES 3.4.1 Run-time dependency libssl found: YES 3.4.1 Run-time dependency p11-kit-1 found: YES 0.25.5 Has header "dlfcn.h" : YES Configuring config.h using configuration Compiler for C supports link arguments -Wl,--version-script,/build/reproducible-path/pkcs11-provider-1.0/src/provider.map: YES Did not find CMake 'cmake' Found CMake: NO Run-time dependency nss-softokn found: NO (tried pkgconfig and cmake) Run-time dependency nss found: YES 3.109 Program setup.sh found: YES (/build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh) Program valgrind found: NO Program test-wrapper found: YES (/build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper) Build targets in project: 12 pkcs11-provider 1.0 User defined options buildtype : plain libdir : lib/aarch64-linux-gnu localstatedir : /var prefix : /usr python.bytecompile: -1 sysconfdir : /etc wrap_mode : nodownload Found ninja-1.12.1 at /usr/bin/ninja debian/rules execute_before_dh_auto_build make[1]: Entering directory '/build/reproducible-path/pkcs11-provider-1.0' # meson test does not compile with verbosity, but doesn't matter as it's test binaries blhc: ignore-line-regexp: .* Compiling C object tests.* make[1]: Leaving directory '/build/reproducible-path/pkcs11-provider-1.0' dh_auto_build -O--buildsystem=meson cd obj-aarch64-linux-gnu && LC_ALL=C.UTF-8 ninja -j12 -v [1/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/pk11_uri.c.o -MF src/pkcs11.so.p/pk11_uri.c.o.d -o src/pkcs11.so.p/pk11_uri.c.o -c ../src/pk11_uri.c [2/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/decoder.c.o -MF src/pkcs11.so.p/decoder.c.o.d -o src/pkcs11.so.p/decoder.c.o -c ../src/decoder.c [3/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/debug.c.o -MF src/pkcs11.so.p/debug.c.o.d -o src/pkcs11.so.p/debug.c.o -c ../src/debug.c [4/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/encoder.c.o -MF src/pkcs11.so.p/encoder.c.o.d -o src/pkcs11.so.p/encoder.c.o -c ../src/encoder.c [5/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/exchange.c.o -MF src/pkcs11.so.p/exchange.c.o.d -o src/pkcs11.so.p/exchange.c.o -c ../src/exchange.c [6/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/digests.c.o -MF src/pkcs11.so.p/digests.c.o.d -o src/pkcs11.so.p/digests.c.o -c ../src/digests.c [7/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/asymmetric_cipher.c.o -MF src/pkcs11.so.p/asymmetric_cipher.c.o.d -o src/pkcs11.so.p/asymmetric_cipher.c.o -c ../src/asymmetric_cipher.c [8/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/random.c.o -MF src/pkcs11.so.p/random.c.o.d -o src/pkcs11.so.p/random.c.o -c ../src/random.c [9/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/kdf.c.o -MF src/pkcs11.so.p/kdf.c.o.d -o src/pkcs11.so.p/kdf.c.o -c ../src/kdf.c [10/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/tls.c.o -MF src/pkcs11.so.p/tls.c.o.d -o src/pkcs11.so.p/tls.c.o -c ../src/tls.c [11/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/slot.c.o -MF src/pkcs11.so.p/slot.c.o.d -o src/pkcs11.so.p/slot.c.o -c ../src/slot.c [12/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/store.c.o -MF src/pkcs11.so.p/store.c.o.d -o src/pkcs11.so.p/store.c.o -c ../src/store.c [13/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/session.c.o -MF src/pkcs11.so.p/session.c.o.d -o src/pkcs11.so.p/session.c.o -c ../src/session.c [14/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/interface.c.o -MF src/pkcs11.so.p/interface.c.o.d -o src/pkcs11.so.p/interface.c.o -c ../src/interface.c [15/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/keymgmt.c.o -MF src/pkcs11.so.p/keymgmt.c.o.d -o src/pkcs11.so.p/keymgmt.c.o -c ../src/keymgmt.c [16/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/util.c.o -MF src/pkcs11.so.p/util.c.o.d -o src/pkcs11.so.p/util.c.o -c ../src/util.c [17/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/signature.c.o -MF src/pkcs11.so.p/signature.c.o.d -o src/pkcs11.so.p/signature.c.o -c ../src/signature.c [18/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/provider.c.o -MF src/pkcs11.so.p/provider.c.o.d -o src/pkcs11.so.p/provider.c.o -c ../src/provider.c [19/20] cc -Isrc/pkcs11.so.p -Isrc -I../src -I. -I.. -fdiagnostics-color=always -D_FILE_OFFSET_BITS=64 -Wall -Winvalid-pch -std=c11 -Wwrite-strings -Wpointer-arith -Wno-missing-field-initializers -Wformat -Wshadow -Wno-unused-parameter -Werror=implicit-function-declaration -Werror=missing-prototypes -Werror=format-security -Werror=parentheses -Werror=implicit -Werror=strict-prototypes -fno-strict-aliasing -fno-delete-null-pointer-checks -fdiagnostics-show-option -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -fPIC -MD -MQ src/pkcs11.so.p/objects.c.o -MF src/pkcs11.so.p/objects.c.o.d -o src/pkcs11.so.p/objects.c.o -c ../src/objects.c [20/20] cc -o src/pkcs11.so src/pkcs11.so.p/asymmetric_cipher.c.o src/pkcs11.so.p/debug.c.o src/pkcs11.so.p/encoder.c.o src/pkcs11.so.p/decoder.c.o src/pkcs11.so.p/digests.c.o src/pkcs11.so.p/exchange.c.o src/pkcs11.so.p/kdf.c.o src/pkcs11.so.p/keymgmt.c.o src/pkcs11.so.p/pk11_uri.c.o src/pkcs11.so.p/interface.c.o src/pkcs11.so.p/objects.c.o src/pkcs11.so.p/provider.c.o src/pkcs11.so.p/random.c.o src/pkcs11.so.p/session.c.o src/pkcs11.so.p/signature.c.o src/pkcs11.so.p/slot.c.o src/pkcs11.so.p/store.c.o src/pkcs11.so.p/tls.c.o src/pkcs11.so.p/util.c.o -Wl,--as-needed -Wl,--allow-shlib-undefined -shared -fPIC -Wl,-z,relro -Wl,-z,now -specs=/usr/share/debhelper/dh_package_notes/debian-package-notes.specs -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/build/reproducible-path/pkcs11-provider-1.0=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -mbranch-protection=standard -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,--version-script,/build/reproducible-path/pkcs11-provider-1.0/src/provider.map /usr/lib/aarch64-linux-gnu/libcrypto.so debian/rules override_dh_auto_test make[1]: Entering directory '/build/reproducible-path/pkcs11-provider-1.0' dh_auto_test -- -t 10 cd obj-aarch64-linux-gnu && DEB_PYTHON_INSTALL_LAYOUT=deb LC_ALL=C.UTF-8 MESON_TESTTHREADS=12 meson test --verbose -t 10 ninja: Entering directory `/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu' [1/29] Compiling C object tests/tsession.p/tsession.c.o [2/29] Compiling C object tests/tdigests.p/tdigests.c.o [3/29] Compiling C object tests/tcmpkeys.p/tcmpkeys.c.o [4/29] Compiling C object tests/tlssetkey.p/tlssetkey.c.o [5/29] Compiling C object tests/tlsctx.p/tlsctx.c.o [6/29] Compiling C object tests/treadkeys.p/treadkeys.c.o [7/29] Compiling C object tests/tgenkey.p/util.c.o [8/29] Compiling C object tests/tlsctx.p/util.c.o [9/29] Compiling C object tests/tfork.p/tfork.c.o [10/29] Compiling C object tests/tpkey.p/tpkey.c.o [11/29] Compiling C object tests/tcmpkeys.p/util.c.o [12/29] Compiling C object tests/tlssetkey.p/util.c.o [13/29] Linking target tests/tdigests [14/29] Compiling C object tests/tfork.p/util.c.o [15/29] Compiling C object tests/tpkey.p/util.c.o [16/29] Compiling C object tests/ccerts.p/ccerts.c.o [17/29] Linking target tests/treadkeys [18/29] Linking target tests/tsession [19/29] Compiling C object tests/pincache.p/pincache.c.o [20/29] Linking target tests/tlsctx [21/29] Linking target tests/tcmpkeys [22/29] Linking target tests/tlssetkey [23/29] Compiling C object tests/ccerts.p/util.c.o [24/29] Compiling C object tests/tgenkey.p/tgenkey.c.o [25/29] Linking target tests/tfork [26/29] Linking target tests/tpkey [27/29] Linking target tests/pincache [28/29] Linking target tests/ccerts [29/29] Linking target tests/tgenkey 1/92 pkcs11-provider:softokn / setup RUNNING >>> SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SHARED_EXT=.so UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=17 P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softokn ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=softokn + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softokn/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' softokn == softhsm ']' + '[' softokn == softokn ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/softokn-init.sh ++ title SECTION 'Setup NSS Softokn' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Setup NSS Softokn' ++ echo '' ++ command -v certutil ++ echo 'NSS'\''s certutil command is required' ++ exit 0 ######################################## ## Setup NSS Softokn NSS's certutil command is required ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 1/92 pkcs11-provider:softokn / setup OK 0.15s 2/92 pkcs11-provider:softhsm / setup RUNNING >>> MALLOC_PERTURB_=33 SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SHARED_EXT=.so UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh softhsm ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=softhsm + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' softhsm == softhsm ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/softhsm-init.sh ++ title SECTION 'Searching for SoftHSM PKCS#11 library' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Searching for SoftHSM PKCS#11 library' ++ echo '' ++ command -v softhsm2-util ######################################## ## Searching for SoftHSM PKCS#11 library +++++ type -p softhsm2-util ++++ dirname /usr/bin/softhsm2-util +++ dirname /usr/bin ++ softhsm_prefix=/usr ++ find_softhsm /usr/lib64/softhsm/libsofthsm2.so /usr/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/local/lib/softhsm/libsofthsm2.so /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so ++ for _lib in "$@" ++ test -f /usr/lib64/softhsm/libsofthsm2.so ++ for _lib in "$@" ++ test -f /usr/lib/softhsm/libsofthsm2.so ++ echo 'Using softhsm path /usr/lib/softhsm/libsofthsm2.so' ++ P11LIB=/usr/lib/softhsm/libsofthsm2.so ++ return ++ export P11LIB ++ title SECTION 'Set up testing system' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Set up testing system' ++ echo '' ++ cat Using softhsm path /usr/lib/softhsm/libsofthsm2.so ######################################## ## Set up testing system ++ export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf ++ SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf ++ export 'TOKENLABEL=SoftHSM Token' ++ TOKENLABEL='SoftHSM Token' ++ export TOKENLABELURI=SoftHSM%20Token ++ TOKENLABELURI=SoftHSM%20Token ++ softhsm2-util --init-token --label 'SoftHSM Token' --free --pin 12345678 --so-pin 12345678 Slot 0 has a free/uninitialized token. The token has been initialized and is reassigned to slot 99790496 ++ export 'TOKENOPTIONS=\npkcs11-module-quirks = no-deinit no-operation-state' ++ TOKENOPTIONS='\npkcs11-module-quirks = no-deinit no-operation-state' ++ export 'TOKENCONFIGVARS=export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf' ++ TOKENCONFIGVARS='export SOFTHSM2_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/softhsm.conf' ++ export TESTPORT=32000 ++ TESTPORT=32000 ++ export SUPPORT_ALLOWED_MECHANISMS=1 ++ SUPPORT_ALLOWED_MECHANISMS=1 + SEEDFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/noisefile.bin + dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/noisefile.bin bs=2048 count=1 + RAND64FILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/64krandom.bin + dd if=/dev/urandom of=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/64krandom.bin bs=2048 count=32 ++ uname + '[' Linux == Darwin ']' ++ type -p certtool + certtool=/usr/bin/certtool + '[' -z /usr/bin/certtool ']' + P11DEFARGS=("--module=${P11LIB}" "--login" "--pin=${PINVALUE}" "--token-label=${TOKENLABEL}") + cat + SERIAL=1 + title LINE 'Creating new Self Sign CA' + case "$1" in + shift 1 + echo 'Creating new Self Sign CA' + KEYID=0000 + URIKEYID=%00%00 + CACRTN=caCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=caCert --id=0000 Creating new Self Sign CA Key pair generated: Private Key Object; RSA label: caCert ID: 0000 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0000;object=caCert;type=private Public Key Object; RSA 2048 bits label: caCert ID: 0000 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0000;object=caCert;type=public + crt_selfsign caCert Issuer 0000 + LABEL=caCert + CN=Issuer + KEYID=0000 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = Issuer|g' -e 's|serial = .*|serial = 2|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg + /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=caCert;token=SoftHSM%20Token;type=public' --outder Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 02 Validity: Not Before: Fri May 01 22:23:10 UTC 2026 Not After: Sat May 01 22:23:10 UTC 2027 Subject: CN=Issuer Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:bc:74:64:75:35:d5:d7:5c:86:7b:f1:2c:69:8f:93 29:07:58:08:62:3e:54:6d:0b:bc:39:94:df:da:df:03 dc:31:63:48:47:73:16:5e:2c:3b:91:f6:a9:a4:60:5b 03:1b:d3:b4:3d:4f:52:cf:6a:7d:d3:e5:4e:2e:cf:e6 59:a6:34:90:8b:9e:b0:77:25:e0:2e:f7:01:3a:19:eb 5a:d2:82:8b:91:35:2b:18:bc:69:57:be:fc:93:54:61 f6:27:17:ac:8b:63:f7:bb:06:0f:68:25:0b:c1:78:8d fe:fe:cc:2b:32:62:de:09:ef:fe:56:4d:e8:47:94:7a 30:93:fd:a7:8d:a8:8c:0e:39:a7:cd:ab:7a:53:6b:f7 f4:a4:ac:9c:d0:42:ae:c6:45:38:85:10:64:28:77:0e 11:97:68:45:d8:eb:d2:f5:31:07:c2:cc:b8:27:5c:a2 e0:02:30:92:08:1b:1f:1a:71:fb:4d:ea:ac:6b:5c:47 32:94:e7:5d:83:6b:b1:ac:33:14:b2:e0:7a:4d:8e:aa d7:88:d1:42:30:d3:ba:91:8f:61:04:dd:cc:db:7a:4e 67:95:c8:e8:7e:05:67:7d:3e:28:45:50:b6:bb:a8:d9 b2:02:74:65:60:2b:60:2d:c4:ab:45:42:91:7f:2a:ad eb Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Certificate signing. Subject Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:d79901bab3478b3770b11fb85c112f6954c9b383 sha256:c5ce191e4e3b28bb20f4dc3d41a7bb986e5b37cbf4f991ce440799376eb62ca1 Public Key PIN: pin-sha256:xc4ZHk47KLsg9Nw9Qae7mG5bN8v0+ZHORAeZN262LKE= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --type=cert --id=0000 --label=caCert Created certificate: Certificate Object; type = X.509 cert label: caCert subject: DN: CN=Issuer serial: 02 ID: 0000 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert + CACRT_PEM=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem + CACRT=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt + openssl x509 -inform DER -in /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt -outform PEM -out /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem + CABASEURIWITHPINVALUE='pkcs11:id=%00%00?pin-value=12345678' + CABASEURIWITHPINSOURCE='pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + CABASEURI=pkcs11:id=%00%00 + CAPUBURI='pkcs11:type=public;id=%00%00' + CAPRIURI='pkcs11:type=private;id=%00%00' + CACRTURI='pkcs11:type=cert;object=caCert' + title LINE 'RSA PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA PKCS11 URIS' + echo 'pkcs11:id=%00%00?pin-value=12345678' + echo 'pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%00 + echo 'pkcs11:type=public;id=%00%00' + echo 'pkcs11:type=private;id=%00%00' + echo 'pkcs11:type=cert;object=caCert' + echo '' + cat /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg RSA PKCS11 URIS pkcs11:id=%00%00?pin-value=12345678 pkcs11:id=%00%00?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%00 pkcs11:type=public;id=%00%00 pkcs11:type=private;id=%00%00 pkcs11:type=cert;object=caCert + echo 'organization = "PKCS11 Provider"' + sed -e '/^cert_signing_key$/d' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + KEYID=0001 + URIKEYID=%00%01 + TSTCRTN=testCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert --id=0001 Key pair generated: Private Key Object; RSA label: testCert ID: 0001 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0001;object=testCert;type=private Public Key Object; RSA 2048 bits label: testCert ID: 0001 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0001;object=testCert;type=public + ca_sign testCert 'My Test Cert' 0001 + LABEL=testCert + CN='My Test Cert' + KEYID=0001 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Test Cert|g' -e 's|serial = .*|serial = 3|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat May 1 10:23:11 2027 CA expiration time: Sat May 1 10:23:10 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 03 Validity: Not Before: Fri May 01 22:23:11 UTC 2026 Not After: Sat May 01 22:23:11 UTC 2027 Subject: CN=My Test Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:cd:23:c7:85:4b:2c:e1:19:09:de:5a:a0:dd:a7:c0 99:a3:05:91:a9:d2:e3:6d:a5:e3:cc:a9:31:e9:62:8e 25:dd:b0:77:25:bb:fb:56:e3:5c:93:18:fd:e2:27:bc b8:ed:2c:55:c6:61:1c:af:4a:a4:24:3b:9c:5d:a1:96 c5:59:57:47:48:33:07:ac:83:1d:ac:80:dc:29:44:6c d3:d6:97:44:73:38:87:e0:26:f7:38:db:b7:f3:42:e2 5f:bb:93:73:d4:51:2d:00:71:e0:53:88:c3:cd:46:b5 a4:57:43:6b:f4:a2:14:bc:43:ee:2d:3d:80:8b:8a:bd a7:82:b5:36:4b:54:d1:21:b7:6c:ff:fd:13:08:34:97 33:89:95:a1:16:72:be:8c:82:f5:fc:02:6c:f0:4d:c5 81:b4:9b:90:e0:5a:8e:54:5d:10:8e:45:64:8f:4f:de e1:92:dd:80:13:ca:54:7d:66:ba:3f:94:6e:9a:b3:1c ac:f1:25:11:c1:dd:35:5f:d0:9e:d1:d3:98:52:c7:c1 83:d4:60:4e:bf:bc:77:03:8f:f4:e0:44:22:f5:5e:51 13:ca:f3:e5:8e:32:5d:30:1b:8d:50:e5:28:de:75:ff bf:07:ca:62:14:20:ca:1c:f1:dd:c7:1e:08:ee:b9:c1 c5 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): 4512e3f35d3196176ff17239b0bf12a949a9fbd2 Authority Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:4512e3f35d3196176ff17239b0bf12a949a9fbd2 sha256:206c362edef941f54058c5d36b3ce2af7ca33f23da99207c7c1ab4b171f553a1 Public Key PIN: pin-sha256:IGw2Lt75QfVAWMXTazzir3yjPyPamSB8fBq0sXH1U6E= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert.crt --type=cert --id=0001 --label=testCert Created certificate: Certificate Object; type = X.509 cert label: testCert subject: DN: O=PKCS11 Provider, CN=My Test Cert serial: 03 ID: 0001 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert + BASEURIWITHPINVALUE='pkcs11:id=%00%01?pin-value=12345678' + BASEURIWITHPINSOURCE='pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + BASEURI=pkcs11:id=%00%01 + PUBURI='pkcs11:type=public;id=%00%01' + PRIURI='pkcs11:type=private;id=%00%01' + CRTURI='pkcs11:type=cert;object=testCert' + title LINE 'RSA PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA PKCS11 URIS' + echo 'pkcs11:id=%00%01?pin-value=12345678' + echo 'pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%01 + echo 'pkcs11:type=public;id=%00%01' + echo 'pkcs11:type=private;id=%00%01' + echo 'pkcs11:type=cert;object=testCert' + echo '' + KEYID=0002 + URIKEYID=%00%02 + ECCRTN=ecCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecCert --id=0002 RSA PKCS11 URIS pkcs11:id=%00%01?pin-value=12345678 pkcs11:id=%00%01?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%01 pkcs11:type=public;id=%00%01 pkcs11:type=private;id=%00%01 pkcs11:type=cert;object=testCert Key pair generated: Private Key Object; EC label: ecCert ID: 0002 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441041bf5de17aa4407e61b18f0e079ec234c14563d698889cafe15454e802c807f965ebe2e964b9461aa18dd891752ffc2fa74e30fba4d3860cc65e9ddb75af8e4b4 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecCert ID: 0002 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public + ca_sign ecCert 'My EC Cert' 0002 + LABEL=ecCert + CN='My EC Cert' + KEYID=0002 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert|g' -e 's|serial = .*|serial = 4|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat May 1 10:23:11 2027 CA expiration time: Sat May 1 10:23:10 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 04 Validity: Not Before: Fri May 01 22:23:11 UTC 2026 Not After: Sat May 01 22:23:11 UTC 2027 Subject: CN=My EC Cert,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: 1b:f5:de:17:aa:44:07:e6:1b:18:f0:e0:79:ec:23:4c 14:56:3d:69:88:89:ca:fe:15:45:4e:80:2c:80:7f:96 Y: 5e:be:2e:96:4b:94:61:aa:18:dd:89:17:52:ff:c2:fa 74:e3:0f:ba:4d:38:60:cc:65:e9:dd:b7:5a:f8:e4:b4 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 17b1721e336885057af1f86ca346958c7c1c95d1 Authority Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:17b1721e336885057af1f86ca346958c7c1c95d1 sha256:51bffcb607fed4ef5511c050faef4fa707471ac273dc9ef006ddb188311d80f8 Public Key PIN: pin-sha256:Ub/8tgf+1O9VEcBQ+u9PpwdHGsJz3J7wBt2xiDEdgPg= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert.crt --type=cert --id=0002 --label=ecCert Created certificate: Certificate Object; type = X.509 cert label: ecCert subject: DN: O=PKCS11 Provider, CN=My EC Cert serial: 04 ID: 0002 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert + ECBASEURIWITHPINVALUE='pkcs11:id=%00%02?pin-value=12345678' + ECBASEURIWITHPINSOURCE='pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ECBASEURI=pkcs11:id=%00%02 + ECPUBURI='pkcs11:type=public;id=%00%02' + ECPRIURI='pkcs11:type=private;id=%00%02' + ECCRTURI='pkcs11:type=cert;object=ecCert' + KEYID=0003 + URIKEYID=%00%03 + ECPEERCRTN=ecPeerCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp256r1 --label=ecPeerCert --id=0003 Key pair generated: Private Key Object; EC label: ecPeerCert ID: 0003 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441048d447fb6fe4a54a425d42dc52a129e2d522f3c8c590144fdcb1dd370f24f5d540437737803af82543e8e5e44f739d49e64e50d2ccad567ad23affad78d6dce70 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecPeerCert ID: 0003 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public + crt_selfsign ecPeerCert 'My Peer EC Cert' 0003 + LABEL=ecPeerCert + CN='My Peer EC Cert' + KEYID=0003 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Peer EC Cert|g' -e 's|serial = .