Certificate chainPOLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-
0 s:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
i:C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness
a:PKEY: RSA-PSS, 3092 (bit); sigalg: rsassaPss
v:NotBefore: Apr 12 10:06:50 2025 GMT; NotAfter: May 12 10:06:50 2025 GMT ---
Server certificate
-----BEGIN CERTIFICATE----- MIIFKDCCA12gAwIBAgIUA8NrrGGG+5Wq6jLfQeb4I4FuVAkwPQYJKoZIhvcNAQEK MDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0BAQgwCwYJYIZIAWUDBAIBogMC ASAwZzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMREwDwYDVQQHDAhO ZXcgWW9yazEYMBYGA1UECgwPUEtDUzExIFByb3ZpZGVyMRgwFgYDVQQLDA9UZXN0 aW5nIEhhcm5lc3MwHhcNMjUwNDEyMTAwNjUwWhcNMjUwNTEyMTAwNjUwWjBnMQsw CQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxETAPBgNVBAcMCE5ldyBZb3Jr MRgwFgYDVQQKDA9QS0NTMTEgUHJvdmlkZXIxGDAWBgNVBAsMD1Rlc3RpbmcgSGFy bmVzczCCAaIwCwYJKoZIhvcNAQEKA4IBkQAwggGMAoIBgwutLhvNeepdlghz7NR5 xm724Ie9f4G3EEvAoEBu5tNDIoEkEsueAZ58Hix7Y+px+QV++GEJ0gUrgGUo+n6O 7jPzmANX8MFH1VoSei+EiHUHwOh88cH6sCSVzpw5upAXSpmYQDolbaPTIR0AI9KO WEUUidHFYTOHjyhpSeNDa36pmYT1Tkk/T0eJWuv4nRLzWluzzH1H6Dpfxfth36D6 dpXw/ueMmHRoJR4DagUC1OdsVPiqiZ/tQRhRpN6VPOlPl1OsiNL+zdSA7YR9kIeN SaYmN6lbaIWUnT0tOW6I+lO4aXXXHW9bT7jokM75PB/zXighvZV23vUu8loxyk60 kaO9x+xs1niN+C4X6VQt5ykHQnfi/zUfY7EE11U2GWPLjGu+t5dX7U4wF8g55BWX sYirldJAh+a8AnOphhXukUa1uJYp87iW/8yQcHE2oIpugAW5mz8jYYtkggk26kTV 3StR3J1MYtuxmk/9OdzOfX/yHmS8cZUkxy2u5R+St3J1JuQZxQIDAQABo2kwZzAd BgNVHQ4EFgQUNinHnsLF47xghAzm488jPEpvutMwHwYDVR0jBBgwFoAUNinHnsLF 47xghAzm488jPEpvutMwDwYDVR0TAQH/BAUwAwEB/zAJBgNVHREEAjAAMAkGA1Ud EgQCMAAwPQYJKoZIhvcNAQEKMDCgDTALBglghkgBZQMEAgGhGjAYBgkqhkiG9w0B AQgwCwYJYIZIAWUDBAIBogMCASADggGEAAhrSn2wYeg6lUmW686kVic+JPMEu+vm joxN0ZuNc5A6OIXCa7qDm1waHcivn6jD7cJ9eYTQhlp4J9VAwtx+KOPNLUUjv75u T/y9naCM+zKJsYGlMavGFBJHVubYieH1LNN2Lb6weGkQ/VKRPJkkPXMNDKHs7NSP DA5HUhC741CvGDN3Jf4hJ2OvrxpujkJfY+Pp8fK0SyY6+gq9ve5DeI0dVbwqsWR2 54o3wal6DorpC7VFcE2/6OWcgXDSEPuQrdamakt0xQl8DaQuoSmHTJt1+wiLOj+J M+jpuYPBMz3HXSnphzRXcR7/zRnAY6MpIOvXp/cRJGbbcRLlCrmUc33D0X5VRaKQ AGE+xvpc/2tK/g9Mot1cUVMInIXg6AjCHhKrAFcOkQaLh51P8bGs2b6S84eV8s6i dquMNJSyCjfGcRe9vu6cCg/iiIubzAsocFAh1zPQJSaGhNiFldmPLIyFJ2uIP1+D PA1jlnPe7Rg73mDIR4ATLEoSjckuBaOh7jrang==
-----END CERTIFICATE-----
subject=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness issuer=C=US, ST=New York, L=New York, O=PKCS11 Provider, OU=Testing Harness ---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: rsa_pss_pss_sha256
Negotiated TLS1.3 group: X25519MLKEM768
---
SSL handshake has read 3099 bytes and written 1613 bytes
Verification error: self-signed certificate
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 3092 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 18 (self-signed certificate)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: E340F4BB7423C605322EF1D0A0F2E1B19276FF914FB6374783400B5A042A3417
Session-ID-ctx:
Resumption PSK: 7C50B7DBEC6B16BAFD07AA6773D6D95F9235919D7A7DFE4178CCFC5BA8D2EEE8B178353B809D3D6C7A3EC48510E19DD9
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 11 87 e2 4f a7 0f aa 1e-cb ad 35 47 39 58 55 ad ...O......5G9XU.