*|serial = 5|g' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg + /usr/bin/certtool --generate-self-signed --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecPeerCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cacert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecPeerCert;token=SoftHSM%20Token;type=public' --outder Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 05 Validity: Not Before: Fri May 01 22:23:11 UTC 2026 Not After: Sat May 01 22:23:11 UTC 2027 Subject: CN=My Peer EC Cert Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: High (256 bits) Curve: SECP256R1 X: 00:8d:44:7f:b6:fe:4a:54:a4:25:d4:2d:c5:2a:12:9e 2d:52:2f:3c:8c:59:01:44:fd:cb:1d:d3:70:f2:4f:5d 54 Y: 04:37:73:78:03:af:82:54:3e:8e:5e:44:f7:39:d4:9e 64:e5:0d:2c:ca:d5:67:ad:23:af:fa:d7:8d:6d:ce:70 Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Certificate signing. Subject Key Identifier (not critical): f3a300a3fcda9c56089ec3f727022bda528610ac Other Information: Public Key ID: sha1:f3a300a3fcda9c56089ec3f727022bda528610ac sha256:f1fdc4db4e994aeebdc546a22ae7e881375ef1d0d0ad01fefada018e0bebdc2e Public Key PIN: pin-sha256:8f3E206ZSu69xUaiKufogTde8dDQrQH++toBjgvr3C4= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecPeerCert.crt --type=cert --id=0003 --label=ecPeerCert Created certificate: Certificate Object; type = X.509 cert label: ecPeerCert subject: DN: CN=My Peer EC Cert serial: 05 ID: 0003 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert + ECPEERBASEURIWITHPINVALUE='pkcs11:id=%00%03?pin-value=12345678' + ECPEERBASEURIWITHPINSOURCE='pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ECPEERBASEURI=pkcs11:id=%00%03 + ECPEERPUBURI='pkcs11:type=public;id=%00%03' + ECPEERPRIURI='pkcs11:type=private;id=%00%03' + ECPEERCRTURI='pkcs11:type=cert;object=ecPeerCert' + title LINE 'EC PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC PKCS11 URIS' + echo 'pkcs11:id=%00%02?pin-value=12345678' + echo 'pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%02 + echo 'pkcs11:type=public;id=%00%02' + echo 'pkcs11:type=private;id=%00%02' + echo 'pkcs11:type=cert;object=ecCert' + echo 'pkcs11:id=%00%03?pin-value=12345678' + echo 'pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%03 + echo 'pkcs11:type=public;id=%00%03' + echo 'pkcs11:type=private;id=%00%03' + echo 'pkcs11:type=cert;object=ecPeerCert' + echo '' + '[' 1 -eq 1 ']' + KEYID=0004 + URIKEYID=%00%04 + EDCRTN=edCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:edwards25519 --label=edCert --id=0004 EC PKCS11 URIS pkcs11:id=%00%02?pin-value=12345678 pkcs11:id=%00%02?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%02 pkcs11:type=public;id=%00%02 pkcs11:type=private;id=%00%02 pkcs11:type=cert;object=ecCert pkcs11:id=%00%03?pin-value=12345678 pkcs11:id=%00%03?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%03 pkcs11:type=public;id=%00%03 pkcs11:type=private;id=%00%03 pkcs11:type=cert;object=ecPeerCert Key pair generated: Private Key Object; EC_EDWARDS label: edCert ID: 0004 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0004;object=edCert;type=private Public Key Object; EC_EDWARDS EC_POINT 272 bits EC_POINT: 042035f9ddc448378cd603400f7a18e64eb856f7ef744ca7c6a6d5869815739bda08 EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) label: edCert ID: 0004 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0004;object=edCert;type=public + ca_sign edCert 'My ED25519 Cert' 0004 + LABEL=edCert + CN='My ED25519 Cert' + KEYID=0004 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My ED25519 Cert|g' -e 's|serial = .*|serial = 6|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/edCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=edCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat May 1 10:23:11 2027 CA expiration time: Sat May 1 10:23:10 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 06 Validity: Not Before: Fri May 01 22:23:11 UTC 2026 Not After: Sat May 01 22:23:11 UTC 2027 Subject: CN=My ED25519 Cert,O=PKCS11 Provider Subject Public Key Algorithm: EdDSA (Ed25519) Algorithm Security Level: High (256 bits) Curve: Ed25519 X: 35:f9:dd:c4:48:37:8c:d6:03:40:0f:7a:18:e6:4e:b8 56:f7:ef:74:4c:a7:c6:a6:d5:86:98:15:73:9b:da:08 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 145e97adaa90ca2b7b221b5e65839612e2c2a13c Authority Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:145e97adaa90ca2b7b221b5e65839612e2c2a13c sha256:9eb65b0cb6ccfaa35361be37d2f42fd2f501a267aeb4cc2eda2e92e33189caaf Public Key PIN: pin-sha256:nrZbDLbM+qNTYb430vQv0vUBomeutMwu2i6S4zGJyq8= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/edCert.crt --type=cert --id=0004 --label=edCert Created certificate: Certificate Object; type = X.509 cert label: edCert subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert serial: 06 ID: 0004 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert + EDBASEURIWITHPINVALUE='pkcs11:id=%00%04;pin-value=12345678' + EDBASEURIWITHPINSOURCE='pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + EDBASEURI=pkcs11:id=%00%04 + EDPUBURI='pkcs11:type=public;id=%00%04' + EDPRIURI='pkcs11:type=private;id=%00%04' + EDCRTURI='pkcs11:type=cert;object=edCert' + title LINE 'ED25519 PKCS11 URIS' + case "$1" in + shift 1 + echo 'ED25519 PKCS11 URIS' + echo 'pkcs11:id=%00%04;pin-value=12345678' + echo 'pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%04 + echo 'pkcs11:type=public;id=%00%04' + echo 'pkcs11:type=private;id=%00%04' + echo 'pkcs11:type=cert;object=edCert' + '[' 1 -eq 1 ']' + KEYID=0009 + URIKEYID=%00%09 + ED2CRTN=ed2Cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:Ed448 --label=ed2Cert --id=0009 ED25519 PKCS11 URIS pkcs11:id=%00%04;pin-value=12345678 pkcs11:id=%00%04;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%04 pkcs11:type=public;id=%00%04 pkcs11:type=private;id=%00%04 pkcs11:type=cert;object=edCert Key pair generated: Private Key Object; EC_EDWARDS label: ed2Cert ID: 0009 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private Public Key Object; EC_EDWARDS EC_POINT 472 bits EC_POINT: 0439f38dce10ef3d3d3655d04fb06bd75c919e7846eb213b93f7953a016e0692b9ccc44d275fc8956f8755e1dad5f02fd6ce8cd0e19e2e7c785500 EC_PARAMS: 06032b6571 (OID 1.3.101.113) label: ed2Cert ID: 0009 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public + ca_sign ed2Cert 'My ED448 Cert' 0009 + LABEL=ed2Cert + CN='My ED448 Cert' + KEYID=0009 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My ED448 Cert|g' -e 's|serial = .*|serial = 7|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ed2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ed2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat May 1 10:23:11 2027 CA expiration time: Sat May 1 10:23:10 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 07 Validity: Not Before: Fri May 01 22:23:11 UTC 2026 Not After: Sat May 01 22:23:11 UTC 2027 Subject: CN=My ED448 Cert,O=PKCS11 Provider Subject Public Key Algorithm: EdDSA (Ed448) Algorithm Security Level: Ultra (456 bits) Curve: Ed448 X: f3:8d:ce:10:ef:3d:3d:36:55:d0:4f:b0:6b:d7:5c:91 9e:78:46:eb:21:3b:93:f7:95:3a:01:6e:06:92:b9:cc c4:4d:27:5f:c8:95:6f:87:55:e1:da:d5:f0:2f:d6:ce 8c:d0:e1:9e:2e:7c:78:55:00 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): e4235e59fc55560d786538c038d99f943b316fea Authority Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:e4235e59fc55560d786538c038d99f943b316fea sha256:9f10df5eca1f6cb913f6785c7c4e7f0875bdeea78fdcaa921342d76e43460616 Public Key PIN: pin-sha256:nxDfXsofbLkT9nhcfE5/CHW97qeP3KqSE0LXbkNGBhY= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ed2Cert.crt --type=cert --id=0009 --label=ed2Cert Created certificate: Certificate Object; type = X.509 cert label: ed2Cert subject: DN: O=PKCS11 Provider, CN=My ED448 Cert serial: 07 ID: 0009 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert + ED2BASEURIWITHPINVALUE='pkcs11:id=%00%09;pin-value=12345678' + ED2BASEURIWITHPINSOURCE='pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ED2BASEURI=pkcs11:id=%00%09 + ED2PUBURI='pkcs11:type=public;id=%00%09' + ED2PRIURI='pkcs11:type=private;id=%00%09' + ED2CRTURI='pkcs11:type=cert;object=ed2Cert' + title LINE 'ED448 PKCS11 URIS' + case "$1" in + shift 1 + echo 'ED448 PKCS11 URIS' + echo 'pkcs11:id=%00%09;pin-value=12345678' + echo 'pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%09 + echo 'pkcs11:type=public;id=%00%09' + echo 'pkcs11:type=private;id=%00%09' + echo 'pkcs11:type=cert;object=ed2Cert' + title PARA 'generate RSA key pair, self-signed certificate, remove public key' + case "$1" in + shift 1 + echo '' + echo '## generate RSA key pair, self-signed certificate, remove public key' + '[' -f '' ']' + KEYID=0005 + URIKEYID=%00%05 + TSTCRTN=testCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testCert2 --id=0005 ED448 PKCS11 URIS pkcs11:id=%00%09;pin-value=12345678 pkcs11:id=%00%09;pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%09 pkcs11:type=public;id=%00%09 pkcs11:type=private;id=%00%09 pkcs11:type=cert;object=ed2Cert ## generate RSA key pair, self-signed certificate, remove public key Key pair generated: Private Key Object; RSA label: testCert2 ID: 0005 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private Public Key Object; RSA 2048 bits label: testCert2 ID: 0005 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0005;object=testCert2;type=public + ca_sign testCert2 'My Test Cert 2' 0005 + LABEL=testCert2 + CN='My Test Cert 2' + KEYID=0005 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My Test Cert 2|g' -e 's|serial = .*|serial = 8|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat May 1 10:23:12 2027 CA expiration time: Sat May 1 10:23:10 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 08 Validity: Not Before: Fri May 01 22:23:12 UTC 2026 Not After: Sat May 01 22:23:12 UTC 2027 Subject: CN=My Test Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:bb:00:60:1d:75:12:41:f6:1b:bc:8c:01:9e:e7:67 eb:85:94:d0:62:d9:73:24:a4:b2:90:03:10:9c:d3:06 1b:4d:34:9e:b9:81:76:86:84:83:af:74:7c:26:54:c4 0f:fb:ee:5c:96:a2:f4:ba:98:9c:ca:35:2e:26:c7:0f 7b:4a:88:0c:bb:95:bc:c4:a1:b1:a6:79:49:54:fd:18 0a:39:a4:d0:2f:ff:e6:27:90:ba:57:e2:00:cb:94:c1 db:a7:35:95:e9:2e:cd:86:9e:51:33:e3:b3:f8:7e:79 61:63:b1:d7:e9:6a:2f:60:31:b9:7d:62:29:6f:b2:79 36:c0:9b:35:eb:0b:6a:8e:8c:2f:de:64:aa:29:74:55 e8:b1:ab:20:4d:58:2b:c4:e8:df:b8:a3:06:3e:85:eb 9e:f5:ca:24:a9:25:8d:c6:5a:1e:ec:7e:c8:65:c6:d8 3d:66:91:ba:5b:e4:43:8b:a4:12:bd:85:8c:ae:6c:a5 29:21:a4:0a:41:56:06:be:b0:16:23:82:55:a6:4d:d6 f7:fc:94:0d:6f:63:41:0a:41:4c:6d:a5:ad:ed:05:ce 52:65:9c:50:8d:25:9f:11:f7:5f:ae:4c:63:59:64:2c 7e:e4:f7:3b:76:a0:dc:3f:a2:9d:82:d9:6e:9b:2a:3c ef Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): d49c36aed4402354c451aa97663cb332f5ede825 Authority Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:d49c36aed4402354c451aa97663cb332f5ede825 sha256:572378033891e6d1091f9323dcd6062f3258c477b6a8975034b1b941469777d9 Public Key PIN: pin-sha256:VyN4AziR5tEJH5Mj3NYGLzJYxHe2qJdQNLG5QUaXd9k= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testCert2.crt --type=cert --id=0005 --label=testCert2 Created certificate: Certificate Object; type = X.509 cert label: testCert2 subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 serial: 08 ID: 0005 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0005 + BASE2URIWITHPINVALUE='pkcs11:id=%00%05?pin-value=12345678' + BASE2URIWITHPINSOURCE='pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + BASE2URI=pkcs11:id=%00%05 + PRI2URI='pkcs11:type=private;id=%00%05' + CRT2URI='pkcs11:type=cert;object=testCert2' + title LINE 'RSA2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA2 PKCS11 URIS' + echo 'pkcs11:id=%00%05?pin-value=12345678' + echo 'pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%05 + echo 'pkcs11:type=private;id=%00%05' + echo 'pkcs11:type=cert;object=testCert2' + echo '' + title PARA 'generate EC key pair, self-signed certificate, remove public key' + case "$1" in + shift 1 + echo '' + echo '## generate EC key pair, self-signed certificate, remove public key' + '[' -f '' ']' + KEYID=0006 + URIKEYID=%00%06 + TSTCRTN=ecCert2 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp384r1 --label=ecCert2 --id=0006 RSA2 PKCS11 URIS pkcs11:id=%00%05?pin-value=12345678 pkcs11:id=%00%05?pin-source=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%05 pkcs11:type=private;id=%00%05 pkcs11:type=cert;object=testCert2 ## generate EC key pair, self-signed certificate, remove public key Key pair generated: Private Key Object; EC label: ecCert2 ID: 0006 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private Public Key Object; EC EC_POINT 384 bits EC_POINT: 046104eccefb9323f7ca582c5a8ce2a441b8e3fbd1ebce5d79d5f6fd0264c06e3e862750044fb0feaf1a31f5f384a4e83fb0b995b67c6017059fd2cc68b80f6f0b792a9a4ef46551b48277cd8ddca23f2dd75dd49bbb75c9d6d999e45b7eadda77a454 EC_PARAMS: 06052b81040022 (OID 1.3.132.0.34) label: ecCert2 ID: 0006 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=public + ca_sign ecCert2 'My EC Cert 2' 0006 + LABEL=ecCert2 + CN='My EC Cert 2' + KEYID=0006 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert 2|g' -e 's|serial = .*|serial = 9|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert2.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert2;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat May 1 10:23:12 2027 CA expiration time: Sat May 1 10:23:10 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 09 Validity: Not Before: Fri May 01 22:23:12 UTC 2026 Not After: Sat May 01 22:23:12 UTC 2027 Subject: CN=My EC Cert 2,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Ultra (384 bits) Curve: SECP384R1 X: 00:ec:ce:fb:93:23:f7:ca:58:2c:5a:8c:e2:a4:41:b8 e3:fb:d1:eb:ce:5d:79:d5:f6:fd:02:64:c0:6e:3e:86 27:50:04:4f:b0:fe:af:1a:31:f5:f3:84:a4:e8:3f:b0 b9 Y: 00:95:b6:7c:60:17:05:9f:d2:cc:68:b8:0f:6f:0b:79 2a:9a:4e:f4:65:51:b4:82:77:cd:8d:dc:a2:3f:2d:d7 5d:d4:9b:bb:75:c9:d6:d9:99:e4:5b:7e:ad:da:77:a4 54 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 2ebbfbc0aae697fae684c7476e25e6b8d179a2e2 Authority Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:2ebbfbc0aae697fae684c7476e25e6b8d179a2e2 sha256:1439f82d223677d23f686a062447a7205dbbe5853404b9d989734c913cefb2d4 Public Key PIN: pin-sha256:FDn4LSI2d9I/aGoGJEenIF275YU0BLnZiXNMkTzvstQ= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert2.crt --type=cert --id=0006 --label=ecCert2 Created certificate: Certificate Object; type = X.509 cert label: ecCert2 subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 serial: 09 ID: 0006 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --delete-object --type pubkey --id 0006 + ECBASE2URIWITHPINVALUE='pkcs11:id=%00%06?pin-value=12345678' + ECBASE2URIWITHPINSOURCE='pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ECBASE2URI=pkcs11:id=%00%06 + ECPRI2URI='pkcs11:type=private;id=%00%06' + ECCRT2URI='pkcs11:type=cert;object=ecCert2' + title LINE 'EC2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC2 PKCS11 URIS' + echo 'pkcs11:id=%00%06?pin-value=12345678' + echo 'pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%06 + echo 'pkcs11:type=private;id=%00%06' + echo 'pkcs11:type=cert;object=ecCert2' + echo '' + '[' -z '' ']' + title PARA 'explicit EC unsupported' + case "$1" in + shift 1 + echo '' + echo '## explicit EC unsupported' + '[' -f '' ']' + title PARA 'generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' + case "$1" in + shift 1 + echo '' + echo '## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate' + '[' -f '' ']' + KEYID=0008 + URIKEYID=%00%08 + TSTCRTN=ecCert3 + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=EC:secp521r1 --label=ecCert3 --id=0008 --always-auth EC2 PKCS11 URIS pkcs11:id=%00%06?pin-value=12345678 pkcs11:id=%00%06?pin-source=file/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%06 pkcs11:type=private;id=%00%06 pkcs11:type=cert;object=ecCert2 ## explicit EC unsupported ## generate EC key pair with ALWAYS AUTHENTICATE flag, self-signed certificate Key pair generated: Private Key Object; EC label: ecCert3 ID: 0008 Usage: decrypt, sign, signRecover, unwrap, derive Access: always authenticate, sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private Public Key Object; EC EC_POINT 528 bits EC_POINT: 048185040089c7221c0c0fbaf86359c3e5fc6c946f4eb1ce3910d241d5cb964efd3cc8077ec4caa0e31303d836f899ccd34aaff24a5f9c8194a5dde7b82eb82b961292e61e0b00840031738b8b3ce41b842a29bddd18e3b5de87eadbe14652e63eafc8d1dfbbfad48b8158bfdd948a44fc82f28287083adb34b7a6142a283dd0cb2608010cb44693 EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) label: ecCert3 ID: 0008 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public + ca_sign ecCert3 'My EC Cert 3' 0008 + LABEL=ecCert3 + CN='My EC Cert 3' + KEYID=0008 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My EC Cert 3|g' -e 's|serial = .*|serial = 10|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert3.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=ecCert3;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' Generating a signed certificate... Expiration time: Sat May 1 10:23:12 2027 CA expiration time: Sat May 1 10:23:10 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0a Validity: Not Before: Fri May 01 22:23:12 UTC 2026 Not After: Sat May 01 22:23:12 UTC 2027 Subject: CN=My EC Cert 3,O=PKCS11 Provider Subject Public Key Algorithm: EC/ECDSA Algorithm Security Level: Future (528 bits) Curve: SECP521R1 X: 00:89:c7:22:1c:0c:0f:ba:f8:63:59:c3:e5:fc:6c:94 6f:4e:b1:ce:39:10:d2:41:d5:cb:96:4e:fd:3c:c8:07 7e:c4:ca:a0:e3:13:03:d8:36:f8:99:cc:d3:4a:af:f2 4a:5f:9c:81:94:a5:dd:e7:b8:2e:b8:2b:96:12:92:e6 1e:0b Y: 00:84:00:31:73:8b:8b:3c:e4:1b:84:2a:29:bd:dd:18 e3:b5:de:87:ea:db:e1:46:52:e6:3e:af:c8:d1:df:bb fa:d4:8b:81:58:bf:dd:94:8a:44:fc:82:f2:82:87:08 3a:db:34:b7:a6:14:2a:28:3d:d0:cb:26:08:01:0c:b4 46:93 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Subject Key Identifier (not critical): 4dba923436746331a4e9ebc51976810154a25c05 Authority Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:4dba923436746331a4e9ebc51976810154a25c05 sha256:e4d11f8b26a950034ccfad2ead0c463a8d6484f3c428dd205dba0235fe285254 Public Key PIN: pin-sha256:5NEfiyapUANMz60urQxGOo1khPPEKN0gXboCNf4oUlQ= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/ecCert3.crt --type=cert --id=0008 --label=ecCert3 Created certificate: Certificate Object; type = X.509 cert label: ecCert3 subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 serial: 0A ID: 0008 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert + ECBASE3URIWITHPINVALUE='pkcs11:id=%00%08?pin-value=12345678' + ECBASE3URIWITHPINSOURCE='pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + ECBASE3URI=pkcs11:id=%00%08 + ECPUB3URI='pkcs11:type=public;id=%00%08' + ECPRI3URI='pkcs11:type=private;id=%00%08' + ECCRT3URI='pkcs11:type=cert;object=ecCert3' + title LINE 'EC3 PKCS11 URIS' + case "$1" in + shift 1 + echo 'EC3 PKCS11 URIS' + echo 'pkcs11:id=%00%08?pin-value=12345678' + echo 'pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%08 + echo 'pkcs11:type=public;id=%00%08' + echo 'pkcs11:type=private;id=%00%08' + echo 'pkcs11:type=cert;object=ecCert3' + echo '' + '[' 1 -eq 1 ']' + KEYID=0010 + URIKEYID=%00%10 + TSTCRTN=testRsaPssCert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:2048 --label=testRsaPssCert --id=0010 --allowed-mechanisms RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS EC3 PKCS11 URIS pkcs11:id=%00%08?pin-value=12345678 pkcs11:id=%00%08?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%08 pkcs11:type=public;id=%00%08 pkcs11:type=private;id=%00%08 pkcs11:type=cert;object=ecCert3 Key pair generated: Private Key Object; RSA label: testRsaPssCert ID: 0010 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private Public Key Object; RSA 2048 bits label: testRsaPssCert ID: 0010 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public + ca_sign testRsaPssCert 'My RsaPss Cert' 0010 --sign-params=RSA-PSS + LABEL=testRsaPssCert + CN='My RsaPss Cert' + KEYID=0010 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My RsaPss Cert|g' -e 's|serial = .*|serial = 11|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPssCert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPssCert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS Generating a signed certificate... Expiration time: Sat May 1 10:23:13 2027 CA expiration time: Sat May 1 10:23:10 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0b Validity: Not Before: Fri May 01 22:23:13 UTC 2026 Not After: Sat May 01 22:23:13 UTC 2027 Subject: CN=My RsaPss Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: Medium (2048 bits) Modulus (bits 2048): 00:a9:a2:ca:3d:20:3d:4b:6c:eb:2a:a9:c0:05:d9:11 f1:22:87:0d:0d:b8:b8:22:56:70:4f:b5:b9:fa:6b:4f 9a:e7:c8:87:0d:d3:ff:53:8a:d2:54:da:66:70:b0:b9 a2:d1:2a:ff:8c:c3:50:a4:51:78:10:72:db:13:9b:c5 09:2f:11:09:5b:80:36:82:bb:9f:dc:02:bd:4f:14:c4 84:eb:4a:96:56:51:b3:fb:90:09:95:1f:29:c4:cf:cc bf:a3:c6:7c:e6:01:60:c8:cd:1f:97:ef:f1:1b:51:e1 b7:4c:92:13:27:11:9a:02:00:8a:ef:9d:f2:03:c9:41 92:15:05:aa:89:d4:22:c5:b6:6a:02:94:31:c0:ee:9c 89:cc:7c:29:01:8c:58:92:50:59:a0:1b:8f:5b:45:91 86:49:a0:16:48:bd:3f:23:9b:e9:e1:90:2d:ee:f0:4b ee:01:a4:2b:68:b6:76:b5:d9:97:44:e0:a3:09:58:b0 7b:8c:50:5a:13:7b:28:13:dd:71:50:58:78:7d:11:7e ec:04:16:7b:d9:c2:18:df:a9:06:6c:4f:13:cc:52:35 f3:66:a3:4c:91:d5:4c:f2:e4:f4:f2:1d:62:7f:74:b0 7b:84:68:2b:8c:91:8d:e5:92:ea:55:91:28:83:48:82 f5 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): 61d07c25858a3ccc01a4be74bbf2a97d5840895c Authority Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:61d07c25858a3ccc01a4be74bbf2a97d5840895c sha256:659831ab07cefc9c42fe69feb236f0b15b55352c03b98af976dd9beea350d185 Public Key PIN: pin-sha256:ZZgxqwfO/JxC/mn+sjbwsVtVNSwDuYr5dt2b7qNQ0YU= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPssCert.crt --type=cert --id=0010 --label=testRsaPssCert Created certificate: Certificate Object; type = X.509 cert label: testRsaPssCert subject: DN: O=PKCS11 Provider, CN=My RsaPss Cert serial: 0B ID: 0010 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert + RSAPSSBASEURIWITHPINVALUE='pkcs11:id=%00%10?pin-value=12345678' + RSAPSSBASEURIWITHPINSOURCE='pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + RSAPSSBASEURI=pkcs11:id=%00%10 + RSAPSSPUBURI='pkcs11:type=public;id=%00%10' + RSAPSSPRIURI='pkcs11:type=private;id=%00%10' + RSAPSSCRTURI='pkcs11:type=cert;object=testRsaPssCert' + title LINE 'RSA-PSS PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA-PSS PKCS11 URIS' + echo 'pkcs11:id=%00%10?pin-value=12345678' + echo 'pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%10 + echo 'pkcs11:type=public;id=%00%10' + echo 'pkcs11:type=private;id=%00%10' + echo 'pkcs11:type=cert;object=testRsaPssCert' + echo '' + KEYID=0011 + URIKEYID=%00%11 + TSTCRTN=testRsaPss2Cert + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --keypairgen --key-type=RSA:3092 --label=testRsaPss2Cert --id=0011 --allowed-mechanisms SHA256-RSA-PKCS-PSS RSA-PSS PKCS11 URIS pkcs11:id=%00%10?pin-value=12345678 pkcs11:id=%00%10?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%10 pkcs11:type=public;id=%00%10 pkcs11:type=private;id=%00%10 pkcs11:type=cert;object=testRsaPssCert Key pair generated: Private Key Object; RSA label: testRsaPss2Cert ID: 0011 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: SHA256-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private Public Key Object; RSA 3092 bits label: testRsaPss2Cert ID: 0011 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public + ca_sign testRsaPss2Cert 'My RsaPss2 Cert' 0011 --sign-params=RSA-PSS --hash=SHA256 + LABEL=testRsaPss2Cert + CN='My RsaPss2 Cert' + KEYID=0011 + shift 3 + (( SERIAL+=1 )) + sed -e 's|cn = .*|cn = My RsaPss2 Cert|g' -e 's|serial = .*|serial = 12|g' -e '/^ca$/d' -i /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg + /usr/bin/certtool --generate-certificate --outfile=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPss2Cert.crt --template=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/cert.cfg --provider=/usr/lib/softhsm/libsofthsm2.so --load-privkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=private' --load-pubkey 'pkcs11:object=testRsaPss2Cert;token=SoftHSM%20Token;type=public' --outder --load-ca-certificate /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.crt --inder '--load-ca-privkey=pkcs11:object=caCert;token=SoftHSM%20Token;type=private' --sign-params=RSA-PSS --hash=SHA256 Generating a signed certificate... Expiration time: Sat May 1 10:23:14 2027 CA expiration time: Sat May 1 10:23:10 2027 Warning: The time set exceeds the CA's expiration time X.509 Certificate Information: Version: 3 Serial Number (hex): 0c Validity: Not Before: Fri May 01 22:23:14 UTC 2026 Not After: Sat May 01 22:23:14 UTC 2027 Subject: CN=My RsaPss2 Cert,O=PKCS11 Provider Subject Public Key Algorithm: RSA Algorithm Security Level: High (3092 bits) Modulus (bits 3092): 0c:88:9b:3b:20:e5:36:3c:07:6b:8c:35:40:e8:63:57 35:19:7e:2e:73:38:59:5c:0a:e3:7a:5e:49:66:ff:48 34:d0:73:9a:65:41:cc:5d:f0:d8:1f:c0:37:07:e7:d6 cb:b5:87:5b:a2:70:e1:06:80:86:98:31:30:03:f6:c5 e9:ae:0e:45:dc:ee:a9:6b:e2:34:8a:38:5e:d9:79:c2 42:52:d4:ff:c3:d1:14:58:61:3c:a1:0a:97:83:ac:4d 66:6d:7c:2b:ad:f5:84:96:6e:dc:4f:ee:e4:12:79:db 92:5d:30:02:d1:4b:b2:70:c6:84:e3:81:e7:25:30:94 a7:98:45:ff:3a:d1:0c:5e:57:ee:98:ee:ed:55:d8:11 20:83:89:b5:b0:0e:30:56:4b:18:f5:c4:87:f2:53:2f 27:d7:c5:5e:93:82:80:0a:05:6d:73:41:e4:1c:70:06 75:4e:90:96:22:c1:73:a8:31:e8:2e:98:35:c1:c3:dc 90:6a:9e:1f:11:25:00:cb:36:d5:c3:1d:ea:35:d9:ca 4d:3b:d2:98:52:61:e1:ee:4f:27:00:55:6e:92:9b:4f 88:9e:9e:42:49:48:81:d2:c3:eb:bb:2e:46:27:3e:84 76:1e:61:5d:a3:26:8a:ef:5f:ab:59:52:97:c7:fa:4a 89:68:3d:1a:d3:a4:ef:6d:d3:1d:84:66:27:8e:30:26 cf:36:c2:64:bc:49:77:02:3c:44:bf:f9:fb:36:29:52 58:1f:8e:7a:6c:cf:6c:2e:52:8b:08:99:93:31:37:07 17:de:7e:27:f7:8b:7b:11:aa:79:ec:3d:74:98:54:dd 5b:c0:0d:41:9c:d9:09:80:7b:92:18:c8:83:74:a7:d6 37:08:ea:5f:b0:70:76:42:f8:34:5d:6f:1e:33:8e:3a b0:62:01:9e:0f:ec:24:40:3f:93:2b:22:4b:74:ef:a9 08:d4:85:86:fd:97:ae:e3:0c:c0:e6:ab:b9:1e:92:fa cd:9f:f1 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): RFC822Name: testcert@example.org Key Usage (critical): Digital signature. Key encipherment. Subject Key Identifier (not critical): e06769403494efc94a610bf8f68144a59bdf2e3c Authority Key Identifier (not critical): d79901bab3478b3770b11fb85c112f6954c9b383 Other Information: Public Key ID: sha1:e06769403494efc94a610bf8f68144a59bdf2e3c sha256:8d495e7b73e50d45a18d26976b83af6f8d69be89f309e8e5362a0d9716464dfc Public Key PIN: pin-sha256:jUlee3PlDUWhjSaXa4Ovb41pvonzCejlNioNlxZGTfw= Signing certificate... + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' --write-object /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testRsaPss2Cert.crt --type=cert --id=0011 --label=testRsaPss2Cert Created certificate: Certificate Object; type = X.509 cert label: testRsaPss2Cert subject: DN: O=PKCS11 Provider, CN=My RsaPss2 Cert serial: 0C ID: 0011 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert + RSAPSS2BASEURIWITHPINVALUE='pkcs11:id=%00%11?pin-value=12345678' + RSAPSS2BASEURIWITHPINSOURCE='pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + RSAPSS2BASEURI=pkcs11:id=%00%11 + RSAPSS2PUBURI='pkcs11:type=public;id=%00%11' + RSAPSS2PRIURI='pkcs11:type=private;id=%00%11' + RSAPSS2CRTURI='pkcs11:type=cert;object=testRsaPss2Cert' + title LINE 'RSA-PSS 2 PKCS11 URIS' + case "$1" in + shift 1 + echo 'RSA-PSS 2 PKCS11 URIS' + echo 'pkcs11:id=%00%11?pin-value=12345678' + echo 'pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt' + echo pkcs11:id=%00%11 + echo 'pkcs11:type=public;id=%00%11' + echo 'pkcs11:type=private;id=%00%11' + echo 'pkcs11:type=cert;object=testRsaPss2Cert' + echo '' + title PARA 'Show contents of softhsm token' + case "$1" in + shift 1 + echo '' + echo '## Show contents of softhsm token' + '[' -f '' ']' + echo ' ----------------------------------------------------------------------------------------------------' + pkcs11-tool --module=/usr/lib/softhsm/libsofthsm2.so --login --pin=12345678 '--token-label=SoftHSM Token' -O RSA-PSS 2 PKCS11 URIS pkcs11:id=%00%11?pin-value=12345678 pkcs11:id=%00%11?pin-source=file:/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt pkcs11:id=%00%11 pkcs11:type=public;id=%00%11 pkcs11:type=private;id=%00%11 pkcs11:type=cert;object=testRsaPss2Cert ## Show contents of softhsm token ---------------------------------------------------------------------------------------------------- Certificate Object; type = X.509 cert label: testCert subject: DN: O=PKCS11 Provider, CN=My Test Cert serial: 03 ID: 0001 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0001;object=testCert;type=cert Private Key Object; RSA label: testCert ID: 0001 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0001;object=testCert;type=private Private Key Object; EC label: ecPeerCert ID: 0003 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=private Private Key Object; RSA label: testCert2 ID: 0005 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0005;object=testCert2;type=private Certificate Object; type = X.509 cert label: ed2Cert subject: DN: O=PKCS11 Provider, CN=My ED448 Cert serial: 07 ID: 0009 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=cert Private Key Object; RSA label: testRsaPss2Cert ID: 0011 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: SHA256-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=private Public Key Object; RSA 2048 bits label: testCert ID: 0001 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0001;object=testCert;type=public Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441041bf5de17aa4407e61b18f0e079ec234c14563d698889cafe15454e802c807f965ebe2e964b9461aa18dd891752ffc2fa74e30fba4d3860cc65e9ddb75af8e4b4 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecCert ID: 0002 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0002;object=ecCert;type=public Public Key Object; EC EC_POINT 528 bits EC_POINT: 048185040089c7221c0c0fbaf86359c3e5fc6c946f4eb1ce3910d241d5cb964efd3cc8077ec4caa0e31303d836f899ccd34aaff24a5f9c8194a5dde7b82eb82b961292e61e0b00840031738b8b3ce41b842a29bddd18e3b5de87eadbe14652e63eafc8d1dfbbfad48b8158bfdd948a44fc82f28287083adb34b7a6142a283dd0cb2608010cb44693 EC_PARAMS: 06052b81040023 (OID 1.3.132.0.35) label: ecCert3 ID: 0008 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=public Certificate Object; type = X.509 cert label: testRsaPssCert subject: DN: O=PKCS11 Provider, CN=My RsaPss Cert serial: 0B ID: 0010 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=cert Private Key Object; RSA label: testRsaPssCert ID: 0010 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local Allowed mechanisms: RSA-PKCS-PSS,SHA1-RSA-PKCS-PSS,SHA256-RSA-PKCS-PSS,SHA384-RSA-PKCS-PSS,SHA512-RSA-PKCS-PSS,SHA224-RSA-PKCS-PSS uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=private Certificate Object; type = X.509 cert label: edCert subject: DN: O=PKCS11 Provider, CN=My ED25519 Cert serial: 06 ID: 0004 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0004;object=edCert;type=cert Certificate Object; type = X.509 cert label: ecPeerCert subject: DN: CN=My Peer EC Cert serial: 05 ID: 0003 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=cert Public Key Object; EC_EDWARDS EC_POINT 272 bits EC_POINT: 042035f9ddc448378cd603400f7a18e64eb856f7ef744ca7c6a6d5869815739bda08 EC_PARAMS: 130c656477617264733235353139 (PrintableString edwards25519) label: edCert ID: 0004 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0004;object=edCert;type=public Private Key Object; EC label: ecCert3 ID: 0008 Usage: decrypt, sign, signRecover, unwrap, derive Access: always authenticate, sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=private Certificate Object; type = X.509 cert label: testCert2 subject: DN: O=PKCS11 Provider, CN=My Test Cert 2 serial: 08 ID: 0005 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0005;object=testCert2;type=cert Certificate Object; type = X.509 cert label: testRsaPss2Cert subject: DN: O=PKCS11 Provider, CN=My RsaPss2 Cert serial: 0C ID: 0011 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=cert Public Key Object; RSA 2048 bits label: testRsaPssCert ID: 0010 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0010;object=testRsaPssCert;type=public Public Key Object; RSA 3092 bits label: testRsaPss2Cert ID: 0011 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0011;object=testRsaPss2Cert;type=public Certificate Object; type = X.509 cert label: ecCert subject: DN: O=PKCS11 Provider, CN=My EC Cert serial: 04 ID: 0002 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0002;object=ecCert;type=cert Private Key Object; EC_EDWARDS label: ed2Cert ID: 0009 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=private Private Key Object; EC label: ecCert2 ID: 0006 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=private Public Key Object; EC_EDWARDS EC_POINT 472 bits EC_POINT: 0439f38dce10ef3d3d3655d04fb06bd75c919e7846eb213b93f7953a016e0692b9ccc44d275fc8956f8755e1dad5f02fd6ce8cd0e19e2e7c785500 EC_PARAMS: 06032b6571 (OID 1.3.101.113) label: ed2Cert ID: 0009 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0009;object=ed2Cert;type=public Public Key Object; EC EC_POINT 256 bits EC_POINT: 0441048d447fb6fe4a54a425d42dc52a129e2d522f3c8c590144fdcb1dd370f24f5d540437737803af82543e8e5e44f739d49e64e50d2ccad567ad23affad78d6dce70 EC_PARAMS: 06082a8648ce3d030107 (OID 1.2.840.10045.3.1.7) label: ecPeerCert ID: 0003 Usage: encrypt, verify, verifyRecover, wrap, derive Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0003;object=ecPeerCert;type=public Private Key Object; RSA label: caCert ID: 0000 Usage: decrypt, sign, signRecover, unwrap Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0000;object=caCert;type=private Public Key Object; RSA 2048 bits label: caCert ID: 0000 Usage: encrypt, verify, verifyRecover, wrap Access: local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0000;object=caCert;type=public Private Key Object; EC_EDWARDS label: edCert ID: 0004 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0004;object=edCert;type=private Certificate Object; type = X.509 cert label: ecCert3 subject: DN: O=PKCS11 Provider, CN=My EC Cert 3 serial: 0A ID: 0008 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0008;object=ecCert3;type=cert Certificate Object; type = X.509 cert label: ecCert2 subject: DN: O=PKCS11 Provider, CN=My EC Cert 2 serial: 09 ID: 0006 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0006;object=ecCert2;type=cert Private Key Object; EC label: ecCert ID: 0002 Usage: decrypt, sign, signRecover, unwrap, derive Access: sensitive, always sensitive, never extractable, local uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0002;object=ecCert;type=private Certificate Object; type = X.509 cert label: caCert subject: DN: CN=Issuer serial: 02 ID: 0000 uri: pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%0000;object=caCert;type=cert + echo ' ----------------------------------------------------------------------------------------------------' + title PARA 'Output configurations' + case "$1" in + shift 1 + echo '' + echo '## Output configurations' + '[' -f '' ']' + OPENSSL_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf + title LINE 'Generate openssl config file' + case "$1" in + shift 1 + echo 'Generate openssl config file' + sed -e 's|@libtoollibs@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src|g' -e 's|@testsblddir@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests|g' -e 's|@testsdir@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm|g' -e 's|@SHARED_EXT@|.so|g' -e 's|@PINFILE@|/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/pinfile.txt|g' -e 's|##TOKENOPTIONS|\npkcs11-module-quirks = no-deinit no-operation-state|g' /build/reproducible-path/pkcs11-provider-1.0/tests/openssl.cnf.in ---------------------------------------------------------------------------------------------------- ## Output configurations Generate openssl config file + title LINE 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars' + case "$1" in + shift 1 + echo 'Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars' + cat Export test variables to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars + '[' -n pkcs11:id=%00%04 ']' + cat + '[' -n pkcs11:id=%00%09 ']' + cat + '[' -n '' ']' + '[' -n pkcs11:id=%00%10 ']' + cat + cat + gen_unsetvars + sed -e s/export/unset/ -e 's/=.*$//' + grep '^export' /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/testvars + title ENDSECTION + case "$1" in + echo '' + echo ' ##' + echo '########################################' + echo '' ## ######################################## ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 2/92 pkcs11-provider:softhsm / setup OK 4.60s 3/92 pkcs11-provider:kryoptic / setup RUNNING >>> SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SHARED_EXT=.so UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=238 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=kryoptic + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ grep OpenSC ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' kryoptic == softhsm ']' + '[' kryoptic == softokn ']' + '[' kryoptic == kryoptic ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh ++ title SECTION 'Searching for Kryoptic module' ++ case "$1" in ++ shift 1 ++ echo '########################################' ++ echo '## Searching for Kryoptic module' ++ echo '' ++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /target/debug/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /target/release/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so ++ for _lib in "$@" ++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so ++ for _lib in "$@" ++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so ++ echo 'skipped: Unable to find kryoptic PKCS#11 library' ++ exit 0 ######################################## ## Searching for Kryoptic module skipped: Unable to find kryoptic PKCS#11 library ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 3/92 pkcs11-provider:kryoptic / setup OK 0.15s 4/92 pkcs11-provider:kryoptic.nss / setup RUNNING >>> SOFTOKNPATH=/usr/lib/aarch64-linux-gnu MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 SHARED_EXT=.so UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 P11KITCLIENTPATH=/usr/lib/aarch64-linux-gnu/pkcs11/p11-kit-client.so TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=232 TESTSSRCDIR=/build/reproducible-path/pkcs11-provider-1.0/tests LIBSPATH=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/src /build/reproducible-path/pkcs11-provider-1.0/tests/setup.sh kryoptic.nss ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― + source /build/reproducible-path/pkcs11-provider-1.0/tests/helpers.sh ++ : /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests ++ helper_emit=1 ++ sed --version ++ grep -q 'GNU sed' ++ sed_inplace=('-i') ++ export sed_inplace + '[' 1 -ne 1 ']' + TOKENTYPE=kryoptic.nss + SUPPORT_ED25519=1 + SUPPORT_ED448=1 + SUPPORT_RSA_PKCS1_ENCRYPTION=1 + SUPPORT_RSA_KEYGEN_PUBLIC_EXPONENT=1 + SUPPORT_TLSFUZZER=1 + SUPPORT_ALLOWED_MECHANISMS=0 ++ opensc-tool -i ++ sed -e 's/OpenSC 0\.\([0-9]*\).*/\1/' ++ grep OpenSC Failed to establish context: Unable to load external module + OPENSC_VERSION=26 + [[ 26 -le 25 ]] + [[ '' = \1 ]] ++ cat /proc/sys/crypto/fips_enabled + [[ 0 = \1 ]] + TMPPDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss + TOKDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/tokens + '[' -d /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss ']' + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss + mkdir /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/tokens + PINVALUE=12345678 + PINFILE=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/pinfile.txt + echo 12345678 + export GNUTLS_PIN=12345678 + GNUTLS_PIN=12345678 + '[' kryoptic.nss == softhsm ']' + '[' kryoptic.nss == softokn ']' + '[' kryoptic.nss == kryoptic ']' + '[' kryoptic.nss == kryoptic.nss ']' + source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic.nss-init.sh ++ export KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/kryoptic.conf ++ KRYOPTIC_CONF=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/kryoptic.nss/kryoptic.conf ++ cat ++ export 'TOKENLABEL=Kryoptic Soft Token' ++ TOKENLABEL='Kryoptic Soft Token' ++ export TOKENLABELURI=Kryoptic%20Soft%20Token ++ TOKENLABELURI=Kryoptic%20Soft%20Token ++ source /build/reproducible-path/pkcs11-provider-1.0/tests/kryoptic-init.sh +++ title SECTION 'Searching for Kryoptic module' +++ case "$1" in +++ shift 1 +++ echo '########################################' +++ echo '## Searching for Kryoptic module' +++ echo '' +++ find_kryoptic /target/debug/libkryoptic_pkcs11.so /target/release/libkryoptic_pkcs11.so /usr/local/lib/kryoptic/libkryoptic_pkcs11so /usr/lib64/pkcs11/libkryoptic_pkcs11.so /usr/lib/pkcs11/libkryoptic_pkcs11.so /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /target/debug/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /target/release/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/local/lib/kryoptic/libkryoptic_pkcs11so +++ for _lib in "$@" +++ test -f /usr/lib64/pkcs11/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/lib/pkcs11/libkryoptic_pkcs11.so +++ for _lib in "$@" +++ test -f /usr/lib/x86_64-linux-gnu/kryoptic/libkryoptic_pkcs11.so +++ echo 'skipped: Unable to find kryoptic PKCS#11 library' +++ exit 0 ######################################## ## Searching for Kryoptic module skipped: Unable to find kryoptic PKCS#11 library ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 4/92 pkcs11-provider:kryoptic.nss / setup OK 0.19s 5/92 pkcs11-provider:softokn / basic RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=68 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 5/92 pkcs11-provider:softokn / basic SKIP 0.08s exit status 77 6/92 pkcs11-provider:softhsm / basic RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=58 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tbasic ## Raw Sign check error openssl pkeyutl -sign -inkey "${BASEURI}" -pkeyopt pad-mode:none -in ${TMPPDIR}/64Brandom.bin -out ${TMPPDIR}/raw-sig.bin Public Key operation error 608C768CFFFF0000:error:0200007A:rsa routines:p11prov_sig_operate:data too small for key size:../src/signature.c:971: ## Sign and Verify with provided Hash and RSA openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## Sign and Verify with provided Hash and RSA with DigestInfo struct openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -pkeyopt digest:sha256 -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pkeyopt digest:sha256 -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## DigestSign and DigestVerify with RSA openssl pkeyutl -sign -inkey "${BASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully RSA basic encrypt and decrypt openssl pkeyutl -encrypt -inkey "${PUBURI}" -pubin -in ${SECRETFILE} -out ${SECRETFILE}.enc openssl pkeyutl -decrypt -inkey "${PRIURI}" -in ${SECRETFILE}.enc -out ${SECRETFILE}.dec ## Test Disallow Public Export openssl pkey -in $PUBURI -pubin -pubout -text ## Test CSR generation from RSA private keys openssl req -new -batch -key "${PRIURI}" -out ${TMPPDIR}/rsa_csr.pem openssl req -in ${TMPPDIR}/rsa_csr.pem -verify -noout Certificate request self-signature verify OK ## Test fetching public keys without PIN in config files openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/rsa.pub.nopin.pem openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ec.pub.nopin.pem openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/ed.pub.nopin.pem ## Test fetching public keys with a PIN in URI openssl pkey -in $BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripin.pem openssl pkey -in $ECBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripin.pem openssl pkey -in $EDBASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripin.pem openssl pkey -in $ED2BASEURIWITHPINVALUE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripin.pem ## Test fetching public keys with a PIN source in URI openssl pkey -in $BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripinsource.pem openssl pkey -in $ECBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ec.pub.uripinsource.pem openssl pkey -in $EDBASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed.pub.uripinsource.pem openssl pkey -in $ED2BASEURIWITHPINSOURCE -pubin -pubout -out ${TMPPDIR}/ed2.pub.uripinsource.pem ## Test prompting without PIN in config files ## Test EVP_PKEY_eq on public RSA key both on token ## Test EVP_PKEY_eq on public EC key both on token ## Test EVP_PKEY_eq on public RSA key via import ## Match private RSA key against public key ## Match private RSA key against public key (commutativity) ## Test EVP_PKEY_eq on public EC key via import ## Match private EC key against public key ## Match private EC key against public key (commutativity) ## Test EVP_PKEY_eq with key exporting disabled ## Test RSA key ## Test EC key ## Test PIN caching Prompt: "Enter pass phrase for PKCS#11 Token (Slot 99790496 - SoftHSM slot ID 0x5f2aea0):" Returning: 12345678 Child Done ALL A-OK! Prompt: "Enter pass phrase for PKCS#11 Token (Slot 99790496 - SoftHSM slot ID 0x5f2aea0):" Returning: 