0010 - d1 b9 ed 02 b8 b4 b3 87-89 15 c9 00 cc 57 a3 d2 .............W..
0020 - e5 e8 4e 1b 43 5a d4 14-6e b9 17 0a 24 9a 6c 5a ..N.CZ..n...$.lZ
0030 - 72 fd f9 cf 65 c0 67 7c-fc 8a d8 e4 92 a9 97 90 r...e.g|........
0040 - 4e e0 84 1d 6c 86 ad a5-0e 75 a5 81 06 a4 05 b6 N...l....u......
0050 - 84 0d 33 f8 fb 71 70 b2-92 38 b5 ef c7 0b 82 6b ..3..qp..8.....k
0060 - 07 cf 82 3e 59 b5 2b c1-30 f2 f4 25 3c 17 b9 fe ...>Y.+.0..%<...
0070 - 6d e9 03 62 e6 b7 58 02-a7 1c 9f 4e 88 b9 2e f9 m..b..X....N....
0080 - 80 7b 8b 0c 5c 61 53 49-7f 3a ab 9b ac 14 2b 95 .{..\aSI.:....+.
0090 - 2b 63 69 55 75 fd 87 af-26 06 b6 2c 80 ea 51 ab +ciUu...&..,..Q.
00a0 - 45 b5 82 68 c4 00 5d d9-93 f8 ff f4 67 a3 28 b6 E..h..].....g.(.
00b0 - 6a 3f 93 3f 5f bc 78 57-9e 81 fb 06 e6 60 14 21 j?.?_.xW.....`.!
00c0 - ec c0 af b8 7d 7b ab 93-c8 a3 92 1e 5d 67 37 a9 ....}{......]g7.
Start Time: 1744452410
Timeout : 7200 (sec)
Verify return code: 18 (self-signed certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 64C833821213BB25C71CDCF19A53D90D6AEF60EC017AD660A76728E3DE12A675
Session-ID-ctx:
Resumption PSK: 086CB2ABE770A5FF44993900925A31282135F27F1B5A8085D48706A293C2067874BD43E21765C31BB65FA617A610F78C
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 11 87 e2 4f a7 0f aa 1e-cb ad 35 47 39 58 55 ad ...O......5G9XU.
0010 - ff e8 e7 55 47 bf 12 24-02 76 86 3a 44 f9 7d 7d ...UG..$.v.:D.}}
0020 - 57 ab 70 40 0c 2a a1 8d-5c 83 e2 2d 2a 24 b9 31 W.p@.*..\..-*$.1
0030 - 95 2e b9 1f 5c ca c4 94-2b 4c c3 92 f6 5b 8b a9 ....\...+L...[..
0040 - c4 10 98 3c a6 41 e8 8e-fc 19 81 dd e8 82 14 50 ...<.A.........P
0050 - 34 e2 08 55 98 f0 83 a8-64 f8 24 0b 77 6e fd 73 4..U....d.$.wn.s
0060 - ca 19 7e 86 02 9d d5 00-8c 79 9a e6 99 a2 51 50 ..~......y....QP
0070 - d6 05 4f 89 2d 26 e9 36-1f 6e bc c7 01 5c e6 39 ..O.-&.6.n...\.9
0080 - e9 d2 bf b6 ff 50 82 bb-96 b1 6e a7 51 b6 ef 63 .....P....n.Q..c
0090 - f1 fa b9 48 9d e2 b9 06-c1 ef 75 a8 9e bc 24 c5 ...H......u...$.