12345678 Child Done ALL A-OK! ## Test interactive Login on key without ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ## Test interactive Login repeated for operation on key with ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ## Test Key generation Performed tests: 4 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 6/92 pkcs11-provider:softhsm / basic OK 7.53s 7/92 pkcs11-provider:kryoptic / basic RUNNING >>> MALLOC_PERTURB_=100 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 7/92 pkcs11-provider:kryoptic / basic SKIP 0.06s exit status 77 8/92 pkcs11-provider:kryoptic.nss / basic RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=59 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper basic-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 8/92 pkcs11-provider:kryoptic.nss / basic SKIP 0.06s exit status 77 9/92 pkcs11-provider:softokn / pubkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=106 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 9/92 pkcs11-provider:softokn / pubkey SKIP 0.05s exit status 77 10/92 pkcs11-provider:softhsm / pubkey RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=232 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tpubkey ## Export RSA Public key to a file openssl pkey -in $BASEURI -pubin -pubout -out ${TMPPDIR}/baseout.pub Export Public key to a file (pub-uri) openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/pubout.pub Print Public key from private openssl pkey -in $PRIURI -pubout -text ## Export Public check error openssl pkey -in pkcs11:id=%de%ad -pubin -pubout -out ${TMPPDIR}/pubout-invlid.pub Could not find private key of Public Key from pkcs11:id=%de%ad ## Export EC Public key to a file openssl pkey -in $ECBASEURI -pubin -pubout -out ${TMPPDIR}/baseecout.pub Export EC Public key to a file (pub-uri) openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/pubecout.pub Print EC Public key from private openssl pkey -in $ECPRIURI -pubout -text ## Check we can get RSA public keys from certificate objects Export Public key to a file (priv-uri) openssl pkey -in $PRI2URI -pubout -out ${TMPPDIR}/priv-cert.pub Export Public key to a file (base-uri) openssl pkey -in $BASE2URI -pubout -out ${TMPPDIR}/base-cert.pub ## Check we can get EC public keys from certificate objects Export Public EC key to a file (priv-uri) openssl pkey -in $ECPRI2URI -pubout -out ${TMPPDIR}/ec-priv-cert.pub Export Public key to a file (base-uri) openssl pkey -in $ECBASE2URI -pubout -out ${TMPPDIR}/ec-base-cert.pub ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 10/92 pkcs11-provider:softhsm / pubkey OK 0.88s 11/92 pkcs11-provider:kryoptic / pubkey RUNNING >>> MALLOC_PERTURB_=153 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 11/92 pkcs11-provider:kryoptic / pubkey SKIP 0.05s exit status 77 12/92 pkcs11-provider:kryoptic.nss / pubkey RUNNING >>> MESON_TEST_ITERATION=1 MALLOC_PERTURB_=145 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pubkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 12/92 pkcs11-provider:kryoptic.nss / pubkey SKIP 0.05s exit status 77 13/92 pkcs11-provider:softokn / certs RUNNING >>> MALLOC_PERTURB_=236 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 13/92 pkcs11-provider:softokn / certs SKIP 0.05s exit status 77 14/92 pkcs11-provider:softhsm / certs RUNNING >>> MESON_TEST_ITERATION=1 MALLOC_PERTURB_=145 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tcerts ## Check we can fetch certifiatce objects openssl x509 -in ${CRTURI} -subject -out ${TMPPDIR}/crt-subj.txt openssl x509 -in ${ECCRTURI} -subject -out ${TMPPDIR}/eccrt-subj.txt ## Use storeutl command to match specific certs via params openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate openssl storeutl -certs -subject "${subj}" -out ${TMPPDIR}/storeutl-crt-subj.txt pkcs11:type=cert 0: Certificate ## Test fetching certificate without PIN in config files openssl x509 -in $CRTURI -subject -out ${TMPPDIR}/crt-subj-nopin.txt ## Test fetching certificate via STORE api Cert load successfully ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 14/92 pkcs11-provider:softhsm / certs OK 0.31s 15/92 pkcs11-provider:kryoptic / certs RUNNING >>> MALLOC_PERTURB_=103 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 15/92 pkcs11-provider:kryoptic / certs SKIP 0.06s exit status 77 16/92 pkcs11-provider:kryoptic.nss / certs RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=146 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper certs-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 16/92 pkcs11-provider:kryoptic.nss / certs SKIP 0.06s exit status 77 17/92 pkcs11-provider:softokn / ecc RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=92 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 17/92 pkcs11-provider:softokn / ecc SKIP 0.06s exit status 77 18/92 pkcs11-provider:softhsm / ecc RUNNING >>> MALLOC_PERTURB_=234 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecc ## Export EC Public key to a file openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ecout.pub Print EC Public key from private openssl pkey -in $ECPRIURI -pubout -text ## Sign and Verify with provided Hash and EC openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${ECBASEURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-ecsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${TMPPDIR}/ecout.pub" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-ecsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-256) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-384) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA-512) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha512-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-256) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-256-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-256-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-384) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-384 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-384-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-384 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-384-ecdgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with ECC (SHA3-512) openssl pkeyutl -sign -inkey "${ECBASEURI}" -digest sha3-512 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha3-512-ecdgstsig.bin openssl pkeyutl -verify -inkey "${ECBASEURI}" -pubin -digest sha3-512 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha3-512-ecdgstsig.bin Signature Verified Successfully ## Test CSR generation from private ECC keys openssl req -new -batch -key "${ECPRIURI}" -out ${TMPPDIR}/ecdsa_csr.pem openssl req -in ${TMPPDIR}/ecdsa_csr.pem -verify -noout Certificate request self-signature verify OK ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 18/92 pkcs11-provider:softhsm / ecc OK 1.03s 19/92 pkcs11-provider:kryoptic / ecc RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=12 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 19/92 pkcs11-provider:kryoptic / ecc SKIP 0.05s exit status 77 20/92 pkcs11-provider:kryoptic.nss / ecc RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=187 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecc-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 20/92 pkcs11-provider:kryoptic.nss / ecc SKIP 0.01s exit status 77 21/92 pkcs11-provider:softhsm / edwards RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=45 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tedwards ## Export ED25519 Public key to a file openssl pkey -in $EDPUBURI -pubin -pubout -out ${TMPPDIR}/edout.pub Print ED25519 Public key from private openssl pkey -in $EDPRIURI -pubout -text ## DigestSign and DigestVerify with ED25519 openssl pkeyutl -sign -inkey "${EDBASEURI}" -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-eddgstsig.bin openssl pkeyutl -verify -inkey "${EDBASEURI}" -pubin -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-eddgstsig.bin Signature Verified Successfully ## Test CSR generation from private ED25519 keys openssl req -new -batch -key "${EDPRIURI}" -out ${TMPPDIR}/ed25519_csr.pem openssl req -in ${TMPPDIR}/ed25519_csr.pem -verify -noout Certificate request self-signature verify OK ## Test EVP_PKEY_eq on public Edwards key both on token ## Test EVP_PKEY_eq on public ED key via import ## Match private ED key against public key ## Match private ED key against public key (commutativity) ## Test Key generation Performed tests: 1 ## Export ED448 Public key to a file openssl pkey -in $ED2PUBURI -pubin -pubout -out ${TMPPDIR}/ed2out.pub Print ED448 Public key from private openssl pkey -in $ED2PRIURI -pubout -text ## DigestSign and DigestVerify with ED448 openssl pkeyutl -sign -inkey "${ED2BASEURI}" -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-eddgstsig.bin openssl pkeyutl -verify -inkey "${ED2BASEURI}" -pubin -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-eddgstsig.bin Signature Verified Successfully ## Test CSR generation from private ED448 keys openssl req -new -batch -key "${ED2PRIURI}" -out ${TMPPDIR}/ed448_csr.pem openssl req -in ${TMPPDIR}/ed448_csr.pem -verify -noout Certificate request self-signature verify OK ## Test EVP_PKEY_eq on public Edwards key both on token ## Test EVP_PKEY_eq on public ED448 key via import ## Match private ED448 key against public key ## Match private ED448 key against public key (commutativity) ## Test Ed448 Key generation Performed tests: 1 ## Test interactive Login on key without ALWAYS AUTHENTICATE expect: spawn id exp3 not open while executing "expect "ALL A-OK"" ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 21/92 pkcs11-provider:softhsm / edwards OK 1.70s 22/92 pkcs11-provider:kryoptic / edwards RUNNING >>> MALLOC_PERTURB_=165 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 22/92 pkcs11-provider:kryoptic / edwards SKIP 0.06s exit status 77 23/92 pkcs11-provider:kryoptic.nss / edwards RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=78 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper edwards-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 23/92 pkcs11-provider:kryoptic.nss / edwards SKIP 0.06s exit status 77 24/92 pkcs11-provider:softokn / ecdh RUNNING >>> MALLOC_PERTURB_=104 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 24/92 pkcs11-provider:softokn / ecdh SKIP 0.03s exit status 77 25/92 pkcs11-provider:kryoptic / ecdh RUNNING >>> MALLOC_PERTURB_=15 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 25/92 pkcs11-provider:kryoptic / ecdh SKIP 0.06s exit status 77 26/92 pkcs11-provider:kryoptic.nss / ecdh RUNNING >>> MALLOC_PERTURB_=125 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecdh-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 26/92 pkcs11-provider:kryoptic.nss / ecdh SKIP 0.07s exit status 77 27/92 pkcs11-provider:softokn / democa RUNNING >>> MALLOC_PERTURB_=234 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 27/92 pkcs11-provider:softokn / democa SKIP 0.05s exit status 77 28/92 pkcs11-provider:softhsm / democa RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=82 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdemoca ## Set up demoCA ## Generating CA cert if needed openssl req -batch -noenc -x509 -new -key ${PRIURI} -out ${DEMOCA}/cacert.pem ## Generating a new CSR with key in file openssl req -batch -noenc -newkey rsa:2048 -subj "/CN=testing-csr-signing/O=PKCS11 Provider/C=US" -keyout ${DEMOCA}/cert.key -out ${DEMOCA}/cert.csr ...+++++++++++++++++++++++++++++++++++++++*.........+..+++++++++++++++++++++++++++++++++++++++*...+...+.......+.....+......+...+.........+...+.............+......++++++ .........+...+++++++++++++++++++++++++++++++++++++++*.+...........+...+...+............+.+............+...+..+.............+...........+.+...+.........+.....+...+....+...+...+...+..+...+....+...+++++++++++++++++++++++++++++++++++++++*.....+......+...+............+......+...+.......+...+..+....+......+...+.....+.+.........+.....+.+......+.....+.......+...+........+....+..+....+...............+..+....+........+.+...........+...+......+.......+...+.....+....+.....+.......++++++ ----- ## Signing the new certificate openssl ca -batch -in ${DEMOCA}/cert.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-csr-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until May 1 22:23:27 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing RSA key in token openssl req -batch -noenc -new -key ${PRIURI} -subj "/CN=testing-rsa-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa.csr ## Signing the new RSA key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsa-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until May 1 22:23:28 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing EC key in token openssl req -batch -noenc -new -key ${ECPRIURI} -subj "/CN=testing-ec-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ec.csr ## Signing the new EC key certificate openssl ca -batch -in ${DEMOCA}/cert-ec.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ec-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until May 1 22:23:28 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing ED key in token openssl req -batch -noenc -new -key ${EDPRIURI} -subj "/CN=testing-ed-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ed.csr ## Signing the new ED key certificate openssl ca -batch -in ${DEMOCA}/cert-ed.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ed-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until May 1 22:23:28 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing ED448 key in token openssl req -batch -noenc -new -key ${ED2PRIURI} -subj "/CN=testing-ed2-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-ed2.csr ## Signing the new ED448 key certificate openssl ca -batch -in ${DEMOCA}/cert-ed2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-ed2-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until May 1 22:23:28 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Generating a new CSR with existing RSA-PSS key in token openssl req -batch -noenc -new -key ${RSAPSSPRIURI} -sigopt rsa_padding_mode:pss -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US" -sigopt rsa_padding_mode:pss -out ${DEMOCA}/cert-rsa-pss.csr ## Signing the new RSA-PSS key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsapss-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until May 1 22:23:28 2027 GMT (365 days) Write out database with 1 new entries Database updated openssl x509 -text -in ${DEMOCA}/cert.pem ## Generating a new CSR with existing SHA256 restricted RSA-PSS key in token openssl req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss -subj "/CN=testing-rsapss-sha2-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa-pss2.csr -sigopt rsa_padding_mode:pss -sigopt digest:sha256 ## Signing the new SHA256 restricted RSA-PSS key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa-pss2.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsapss-sha2-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until May 1 22:23:28 2027 GMT (365 days) Write out database with 1 new entries Database updated openssl x509 -text -in ${DEMOCA}/cert.pem ## Generating a new CSR with existing RSA-PSS key in token openssl req -batch -noenc -new -key ${RSAPSS2PRIURI} -sigopt rsa_padding_mode:pss -subj "/CN=testing-rsapss-signing/O=PKCS11 Provider/C=US" -out ${DEMOCA}/cert-rsa-pss2.csr -sigopt rsa_padding_mode:pss -sigopt digest:sha256 -sigopt rsa_pss_saltlen:-2 ## Signing the new RSA-PSS key certificate openssl ca -batch -in ${DEMOCA}/cert-rsa-pss.csr -keyfile ${PRIURI} -out ${DEMOCA}/cert.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'testing-rsapss-signing' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until May 1 22:23:29 2027 GMT (365 days) Write out database with 1 new entries Database updated ## Set up OCSP openssl req -batch -noenc -new -subj "/CN=OCSP/O=PKCS11 Provider/C=US" -key ${PRIURI} -out ${DEMOCA}/ocspSigning.csr openssl ca -batch -keyfile ${PRIURI} -cert ${DEMOCA}/cacert.pem -in ${DEMOCA}/ocspSigning.csr -out ${DEMOCA}/ocspSigning.pem Using configuration from /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/openssl.cnf Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'OCSP' organizationName :ASN.1 12:'PKCS11 Provider' countryName :PRINTABLE:'US' Certificate is to be certified until May 1 22:23:29 2027 GMT (365 days) Write out database with 1 new entries Database updated ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 28/92 pkcs11-provider:softhsm / democa OK 1.85s 29/92 pkcs11-provider:kryoptic / democa RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=108 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 29/92 pkcs11-provider:kryoptic / democa SKIP 0.06s exit status 77 30/92 pkcs11-provider:kryoptic.nss / democa RUNNING >>> MALLOC_PERTURB_=153 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper democa-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 30/92 pkcs11-provider:kryoptic.nss / democa SKIP 0.07s exit status 77 31/92 pkcs11-provider:softokn / digest RUNNING >>> MESON_TEST_ITERATION=1 MALLOC_PERTURB_=172 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 31/92 pkcs11-provider:softokn / digest SKIP 0.05s exit status 77 32/92 pkcs11-provider:softhsm / digest RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=94 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tdigest ## Test Digests support sha512-224: Unsupported by pkcs11 token sha512-256: Unsupported by pkcs11 token sha3-224: Unsupported by pkcs11 token sha3-256: Unsupported by pkcs11 token sha3-384: Unsupported by pkcs11 token sha3-512: Unsupported by pkcs11 token PASSED ## Test Digests Blocked No digest available for testing pkcs11 provider Digest operations failed as expected ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 32/92 pkcs11-provider:softhsm / digest OK 0.25s 33/92 pkcs11-provider:kryoptic / digest RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=13 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 33/92 pkcs11-provider:kryoptic / digest SKIP 0.05s exit status 77 34/92 pkcs11-provider:kryoptic.nss / digest RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=227 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper digest-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 34/92 pkcs11-provider:kryoptic.nss / digest SKIP 0.05s exit status 77 35/92 pkcs11-provider:softokn / fork RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=215 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 35/92 pkcs11-provider:softokn / fork SKIP 0.05s exit status 77 36/92 pkcs11-provider:softhsm / fork RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=31 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tfork Child Done Child Done ALL A-OK! ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 36/92 pkcs11-provider:softhsm / fork OK 1.67s 37/92 pkcs11-provider:kryoptic / fork RUNNING >>> MALLOC_PERTURB_=8 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 37/92 pkcs11-provider:kryoptic / fork SKIP 0.07s exit status 77 38/92 pkcs11-provider:kryoptic.nss / fork RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=32 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper fork-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 38/92 pkcs11-provider:kryoptic.nss / fork SKIP 0.05s exit status 77 39/92 pkcs11-provider:softokn / oaepsha2 RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=247 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 39/92 pkcs11-provider:softokn / oaepsha2 SKIP 0.06s exit status 77 40/92 pkcs11-provider:kryoptic / oaepsha2 RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=157 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 40/92 pkcs11-provider:kryoptic / oaepsha2 SKIP 0.06s exit status 77 41/92 pkcs11-provider:kryoptic.nss / oaepsha2 RUNNING >>> MESON_TEST_ITERATION=1 MALLOC_PERTURB_=6 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper oaepsha2-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 41/92 pkcs11-provider:kryoptic.nss / oaepsha2 SKIP 0.06s exit status 77 42/92 pkcs11-provider:softokn / hkdf RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=3 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 42/92 pkcs11-provider:softokn / hkdf SKIP 0.06s exit status 77 43/92 pkcs11-provider:kryoptic / hkdf RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=42 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 43/92 pkcs11-provider:kryoptic / hkdf SKIP 0.05s exit status 77 44/92 pkcs11-provider:kryoptic.nss / hkdf RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=241 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper hkdf-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 44/92 pkcs11-provider:kryoptic.nss / hkdf SKIP 0.06s exit status 77 45/92 pkcs11-provider:softokn / imported RUNNING >>> MESON_TEST_ITERATION=1 MALLOC_PERTURB_=145 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 45/92 pkcs11-provider:softokn / imported SKIP 0.02s exit status 77 46/92 pkcs11-provider:kryoptic / imported RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=189 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 46/92 pkcs11-provider:kryoptic / imported SKIP 0.04s exit status 77 47/92 pkcs11-provider:kryoptic.nss / imported RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=168 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper imported-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 47/92 pkcs11-provider:kryoptic.nss / imported SKIP 0.05s exit status 77 48/92 pkcs11-provider:softokn / rsapss RUNNING >>> MALLOC_PERTURB_=192 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 48/92 pkcs11-provider:softokn / rsapss SKIP 0.05s exit status 77 49/92 pkcs11-provider:softhsm / rsapss RUNNING >>> MESON_TEST_ITERATION=1 MALLOC_PERTURB_=166 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapss ## DigestSign and DigestVerify with RSA PSS openssl pkeyutl -sign -inkey "${BASEURI}" -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully Re-verify using OpenSSL default provider openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully ## DigestSign and DigestVerify with RSA PSS with default params openssl pkeyutl -sign -inkey "${BASEURI}" -pkeyopt pad-mode:pss -in ${RAND64FILE} -rawin -out ${TMPPDIR}/def-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -pkeyopt pad-mode:pss -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/def-dgstsig.bin Signature Verified Successfully Re-verify using OpenSSL default provider openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -pkeyopt pad-mode:pss -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/def-dgstsig.bin Signature Verified Successfully ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 49/92 pkcs11-provider:softhsm / rsapss OK 0.45s 50/92 pkcs11-provider:kryoptic / rsapss RUNNING >>> MALLOC_PERTURB_=52 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 50/92 pkcs11-provider:kryoptic / rsapss SKIP 0.05s exit status 77 51/92 pkcs11-provider:kryoptic.nss / rsapss RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=123 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapss-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 51/92 pkcs11-provider:kryoptic.nss / rsapss SKIP 0.05s exit status 77 52/92 pkcs11-provider:softhsm / rsapssam RUNNING >>> MALLOC_PERTURB_=110 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trsapssam ## DigestSign and DigestVerify with RSA PSS (SHA256 restriction) openssl pkeyutl -sign -inkey "${RSAPSS2PRIURI}" -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin openssl pkeyutl -verify -inkey "${RSAPSS2PUBURI}" -pubin -digest sha256 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha256 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-rsapps-genpkey-dgstsig.bin Signature Verified Successfully ## Fail DigestSign with RSA PSS because of restricted Digest openssl pkeyutl -sign -inkey "${RSAPSS2PRIURI}" -digest sha384 -pkeyopt pad-mode:pss -pkeyopt mgf1-digest:sha384 -pkeyopt saltlen:digest -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-rsapps-genpkey-dgstsig.bin 2>&1 ## Fail Signing with RSA PKCS1 mech and RSA-PSS key openssl pkeyutl -sign -inkey "${RSAPSSPRIURI}" -digest sha256 -pkeyopt rsa_padding_mode:pkcs1 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha384-rsa-not-rsapss-sig.bin 2>&1 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 52/92 pkcs11-provider:softhsm / rsapssam OK 0.40s 53/92 pkcs11-provider:kryoptic / rsapssam RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=45 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rsapssam-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 53/92 pkcs11-provider:kryoptic / rsapssam SKIP 0.05s exit status 77 54/92 pkcs11-provider:softokn / genkey RUNNING >>> MALLOC_PERTURB_=46 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 54/92 pkcs11-provider:softokn / genkey SKIP 0.06s exit status 77 55/92 pkcs11-provider:softhsm / genkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=22 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tgenkey Performed tests: 0 ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 55/92 pkcs11-provider:softhsm / genkey OK 0.10s 56/92 pkcs11-provider:kryoptic / genkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=135 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 56/92 pkcs11-provider:kryoptic / genkey SKIP 0.05s exit status 77 57/92 pkcs11-provider:kryoptic.nss / genkey RUNNING >>> MESON_TEST_ITERATION=1 MALLOC_PERTURB_=149 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper genkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 57/92 pkcs11-provider:kryoptic.nss / genkey SKIP 0.05s exit status 77 58/92 pkcs11-provider:softokn / pkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=79 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 58/92 pkcs11-provider:softokn / pkey SKIP 0.05s exit status 77 59/92 pkcs11-provider:softhsm / pkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=161 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tpkey ALL A-OK! ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 59/92 pkcs11-provider:softhsm / pkey OK 0.38s 60/92 pkcs11-provider:kryoptic / pkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=221 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 60/92 pkcs11-provider:kryoptic / pkey SKIP 0.05s exit status 77 61/92 pkcs11-provider:kryoptic.nss / pkey RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=97 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pkey-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 61/92 pkcs11-provider:kryoptic.nss / pkey SKIP 0.05s exit status 77 62/92 pkcs11-provider:softokn / session RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=123 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 62/92 pkcs11-provider:softokn / session SKIP 0.05s exit status 77 63/92 pkcs11-provider:softhsm / session RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=86 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/tsession ALL A-OK!―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 63/92 pkcs11-provider:softhsm / session OK 0.38s 64/92 pkcs11-provider:kryoptic / session RUNNING >>> MALLOC_PERTURB_=169 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 64/92 pkcs11-provider:kryoptic / session SKIP 0.05s exit status 77 65/92 pkcs11-provider:kryoptic.nss / session RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=135 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper session-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 65/92 pkcs11-provider:kryoptic.nss / session SKIP 0.05s exit status 77 66/92 pkcs11-provider:softokn / rand RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=61 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 66/92 pkcs11-provider:softokn / rand SKIP 0.05s exit status 77 67/92 pkcs11-provider:softhsm / rand RUNNING >>> MALLOC_PERTURB_=195 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/trand ## Test PKCS11 RNG openssl rand 1 60DC51B9FFFF0000:error:0308010C:digital envelope routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:355:Global default library context, Algorithm (PKCS11-RAND : 0), Properties () 60DC51B9FFFF0000:error:12000090:random number generator:rand_new_drbg:unable to fetch drbg:../crypto/rand/rand_lib.c:660: openssl rand 1 ƒ ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 67/92 pkcs11-provider:softhsm / rand OK 0.18s 68/92 pkcs11-provider:kryoptic / rand RUNNING >>> MALLOC_PERTURB_=113 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 68/92 pkcs11-provider:kryoptic / rand SKIP 0.06s exit status 77 69/92 pkcs11-provider:kryoptic.nss / rand RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=185 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper rand-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 69/92 pkcs11-provider:kryoptic.nss / rand SKIP 0.06s exit status 77 70/92 pkcs11-provider:softokn / readkeys RUNNING >>> MALLOC_PERTURB_=15 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 70/92 pkcs11-provider:softokn / readkeys SKIP 0.05s exit status 77 71/92 pkcs11-provider:softhsm / readkeys RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=93 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/treadkeys ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 71/92 pkcs11-provider:softhsm / readkeys OK 0.12s 72/92 pkcs11-provider:kryoptic / readkeys RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=231 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 72/92 pkcs11-provider:kryoptic / readkeys SKIP 0.05s exit status 77 73/92 pkcs11-provider:kryoptic.nss / readkeys RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=136 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper readkeys-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 73/92 pkcs11-provider:kryoptic.nss / readkeys SKIP 0.05s exit status 77 74/92 pkcs11-provider:softokn / tls RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=132 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 74/92 pkcs11-provider:softokn / tls SKIP 0.06s exit status 77 75/92 pkcs11-provider:softhsm / tls RUNNING >>> MALLOC_PERTURB_=35 MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttls ## Test SSL_CTX creation SSL Context works! ## Test setting cert/keys on TLS Context Cert and Key successfully set on TLS Context! ## Test setting cert/keys on TLS Context w/o pub key Cert and Key successfully set on TLS Context! ## Test an actual TLS connection ######################################## ## TLS with key in provider ## Run sanity test with default values (RSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAM0jx4VLLOEZCd5aoN2nwJmjBZGp0uNtpePM qTHpYo4l3bB3Jbv7VuNckxj94ie8uO0sVcZhHK9KpCQ7nF2hlsVZV0dIMwesgx2s gNwpRGzT1pdEcziH4Cb3ONu380LiX7uTc9RRLQBx4FOIw81GtaRXQ2v0ohS8Q+4t PYCLir2ngrU2S1TRIbds//0TCDSXM4mVoRZyvoyC9fwCbPBNxYG0m5DgWo5UXRCO RWSPT97hkt2AE8pUfWa6P5RumrMcrPElEcHdNV/QntHTmFLHwYPUYE6/vHcDj/Tg RCL1XlETyvPljjJdMBuNUOUo3nX/vwfKYhQgyhzx3cceCO65wcUCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBRFEuPzXTGWF2/xcjmwvxKpSan70jAf BgNVHSMEGDAWgBTXmQG6s0eLN3CxH7hcES9pVMmzgzANBgkqhkiG9w0BAQsFAAOC AQEApjWhikqxn3cHsMfgY1ysRaUtnt6hYm5aAI/ZZ1zLETeMcsur0avorPqGGhZy txyN4K8dUlxJ35iB0V9lrCuouYB9C96NlXWIb6zxT/N+n9G0W1AIjjiHR/d11qK/ sO/CoqgziI6a53P5wYf5VuMREY5y9c8w2fJkx/egbzDg9KPnq5T+NCscd+y0y5Gk xj24c44KxiFrgsChyWPFwuJ26fkfYyw1VVln+pzN7UfS3WdL/icseS/4wPIMIoX5 iRSmIMBZMw43ttlbLDH4ZokY1KMSnPhRrX+41RlbQDKy1P+c0jXL7FCevas22UnR QxBSlcYrYNUwUrsHxfigKQuRIg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 6A8533C87B0B1AAF8233A3304164D474A0EA8948F3297DC8FDBEFA13712BFE2D Session-ID-ctx: Resumption PSK: D6CAA8CA68ECD03EFB1623218495E0070A2CD4EE6CD579E92BC22338A27985D22C575CE867F209C667F1082BB90D09DB PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - e9 30 0d 70 f7 06 cb 11-53 ca 6c 08 71 c6 a0 1b .0.p....S.l.q... 0010 - 72 1c d9 84 85 e6 f0 e3-62 de 5f b9 b5 67 5d e4 r.......b._..g]. 0020 - 0b 32 64 92 2f f1 94 06-fb 87 23 95 d4 82 14 cb .2d./.....#..... 0030 - d8 58 91 50 50 16 a9 c0-fb 55 b9 2f 8d be 65 fd .X.PP....U./..e. 0040 - 85 1a 06 b5 52 31 20 9e-a6 19 ea fa 8d 66 19 20 ....R1 ......f. 0050 - ac a8 d8 de f8 dd a3 b3-ba 21 5c 68 dd 5a 05 5b .........!\h.Z.[ 0060 - e1 66 fe fb 50 02 65 40-6e 2d ff b4 8b 9c 4a 1f .f..P.e@n-....J. 0070 - e8 6d 76 8c 56 74 3e f3-89 ca b5 50 30 00 86 57 .mv.Vt>....P0..W 0080 - ae 24 85 95 be 9a 01 55-c9 df f2 d9 b9 30 f1 92 .$.....U.....0.. 0090 - 55 52 b0 41 d6 0e bf 43-b3 2b b4 99 a2 f6 ec 71 UR.A...C.+.....q 00a0 - a3 d8 83 17 e3 6b 92 0c-b7 56 f3 b4 d3 2a b8 b9 .....k...V...*.. 00b0 - d6 bc 23 97 0a 9a 0d 8c-a3 04 d6 fc d0 71 88 3a ..#..........q.: 00c0 - 04 99 a4 4a 7d ae ee 49-38 76 b8 9b 39 3a 09 0d ...J}..I8v..9:.. Start Time: 1777674215 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 979B416BF26E2733894D0D8C5877C25B17E79F729F83FD29C3F5702997B0984E Session-ID-ctx: Resumption PSK: 0ED5EAB6B30E507211340D0FAD7057A3E80F7AFF1D46F9EF36DF54DCFF1DD3F589AF56FD870B54392E813880F81FFC46 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - e9 30 0d 70 f7 06 cb 11-53 ca 6c 08 71 c6 a0 1b .0.p....S.l.q... 0010 - 7e 07 e8 fc 9b 21 3b a7-42 8e d1 7d 90 88 b7 fa ~....!;.B..}.... 0020 - 9c 18 d9 8e 62 e3 8c 31-0f 25 a1 b6 0c 4a 89 e4 ....b..1.%...J.. 0030 - 26 33 64 bf b5 6f d3 d4-e9 f6 39 e1 33 49 87 b4 &3d..o....9.3I.. 0040 - 29 2f 62 85 91 dd 45 de-a6 6d e0 60 31 ae 29 ea )/b...E..m.`1.). 0050 - cc 8a 84 57 2c 86 99 c9-ca 29 13 63 92 2e 56 e5 ...W,....).c..V. 0060 - b7 d6 62 94 7d 1d c9 6a-9c fd 11 39 9d af 8a ed ..b.}..j...9.... 0070 - f1 bb 0c 70 d5 7d ae b2-67 15 d5 49 40 9b fa 2e ...p.}..g..I@... 0080 - 02 9e 9e 4c 26 eb 3a 49-b0 a5 e6 41 45 31 b1 b6 ...L&.:I...AE1.. 0090 - c2 a6 8f 16 81 36 a3 c6-c0 93 fd 11 ac 08 3d 04 .....6........=. 00a0 - 3f 49 aa ee 0a 0a 2b 03-73 8f 42 c7 58 94 ad a8 ?I....+.s.B.X... 00b0 - d3 de 8b 67 15 88 5a 2f-46 93 f4 fc db e1 cd 12 ...g..Z/F....... 00c0 - 1d eb 4c ab ab 25 96 99-77 3c 93 5d 11 75 ed 74 ..L..%..w<.].u.t Start Time: 1777674215 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 600C7695FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIKavnYG4y/BHBdbyJonHEBMajsQGZ+XWOGdxzeuPN7+Q BDAO1eq2sw5QchE0DQ+tcFej6A96/x1G+e8231Tc/x3T9YmvVv2HC1Q5LoE4gPgf /EahBgIEafUn56IEAgIcIKQGBAQBAAAArgcCBQCLwtCAswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (RSA-PSS) ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%10 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 2048 (bit); sigalg: RSASSA-PSS v:NotBefore: May 1 22:23:35 2026 GMT; NotAfter: May 31 22:23:35 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIEIzCCAtugAwIBAgIUBGlPUKduXqkwDrPaZ+8nG66DkkcwPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwNTAxMjIyMzM1WhcNMjYwNTMxMjIyMzM1WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCASAwCwYJKoZIhvcNAQEKA4IBDwAwggEKAoIBAQCposo9ID1LbOsqqcAF 2RHxIocNDbi4IlZwT7W5+mtPmufIhw3T/1OK0lTaZnCwuaLRKv+Mw1CkUXgQctsT m8UJLxEJW4A2gruf3AK9TxTEhOtKllZRs/uQCZUfKcTPzL+jxnzmAWDIzR+X7/Eb UeG3TJITJxGaAgCK753yA8lBkhUFqonUIsW2agKUMcDunInMfCkBjFiSUFmgG49b RZGGSaAWSL0/I5vp4ZAt7vBL7gGkK2i2drXZl0TgowlYsHuMUFoTeygT3XFQWHh9 EX7sBBZ72cIY36kGbE8TzFI182ajTJHVTPLk9PIdYn90sHuEaCuMkY3lkupVkSiD SIL1AgMBAAGjaTBnMB0GA1UdDgQWBBQZfFHczu9i7JqRDtTNe3iXm7VNPDAfBgNV HSMEGDAWgBQZfFHczu9i7JqRDtTNe3iXm7VNPDAPBgNVHRMBAf8EBTADAQH/MAkG A1UdEQQCMAAwCQYDVR0SBAIwADA9BgkqhkiG9w0BAQowMKANMAsGCWCGSAFlAwQC AaEaMBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgGiAwIBIAOCAQEACldhZtOnl36j wHreFk+dWoD3QHFBTtE+yKmK8TQg0FuFZzVmKWt2+xFv3iCZUrWtpK3xbrMjcS7P c1NiUybocV5yWEKQIxQOjv6vwDaj0DHhfxfflrRqATfVMesQvXdygd28ilabaXH5 WqeJbD2havzupOHiULF+CZPtf+5zh2rKRM8Ka6mQ6unyUVg+6wR+XaYge/Qr5SvP Utt3nB7j/sthjJk1KcsA5XYNiyTVRZR1BbMiaP+dQcgiJBorsGeVbpsLEm7HwwuV XOtrnQpaw/Eu74cl7ArA88zJtKqeJHcYehXIX/MlvSSi7TXTWLzT2i4N+q8rWSFN SmCKNudybg== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1619 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 45DC6299175384F2F85D884F2BD805E3C4C03AEA408094D2416F8CF7A51E640D Session-ID-ctx: Resumption PSK: 507922F6351ED1F7E3F292DA0D3F37D508902DCAD773682010E0BB4A60FD20D848F37C91FADE476D4FF7B75E83710EC6 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 9d f3 21 81 59 24 ca f3-42 a3 5e 60 9f 3c db 61 ..!.Y$..B.^`.<.a 0010 - 01 04 87 30 4a f5 ee 9e-11 8e 5e 5c e4 02 93 7c ...0J.....^\...| 0020 - 9d f7 93 f5 cb c8 58 d4-ac bf 0e bd f5 08 29 a9 ......X.......). 0030 - ea eb 8d 3b fa ed 9f 3d-ac ee 37 2a 15 0a ea 05 ...;...=..7*.... 0040 - 50 97 1d a4 77 a7 72 ca-72 b5 8d 24 e3 3c c9 df P...w.r.r..$.<.. 0050 - d7 09 a5 73 fe 3a 7a 05-8f 8d cf d6 14 00 5d 2d ...s.:z.......]- 0060 - 83 b1 b8 fa f0 db b2 98-68 9a 19 2f 7b 1b f2 7f ........h../{... 0070 - b3 37 55 83 d7 cb 25 1d-ec a4 51 d1 72 28 9f 5e .7U...%...Q.r(.^ 0080 - cc 92 95 ae 5d 48 88 fe-f1 17 f1 f1 4c 95 66 e8 ....]H......L.f. 0090 - ac 1d 91 53 73 ae 24 4f-8f ac f5 ca fa c0 e6 28 ...Ss.$O.......( 00a0 - f8 d7 8e 67 a4 92 03 1e-e1 7d 4d 96 e1 c7 24 1e ...g.....}M...$. 00b0 - 27 13 dc b6 5f 80 dc 6a-e1 33 b7 f1 bf ba 59 85 '..._..j.3....Y. 00c0 - ce 15 6b 63 14 58 cc 5d-5d 62 3f 6d 57 44 65 ab ..kc.X.]]b?mWDe. Start Time: 1777674216 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 0302643E3D0F99D78FC1E1435DD5CEFAB72F79C5C55AB99328F4F2F8EAF8DB9D Session-ID-ctx: Resumption PSK: 9F82F2B75422E65C4E190A7F8B2FCAA86B0BE9CFBD92757A35F474CBDFFE337050F672F8C7D27531FBED2B390298D9FA PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 9d f3 21 81 59 24 ca f3-42 a3 5e 60 9f 3c db 61 ..!.Y$..B.^`.<.a 0010 - 01 a0 d0 6f 39 1d ea e3-6c 79 09 a0 cf 82 64 cc ...o9...ly....d. 0020 - 43 ef 1d 8f a6 fa 75 58-46 6b 20 87 0b 4c 55 d1 C.....uXFk ..LU. 0030 - 5f 84 b1 6d 9e 22 cf 37-7c 96 d6 57 9f 13 ad a3 _..m.".7|..W.... 0040 - f1 a0 b5 25 53 5d 5f 76-88 85 f3 c4 72 fe 2e 99 ...%S]_v....r... 0050 - 41 98 2c cb 8f ce 51 1f-44 0b a1 9d fc a7 05 7c A.,...Q.D......| 0060 - ff 29 57 27 22 6e 29 1a-6d 6b 25 9a 88 a6 03 13 .)W'"n).mk%..... 0070 - 92 e1 08 22 05 07 89 6a-1e ba a9 22 1d c0 91 75 ..."...j..."...u 0080 - 2e de c4 54 8f 6c 2c 74-cd 9a 18 26 7e 99 2f 91 ...T.l,t...&~./. 0090 - 9d df e7 8f 62 73 c0 fe-07 33 19 d2 16 8a d0 4f ....bs...3.....O 00a0 - 45 2f d1 b7 0f c5 e0 4b-c1 60 ac 55 8e 02 6e 5c E/.....K.`.U..n\ 00b0 - 43 f1 c8 f7 dc ec 2c 10-55 39 44 89 ed 70 a2 e5 C.....,.U9D..p.. 00c0 - 51 4b 9f 18 fe c1 86 65-4f 83 40 7f 1b 2e d8 02 QK.....eO.@..... Start Time: 1777674216 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 60FC429EFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-default.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIAu6tKOL+hTZBn1t8EJCunwh3nR3E2arZaiEzNycq1wM BDCfgvK3VCLmXE4ZCn+LL8qoawvpz72SdXo19HTL3/4zcFD2cvjH0nUx++0rOQKY 2fqhBgIEafUn6KIEAgIcIKQGBAQBAAAArgYCBF1hEYizAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with RSA-PSS and SHA256 ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 3092 (bit); sigalg: RSASSA-PSS v:NotBefore: May 1 22:23:36 2026 GMT; NotAfter: May 31 22:23:36 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIFKDCCA12gAwIBAgIUCmPXb744hmVsOl73dIEoBFdsQlEwPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwNTAxMjIyMzM2WhcNMjYwNTMxMjIyMzM2WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgwyImzsg5TY8B2uMNUDo Y1c1GX4uczhZXArjel5JZv9INNBzmmVBzF3w2B/ANwfn1su1h1uicOEGgIaYMTAD 9sXprg5F3O6pa+I0ijhe2XnCQlLU/8PRFFhhPKEKl4OsTWZtfCut9YSWbtxP7uQS eduSXTAC0UuycMaE44HnJTCUp5hF/zrRDF5X7pju7VXYESCDibWwDjBWSxj1xIfy Uy8n18Vek4KACgVtc0HkHHAGdU6QliLBc6gx6C6YNcHD3JBqnh8RJQDLNtXDHeo1 2cpNO9KYUmHh7k8nAFVukptPiJ6eQklIgdLD67suRic+hHYeYV2jJorvX6tZUpfH +kqJaD0a06TvbdMdhGYnjjAmzzbCZLxJdwI8RL/5+zYpUlgfjnpsz2wuUosImZMx NwcX3n4n94t7Eap57D10mFTdW8ANQZzZCYB7khjIg3Sn1jcI6l+wcHZC+DRdbx4z jjqwYgGeD+wkQD+TKyJLdO+pCNSFhv2XruMMwOaruR6S+s2f8QIDAQABo2kwZzAd BgNVHQ4EFgQU0Wfkvh5R3V3Khz+qD9nUX6g2BL8wHwYDVR0jBBgwFoAU0Wfkvh5R 3V3Khz+qD9nUX6g2BL8wDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B AQgwCwYJYIZIAWUDBAIBogMCASADggGEAASZXP0CU8Pc5IQwUcl19TMEibgQi56n 6fTj5+CcMFsPwMP32WJ9dJRZSXC1jmRiGD6BgIaJDfySPd9aMsovoZj5S6gJHI8v r52Ish1y9Ii6I3MWhcCGY2mFv291+sEZwvS1k/J/fg4thOXKsEVisSLf+eh7yemv JO2W2Oz54Ac/ejsS57t21ELNgPI5kbMbCMv26TgIKds/3Xh85TTZ1H6WSA1rkF0j NMP034WThp8jM/b2EYRxZAOidiVnwoR3FsBTOxuL/K3b5W5kL3X4i0L3BMCNyFk2 8hCx5n467F5SGs+HOJBacpvoNnRR9sBj8h0FWXjtQmWJOVJYlD1oTIsSH6KmJCUQ bTXEU81H3orXokvp0KETGx6vfHnG2PCHIScrDVXWYo++srBxxkbufKHFCByML64f X0uSVUA4BNWy7ua6nmmaStFBVBnaXPQw3PY0D23ziw77REqMwPUaNP2slKydlXcs O+EoWfc3adu419lVZjQG/Y94U5SU20qR/gr4xg== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 2011 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 3092 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: C54AC7870AC8A6246F29D919377EE16D03B0FC5C040E800B3D068DB0173590BE Session-ID-ctx: Resumption PSK: D0D8638014653B978AA5F16A1D578D738C4DBB8B6B67302FD9F3FB41A80AF2A2AB7E4996F7FFAA55CD6204ADFB00A644 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 5e d9 c7 4f 0a 6b 5e 38-4f 72 4f 34 c0 bf 1e 1b ^..O.k^8OrO4.... 0010 - 56 26 a5 2e 7f 13 a5 5e-60 e5 95 55 7e 75 6a 3e V&.....^`..U~uj> 0020 - 66 f0 c3 0d 7b b9 d0 26-07 7b 5b 96 ed 3a 6c f4 f...{..&.{[..:l. 0030 - 69 2a 4e 12 25 71 cd f0-74 fd f9 04 20 1d f9 4e i*N.%q..t... ..N 0040 - 4c fc 58 40 7b b0 8e 61-df 56 83 30 3b 7a 96 16 L.X@{..a.V.0;z.. 0050 - 3b 0d 1f 3d 79 a6 2a b1-d8 69 3d 0a e3 f2 81 12 ;..=y.*..i=..... 0060 - 59 11 1b 06 c4 22 78 c2-f0 c5 34 5c cb 50 69 06 Y...."x...4\.Pi. 0070 - a2 87 6f 11 2c f8 f6 a8-e4 dd 5a c4 83 9a ac e2 ..o.,.....Z..... 0080 - 41 c8 d6 f3 f2 30 11 7b-e4 fa 5c 0d cf 27 7d b3 A....0.{..\..'}. 0090 - 01 6f 33 a5 30 8f 77 6d-de f7 4b f0 c1 fe 00 26 .o3.0.wm..K....& 00a0 - e5 3a e2 a0 f2 21 e5 05-51 32 40 59 bd 9a 74 7c .:...!..Q2@Y..t| 00b0 - e0 77 65 a5 18 20 d7 94-f4 cc cb a6 61 8c bd 27 .we.. ......a..' 00c0 - 33 2f 14 b3 12 bb 70 b5-57 d0 92 a6 51 74 c5 91 3/....p.W...Qt.. Start Time: 1777674216 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: D8CCD76A01E6FC2FD6BB86A465AAEC9E106C506CA180BC8FD225AFE31D008E2D Session-ID-ctx: Resumption PSK: 32A2F817E5F352A4653E419CD7E063B4D3868F87A802E02D36DBBC07AF2E663253CA3515ADAF51827A56D7478B57AC72 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 5e d9 c7 4f 0a 6b 5e 38-4f 72 4f 34 c0 bf 1e 1b ^..O.k^8OrO4.... 0010 - 81 3e 98 d9 ad fb 51 35-ec 87 91 31 c5 25 17 ef .>....Q5...1.%.. 0020 - 9d 32 6d 9b 70 bc 7a 7e-f7 b1 59 ba 23 23 82 b1 .2m.p.z~..Y.##.. 0030 - bb 0b e0 cc 25 d4 28 64-c6 1f 6f 72 d6 e1 1e 0b ....%.(d..or.... 0040 - 41 00 b6 cd 75 19 94 08-12 20 a9 b9 43 b6 34 fe A...u.... ..C.4. 0050 - d2 1d 59 3d 84 19 fa 19-06 16 09 19 cf fd fe db ..Y=............ 0060 - c4 93 00 c5 44 a5 0d be-92 20 fc 47 6a 8a d0 4f ....D.... .Gj..O 0070 - 9f fd 6a d1 35 eb 5c c6-ef 4a 4b b0 e8 8e 2d bb ..j.5.\..JK...-. 0080 - d0 f3 1d 98 e9 2b 01 79-9a 74 df 1d 53 07 9e e0 .....+.y.t..S... 0090 - 46 3f 49 3c e7 6c 1f d8-7a 65 5a f7 14 9a 1c 82 F?I<.l..zeZ..... 00a0 - 7d 2a 68 35 6e 63 35 2c-9b f6 08 5e 9b 85 56 97 }*h5nc5,...^..V. 00b0 - 00 d3 ad 49 6f ac 3b 68-5a f6 07 7b 59 83 99 dd ...Io.;hZ..{Y... 00c0 - 7f fb e7 74 e0 7c 6d f6-15 ab 29 cf f1 e4 9b 2d ...t.|m...)....- Start Time: 1777674216 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 606C018FFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-sha256.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIIVX0pFsgXqEPMDoAmZVI8e1bPVuNCPIp4EZOcJ6crfF BDAyovgX5fNSpGU+QZzX4GO004aPh6gC4C0227wHry5mMlPKNRWtr1GCelbXR4tX rHKhBgIEafUn6KIEAgIcIKQGBAQBAAAArgcCBQDU0pdKswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (ECDSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQb9d4XqkQH5hsY8OB57CNMFFY9aYiJyv4VRU6ALIB/ll6+ LpZLlGGqGN2JF1L/wvp04w+6TThgzGXp3bda+OS0o4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFBexch4zaIUFevH4bKNGlYx8HJXRMB8GA1UdIwQYMBaAFNeZ AbqzR4s3cLEfuFwRL2lUybODMA0GCSqGSIb3DQEBCwUAA4IBAQArNItG2mc5Fybk FfViAg642iPFYFeh1dXc7xqHzL0yAqXIfjXQX+tqJWAmLkrKGpIeW/7mgZRvd9Dk D8EbRFXwhCgB5R6sa+nu8rm7I6lDTrypY8PGIYDQiD99hs1CW/jVhOLCN4Eik84o OY+V/QsOKBuzk2ewspFxD1JFkdOMExgHfTrdUHAVE2LGkzZRgPIiJTWqBTVzXs54 SK7gF/N4GMVqWR85Q++NYZEIRcST4KnR8z9rb7Bg/yU4m3mW8m8zvocoXFAUNwQO k+AssMmOfD5vBT9ZLP8Vn2SswnVOaT7V9/AspfBipbViwLT9la7KCGUurvn/6TEN XBhZBJed -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1001 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: EB94265BD78DD45655588441FF33FFE7D41ACAC159582DDDCC9AAEA1DD63E9E0 Session-ID-ctx: Resumption PSK: 77DD9278E2B59F59E71C565F9A4DA78BD1F88AA22D3E21B5257684046818403A19DCDEC45CF5BB3F42DC1E8EA2842B32 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 74 c6 b8 07 ab 19 c5 0b-1b 85 6d 5a e3 57 67 e9 t.........mZ.Wg. 0010 - 46 d9 87 32 7c 73 ef 0b-a5 1b 08 02 f7 db a7 54 F..2|s.........T 0020 - ec 80 4d a5 08 a9 33 fb-92 d5 88 a9 3f 6a 17 0a ..M...3.....?j.. 0030 - 8c 77 b1 e5 7f f8 25 32-ac ff 54 f1 e8 d0 de b0 .w....