00a0 - 2f 0a ee 2b 09 07 90 76-df 9a cc c7 1c 90 21 7a /..+...v......!z
00b0 - 8c b6 6c 47 4f b9 f1 3c-dd 62 7a d2 5a 33 d0 56 ..lGO..<.bz.Z3.V
00c0 - 19 ab 65 e9 1f c3 a7 74-7b 91 bc e4 cd 8a 8b 48 ..e....t{......H
Start Time: 1744452410
Timeout : 7200 (sec)
Verify return code: 18 (self-signed certificate)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
TLS SUCCESSFUL
40270AD9957F0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:691:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%11 -cert /build/reproducible-path/pkcs11-provider-1.0/obj-x86_64-linux-gnu/tests/softhsm/rsapss-sha256.pem
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS----- MIGEAgEBAgIDBAQCEwIEILTwhqH4K9GJHyiNUUlkAWr0uqrfjzIYOqzU3HGqQ3BJ BDAIbLKr53Cl/0SZOQCSWjEoITXyfxtagIXUhwaik8IGeHS9Q+IXZcMbtl+mF6YQ 94yhBgIEZ/o7OqIEAgIcIKQGBAQBAAAArgcCBQCDW0GMswQCAhHs
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-
Signature Algorithms: id-ml-dsa-65:id-ml-dsa-87:id-ml-dsa-44:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: id-ml-dsa-65:id-ml-dsa-87:id-ml-dsa-44:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: X25519MLKEM768:x25519:secp256r1:x448:secp384r1:secp521r1:ffdhe2048:ffdhe3072POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-
Shared groups: X25519MLKEM768:x25519:secp256r1:x448:secp384r1:secp521r1:ffdhe2048:ffdhe3072
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
TLS SUCCESSFUL
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
0 items in the session cache
0 client connects (SSL_connect())
0 client renegotiates (SSL_connect())
0 client connects that finished
1 server accepts (SSL_accept())
0 server renegotiates (SSL_accept())
1 server accepts that finished
0 session cache hits
0 session cache misses
0 session cache timeouts
0 callback cache hits
0 cache full overflows (128 allowed)
## Run sanity test with default values (ECDSA)
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-x86_64-linux-gnu/tests/softhsm/caCert.pem
Connecting to ::1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My EC Cert
verify return:1
---
Certificate chain
0 s:O=PKCS11 Provider, CN=My EC Cert
i:CN=Issuer
a:PKEY: EC, (prime256v1); sigalg: sha256WithRSAEncryption
v:NotBefore: Apr 12 10:06:36 2025 GMT; NotAfter: Apr 12 10:06:36 2026 GMT ---
Server certificate
-----BEGIN CERTIFICATE----- MIICcjCCAVqgAwIBAgIBBDANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjUwNDEyMTAwNjM2WhcNMjYwNDEyMTAwNjM2WjAvMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxEzARBgNVBAMTCk15IEVDIENlcnQwWTATBgcqhkjOPQIB BggqhkjOPQMBBwNCAATBhC6Bskae48wDIXJQXRNVcx3n7y90X+kO5StIXCuMPHy1 KKX00cXF6UXUHszjlvS2SMrVZQvJc2WTOiDTiv27o4GBMH8wDAYDVR0TAQH/BAIw ADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8BAf8EBAMC B4AwHQYDVR0OBBYEFL+L0nMF/mpdNL6bGu74hnxx2622MB8GA1UdIwQYMBaAFCyg 8iYK7eejABnMyB2/g2vveKgPMA0GCSqGSIb3DQEBCwUAA4IBAQA50M5wbeBoxn/E X6VGW6QqIvM6rSi+/1e4bPpF3QAWDQDe1dktyIuV+S845UEW0+evWQzNIvPuahXJ gqOHJyTVYJNK2UZHd1P0GMCbnNwAFPuJtbikTG0XXj5mCmDDGfjMDe7f4iB7yoho eXijLDEYcSu9EBSHTKMFl1KHYI59fKsFaG1/vblPeRiXYwGpynuWnS9hiRpM5Bng FVSuHPZaD/CsVje/tqIzp7dx+EVwAmCEbWSLuzM8SvOf7LPU8NJOfUHTKPnq9ul7 UbgGKwA4ITGLF6tuviJ+AXVkF6k/mlEGBU2AeEVrYxsJfIpZ9iUGLRw0DYHX9pXy
B4KikiF9
-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My EC Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: ecdsa_secp256r1_sha256
Negotiated TLS1.3 group: X25519MLKEM768
---
SSL handshake has read 2089 bytes and written 1613 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 256 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 85EA8869C52D1AFCAEA40326C75A04F947F5F85042E471C71920CE4286A5A8FB
Session-ID-ctx:
Resumption PSK: 8204EEC3AADBF68A574854EC2206F0E84C7517C96C211EE4FF31DB8E6D88422BB7BA27F70138CAA05B370FAF81212F4E
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - e8 91 25 a6 33 ec b5 99-31 0f 86 ad 8f bd c0 95 ..%.3...1.......