%2..T..... 0040 - a6 c1 32 ed 00 2f a1 fd-e6 ff 58 c6 d4 f4 96 26 ..2../....X....& 0050 - c2 7c b1 5e a4 27 52 96-a5 26 22 b0 e5 40 68 b3 .|.^.'R..&"..@h. 0060 - bb 83 5d 5d af b0 b5 f6-c7 cc 84 3f 68 e0 d7 a5 ..]].......?h... 0070 - d7 a8 4f 97 60 50 d0 64-25 8a 4c 76 ed b2 1a 6b ..O.`P.d%.Lv...k 0080 - d4 80 0d bb be 9f f2 32-b3 44 b1 74 c5 62 9b fe .......2.D.t.b.. 0090 - c3 18 c7 6f bd d8 e5 09-70 17 0e 1e 08 0a 79 65 ...o....p.....ye 00a0 - c1 85 95 b9 31 af 88 34-11 ca 35 cc c0 ad 5e 82 ....1..4..5...^. 00b0 - 1c 36 0c 51 32 ae 77 96-75 38 8f f4 d6 00 27 70 .6.Q2.w.u8....'p 00c0 - 68 f8 e1 da 42 17 61 aa-d1 7e 4f 52 25 84 fc 67 h...B.a..~OR%..g Start Time: 1777674216 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 649E9D00A4632588CF9C2888F4650E982D6C550A370720004FF9820720615460 Session-ID-ctx: Resumption PSK: 7D27429D27E9A90BFDB14342E1A9F7F82E6FFB06CCC5B3A6BDA3E0DB716568F2DB78FF71C07301A593C8EAEDE88651E9 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 74 c6 b8 07 ab 19 c5 0b-1b 85 6d 5a e3 57 67 e9 t.........mZ.Wg. 0010 - cc 2b 02 0e 13 a1 b3 64-94 3c 27 ef 5e 25 18 e0 .+.....d.<'.^%.. 0020 - a8 2c 30 d7 19 6c c3 78-0d 3d 06 05 64 1d 82 88 .,0..l.x.=..d... 0030 - 36 6d e7 7c 5d f3 a1 7e-d8 51 58 9f 85 fa 3b 63 6m.|]..~.QX...;c 0040 - 12 bf 54 b5 0b 3f ad c8-1c 96 d1 93 4f e7 ad 59 ..T..?......O..Y 0050 - 11 b6 28 1a 5b 70 d0 fb-05 5f 2c 53 6f 11 c9 8f ..(.[p..._,So... 0060 - f0 0e d5 45 19 94 19 0d-41 9f 93 55 14 e9 47 63 ...E....A..U..Gc 0070 - 80 13 18 e9 d2 e5 29 01-1d d2 5b bd 31 4e 54 2f ......)...[.1NT/ 0080 - 11 9c af ac 12 d6 ad bc-1f 01 0c 16 0e c6 d4 b2 ................ 0090 - fd a1 2e e0 52 ac d8 c2-32 b7 18 d7 70 1f a2 b4 ....R...2...p... 00a0 - 14 4b ec b2 23 21 ab ec-b2 b8 bb 27 00 f8 41 c1 .K..#!.....'..A. 00b0 - 96 14 03 bb 3d 64 97 4c-af 22 1a f1 35 60 31 ba ....=d.L."..5`1. 00c0 - f1 d1 98 f1 2c 57 1d 99-67 6f 36 82 60 f7 22 85 ....,W..go6.`.". Start Time: 1777674216 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 602C259FFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIP9cmD/KYaOUCkeDXfSC91MAZQSMCg5/r0l+CQv/aTwm BDB9J0KdJ+mpC/2xQ0Lhqff4Lm/7BszFs6a9o+DbcWVo8tt4/3HAcwGlk8jq7eiG UemhBgIEafUn6KIEAgIcIKQGBAQBAAAArgYCBHjANYSzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed25519) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED25519 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED25519 Cert i:CN=Issuer a:PKEY: ED25519, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICSDCCATCgAwIBAgIBBjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjA0MRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxGDAWBgNVBAMTD015IEVEMjU1MTkgQ2VydDAqMAUGAytl cAMhADX53cRIN4zWA0APehjmTrhW9+90TKfGptWGmBVzm9oIo4GBMH8wDAYDVR0T AQH/BAIwADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8B Af8EBAMCB4AwHQYDVR0OBBYEFBRel62qkMoreyIbXmWDlhLiwqE8MB8GA1UdIwQY MBaAFNeZAbqzR4s3cLEfuFwRL2lUybODMA0GCSqGSIb3DQEBCwUAA4IBAQBAXyoS jJtXwAW2TVY6kopOEbTtqoRcp4xRif0u6DwAS38OstGN4pUDUiIbjVS037Yk2KYC 3785nkpmI7ctPfS/NvVu9myfHRGPcBS2Y7VQWNqBi3raUj0X9/De0rOrCoX6Wo7c Zpeb7KXouLcwKszkICMww+y2NflBfrhhOtsqZWb1zmcouZx+3BWUNPjdmgdO1Fba 3TLu9w6jjjuEPO/HQneZrKXDN/pqzWiUtzsDsuG4V55KMRmxbx2lnWd0o8XG1bVp o6QgoY3pX8sCkWfLZR5aMBVhayxG6Te0vcVHSi6mnuoINqTTDayBwoLTje3fVn6g Y6LvTu9PBy0tYcr3 -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED25519 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: ed25519 Server Temp Key: X25519, 253 bits --- SSL handshake has read 952 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 07A2DA9C79A443BD82D2BFC1CF875466407E87F712E7ACE77E30E0876060A53D Session-ID-ctx: Resumption PSK: F0AF5C0B1526059F22C3198CEB6C40E56EAD78A79C064F2D34934E0E8A5794C75575B149BBAEB6CD86280E48326140BC PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 07 67 fe 1b 70 2e 88 78-c3 43 aa 1f a0 ff 9d bb .g..p..x.C...... 0010 - f5 fe 9c 36 f9 95 ce 45-35 c6 7b 18 06 d3 7d fd ...6...E5.{...}. 0020 - 59 0f 00 d6 75 89 5b 5f-29 af 1b 88 41 2c 5b e9 Y...u.[_)...A,[. 0030 - b6 0b 3c 5c 89 f3 55 3f-68 05 e4 e5 6f 51 e7 32 ..<\..U?h...oQ.2 0040 - 98 e9 e6 70 9c 54 9e c0-a4 13 52 3e b5 f7 53 a6 ...p.T....R>..S. 0050 - e9 a1 7b 90 ef 96 9e 70-0a d2 38 61 b9 22 cc 38 ..{....p..8a.".8 0060 - 34 39 b7 41 ed c5 29 a1-14 e0 66 34 49 51 45 0b 49.A..)...f4IQE. 0070 - 18 bc f0 bf 04 73 f3 e9-bf dc 4f ce 8e e1 7e f5 .....s....O...~. 0080 - 11 96 e7 27 ac d9 02 25-30 21 d2 c1 46 d0 0f fe ...'...%0!..F... 0090 - 2b 9d cb 6f 0e 21 d6 34-03 50 e9 24 e2 36 a8 8a +..o.!.4.P.$.6.. 00a0 - 5c 81 98 76 fa 98 af 35-49 ca b3 74 48 e9 22 5c \..v...5I..tH."\ 00b0 - ef 72 9f 4e 29 ee dc e9-b6 ef 37 a1 a5 70 94 e0 .r.N).....7..p.. 00c0 - 77 09 ee 30 c4 be 5c b3-4a f9 62 ad 41 02 cc 42 w..0..\.J.b.A..B Start Time: 1777674216 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 17DDC48DD78EA022DA397287143873EEE8DF48828B0494C21D5CDBB6B5B6798D Session-ID-ctx: Resumption PSK: 293B861FB6FEBD9249286BE2F39B81D0DC469A9DF2733220F3A084915A7C6009E3EDD2A59D2C70A8A3EE907790EAC568 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 07 67 fe 1b 70 2e 88 78-c3 43 aa 1f a0 ff 9d bb .g..p..x.C...... 0010 - 2d 1a fb 54 97 4e 20 c6-31 dc ca 1a 05 24 7f 60 -..T.N .1....$.` 0020 - 38 67 2c 8b 6d 74 be 1f-28 4a 69 41 be e0 14 4d 8g,.mt..(JiA...M 0030 - 76 7d ad 28 03 6c b2 b8-40 2a af 09 4e 5d b2 2c v}.(.l..@*..N]., 0040 - ec f7 03 15 54 91 79 00-50 a7 f8 53 95 a3 9c 6e ....T.y.P..S...n 0050 - 8d 09 5c f4 9e 5c 98 a5-37 3b 2b 2d 2f 37 29 01 ..\..\..7;+-/7). 0060 - ad a7 0c 2b 51 07 20 60-44 60 f5 4a 9b 3a bb e0 ...+Q. `D`.J.:.. 0070 - 41 d1 07 d6 2d 09 82 68-f5 c5 2f 74 92 38 0c e9 A...-..h../t.8.. 0080 - e3 17 e3 f4 bc b9 f5 2c-34 54 bd f7 49 a1 a9 3b .......,4T..I..; 0090 - 7e b9 44 b9 64 9b 14 2b-7e 13 5d c9 28 66 3b 9b ~.D.d..+~.].(f;. 00a0 - c0 a2 b2 58 e0 b1 ad 85-f8 04 be e0 0b 54 2f 75 ...X.........T/u 00b0 - 8c 00 8e 87 15 76 5c 72-fb 4f 7b 5f bd af e8 c1 .....v\r.O{_.... 00c0 - 79 e4 9b 71 75 0b 4b 58-ac e1 b4 a3 6b 58 b7 ff y..qu.KX....kX.. Start Time: 1777674216 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 605C4695FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIMmvX6frej0EwCYxVab1bAWfvio2NHm4MIUyweFKG6Kj BDApO4Yftv69kkkoa+Lzm4HQ3EaanfJzMiDzoISRWnxgCePt0qWdLHCoo+6Qd5Dq xWihBgIEafUn6KIEAgIcIKQGBAQBAAAArgYCBDOa9MSzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed448) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED448 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED448 Cert i:CN=Issuer a:PKEY: ED448, 456 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICXzCCAUegAwIBAgIBBzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAyMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFjAUBgNVBAMTDU15IEVENDQ4IENlcnQwQzAFBgMrZXED OgDzjc4Q7z09NlXQT7Br11yRnnhG6yE7k/eVOgFuBpK5zMRNJ1/IlW+HVeHa1fAv 1s6M0OGeLnx4VQCjgYEwfzAMBgNVHRMBAf8EAjAAMB8GA1UdEQQYMBaBFHRlc3Rj ZXJ0QGV4YW1wbGUub3JnMA4GA1UdDwEB/wQEAwIHgDAdBgNVHQ4EFgQU5CNeWfxV Vg14ZTjAONmflDsxb+owHwYDVR0jBBgwFoAU15kBurNHizdwsR+4XBEvaVTJs4Mw DQYJKoZIhvcNAQELBQADggEBAKOHFYhBEzAJdZJzbbCJ5MSjkHXmCOLI40np1Nrc wSevhZsq3JmmLLRcCe33Yw9z12QnkFtJWhPxIAxZkYUlX6R7QY8gSO0WblJ4mfWz A2jziQl7n9JfwmJtqImKtAkhm4VwTs3V6vB3hK+a8kj6CTT3ZsHxAFU3tFSi1BuB wu/FPLNRl1wYxTguofnC3Q+E7knAR7l1/DzCv8tX40T4R526wc+yFd3s2+YEVUMj 3e9MFBoYkFiB7/pmab0w6I3NvMP9CKaJkcOlbOQ3XiN9KbFjKSSnUaGfVNo4CTJr uTA6g9jDk90tpqVsGqsbu8vVlBukrcY5ERVLbkH6PUq/B4k= -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED448 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: ed448 Server Temp Key: X25519, 253 bits --- SSL handshake has read 1025 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 456 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: D89FC4AB82E216E3D49D0CA415DB497C7ADDE633A3F1D8C86031F3A2E0721394 Session-ID-ctx: Resumption PSK: 458802C2B555DB9FDC21FA05000DC1EE4ABA4B55E9CC530610523DC122ACFBA2D2A71604471D5FBA28E4013985F3F401 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 22 0f d2 b3 35 77 d3 b0-04 cb fa d9 65 35 af da "...5w......e5.. 0010 - a0 a9 56 d3 a5 f3 f9 37-e0 3b ff 8f ce 9c a2 41 ..V....7.;.....A 0020 - 1a ad 26 2a d5 5a 70 50-9b eb 6e c9 1c 01 04 18 ..&*.ZpP..n..... 0030 - df 75 42 4c 0e a5 ed f1-a8 3c a1 a0 dc 59 86 cb .uBL.....<...Y.. 0040 - cc 03 71 4a 6e 67 63 d4-07 ce 8b e6 8a ee fa 4a ..qJngc........J 0050 - e9 6f 29 5a ec 8f 12 91-e5 d4 66 45 a4 5c 7f 62 .o)Z......fE.\.b 0060 - b3 e2 25 aa f6 6f e9 f7-b4 af ce a1 cc d5 46 90 ..%..o........F. 0070 - 6d aa 56 35 16 7d db e3-26 1f d9 f6 c0 57 7b ad m.V5.}..&....W{. 0080 - 7c e4 62 c2 51 47 c2 ea-54 a5 2b 84 23 01 af 62 |.b.QG..T.+.#..b 0090 - 08 64 83 4d 91 5c 10 56-6d 12 cd 42 41 c7 cb 6d .d.M.\.Vm..BA..m 00a0 - 25 b5 05 b7 ba e0 68 fc-01 f6 d3 18 09 42 87 69 %.....h......B.i 00b0 - 93 38 b1 77 5b b1 0c 84-55 df 61 60 f0 0d cf 6a .8.w[...U.a`...j 00c0 - 67 5c 9c a9 ee 0f 80 6b-62 e0 47 05 f1 70 6f 7d g\.....kb.G..po} Start Time: 1777674217 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 32EC796A489413F8C7B34F15A430EF579CA5BDA5C749CFB195195720E7372446 Session-ID-ctx: Resumption PSK: B96B2CDC1439AD147564C5229A6FFC103D9CEDD62A1F6E1130BE83F01C6C26E9FAABD8D6764EF08E603CB2D441C9C7E5 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 22 0f d2 b3 35 77 d3 b0-04 cb fa d9 65 35 af da "...5w......e5.. 0010 - 26 f4 1b 96 9b 9a dd 5e-b4 cc 96 bf 5d ed 20 de &......^....]. . 0020 - fd 1c ef 5f e0 83 e2 db-b5 e0 03 56 f5 96 2f f3 ..._.......V../. 0030 - 2b da 35 64 a2 88 75 0b-5d 00 56 9f 19 03 f1 d3 +.5d..u.].V..... 0040 - ae ef 01 ff 5f 69 85 bc-5a 7c 13 43 09 03 f9 9a ...._i..Z|.C.... 0050 - bd c0 39 06 f0 1d 33 3a-02 7c 97 64 be d4 12 c8 ..9...3:.|.d.... 0060 - c5 eb 46 92 d1 ba 4a 8b-4d c8 c9 5d 69 ad e2 a0 ..F...J.M..]i... 0070 - ee c2 87 f8 06 6e cb f0-8d 4f bc 9d d5 c6 95 02 .....n...O...... 0080 - 12 ae e3 e8 ac eb a5 4d-8c b9 26 c8 1f a6 3d cb .......M..&...=. 0090 - 80 dd de 18 53 d6 ae 3e-39 50 08 b1 91 7a f4 b5 ....S..>9P...z.. 00a0 - 7c 13 10 39 a4 e6 5c 65-6a 7c 1d c6 4d 02 4d 90 |..9..\ej|..M.M. 00b0 - 5f 35 7d 70 1a 42 ad 33-63 2d d7 0b 05 7d e6 d9 _5}p.B.3c-...}.. 00c0 - e3 cc 71 85 47 c0 ea 7e-a6 69 34 7a 1e 78 bf 6a ..q.G..~.i4z.x.j Start Time: 1777674217 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 60ACD48CFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%09 -cert pkcs11:type=cert;object=ed2Cert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIHQgfVwgPGTNfzOvkX3hafK9TLQmKmze77/3sGpWb/cv BDC5ayzcFDmtFHVkxSKab/wQPZzt1iofbhEwvoPwHGwm6fqr2NZ2TvCOYDyy1EHJ x+WhBgIEafUn6aIEAgIcIKQGBAQBAAAArgYCBCUj/hqzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAM0jx4VLLOEZCd5aoN2nwJmjBZGp0uNtpePM qTHpYo4l3bB3Jbv7VuNckxj94ie8uO0sVcZhHK9KpCQ7nF2hlsVZV0dIMwesgx2s gNwpRGzT1pdEcziH4Cb3ONu380LiX7uTc9RRLQBx4FOIw81GtaRXQ2v0ohS8Q+4t PYCLir2ngrU2S1TRIbds//0TCDSXM4mVoRZyvoyC9fwCbPBNxYG0m5DgWo5UXRCO RWSPT97hkt2AE8pUfWa6P5RumrMcrPElEcHdNV/QntHTmFLHwYPUYE6/vHcDj/Tg RCL1XlETyvPljjJdMBuNUOUo3nX/vwfKYhQgyhzx3cceCO65wcUCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBRFEuPzXTGWF2/xcjmwvxKpSan70jAf BgNVHSMEGDAWgBTXmQG6s0eLN3CxH7hcES9pVMmzgzANBgkqhkiG9w0BAQsFAAOC AQEApjWhikqxn3cHsMfgY1ysRaUtnt6hYm5aAI/ZZ1zLETeMcsur0avorPqGGhZy txyN4K8dUlxJ35iB0V9lrCuouYB9C96NlXWIb6zxT/N+n9G0W1AIjjiHR/d11qK/ sO/CoqgziI6a53P5wYf5VuMREY5y9c8w2fJkx/egbzDg9KPnq5T+NCscd+y0y5Gk xj24c44KxiFrgsChyWPFwuJ26fkfYyw1VVln+pzN7UfS3WdL/icseS/4wPIMIoX5 iRSmIMBZMw43ttlbLDH4ZokY1KMSnPhRrX+41RlbQDKy1P+c0jXL7FCevas22UnR QxBSlcYrYNUwUrsHxfigKQuRIg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1476 bytes and written 290 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 3B43B91903229D627240AC253C89354F03B4CCA9A0FB10C57DAA8E3F7D115212 Session-ID-ctx: Master-Key: 1840522499FEB805C4C7D0F273B460072AC930CF43C44AD9EEFC0F4CE9DC7CAC10BB0FFC76A4E5C9E6A7B3BE48A9E91D PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - c5 38 f2 1b 6d ad 65 ba-04 0b b7 8c fa c5 d5 be .8..m.e......... 0010 - 5b b2 92 7a 28 09 c7 c0-0e 05 69 f0 bf 09 f1 38 [..z(.....i....8 0020 - a0 eb 57 a8 e6 37 68 31-12 9d d3 57 f2 2a 22 42 ..W..7h1...W.*"B 0030 - 89 42 f0 54 88 fb ba 33-b5 a9 81 d4 19 f1 f9 d9 .B.T...3........ 0040 - 29 2b 99 2b 82 39 a7 45-f5 65 d9 43 40 5e 18 f8 )+.+.9.E.e.C@^.. 0050 - c7 a0 c9 d5 1e ac 16 d1-6e 41 53 93 08 4e 08 8b ........nAS..N.. 0060 - 8c 95 f1 de 47 f3 28 28-b4 0e 0c a8 f5 d4 65 38 ....G.((......e8 0070 - 2f 64 a7 d2 b2 d5 06 f5-a4 82 1b 5d 32 25 ce 77 /d.........]2%.w 0080 - ec 24 03 cb 63 0b e1 18-48 ad d3 5c fa 74 b2 3d .$..c...H..\.t.= 0090 - 5c 6e f4 c9 48 cd f2 38-ae 3c 47 c6 65 00 b2 2f \n..H..8.....U..$).... 0050 - 48 65 72 8a 09 c4 b0 df-fe 92 14 61 42 ac 40 9c Her........aB.@. 0060 - 19 39 5b ea 44 04 79 01-da 9c 51 36 78 c0 49 31 .9[.D.y...Q6x.I1 0070 - 64 99 60 52 58 9e 07 11-c2 6e b6 36 4c 80 b5 7a d.`RX....n.6L..z 0080 - 1b dd a6 d4 d8 91 a8 0a-ba 29 dc 5f 35 7b cb 24 .........)._5{.$ 0090 - cf b0 05 44 c9 a3 78 66-30 d2 85 fa da 62 33 91 ...D..xf0....b3. 00a0 - 9e 17 6b 14 1b 29 87 36-42 5a 49 de 3a fb 83 60 ..k..).6BZI.:..` 00b0 - f2 72 50 04 a8 77 d4 17-74 93 f4 1f 69 49 7d 2e .rP..w..t...iI}. 00c0 - 2e a3 15 bd e0 4e 4a 5a-0a 93 d8 55 2a 03 be 6c .....NJZ...U*..l Start Time: 1777674217 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 60DC7BB4FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIJEhRyuPhM8OebVjcuF9agneXPUYUfwRZ0O+c7PyhV/N BDAFuUtYlqWkkdTMyysz9dY1rWgTNqnD1Mwj3E4XpNoo61wWfvAepvptYsyRv9lx b4ehBgIEafUn6aIEAgIcIKQGBAQBAAAArgYCBBKLZWizAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 (ECDSA) spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQb9d4XqkQH5hsY8OB57CNMFFY9aYiJyv4VRU6ALIB/ll6+ LpZLlGGqGN2JF1L/wvp04w+6TThgzGXp3bda+OS0o4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFBexch4zaIUFevH4bKNGlYx8HJXRMB8GA1UdIwQYMBaAFNeZ AbqzR4s3cLEfuFwRL2lUybODMA0GCSqGSIb3DQEBCwUAA4IBAQArNItG2mc5Fybk FfViAg642iPFYFeh1dXc7xqHzL0yAqXIfjXQX+tqJWAmLkrKGpIeW/7mgZRvd9Dk D8EbRFXwhCgB5R6sa+nu8rm7I6lDTrypY8PGIYDQiD99hs1CW/jVhOLCN4Eik84o OY+V/QsOKBuzk2ewspFxD1JFkdOMExgHfTrdUHAVE2LGkzZRgPIiJTWqBTVzXs54 SK7gF/N4GMVqWR85Q++NYZEIRcST4KnR8z9rb7Bg/yU4m3mW8m8zvocoXFAUNwQO k+AssMmOfD5vBT9ZLP8Vn2SswnVOaT7V9/AspfBipbViwLT9la7KCGUurvn/6TEN XBhZBJed -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1087 bytes and written 290 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 Session-ID: 0D274BE10C9017D6DEBFCBE29FC37F17AD627B99F9BF2A1EB3DE89C74D3E11E1 Session-ID-ctx: Master-Key: 0C63E1C045A8AA15865B11EE0416723CA12843EB652C8536C9F334E903416BA8EAAD5F7D1DADEBB007F53191106144BD PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 76 de c8 dc 80 32 46 68-e1 14 3f 2f c8 bc f2 87 v....2Fh..?/.... 0010 - f2 67 c3 e0 58 9c 30 0c-c2 78 61 35 9b 95 cf e4 .g..X.0..xa5.... 0020 - 67 ea 0b 13 8f bf 1b b7-42 1b 00 22 df 70 b9 c2 g.......B..".p.. 0030 - 81 ac 2c c2 4b 2d 9c 4c-60 4a 95 ce d6 70 a8 90 ..,.K-.L`J...p.. 0040 - 4c 0c 28 ec 57 62 46 e4-09 0d 5f c3 76 a0 29 b6 L.(.WbF..._.v.). 0050 - aa c2 00 a7 37 0c e8 33-b9 c7 45 c5 5b 70 cf 59 ....7..3..E.[p.Y 0060 - 2f 4c 4c 67 ac c9 23 81-d4 dc 4b 47 2b 65 dc f8 /LLg..#...KG+e.. 0070 - cb f0 d4 70 5c ea 76 3b-1a 7e 2f d0 00 87 e7 8c ...p\.v;.~/..... 0080 - b1 d5 92 3a 83 15 f1 31-ca 82 fe c3 18 73 a7 4c ...:...1.....s.L 0090 - 9a 06 5c ec be e7 94 1b-d2 02 d1 b8 14 6b 4b a3 ..\..........kK. 00a0 - 36 4c 1a 8c 0b 16 9b ac-81 f6 06 7a a5 91 d0 b2 6L.........z.... Start Time: 1777674217 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 60DCEA89FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2 Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALALAQABDAMY+HARaiqFYZbEe4EFnI8oShD62UshTbJ8zTpA0Fr qOqtX30dreuwB/UxkRBhRL2hBgIEafUn6aIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 and ECDH spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQb9d4XqkQH5hsY8OB57CNMFFY9aYiJyv4VRU6ALIB/ll6+ LpZLlGGqGN2JF1L/wvp04w+6TThgzGXp3bda+OS0o4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFBexch4zaIUFevH4bKNGlYx8HJXRMB8GA1UdIwQYMBaAFNeZ AbqzR4s3cLEfuFwRL2lUybODMA0GCSqGSIb3DQEBCwUAA4IBAQArNItG2mc5Fybk FfViAg642iPFYFeh1dXc7xqHzL0yAqXIfjXQX+tqJWAmLkrKGpIeW/7mgZRvd9Dk D8EbRFXwhCgB5R6sa+nu8rm7I6lDTrypY8PGIYDQiD99hs1CW/jVhOLCN4Eik84o OY+V/QsOKBuzk2ewspFxD1JFkdOMExgHfTrdUHAVE2LGkzZRgPIiJTWqBTVzXs54 SK7gF/N4GMVqWR85Q++NYZEIRcST4KnR8z9rb7Bg/yU4m3mW8m8zvocoXFAUNwQO k+AssMmOfD5vBT9ZLP8Vn2SswnVOaT7V9/AspfBipbViwLT9la7KCGUurvn/6TEN XBhZBJed -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1119 bytes and written 263 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES128-GCM-SHA256 Session-ID: C31DF7F5EC27F51C187CAC0BC22EFC64CB175EFBA4603EED05D6738D5704933D Session-ID-ctx: Master-Key: 43C16DB551E9ACFE7E14839CA09E2271D9FDF6A49004F911C2882EF8E50570DDDE9DD4BE9D0EE977316D2F0C788ED072 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - a9 87 a6 b1 1f 36 9a 2a-c0 7a 9d 03 46 87 24 25 .....6.*.z..F.$% 0010 - ed 85 ac 45 68 46 a1 44-39 cd 98 db ec c4 93 b0 ...EhF.D9....... 0020 - 18 84 68 07 03 25 c3 84-8c 84 46 d3 af 36 07 2e ..h..%....F..6.. 0030 - 66 7a d3 f0 27 fa d1 f9-20 ec 28 7d 41 04 ac 13 fz..'... .(}A... 0040 - b7 9b c9 1c e9 18 f2 3b-59 82 03 7c ea b9 8c 0b .......;Y..|.... 0050 - 8e 99 2e ae 7f 56 9d dd-d0 b3 11 7f c5 c4 3d f9 .....V........=. 0060 - a9 63 de f2 e7 21 7c 55-17 6f 67 a8 05 2e 59 67 .c...!|U.og...Yg 0070 - a9 1e f8 ef ef e5 0d 4b-46 25 56 77 66 7a 6d 29 .......KF%Vwfzm) 0080 - a8 a3 28 f1 a5 ca f0 c4-a6 19 6f 8d ca 10 53 53 ..(.......o...SS 0090 - 26 b9 89 04 2b 7c f6 84-86 24 51 c1 f3 32 35 c5 &...+|...$Q..25. 00a0 - 32 08 4a 72 ff 77 ca 97-c1 fc 3c 0f e8 21 bb a3 2.Jr.w....<..!.. Start Time: 1777674218 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 601C548AFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAKwQABDBDwW21Uems/n4Ug5ygniJx2f32pJAE+RHCiC745QVw 3d6d1L6dDul3MW0vDHiO0HKhBgIEafUn6qIEAgIcIKQGBAQBAAAArQMCAQGzAwIB Fw== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES128-GCM-SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: secp256r1 Shared groups: secp256r1 CIPHER is ECDHE-ECDSA-AES128-GCM-SHA256 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.3 and specific suite spawn openssl s_client -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3 -ciphersuites TLS_AES_256_GCM_SHA384 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQb9d4XqkQH5hsY8OB57CNMFFY9aYiJyv4VRU6ALIB/ll6+ LpZLlGGqGN2JF1L/wvp04w+6TThgzGXp3bda+OS0o4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFBexch4zaIUFevH4bKNGlYx8HJXRMB8GA1UdIwQYMBaAFNeZ AbqzR4s3cLEfuFwRL2lUybODMA0GCSqGSIb3DQEBCwUAA4IBAQArNItG2mc5Fybk FfViAg642iPFYFeh1dXc7xqHzL0yAqXIfjXQX+tqJWAmLkrKGpIeW/7mgZRvd9Dk D8EbRFXwhCgB5R6sa+nu8rm7I6lDTrypY8PGIYDQiD99hs1CW/jVhOLCN4Eik84o OY+V/QsOKBuzk2ewspFxD1JFkdOMExgHfTrdUHAVE2LGkzZRgPIiJTWqBTVzXs54 SK7gF/N4GMVqWR85Q++NYZEIRcST4KnR8z9rb7Bg/yU4m3mW8m8zvocoXFAUNwQO k+AssMmOfD5vBT9ZLP8Vn2SswnVOaT7V9/AspfBipbViwLT9la7KCGUurvn/6TEN XBhZBJed -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1060 bytes and written 329 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 9AC286DB00ED4B152295B4F1B98C416A4E1A014E5C6B8388DB57B25A8F72CF4C Session-ID-ctx: Resumption PSK: A7EC79F4A01AB8AD0EEE23D7ED4F946A725634919E87F4960858C2E7C633C8242F1FA710810BBCD6320D630ECAC89D46 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 6e 2d fb 90 ea ee 20 d1-38 02 f0 ba 8b 55 2b 93 n-.... .8....U+. 0010 - 03 64 81 ea 78 79 e2 7d-37 62 c5 47 fb 1d 58 d4 .d..xy.}7b.G..X. 0020 - 37 cf e8 d7 a9 47 93 70-ed d2 aa de 09 d8 7b fe 7....G.p......{. 0030 - 30 0f c2 dc 0a 4e 85 d9-3e 1e b9 5e 3b 28 76 a9 0....N..>..^;(v. 0040 - b0 b1 3c 47 5e 3b 30 4f-2c 15 6d df 87 fb fc 8c ..7p.n0... 00c0 - cb 19 da bb d9 0b a4 fe-f9 cc a4 18 7e a9 4f 53 ............~.OS Start Time: 1777674218 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 23EAE7F351562C0D62538EEB54EC85C8C8A0E58E12AD3211F03DD3C5B05D64EE Session-ID-ctx: Resumption PSK: AA3ACDF2652853B242FF7288B09336697354AA4042C9F0D38357F7DEFCA24ED9EF49CF84AE5355C6E249F0C202DBF543 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 44 b2 69 8e 47 f8 12 9a-44 62 75 6d 9a 96 23 79 D.i.G...Dbum..#y 0010 - 29 dd df 48 69 7b 8f 6a-54 fa 40 eb e9 b0 78 27 )..Hi{.jT.@...x' 0020 - 3b 25 70 9b b3 73 aa 9f-26 47 59 cf 3d d3 a9 07 ;%p..s..&GY.=... 0030 - 99 17 cb a6 2e df b6 59-8d b9 4b 9e 06 86 d4 a6 .......Y..K..... 0040 - c1 bb c6 76 12 20 1a ad-5e 76 65 3d bd 8e bd af ...v. ..^ve=.... 0050 - ee 0a ae 2f cd 94 da 4f-3d dc f3 6d 34 8c c3 70 .../...O=..m4..p 0060 - 09 d4 a8 14 fa f5 55 a4-d7 8b 0b da 96 2e 1c 44 ......U........D 0070 - 43 c7 73 c0 16 1e f1 5e-a0 73 0d 7c a6 49 7d b2 C.s....^.s.|.I}. 0080 - 6a 86 0a 4a 29 8a 97 27-41 9c ed e8 91 01 6a 88 j..J)..'A.....j. 0090 - e3 f1 05 57 3b 71 6e a2-d9 02 71 6a 7e 7d 6c a4 ...W;qn...qj~}l. 00a0 - 50 5e e8 2f c4 4a cb d8-9b b3 d2 b7 8f f6 08 43 P^./.J.........C 00b0 - 52 ee 9c b1 50 f9 44 69-c7 4c 72 f4 17 6f bf 20 R...P.Di.Lr..o. 00c0 - ec 69 55 07 e2 ec fe c2-9d 00 28 66 b9 85 cf a9 .iU.......(f.... Start Time: 1777674218 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 603C6099FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIOy7Nb8KIH6xGcCsqXLSkIGjaqyfJfzUgCrtT/Xnbb4K BDCqOs3yZShTskL/coiwkzZpc1SqQELJ8NODV/fe/KJO2e9Jz4SuU1XG4knwwgLb 9UOhBgIEafUn6qIEAgIcIKQGBAQBAAAArgcCBQDhqQjQswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (RSA-PSS) ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%10 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 2048 (bit); sigalg: RSASSA-PSS v:NotBefore: May 1 22:23:38 2026 GMT; NotAfter: May 31 22:23:38 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIEIzCCAtugAwIBAgIUWft8YMDZ2QsGbaznsQpLw2+zAR8wPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwNTAxMjIyMzM4WhcNMjYwNTMxMjIyMzM4WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCASAwCwYJKoZIhvcNAQEKA4IBDwAwggEKAoIBAQCposo9ID1LbOsqqcAF 2RHxIocNDbi4IlZwT7W5+mtPmufIhw3T/1OK0lTaZnCwuaLRKv+Mw1CkUXgQctsT m8UJLxEJW4A2gruf3AK9TxTEhOtKllZRs/uQCZUfKcTPzL+jxnzmAWDIzR+X7/Eb UeG3TJITJxGaAgCK753yA8lBkhUFqonUIsW2agKUMcDunInMfCkBjFiSUFmgG49b RZGGSaAWSL0/I5vp4ZAt7vBL7gGkK2i2drXZl0TgowlYsHuMUFoTeygT3XFQWHh9 EX7sBBZ72cIY36kGbE8TzFI182ajTJHVTPLk9PIdYn90sHuEaCuMkY3lkupVkSiD SIL1AgMBAAGjaTBnMB0GA1UdDgQWBBQZfFHczu9i7JqRDtTNe3iXm7VNPDAfBgNV HSMEGDAWgBQZfFHczu9i7JqRDtTNe3iXm7VNPDAPBgNVHRMBAf8EBTADAQH/MAkG A1UdEQQCMAAwCQYDVR0SBAIwADA9BgkqhkiG9w0BAQowMKANMAsGCWCGSAFlAwQC AaEaMBgGCSqGSIb3DQEBCDALBglghkgBZQMEAgGiAwIBIAOCAQEAEkXs80rev2lw mB/xDLbWQv6J0wGjIappEfPqrjEHjWNBU/eyv6ChGgjgHk7HntexpkrmP5YZfscr 3BBZM36+kIGIT3/e15ZS3ZLmQg2Mh9T3k8QEGpVzdgVUJMvgLNVor3ci0370LwfN Cjn/T5UrPAu2OZEkZLph1njDUn9+TYtbzbs6ko+tOdZHb4Ns6/K+JvfGuDsp6hZd GRNMNUBiPPFaZVMc1LVLltYwgIKvO8wQpA3IYRGViCRTd2ijT82Q+3DfKvX9otRJ Z3Ty77iS1KnkwpBmPCQ8895n5ljeaMZHI/ZCGZyb+6cgTZ0R0Sti8eFTSSMofodo gZ4+WlKHWg== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1619 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 74BBEBA1309A5606AEEC3881EDC86ED1445C07C5133C33EDD1D4057E1D1E7F9F Session-ID-ctx: Resumption PSK: 3B6DE8B1E88FA84731919064BEC790DB69C06197E8E93E05248B6AF99B1E41277E87D630184F7341B0A99590F27B3D38 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 0b fe ea ae 94 12 bd 45-91 67 e5 b1 02 9d 25 59 .......E.g....