0010 - e5 fc bb 38 82 ed 20 d3-07 9b 90 df 77 f9 af 10 ...8.. .....w...
0020 - ea 9f c1 5c eb d2 09 9d-62 7b 47 6e de 61 31 4a ...\....b{Gn.a1J
0030 - 8c 0e 79 e4 6e b4 75 24-e0 8f 71 2b 67 a8 5a 2e ..y.n.u$..q+g.Z.
0040 - 0d 28 1d 58 eb 02 00 96-63 6b 7d f7 86 b0 2d 16 .(.X....ck}...-.
0050 - 5b 6f 88 0d e7 70 50 96-ea 90 ff 7e de 0a 15 91 [o...pP....~....
0060 - 56 45 a3 d0 70 83 5c 3f-d8 d8 03 09 78 e8 d2 a6 VE..p.\?....x...
0070 - 69 8a 4c 07 1e 66 97 a7-58 f7 d3 02 14 7b 7d 16 i.L..f..X....{}.
0080 - 35 80 28 ad 78 a2 05 00-ef 21 0c c7 e9 18 46 90 5.(.x....!....F.
0090 - 37 90 30 8d 9f fc 50 ae-dc 37 6c fb 74 6d 47 92 7.0...P..7l.tmG.
00a0 - c0 0b 3c 46 08 12 92 08-da 91 e4 d3 3d 6b 9b 34 ..<F........=k.4
00b0 - f7 c3 9e 82 1c 3f 33 08-4f cf da e8 96 da b0 4f .....?3.O......O
00c0 - 6d 1f 55 6d de 30 0a ac-20 b9 fd 15 18 02 ad c7 m.Um.0.. .......
Start Time: 1744452410
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 9AF2A93D899EA97445FB947A5A3FC7500D0A9C61BBE9C8D309EAA2004DEA05B1
Session-ID-ctx:
Resumption PSK: 2FF83369B3CDBD61E241A706C5A4B253A7AD2E94E2A9AF27215FB732EE135FD290CF8D97F8DC602956913DD26320AA42
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - e8 91 25 a6 33 ec b5 99-31 0f 86 ad 8f bd c0 95 ..%.3...1.......
0010 - 45 66 96 b9 d0 dd d1 5d-b3 53 1c 33 0a cb 59 fa Ef.....].S.3..Y.
0020 - a4 dd 1e 1f e0 bd f1 d8-4a fc fa 99 ad 13 22 d7 ........J.....".
0030 - 85 cc e1 50 62 04 85 3e-63 ef 1a 7c 09 f5 49 a7 ...Pb..>c..|..I.
0040 - 8c 03 e4 16 43 a7 d1 bc-d5 6d 34 0a b8 6b 79 00 ....C....m4..ky.
0050 - 03 91 b5 00 31 14 12 2d-fd d4 42 f2 11 30 6b 3b ....1..-..B..0k;
0060 - d8 99 17 63 ae 4e c9 08-0a e1 ed 28 78 1f 8c c0 ...c.N.....(x...