%Y 0010 - 46 11 bc 6b 59 3e a3 29-ca f0 43 4c a9 11 ad d1 F..kY>.)..CL.... 0020 - 6a f5 34 d1 fa fc a0 82-99 e8 24 6e a2 d8 93 f3 j.4.......$n.... 0030 - 06 a5 7c f1 d4 d7 83 f7-14 15 43 2a a1 85 94 4e ..|.......C*...N 0040 - bb 8a a3 e1 23 af 61 12-ff 5c 89 b3 ea a0 cd 63 ....#.a..\.....c 0050 - 6b 11 69 83 2b 92 42 9e-26 3a 2f ee 20 8d 83 43 k.i.+.B.&:/. ..C 0060 - ad 1b d6 c2 7e 81 0a c7-67 ff 1c a7 c8 e8 89 37 ....~...g......7 0070 - 43 d3 36 e9 70 86 ec f2-46 b7 80 63 77 8f d5 a9 C.6.p...F..cw... 0080 - c9 46 00 c4 46 47 ac e1-ed a4 df ef 39 51 17 9e .F..FG......9Q.. 0090 - 10 2e c3 a6 13 90 47 71-33 7f fc f9 45 57 1f 64 ......Gq3...EW.d 00a0 - 4d a8 3a 7e 65 bb 21 a2-85 d6 e4 64 71 4b 9f 91 M.:~e.!....dqK.. 00b0 - c8 3a c4 8d 34 cf be 00-32 cb 86 b4 fb ff 88 30 .:..4...2......0 00c0 - 29 6a db 29 79 f6 a7 91-81 6c c6 a5 d9 58 8c da )j.)y....l...X.. Start Time: 1777674219 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 05410C278EE9A205DD832FDA4DA5A1512212B62233A50A3C5C8F69DDACB8DA84 Session-ID-ctx: Resumption PSK: 3D7DFAEE87ADA5EBEB6AD3B059AF8C30896B2934FB0862EAACF8C2BC337C6BFA297FA52942FFED2612254E6DFDE082EB PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 0b fe ea ae 94 12 bd 45-91 67 e5 b1 02 9d 25 59 .......E.g....%Y 0010 - 37 25 20 e2 d7 ef e6 2a-25 35 c0 5b 89 e1 2c e4 7% ....*%5.[..,. 0020 - 05 e1 bd 71 44 fe 75 b5-1e cd 2b 88 d0 39 14 25 ...qD.u...+..9.% 0030 - f8 59 06 17 6a 51 52 8e-8c e3 a3 a2 a1 31 e2 39 .Y..jQR......1.9 0040 - 11 be 94 4a 7c 72 e6 07-4a a0 a8 83 06 22 00 f3 ...J|r..J....".. 0050 - 2c 9b 9a d8 37 4f 58 a8-2b 2c d9 61 b3 7d a4 1a ,...7OX.+,.a.}.. 0060 - d5 73 ea c5 4d 63 b1 92-46 e3 09 7e 28 38 92 bc .s..Mc..F..~(8.. 0070 - cc 71 e3 4f d7 a7 bb 5a-a6 5f 8c d3 d3 c3 96 c2 .q.O...Z._...... 0080 - 81 54 28 fd d0 ab 91 f7-5b d7 9b 11 1d d1 ba 06 .T(.....[....... 0090 - 90 03 b2 77 69 62 0c 31-92 c2 c9 4c 6b 9f 38 ad ...wib.1...Lk.8. 00a0 - 12 53 21 af ba ce 56 90-18 65 55 42 80 eb 1e 46 .S!...V..eUB...F 00b0 - cc c3 4b c7 78 3a ab 08-2a ac d4 e2 59 b4 c3 f5 ..K.x:..*...Y... 00c0 - f2 86 94 5a e9 95 d9 bb-53 65 f6 8c 84 24 4b b5 ...Z....Se...$K. Start Time: 1777674219 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 601C8ABBFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%10 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-default.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGBAgEBAgIDBAQCEwIEILpk3A59MmynU7w554dLBwshHhcuAx8VEsJIoO4FkIg9 BDA9ffruh62l6+tq07BZr4wwiWspNPsIYuqs+MK8M3xr+il/pSlC/+0mEiVObf3g guuhBgIEafUn66IEAgIcIKQGBAQBAAAArgUCAxlE8rMDAgEd -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with RSA-PSS and SHA256 ## Generating a new selfsigned certificate for pkcs11:type=private;id=%00%11 openssl req -batch -noenc -x509 -new -key ${KEY} ${AARGS} -out ${CERT} spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify error:num=18:self-signed certificate verify return:1 depth=0 C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness verify return:1 --- Certificate chain 0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness a:PKEY: RSASSA-PSS, 3096 (bit); sigalg: RSASSA-PSS v:NotBefore: May 1 22:23:39 2026 GMT; NotAfter: May 31 22:23:39 2026 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIFKDCCA12gAwIBAgIUAlsz5dAyyV4iABp/e58wQ7yCehYwPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjYwNTAxMjIyMzM5WhcNMjYwNTMxMjIyMzM5WjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgwyImzsg5TY8B2uMNUDo Y1c1GX4uczhZXArjel5JZv9INNBzmmVBzF3w2B/ANwfn1su1h1uicOEGgIaYMTAD 9sXprg5F3O6pa+I0ijhe2XnCQlLU/8PRFFhhPKEKl4OsTWZtfCut9YSWbtxP7uQS eduSXTAC0UuycMaE44HnJTCUp5hF/zrRDF5X7pju7VXYESCDibWwDjBWSxj1xIfy Uy8n18Vek4KACgVtc0HkHHAGdU6QliLBc6gx6C6YNcHD3JBqnh8RJQDLNtXDHeo1 2cpNO9KYUmHh7k8nAFVukptPiJ6eQklIgdLD67suRic+hHYeYV2jJorvX6tZUpfH +kqJaD0a06TvbdMdhGYnjjAmzzbCZLxJdwI8RL/5+zYpUlgfjnpsz2wuUosImZMx NwcX3n4n94t7Eap57D10mFTdW8ANQZzZCYB7khjIg3Sn1jcI6l+wcHZC+DRdbx4z jjqwYgGeD+wkQD+TKyJLdO+pCNSFhv2XruMMwOaruR6S+s2f8QIDAQABo2kwZzAd BgNVHQ4EFgQU0Wfkvh5R3V3Khz+qD9nUX6g2BL8wHwYDVR0jBBgwFoAU0Wfkvh5R 3V3Khz+qD9nUX6g2BL8wDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B AQgwCwYJYIZIAWUDBAIBogMCASADggGEAAI1mOPn0JRDFGKU4Qw6q2d5fF8XKVlO xaaOLwbsSgA3o6F5vZsA7E4vOuBr9zEKmCp8FMNg9U4X/AjAsQ0wc1zUFjCNbYS6 qt1uCaeW2Y3boK5W17q0Eh6DuIhHIqaWX5lC2Wf4mjHjxfvbPGosp8HNl88Kllr1 oVO0Zz/cem+dfnjaen6LyndEPmCv5DjFM0IV6gmqsdpKVk9U6QpZJZGM5M9cDf7U GZxFHlZHUsywK3HP5B5sB3AAt0vRt5OQdbzrSrzXiEoxTENsW1/7calu7eyrpDxY ZRh7cGPsAic+wmfpwHy5hPws0dXy1ludtKcdTCW2yIy63oUhQwwGBp/eSPZtcrsW lqQsO9RrWhOkFyE7uFCfyJSCfJdmch2tkj8BjodPFVP29G3NzNlxQVYXV2ud1SuX Nx48kbeO8MQ2tc92WS0WdHPasZztMrNRk/Wm7RhUXBQPZXE11YeaL/l5HeVkQ0vO pwcbmQpq6gkliyHHlAzaElv8CdLQ5iiDAmnxyg== -----END CERTIFICATE----- subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 2011 bytes and written 391 bytes Verification error: self-signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 3096 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self-signed certificate) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: EAFE958DB60820B15A0948CE1F7DD29A614F912FCA13763F48F67D6B11E60684 Session-ID-ctx: Resumption PSK: FA54F1FF52D39B1769BAEBFDECFA54CE970219DB66C136AB06E5695858AB207442B6517C94B52257943C06513182F4AC PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 56 30 ac da 7b 27 83 bf-38 16 cb 21 4e 10 59 2f V0..{'..8..!N.Y/ 0010 - 95 3a 9f 1f d4 80 74 1e-1c fb ea ec 57 35 bb 1b .:....t.....W5.. 0020 - a9 1c a3 00 3a cb 81 7f-2b f2 2b 94 16 12 d8 5a ....:...+.+....Z 0030 - 1a 7e 1c 70 72 20 3f 9b-7a f2 1d f3 72 35 3a 0b .~.pr ?.z...r5:. 0040 - 79 af d8 23 e8 74 a7 96-ae 18 92 f3 33 fd 90 b0 y..#.t......3... 0050 - 70 46 6d d6 30 05 68 26-e9 91 44 1f 11 a0 d1 4b pFm.0.h&..D....K 0060 - 70 c1 83 fb c3 23 16 33-fb 94 cf d9 08 e9 26 be p....#.3......&. 0070 - b6 c8 de 9e 1d 52 21 44-65 88 27 ac b4 2a 16 48 .....R!De.'..*.H 0080 - 9d 5b fb 20 fa 8c 25 60-a4 da a5 1b 59 99 6f a3 .[. ..%`....Y.o. 0090 - 54 2c 88 df 77 b0 32 df-b1 d5 89 0a 87 ca 8e 70 T,..w.2........p 00a0 - 24 cf 07 9c 8b 84 00 8c-12 35 32 e4 ed 4c 20 3d $........52..L = 00b0 - 68 cf 77 06 5c ec ab 68-1a aa c9 13 4c 23 d7 8a h.w.\..h....L#.. 00c0 - 6e 47 fa 54 92 71 6f dc-09 cd 58 01 52 0e 96 96 nG.T.qo...X.R... Start Time: 1777674219 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 7238F337892C11CACADBF6AB0BE2D086929E06D3870EE70F0F80D839AE82D88F Session-ID-ctx: Resumption PSK: A0587636E7F1A3D7B87A28130D457FC3046B887F8575FE7BB2540A6851BBCA9B74B2B8E543299EFEDCC4A399544BD425 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 56 30 ac da 7b 27 83 bf-38 16 cb 21 4e 10 59 2f V0..{'..8..!N.Y/ 0010 - a9 d0 ca 3f d6 39 0d 3d-0e cf 87 af 9e df 25 92 ...?.9.=......%. 0020 - 85 97 fc 17 9b 1c 36 91-3c 55 dc 69 cb cc dc 70 ......6...n_ 0050 - 6b d7 34 cb e7 ed 89 be-02 ec e2 53 4e 2e 42 cb k.4........SN.B. 0060 - eb 79 46 11 c9 df 8e 01-3e 4b 57 80 54 74 a4 1b .yF.....>KW.Tt.. 0070 - ec 98 f0 fd ee 0b 31 2d-08 f8 c2 e5 c2 e7 3b 21 ......1-......;! 0080 - 00 d7 3d 02 f7 ad 4e be-f3 b5 73 9a f9 b4 9b 28 ..=...N...s....( 0090 - 04 63 af ce 7b 7a 0d 78-f3 93 fe 1b 86 c1 4e 8e .c..{z.x......N. 00a0 - 72 71 03 bf 07 03 94 d0-d6 2d 39 06 33 53 1f a5 rq.......-9.3S.. 00b0 - dd 57 c2 fd 65 70 71 c6-0e eb c9 47 49 5e a2 ba .W..epq....GI^.. 00c0 - 08 46 d0 ce f0 89 9b ca-88 be e3 41 68 0c 5c e8 .F.........Ah.\. Start Time: 1777674219 Timeout : 7200 (sec) Verify return code: 18 (self-signed certificate) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 60FC81BEFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/rsapss-sha256.pem Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIKbJPbAAZqPBHXGkTQnDHbLe32e00UIz1jZiMCeOLUFf BDCgWHY25/Gj17h6KBMNRX/DBGuIf4V1/nuyVApoUbvKm3SyuOVDKZ7+3MSjmVRL 1CWhBgIEafUn66IEAgIcIKQGBAQBAAAArgcCBQDOR7f3swMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (ECDSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQb9d4XqkQH5hsY8OB57CNMFFY9aYiJyv4VRU6ALIB/ll6+ LpZLlGGqGN2JF1L/wvp04w+6TThgzGXp3bda+OS0o4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFBexch4zaIUFevH4bKNGlYx8HJXRMB8GA1UdIwQYMBaAFNeZ AbqzR4s3cLEfuFwRL2lUybODMA0GCSqGSIb3DQEBCwUAA4IBAQArNItG2mc5Fybk FfViAg642iPFYFeh1dXc7xqHzL0yAqXIfjXQX+tqJWAmLkrKGpIeW/7mgZRvd9Dk D8EbRFXwhCgB5R6sa+nu8rm7I6lDTrypY8PGIYDQiD99hs1CW/jVhOLCN4Eik84o OY+V/QsOKBuzk2ewspFxD1JFkdOMExgHfTrdUHAVE2LGkzZRgPIiJTWqBTVzXs54 SK7gF/N4GMVqWR85Q++NYZEIRcST4KnR8z9rb7Bg/yU4m3mW8m8zvocoXFAUNwQO k+AssMmOfD5vBT9ZLP8Vn2SswnVOaT7V9/AspfBipbViwLT9la7KCGUurvn/6TEN XBhZBJed -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1000 bytes and written 391 bytes Verification error: unspecified certificate verification error --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 1 (unspecified certificate verification error) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: FE41EE3263415E5402FF35519BE636CFA2E46CD0FCCD00F0124A5317614ED1D5 Session-ID-ctx: Resumption PSK: 734C5444625377F91178ABB77CA6B42CC941245BF8097C23E1BE73E5515B6C1A810EAB3172467DC1F79DCB97B568A22D PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - c4 fd df ba 8a 4c 79 26-1e 39 83 2d 23 ef f5 5f .....Ly&.9.-#.._ 0010 - 38 a1 74 88 a4 2e 1e c9-da e4 ca 74 95 5f 13 08 8.t........t._.. 0020 - 1d 5e b1 21 37 41 bf 73-d6 40 18 d6 f0 42 7d e0 .^.!7A.s.@...B}. 0030 - 99 62 72 43 10 86 ba 6e-51 f8 7f 25 d6 5d c7 2a .brC...nQ..%.].* 0040 - e0 23 ad e9 d3 91 a9 53-9b fb e3 33 03 26 59 b9 .#.....S...3.&Y. 0050 - 16 e1 01 59 18 9c d3 7b-99 b8 6f cb c7 66 14 f5 ...Y...{..o..f.. 0060 - c0 ec 0d 65 a8 3f 89 04-17 7d b5 5e 86 b9 f4 8e ...e.?...}.^.... 0070 - c4 49 b6 0c 71 04 45 16-53 35 85 90 da c3 29 a3 .I..q.E.S5....). 0080 - 79 34 e1 bb f0 4f 12 f4-e6 2b 9f c3 18 48 2b 0a y4...O...+...H+. 0090 - c1 76 02 79 a2 45 3b 67-cb 2e 5d 3f f0 2f 1d 22 .v.y.E;g..]?./." 00a0 - 0a 64 a1 ec fd dd 38 69-08 0f 14 fa 92 77 22 b4 .d....8i.....w". 00b0 - 49 9d 7c d0 ba 09 78 41-6e 18 9b 1d 67 62 07 b5 I.|...xAn...gb.. 00c0 - 18 bc c9 98 74 a6 42 8f-15 e9 9c 57 54 e6 be 3d ....t.B....WT..= Start Time: 1777674219 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 92F0602FD6148CC43FB966168766EC46A2E137B3ABA96D6AF7EDA87D1C456E59 Session-ID-ctx: Resumption PSK: AD7BD1FA3223DD561D33A8593ED54F06303E4C0584D65FD6FE02E46976DD34BF31D065DC300FF3D6EBD6E7343A73C05C PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - c4 fd df ba 8a 4c 79 26-1e 39 83 2d 23 ef f5 5f .....Ly&.9.-#.._ 0010 - ed 68 02 ab e4 e5 16 47-f1 16 ed 45 c5 84 cb 3d .h.....G...E...= 0020 - 17 7e 99 f9 29 d7 b7 11-d6 39 83 20 b8 2d 74 4f .~..)....9. .-tO 0030 - de e6 4b 77 0e 68 a0 86-a9 63 a1 fb 28 38 f7 b8 ..Kw.h...c..(8.. 0040 - 91 1a 05 4d b2 a7 b2 9b-a6 e1 d1 4c 45 2b 55 57 ...M.......LE+UW 0050 - 18 fa 68 53 20 40 78 a3-bd 10 56 63 a7 e0 fc 45 ..hS @x...Vc...E 0060 - f9 9f 2e fc 7f e4 8f 70-a4 d7 6b ba 12 32 04 3d .......p..k..2.= 0070 - 0e fd 25 51 81 3e 45 b1-b0 d6 00 29 67 d7 aa ba ..%Q.>E....)g... 0080 - 2a db 12 2d 71 a3 68 96-e4 e8 4f 14 fc 79 a0 1a *..-q.h...O..y.. 0090 - 8c d6 ed dc c1 98 3b 92-75 47 4b 3f 02 b8 52 10 ......;.uGK?..R. 00a0 - d8 0e 31 7b d7 f1 6b fc-9d 7f 4a 1f 0e 27 ba 64 ..1{..k...J..'.d 00b0 - 05 14 d0 1b bb 49 c4 ca-27 0e 18 2d 77 ea 3e 75 .....I..'..-w.>u 00c0 - 64 e3 e7 af d2 f5 1f 11-fc 1c 73 56 1a a2 39 44 d.........sV..9D Start Time: 1777674219 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 600C4DBAFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEIMF0o/zYT93FeKptJIxdTt9tRnWKjRTCACDf7eNxw/02 BDCte9H6MiPdVh0zqFk+1U8GMD5MBYTWX9b+AuRpdt00vzHQZdwwD/PW69bnNDpz wFyhBgIEafUn66IEAgIcIKQGBAQBAAAArgcCBQDkhY+zswMCAR0= -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run sanity test with default values (Ed25519) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My ED25519 Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My ED25519 Cert i:CN=Issuer a:PKEY: ED25519, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICSDCCATCgAwIBAgIBBjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjA0MRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxGDAWBgNVBAMTD015IEVEMjU1MTkgQ2VydDAqMAUGAytl cAMhADX53cRIN4zWA0APehjmTrhW9+90TKfGptWGmBVzm9oIo4GBMH8wDAYDVR0T AQH/BAIwADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8B Af8EBAMCB4AwHQYDVR0OBBYEFBRel62qkMoreyIbXmWDlhLiwqE8MB8GA1UdIwQY MBaAFNeZAbqzR4s3cLEfuFwRL2lUybODMA0GCSqGSIb3DQEBCwUAA4IBAQBAXyoS jJtXwAW2TVY6kopOEbTtqoRcp4xRif0u6DwAS38OstGN4pUDUiIbjVS037Yk2KYC 3785nkpmI7ctPfS/NvVu9myfHRGPcBS2Y7VQWNqBi3raUj0X9/De0rOrCoX6Wo7c Zpeb7KXouLcwKszkICMww+y2NflBfrhhOtsqZWb1zmcouZx+3BWUNPjdmgdO1Fba 3TLu9w6jjjuEPO/HQneZrKXDN/pqzWiUtzsDsuG4V55KMRmxbx2lnWd0o8XG1bVp o6QgoY3pX8sCkWfLZR5aMBVhayxG6Te0vcVHSi6mnuoINqTTDayBwoLTje3fVn6g Y6LvTu9PBy0tYcr3 -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My ED25519 Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signature type: ed25519 Server Temp Key: X25519, 253 bits --- SSL handshake has read 952 bytes and written 391 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 256 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: 6C5D7AE6E65BB4A05642A7A6CC6225BFCC03179C1AF520AD734E053213EE73EF Session-ID-ctx: Resumption PSK: 66A97A1354D9D7FAA9214AE8AC236A85E04A55D631E28E5D65B5BC6C9D56DF05A09AD0004BBC70AAE2A00F7991F55BA7 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - c3 84 e3 3e 30 e5 a9 d8-68 1b 22 28 c3 d6 59 02 ...>0...h."(..Y. 0010 - d0 d6 50 cc d5 a4 78 ad-a2 03 cd 32 a4 bf 74 6a ..P...x....2..tj 0020 - 1d 3b 78 34 dc e6 53 af-69 71 82 18 0a 62 97 22 .;x4..S.iq...b." 0030 - b6 fc 1b 5f c5 81 e7 61-2c 1b e9 47 bc 50 dd f6 ..._...a,..G.P.. 0040 - 82 1a f6 44 a9 44 f9 4d-c6 66 77 81 b6 f3 5c 66 ...D.D.M.fw...\f 0050 - 4e 87 61 e3 00 7f ef 2c-51 a6 e1 16 24 66 21 fe N.a....,Q...$f!. 0060 - 9b e4 75 c1 88 7a 06 0c-6b 49 86 0c 6d 1d 82 2e ..u..z..kI..m... 0070 - 97 57 ee 3f 0d 84 51 e2-b4 88 4d 47 3e 45 8a 8c .W.?..Q...MG>E.. 0080 - e4 f2 af 2f 15 2f d5 63-72 17 fe 9e 34 36 6a fd ..././.cr...46j. 0090 - 79 ca 9b ad 81 43 7c ba-29 d0 c5 84 b3 63 41 56 y....C|.)....cAV 00a0 - 7d 41 0a 50 f9 42 66 12-52 27 9a d4 37 31 b6 a5 }A.P.Bf.R'..71.. 00b0 - e7 91 66 05 bd 75 0b 63-6c d3 b2 51 cb 41 e7 d5 ..f..u.cl..Q.A.. 00c0 - c7 60 d3 f9 b7 84 21 3f-8f 4f b6 3a 35 4f a0 79 .`....!?.O.:5O.y Start Time: 1777674219 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: CD4AA908390C90A0AE88A3A9FD41DAE09524D3EC061E0AA1EE53F0EC3CF88FE1 Session-ID-ctx: Resumption PSK: C58B9FD59B74ED9E27C253361C053D5B929F594B666DA8BD3AEA913FAFF377A40F9749261A493CFC2B09ADA9C276E3DA PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - c3 84 e3 3e 30 e5 a9 d8-68 1b 22 28 c3 d6 59 02 ...>0...h."(..Y. 0010 - 0c 6f 54 e3 0b 06 97 90-4b 40 59 d7 70 21 a1 f2 .oT.....K@Y.p!.. 0020 - b6 15 f0 af 55 e5 c3 e8-f6 93 4a 93 b0 11 9c b6 ....U.....J..... 0030 - e9 9b 74 8b 7d 7b c0 17-e0 32 a3 0a 67 27 3f 01 ..t.}{...2..g'?. 0040 - f0 2c 53 3c 53 53 b3 f4-bd 93 aa fe 8f b2 66 f2 .,S.R.E.=j.' 0090 - 41 e3 df 66 7b 9f 4e e2-59 4b 30 96 45 5f 2f db A..f{.N.YK0.E_/. 00a0 - 32 4e ae 5e 07 b1 33 94-11 ec d9 26 13 83 fc b1 2N.^..3....&.... 00b0 - 64 ad 37 15 52 f7 48 26-b8 7e 41 49 86 ac 74 47 d.7.R.H&.~AI..tG 00c0 - 97 46 b4 3f bb 56 d6 41-3b 9f 8f a3 89 73 2c fc .F.?.V.A;....s,. Start Time: 1777674220 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 603C648FFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%09 -cert pkcs11:type=cert;object=ed2Cert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEIFO0Xm1Im+LFGOYUYrxw4gJ2GwAsz4VOzlg92Bpi7SUs BDBVxE2bcz3e3sZIkRM8ZTZeIwtIq8v6WrqfJpSVIEtenxFp/xT6WD716/RBUwgh QuyhBgIEafUn7KIEAgIcIKQGBAQBAAAArgYCBDHHI6KzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAM0jx4VLLOEZCd5aoN2nwJmjBZGp0uNtpePM qTHpYo4l3bB3Jbv7VuNckxj94ie8uO0sVcZhHK9KpCQ7nF2hlsVZV0dIMwesgx2s gNwpRGzT1pdEcziH4Cb3ONu380LiX7uTc9RRLQBx4FOIw81GtaRXQ2v0ohS8Q+4t PYCLir2ngrU2S1TRIbds//0TCDSXM4mVoRZyvoyC9fwCbPBNxYG0m5DgWo5UXRCO RWSPT97hkt2AE8pUfWa6P5RumrMcrPElEcHdNV/QntHTmFLHwYPUYE6/vHcDj/Tg RCL1XlETyvPljjJdMBuNUOUo3nX/vwfKYhQgyhzx3cceCO65wcUCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBRFEuPzXTGWF2/xcjmwvxKpSan70jAf BgNVHSMEGDAWgBTXmQG6s0eLN3CxH7hcES9pVMmzgzANBgkqhkiG9w0BAQsFAAOC AQEApjWhikqxn3cHsMfgY1ysRaUtnt6hYm5aAI/ZZ1zLETeMcsur0avorPqGGhZy txyN4K8dUlxJ35iB0V9lrCuouYB9C96NlXWIb6zxT/N+n9G0W1AIjjiHR/d11qK/ sO/CoqgziI6a53P5wYf5VuMREY5y9c8w2fJkx/egbzDg9KPnq5T+NCscd+y0y5Gk xj24c44KxiFrgsChyWPFwuJ26fkfYyw1VVln+pzN7UfS3WdL/icseS/4wPIMIoX5 iRSmIMBZMw43ttlbLDH4ZokY1KMSnPhRrX+41RlbQDKy1P+c0jXL7FCevas22UnR QxBSlcYrYNUwUrsHxfigKQuRIg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1476 bytes and written 290 bytes Verification: OK --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 6281A7835A414F6FD352A0C4A4393D4F6CF9C4AAADFF292B8C9F6DD0BAAF4E90 Session-ID-ctx: Master-Key: 576CD59AC51C9BF163FD62B6ADCEEF502DC35935F0EE1AA939A6F657E3363BB0674D6617FBD34C85DD09AD62EE48B060 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 3d 0f cc 31 9b 33 f9 09-74 c2 fc ea d7 4d 15 dc =..1.3..t....M.. 0010 - 39 68 76 1b 8b 60 54 99-55 e6 e3 8c bd 87 83 f9 9hv..`T.U....... 0020 - f1 e1 69 15 40 c8 15 51-e6 77 12 4e 97 ef 14 88 ..i.@..Q.w.N.... 0030 - 45 b2 dc de 25 25 18 95-65 8f e7 ff f1 0a e0 86 E...%%..e....... 0040 - 41 65 aa 6c 21 c9 14 b8-6a 0c 42 d7 c5 5f 9a 06 Ae.l!...j.B.._.. 0050 - 6c a8 58 fe 93 3a ad cd-7e ac 97 67 56 ba d3 6b l.X..:..~..gV..k 0060 - 23 a8 e1 e6 03 c8 d9 71-42 1e 85 62 1a a6 c4 c9 #......qB..b.... 0070 - 88 9d db 0f b0 cd eb 31-b0 f5 41 9c b0 dc 7e d4 .......1..A...~. 0080 - cf cf 0b 18 81 fb d9 ba-4f 0b d5 59 dd 58 88 80 ........O..Y.X.. 0090 - bc 38 94 4c 7d 02 1d 9d-da d0 39 29 bc ae d3 a6 .8.L}.....9).... 00a0 - 28 3a 81 19 59 84 6b 8c-5b 14 2d a0 1f 4c 5f 24 (:..Y.k.[.-..L_$ Start Time: 1777674220 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: yes --- TLS SUCCESSFUL 600CEC9DFFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALAMAQABDBXbNWaxRyb8WP9Yratzu9QLcNZNfDuGqk5pvZX4zY7 sGdNZhf700yF3QmtYu5IsGChBgIEafUn7KIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 TLS SUCCESSFUL Q Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-RSA-AES256-GCM-SHA384 Secure Renegotiation IS supported DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with explicit TLS 1.3 spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_3 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My Test Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My Test Cert i:CN=Issuer a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDPzCCAiegAwIBAgIBAzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAxMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFTATBgNVBAMTDE15IFRlc3QgQ2VydDCCASIwDQYJKoZI hvcNAQEBBQADggEPADCCAQoCggEBAM0jx4VLLOEZCd5aoN2nwJmjBZGp0uNtpePM qTHpYo4l3bB3Jbv7VuNckxj94ie8uO0sVcZhHK9KpCQ7nF2hlsVZV0dIMwesgx2s gNwpRGzT1pdEcziH4Cb3ONu380LiX7uTc9RRLQBx4FOIw81GtaRXQ2v0ohS8Q+4t PYCLir2ngrU2S1TRIbds//0TCDSXM4mVoRZyvoyC9fwCbPBNxYG0m5DgWo5UXRCO RWSPT97hkt2AE8pUfWa6P5RumrMcrPElEcHdNV/QntHTmFLHwYPUYE6/vHcDj/Tg RCL1XlETyvPljjJdMBuNUOUo3nX/vwfKYhQgyhzx3cceCO65wcUCAwEAAaOBgTB/ MAwGA1UdEwEB/wQCMAAwHwYDVR0RBBgwFoEUdGVzdGNlcnRAZXhhbXBsZS5vcmcw DgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBRFEuPzXTGWF2/xcjmwvxKpSan70jAf BgNVHSMEGDAWgBTXmQG6s0eLN3CxH7hcES9pVMmzgzANBgkqhkiG9w0BAQsFAAOC AQEApjWhikqxn3cHsMfgY1ysRaUtnt6hYm5aAI/ZZ1zLETeMcsur0avorPqGGhZy txyN4K8dUlxJ35iB0V9lrCuouYB9C96NlXWIb6zxT/N+n9G0W1AIjjiHR/d11qK/ sO/CoqgziI6a53P5wYf5VuMREY5y9c8w2fJkx/egbzDg9KPnq5T+NCscd+y0y5Gk xj24c44KxiFrgsChyWPFwuJ26fkfYyw1VVln+pzN7UfS3WdL/icseS/4wPIMIoX5 iRSmIMBZMw43ttlbLDH4ZokY1KMSnPhRrX+41RlbQDKy1P+c0jXL7FCevas22UnR QxBSlcYrYNUwUrsHxfigKQuRIg== -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My Test Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1391 bytes and written 318 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Protocol: TLSv1.3 Server public key is 2048 bit This TLS version forbids renegotiation. Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: FE6EC1C6F685838A1D45E8875A2B7629B65E2191B02B1667EAF185B0FBF7E521 Session-ID-ctx: Resumption PSK: C72BD92293AC877E3A09623B7D8FDB90E3B6DDCBABBDE848D178E2F9224D279E9BF3474BBCB7010F9A4B0FF0BD869281 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 02 31 69 33 32 49 d8 a9-eb 03 d3 48 0f f9 8b 7f .1i32I.....H.... 0010 - ba 0f d7 b2 66 e8 fb 05-85 90 8a 38 e0 4e c6 29 ....f......8.N.) 0020 - 99 53 35 e8 ca c6 fd 9c-45 f2 c1 c7 3f e2 14 20 .S5.....E...?.. 0030 - 6e ca 25 78 76 56 e7 41-dc f5 55 c6 0b e4 75 6a n.%xvV.A..U...uj 0040 - 18 9b cb 20 79 d9 3a c8-c0 da 59 df a9 b5 8d 62 ... y.:...Y....b 0050 - a0 52 13 9e 28 41 d0 fb-1b 1c 68 08 82 ab 0e 51 .R..(A....h....Q 0060 - 12 72 46 9c 77 a2 92 80-30 d2 d3 29 69 2a 41 a6 .rF.w...0..)i*A. 0070 - 08 75 4e 03 5d 00 df 98-6c 9b 30 bc 0e 7c 36 e0 .uN.]...l.0..|6. 0080 - c1 9f ab 82 28 2e fe c5-12 4b 9a 77 50 2f bb bb ....(....K.wP/.. 0090 - 9a bd 1a 86 01 25 50 ea-81 9d 50 8d e7 45 c1 6a .....%P...P..E.j 00a0 - 4c 06 df 51 fd dd a6 75-51 97 7d bf 12 bf a5 be L..Q...uQ.}..... 00b0 - 3a ca 7f 23 62 29 d5 d5-80 86 d5 c2 91 d2 0b b1 :..#b).......... 00c0 - 96 92 cf ea b9 f7 6c e3-71 24 10 01 3d 43 dd 9f ......l.q$..=C.. Start Time: 1777674220 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_256_GCM_SHA384 Session-ID: CA1DF5EDF249602CC4AE9AD0FC9F2BB57D8F8907B38D4C0962294DA1CAE28D81 Session-ID-ctx: Resumption PSK: B5CFB1F2603DD846869A958FB1BF244444E98406ADBCBCD495E2044178E07D5861F25756DC77AE74590D6F3B2FA4BCB1 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 02 31 69 33 32 49 d8 a9-eb 03 d3 48 0f f9 8b 7f .1i32I.....H.... 0010 - e8 55 6d dc a1 a6 e5 f4-dc ce 8d ae 09 9f 57 e1 .Um...........W. 0020 - 1c 0a 99 3f b1 37 ec 3e-f6 7a 41 b1 be a6 5b 19 ...?.7.>.zA...[. 0030 - f8 ea 2b 46 da 74 62 01-5e 05 41 0a 7f 8c 0c 40 ..+F.tb.^.A....@ 0040 - 43 f0 15 c9 42 43 c0 1a-63 eb 5c bf 68 0c 4b 58 C...BC..c.\.h.KX 0050 - 36 8d 04 80 52 99 39 07-c4 4e 6c 50 8a 41 cc 05 6...R.9..NlP.A.. 0060 - 86 f1 0e 65 7b 45 30 a6-2d 95 cd 17 30 38 5c a2 ...e{E0.-...08\. 0070 - 0f 0b 7c 0b db bb d1 84-3e 22 0f 7e 4c 41 ad eb ..|.....>".~LA.. 0080 - 64 6a 53 d3 51 fa 78 bc-81 3e 96 3e cd a2 5f 0c djS.Q.x..>.>.._. 0090 - 4d 48 a6 86 45 70 0e f8-97 2e 25 72 75 05 76 45 MH..Ep....%ru.vE 00a0 - 78 aa 78 37 ef ce ba 89-f8 b4 b9 9b 10 6c ad d9 x.x7.........l.. 00b0 - 4b 19 36 06 1b 5c 88 9f-e9 9d 28 65 dd 94 9a 61 K.6..\....(e...a 00c0 - eb bc cb 14 95 f4 e4 04-6d 37 dc a5 17 f2 35 fa ........m7....5. Start Time: 1777674220 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK TLS SUCCESSFUL 60DC6B92FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%01 -cert pkcs11:type=cert;object=testCert Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MIGCAgEBAgIDBAQCEwIEILAjYM9QeBBbu3dh9Um6R4WxDqhWdlRnv+qTq9nzml7B BDC1z7HyYD3YRoaalY+xvyREROmEBq28vNSV4gRBeOB9WGHyV1bcd650WQ1vOy+k vLGhBgIEafUn7KIEAgIcIKQGBAQBAAAArgYCBB7pA5CzAwIBHQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256 Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1:ffdhe2048:ffdhe3072:ffdhe4096:ffdhe6144:ffdhe8192 CIPHER is TLS_AES_256_GCM_SHA384 This TLS version forbids renegotiation. TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 (ECDSA) spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQb9d4XqkQH5hsY8OB57CNMFFY9aYiJyv4VRU6ALIB/ll6+ LpZLlGGqGN2JF1L/wvp04w+6TThgzGXp3bda+OS0o4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFBexch4zaIUFevH4bKNGlYx8HJXRMB8GA1UdIwQYMBaAFNeZ AbqzR4s3cLEfuFwRL2lUybODMA0GCSqGSIb3DQEBCwUAA4IBAQArNItG2mc5Fybk FfViAg642iPFYFeh1dXc7xqHzL0yAqXIfjXQX+tqJWAmLkrKGpIeW/7mgZRvd9Dk D8EbRFXwhCgB5R6sa+nu8rm7I6lDTrypY8PGIYDQiD99hs1CW/jVhOLCN4Eik84o OY+V/QsOKBuzk2ewspFxD1JFkdOMExgHfTrdUHAVE2LGkzZRgPIiJTWqBTVzXs54 SK7gF/N4GMVqWR85Q++NYZEIRcST4KnR8z9rb7Bg/yU4m3mW8m8zvocoXFAUNwQO k+AssMmOfD5vBT9ZLP8Vn2SswnVOaT7V9/AspfBipbViwLT9la7KCGUurvn/6TEN XBhZBJed -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 1086 bytes and written 290 bytes Verification error: unspecified certificate verification error --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 Session-ID: 8F1F469381E82834B052093FF629210A97C1C43E77485DC7C129C884BF44BB2F Session-ID-ctx: Master-Key: 17D7DFDA90E1D148F705493CDD68B075000C2B89C0DFF1E0F74FCB9448EBDCB41C85780D4C686CA9F087B84A38B73815 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 73 ad c6 7f c5 80 6b c2-e5 63 5c 10 2f 55 23 cc s.....k..c\./U#. 0010 - 9e ad 56 98 7f 00 ed 0d-fc c7 14 06 53 04 57 4b ..V.........S.WK 0020 - c5 d6 4e c5 2e f6 74 28-96 31 29 4e 64 ad ab 1e ..N...t(.1)Nd... 0030 - 21 b8 ed 7f 8a 4e 1c de-bf 25 5f 7d 08 5f a2 81 !....N...%_}._.. 0040 - 59 e7 63 69 f4 66 e0 f0-34 d7 51 b8 47 f2 96 83 Y.ci.f..4.Q.G... 0050 - 33 92 b7 84 cc 60 84 13-c2 26 07 03 55 55 e2 ab 3....`...&..UU.. 0060 - bb 11 64 cf 6f 6f 93 00-46 ad b0 cb 59 e4 9d 6b ..d.oo..F...Y..k 0070 - 26 fe 85 b9 70 f0 1b 41-43 29 c4 93 cb 39 f3 4e &...p..AC)...9.N 0080 - a2 56 9a 44 63 12 b5 de-04 5d 42 86 92 03 38 bb .V.Dc....]B...8. 0090 - 8b ce 13 dc 98 c9 d9 ca-f9 ec 97 3c 2e 08 ac 09 ...........<.... 00a0 - df bb e7 ab e3 5c 02 6e-ca 8b 18 0f 37 bd a0 13 .....\.n....7... Start Time: 1777674220 Timeout : 7200 (sec) Verify return code: 1 (unspecified certificate verification error) Extended master secret: yes --- TLS SUCCESSFUL 60FC1A96FFFF0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:688: Server output: spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert -tls1_2 Using default temp DH parameters ACCEPT -----BEGIN SSL SESSION PARAMETERS----- MF8CAQECAgMDBALALAQABDAX19/akOHRSPcFSTzdaLB1AAwricDf8eD3T8uUSOvc tByFeA1MaGyp8Ie4Sji3OBWhBgIEafUn7KIEAgIcIKQGBAQBAAAArQMCAQGzAwIB HQ== -----END SSL SESSION PARAMETERS----- Shared ciphers:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Shared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512 Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 Supported groups: x25519:secp256r1:x448:secp521r1:secp384r1 Shared groups: x25519:secp256r1:x448:secp521r1:secp384r1 CIPHER is ECDHE-ECDSA-AES256-GCM-SHA384 Secure Renegotiation IS supported TLS SUCCESSFUL Q DONE shutdown accept socket shutting down SSL CONNECTION CLOSED 0 items in the session cache 0 client connects (SSL_connect()) 0 client renegotiates (SSL_connect()) 0 client connects that finished 1 server accepts (SSL_accept()) 0 server renegotiates (SSL_accept()) 1 server accepts that finished 0 session cache hits 0 session cache misses 0 session cache timeouts 0 callback cache hits 0 cache full overflows (128 allowed) ## Run test with TLS 1.2 and ECDH spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests/softhsm/caCert.pem -tls1_2 -cipher ECDHE-ECDSA-AES128-GCM-SHA256 -groups secp256r1 Connecting to 127.0.0.1 CONNECTED(00000005) Can't use SSL_get_servername depth=0 O=PKCS11 Provider, CN=My EC Cert verify error:num=1:unspecified certificate verification error verify return:1 depth=1 CN=Issuer verify return:1 depth=0 O=PKCS11 Provider, CN=My EC Cert verify return:1 --- Certificate chain 0 s:O=PKCS11 Provider, CN=My EC Cert i:CN=Issuer a:PKEY: id-ecPublicKey, 256 (bit); sigalg: RSA-SHA256 v:NotBefore: May 1 22:23:11 2026 GMT; NotAfter: May 1 22:23:11 2027 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjYwNTAxMjIyMzExWhcNMjcwNTAxMjIyMzExWjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAAQb9d4XqkQH5hsY8OB57CNMFFY9aYiJyv4VRU6ALIB/ll6+ LpZLlGGqGN2JF1L/wvp04w+6TThgzGXp3bda+OS0o4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFBexch4zaIUFevH4bKNGlYx8HJXRMB8GA1UdIwQYMBaAFNeZ AbqzR4s3cLEfuFwRL2lUybODMA0GCSqGSIb3DQEBCwUAA4IBAQArNItG2mc5Fybk FfViAg642iPFYFeh1dXc7xqHzL0yAqXIfjXQX+tqJWAmLkrKGpIeW/7mgZRvd9Dk D8EbRFXwhCgB5R6sa+nu8rm7I6lDTrypY8PGIYDQiD99hs1CW/jVhOLCN4Eik84o OY+V/QsOKBuzk2ewspFxD1JFkdOMExgHfTrdUHAVE2LGkzZRgPIiJTWqBTVzXs54 SK7gF/N4GMVqWR85Q++NYZEIRcST4KnR8z9rb7Bg/yU4m3mW8m8zvocoXFAUNwQO k+AssMmOfD5vBT9ZLP8Vn2SswnVOaT7V9/AspfBipbViwLT9la7KCGUurvn/6TEN XBhZBJed -----END CERTIFICATE----- subject=O=PKCS11 Provider, CN=My EC Cert issuer=CN=Issuer --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: ECDH, prime256v1, 256 bits --- SSL handshake has read 1120 bytes and written 263 bytes Verification error: unspecified certificate verification error --- New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256 Protocol: TLSv1.2 Server public key is 256 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES128-GCM-SHA256 Session-ID: 2A047E7F700A34391F6199279962320AF95A120A5152AE9185AFEF29F60BD2D1 Session-ID-ctx: Master-Key: 5B200DED84CA1108D6F95DB76FF2EB8B3FFB3B4279A9D2AE2A8D657DC3962E78D07B0354346D9AE0AFF4682A7614249A PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 7200 (seconds) TLS session ticket: 0000 - 0a e0 ad 0c b8 2d c1 ff-a4 ad 77 45 14 f8 e2 91 .....-....wE.... 0010 - ac 37 b2 29 16 0d 89 06-f6 19 6c 30 38 ad 6e fe .7.)......l08.n. 0020 - b5 8d d0 fa f8 88 a2 94-46 7d 98 bd f9 26 d1 8b ........F}...&.. 0030 - 00 7e 59 97 e3 87 85 24-6d 2e 51 77 94 20 30 c4 .~Y....$m.Qw. 0. 0040 - 74 46 24 32 52 82 31 33-54 e5 a4 0e 10 7f 02 bf tF$2R.13T....... 0050 - 2f a6 3d 15 2d 80 2d 56-89 85 c2 61 12 cc d7 aa /.=.-.-V...a.... 0060 - 39 d3 15 a1 13 ae fe 35-23 cc dc e9 65 47 cf d4 9......5#...eG.. 0070 - 63 97 ec 7e 02 22 d2 ed-9d c8 01 86 45 46 90 b1 c..~."......EF.. 0080 - 99 32 16 32 25 8c 4c fb-c2 a0 56 bc cc fa a3 80 .2.2%.L...V..... 0090 - a7 2d 1d 3c 6c 8a 22 fe-15 71 a4 fe 17 e3 fb a4 .-.>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=247 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 76/92 pkcs11-provider:kryoptic / tls SKIP 0.07s exit status 77 77/92 pkcs11-provider:kryoptic.nss / tls RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=208 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tls-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 77/92 pkcs11-provider:kryoptic.nss / tls SKIP 0.05s exit status 77 78/92 pkcs11-provider:softokn / tlsfuzzer RUNNING >>> MALLOC_PERTURB_=191 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 78/92 pkcs11-provider:softokn / tlsfuzzer SKIP 0.03s exit status 77 79/92 pkcs11-provider:softhsm / tlsfuzzer RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=163 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/ttlsfuzzer TLS fuzzer is not available -- skipping ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 79/92 pkcs11-provider:softhsm / tlsfuzzer SKIP 0.10s exit status 77 80/92 pkcs11-provider:kryoptic / tlsfuzzer RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=233 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 80/92 pkcs11-provider:kryoptic / tlsfuzzer SKIP 0.06s exit status 77 81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests MALLOC_PERTURB_=98 UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper tlsfuzzer-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 81/92 pkcs11-provider:kryoptic.nss / tlsfuzzer SKIP 0.06s exit status 77 82/92 pkcs11-provider:softokn / uri RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=179 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 82/92 pkcs11-provider:softokn / uri SKIP 0.06s exit status 77 83/92 pkcs11-provider:softhsm / uri RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=215 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/turi ## Check that storeutl returns URIs openssl storeutl -text pkcs11: ## Check returned URIs work to find objects $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%D3%3A%3F%5C%DD%EA%36%4D%3D%13%68%08%AA%96%BF%65;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%FF%86%C9%98%F4%AE%E2%6D%00%25%C2%C9%B8%4A%BB%F7;object=Test-Ed-gen-ff86c998;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%DE%E8%F5%C5%E9%38%F3%66%22%72%65%B2%03%B2%04%1C;object=Test-Ed-gen-dee8f5c5;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%91%C4%75%CC%10%37%F3%E4%25%4E%5A%CA%04%59%2C%8F;object=Test-RSA-Key-Usage-91c475cc;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%E7%0B%ED%4E%C1%63%CB%F0%03%E7%D7%2C%01%09%D2%05;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%01;object=testCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%03;object=ecPeerCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%05;object=testCert2;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%11;object=testRsaPss2Cert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%E1%7F%99%6D%49%5F%CD%EC%C5%9A%CB%62%7D%62%EE%F1;object=Test-RSA-gen-e17f996d;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%79%F8%E7%02%6F%64%FB%B4%A2%16%68%54%35%EA%EE%22;object=Pkey%20sigver%20Test;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%75%9B%40%54%30%EE%9B%6E%8C%7C%80%5F%D7%59%A3%10;object=Fork-Test;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%10;object=testRsaPssCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%DD%EF%E2%5B%45%5A%50%CC%6F%0D%E0%D6%60%4A%2C%EE;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%08;object=ecCert3;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%F9%0B%A9%36%C8%C8%88%B5%C2%67%5E%AC%A4%3B%BF%CB;object=Test-RSA-PSS-gen-f90ba936;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%8C%DE%37%0E%E9%68%E5%A4%F5%56%5A%4A%7A%CB%89%0A;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%09;object=ed2Cert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%06;object=ecCert2;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%FF%70%E8%70%8E%17%FB%63%FB%ED%D3%5B%90%DC%7E%9A;object=Test-EC-gen-ff70e870;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%00;object=caCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%04;object=edCert;type=private openssl storeutl -text "$uri" $uri=pkcs11:model=SoftHSM%20v2;manufacturer=SoftHSM%20project;serial=7cebd1a985f2aea0;token=SoftHSM%20Token;id=%00%02;object=ecCert;type=private openssl storeutl -text "$uri" ## Check each URI component is tested $cmp=pkcs11:model=SoftHSM%20v2 openssl storeutl -text "pkcs11:${cmp}" $cmp=manufacturer=SoftHSM%20project openssl storeutl -text "pkcs11:${cmp}" $cmp=serial=7cebd1a985f2aea0 openssl storeutl -text "pkcs11:${cmp}" $cmp=token=SoftHSM%20Token openssl storeutl -text "pkcs11:${cmp}" $cmp=id=%D3%3A%3F%5C%DD%EA%36%4D%3D%13%68%08%AA%96%BF%65 openssl storeutl -text "pkcs11:${cmp}" $cmp=type=private openssl storeutl -text "pkcs11:${cmp}" ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 83/92 pkcs11-provider:softhsm / uri OK 3.32s 84/92 pkcs11-provider:kryoptic / uri RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=84 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 84/92 pkcs11-provider:kryoptic / uri SKIP 0.06s exit status 77 85/92 pkcs11-provider:kryoptic.nss / uri RUNNING >>> MALLOC_PERTURB_=239 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper uri-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 85/92 pkcs11-provider:kryoptic.nss / uri SKIP 0.06s exit status 77 86/92 pkcs11-provider:softhsm / ecxc RUNNING >>> MALLOC_PERTURB_=195 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-softhsm.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― Executing /build/reproducible-path/pkcs11-provider-1.0/tests/tecxc ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 86/92 pkcs11-provider:softhsm / ecxc SKIP 0.10s exit status 77 87/92 pkcs11-provider:kryoptic / ecxc RUNNING >>> MALLOC_PERTURB_=195 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 87/92 pkcs11-provider:kryoptic / ecxc SKIP 0.05s exit status 77 88/92 pkcs11-provider:kryoptic.nss / ecxc RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests MALLOC_PERTURB_=140 /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper ecxc-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 88/92 pkcs11-provider:kryoptic.nss / ecxc SKIP 0.06s exit status 77 89/92 pkcs11-provider:softokn / cms RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MALLOC_PERTURB_=54 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-softokn.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 89/92 pkcs11-provider:softokn / cms SKIP 0.07s exit status 77 90/92 pkcs11-provider:kryoptic / cms RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=139 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 90/92 pkcs11-provider:kryoptic / cms SKIP 0.03s exit status 77 91/92 pkcs11-provider:kryoptic.nss / cms RUNNING >>> ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 MESON_TEST_ITERATION=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=96 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper cms-kryoptic.nss.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 91/92 pkcs11-provider:kryoptic.nss / cms SKIP 0.04s exit status 77 92/92 pkcs11-provider:kryoptic / pinlock RUNNING >>> MESON_TEST_ITERATION=1 ASAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1 TEST_PATH=/build/reproducible-path/pkcs11-provider-1.0/tests UBSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MSAN_OPTIONS=halt_on_error=1:abort_on_error=1:print_summary=1:print_stacktrace=1 MALLOC_PERTURB_=10 TESTBLDDIR=/build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/tests /build/reproducible-path/pkcs11-provider-1.0/tests/test-wrapper pinlock-kryoptic.t ――――――――――――――――――――――――――――――――――――― ✀ ――――――――――――――――――――――――――――――――――――― ―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――― 92/92 pkcs11-provider:kryoptic / pinlock SKIP 0.05s exit status 77 Ok: 21 Expected Fail: 0 Fail: 0 Unexpected Pass: 0 Skipped: 71 Timeout: 0 Full log written to /build/reproducible-path/pkcs11-provider-1.0/obj-aarch64-linux-gnu/meson-logs/testlog.txt make[1]: Leaving directory '/build/reproducible-path/pkcs11-provider-1.0' create-stamp debian/debhelper-build-stamp dh_testroot -O--buildsystem=meson dh_prep -O--buildsystem=meson dh_auto_install --destdir=debian/pkcs11-provider/ -O--buildsystem=meson cd obj-aarch64-linux-gnu && DESTDIR=/build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider LC_ALL=C.UTF-8 ninja install [0/1] Installing files Installing src/pkcs11.so to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/lib/aarch64-linux-gnu/ossl-modules Installing /build/reproducible-path/pkcs11-provider-1.0/docs/provider-pkcs11.7 to /build/reproducible-path/pkcs11-provider-1.0/debian/pkcs11-provider/usr/share/man/man7 dh_installdocs -O--buildsystem=meson dh_installchangelogs -O--buildsystem=meson dh_installman -O--buildsystem=meson dh_installsystemduser -O--buildsystem=meson dh_perl -O--buildsystem=meson dh_link -O--buildsystem=meson dh_strip_nondeterminism -O--buildsystem=meson dh_compress -O--buildsystem=meson dh_fixperms -O--buildsystem=meson dh_missing -O--buildsystem=meson dh_dwz -a -O--buildsystem=meson dh_strip -a -O--buildsystem=meson dh_makeshlibs -a -O--buildsystem=meson dh_shlibdeps -a -O--buildsystem=meson dpkg-shlibdeps: warning: diversions involved - output may be incorrect diversion by libc6 from: /lib/ld-linux-aarch64.so.1 dpkg-shlibdeps: warning: diversions involved - output may be incorrect diversion by libc6 to: /lib/ld-linux-aarch64.so.1.usr-is-merged dh_installdeb -O--buildsystem=meson dh_gencontrol -O--buildsystem=meson dh_md5sums -O--buildsystem=meson dh_builddeb -O--buildsystem=meson dpkg-deb: building package 'pkcs11-provider' in '../pkcs11-provider_1.0-2_arm64.deb'. dpkg-deb: building package 'pkcs11-provider-dbgsym' in '../pkcs11-provider-dbgsym_1.0-2_arm64.deb'. dpkg-genbuildinfo --build=binary -O../pkcs11-provider_1.0-2_arm64.buildinfo dpkg-genchanges --build=binary -O../pkcs11-provider_1.0-2_arm64.changes dpkg-genchanges: info: binary-only upload (no source code included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: not including original source code in upload I: copying local configuration I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env I: removing directory /srv/workspace/pbuilder/1050553 and its subdirectories I: Current time: Fri May 1 10:23:52 -12 2026 I: pbuilder-time-stamp: 1777674232 Sat Mar 29 16:00:55 UTC 2025 I: 1st build successful. Starting 2nd build on remote node codethink04-arm64.debian.net. Sat Mar 29 16:00:55 UTC 2025 I: Preparing to do remote build '2' on codethink04-arm64.debian.net. Sat Mar 29 16:03:25 UTC 2025 I: Deleting $TMPDIR on codethink04-arm64.debian.net. Sat Mar 29 16:03:26 UTC 2025 I: pkcs11-provider_1.0-2_arm64.changes: Format: 1.8 Date: Sat, 29 Mar 2025 01:25:16 +0000 Source: pkcs11-provider Binary: pkcs11-provider pkcs11-provider-dbgsym Architecture: arm64 Version: 1.0-2 Distribution: unstable Urgency: medium Maintainer: Luca Boccassi Changed-By: Luca Boccassi Description: pkcs11-provider - OpenSSL 3 provider for PKCS11 Closes: 1095848 Changes: pkcs11-provider (1.0-2) unstable; urgency=medium . * Add timeout multiplier for unit tests to fix FTBFS on slow architectures (Closes: #1095848) * Add workaround for blhc failing due to meson test not compiling with verbosity * d/control: bump Standards-Version to 4.7.2, no changes Checksums-Sha1: c7f313753473cc26dea234504b300e16e85d347d 309864 pkcs11-provider-dbgsym_1.0-2_arm64.deb c4fd2396b05d3638046ad39ffb2c7c08d447efe3 7186 pkcs11-provider_1.0-2_arm64.buildinfo 2443d7a1bd6e3a57a8f4285e393568ea7c082c12 114296 pkcs11-provider_1.0-2_arm64.deb Checksums-Sha256: 95c778083d758ae1d4c4b851686023113f3b0cae4cf19815e1a7a9d3bd6bde53 309864 pkcs11-provider-dbgsym_1.0-2_arm64.deb 2be9398b5bd4bf13918267b98a70e1de7bf7509f8713d47e21bf54b3173453ea 7186 pkcs11-provider_1.0-2_arm64.buildinfo 9b5612a4e352727aa7e3d3cff45037b7206537cc96f27d3d443d1ff5e79bd8b6 114296 pkcs11-provider_1.0-2_arm64.deb Files: 7050946f8800ed797ba77785c4945b2f 309864 debug optional pkcs11-provider-dbgsym_1.0-2_arm64.deb 8d14c2f1cd3a514f6a6d81fd54892d05 7186 libs optional pkcs11-provider_1.0-2_arm64.buildinfo 259223dee288188cf75431f0ef9e9261 114296 libs optional pkcs11-provider_1.0-2_arm64.deb Sat Mar 29 16:03:27 UTC 2025 I: diffoscope 291 will be used to compare the two builds: Running as unit: rb-diffoscope-arm64_3-84528.service # Profiling output for: /usr/bin/diffoscope --timeout 7200 --html /srv/reproducible-results/rbuild-debian/r-b-build.Q6pCuKA5/pkcs11-provider_1.0-2.diffoscope.html --text /srv/reproducible-results/rbuild-debian/r-b-build.Q6pCuKA5/pkcs11-provider_1.0-2.diffoscope.txt --json /srv/reproducible-results/rbuild-debian/r-b-build.Q6pCuKA5/pkcs11-provider_1.0-2.diffoscope.json --profile=- /srv/reproducible-results/rbuild-debian/r-b-build.Q6pCuKA5/b1/pkcs11-provider_1.0-2_arm64.changes /srv/reproducible-results/rbuild-debian/r-b-build.Q6pCuKA5/b2/pkcs11-provider_1.0-2_arm64.changes ## command (total time: 0.000s) 0.000s 1 call cmp (internal) ## has_same_content_as (total time: 0.000s) 0.000s 1 call diffoscope.comparators.binary.FilesystemFile ## main (total time: 0.003s) 0.003s 2 calls outputs 0.000s 1 call cleanup Finished with result: success Main processes terminated with: code=exited/status=0 Service runtime: 243ms CPU time consumed: 242ms Sat Mar 29 16:03:28 UTC 2025 I: diffoscope 291 found no differences in the changes files, and a .buildinfo file also exists. Sat Mar 29 16:03:28 UTC 2025 I: pkcs11-provider from unstable built successfully and reproducibly on arm64. Sat Mar 29 16:03:29 UTC 2025 I: Submitting .buildinfo files to external archives: Sat Mar 29 16:03:29 UTC 2025 I: Submitting 8.0K b1/pkcs11-provider_1.0-2_arm64.buildinfo.asc Sat Mar 29 16:03:30 UTC 2025 I: Submitting 8.0K b2/pkcs11-provider_1.0-2_arm64.buildinfo.asc Sat Mar 29 16:03:31 UTC 2025 I: Done submitting .buildinfo files to http://buildinfo.debian.net/api/submit. Sat Mar 29 16:03:31 UTC 2025 I: Done submitting .buildinfo files. Sat Mar 29 16:03:31 UTC 2025 I: Removing signed pkcs11-provider_1.0-2_arm64.buildinfo.asc files: removed './b1/pkcs11-provider_1.0-2_arm64.buildinfo.asc' removed './b2/pkcs11-provider_1.0-2_arm64.buildinfo.asc'