0070 - 7e ed fd 17 24 4a cf f6-23 c9 47 3a 6c 2a 00 3b ~...$J..#.G:l*.;
0080 - 54 e9 fb 47 9c 14 95 df-08 a0 61 7c 44 05 dd a9 T..G......a|D...
0090 - 2d 17 ed 7b 2c 3e 8c d6-3b d7 ac 81 b4 4f b6 e9 -..{,>..;....O..
00a0 - 79 e4 d9 73 a6 55 aa 2f-62 fe 28 49 9a ef b2 06 y..s.U./b.(I....
00b0 - 9c 34 d3 b3 8c c5 1f 96-88 28 6a b9 74 de 8d c6 .4.......(j.t...
00c0 - 97 ec 5b 3f 4d 1c cf 4a-9f 7f 18 33 4e 44 cc 1e ..[?M..J...3ND..
Start Time: 1744452410
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
TLS SUCCESSFUL
40C7D1E1537F0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:691:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%02 -cert pkcs11:type=cert;object=ecCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS----- MIGDAgEBAgIDBAQCEwIEID+uxhyjebIClHj4ACgMM8ZaAuZdTapD+7wQnBYlFAgd BDAv+DNps829YeJBpwbFpLJTp60ulOKprychX7cy7hNf0pDPjZf43GApVpE90mMg qkKhBgIEZ/o7OqIEAgIcIKQGBAQBAAAArgYCBDQNs3OzBAICEew=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-
Signature Algorithms: id-ml-dsa-65:id-ml-dsa-87:id-ml-dsa-44:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: id-ml-dsa-65:id-ml-dsa-87:id-ml-dsa-44:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: X25519MLKEM768:x25519:secp256r1:x448:secp384r1:secp521r1:ffdhe2048:ffdhe3072POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-
Shared groups: X25519MLKEM768:x25519:secp256r1:x448:secp384r1:secp521r1:ffdhe2048:ffdhe3072
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
TLS SUCCESSFUL
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
0 items in the session cache
0 client connects (SSL_connect())
0 client renegotiates (SSL_connect())
0 client connects that finished
1 server accepts (SSL_accept())
0 server renegotiates (SSL_accept())
1 server accepts that finished
0 session cache hits
0 session cache misses
0 session cache timeouts
0 callback cache hits
0 cache full overflows (128 allowed)
## Run sanity test with default values (Ed25519)
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-x86_64-linux-gnu/tests/softhsm/caCert.pem
Connecting to ::1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My ED25519 Cert
verify return:1
---
Certificate chain
0 s:O=PKCS11 Provider, CN=My ED25519 Cert
i:CN=Issuer
a:PKEY: ED25519, 256 (bit); sigalg: sha256WithRSAEncryption
v:NotBefore: Apr 12 10:06:36 2025 GMT; NotAfter: Apr 12 10:06:36 2026 GMT ---
Server certificate
-----BEGIN CERTIFICATE----- MIICSDCCATCgAwIBAgIBBjANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjUwNDEyMTAwNjM2WhcNMjYwNDEyMTAwNjM2WjA0MRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxGDAWBgNVBAMTD015IEVEMjU1MTkgQ2VydDAqMAUGAytl cAMhAJ0WDl2Hl8UUb29HJ9UY3U5Pl2u7tIjX3NmrIUH2E3zSo4GBMH8wDAYDVR0T AQH/BAIwADAfBgNVHREEGDAWgRR0ZXN0Y2VydEBleGFtcGxlLm9yZzAOBgNVHQ8B Af8EBAMCB4AwHQYDVR0OBBYEFPhxmjKvZMwiSEguzAjQfqTmyHwcMB8GA1UdIwQY MBaAFCyg8iYK7eejABnMyB2/g2vveKgPMA0GCSqGSIb3DQEBCwUAA4IBAQBzM6Z2 QALfpQ9ipxzETsdN6cb8XOaZlJZReV8dlzEApLWnrA9RnbOfGMYmSP8mwylnxENe ZGORRemijPJzIDvwmNrKhiLfarKRftVrQDNjytzn+CbYdYFaHjrT3JGvUrgh5Pe1 9jjvGscBDvgdYrW9W8IYU/8OJlMvkL0BA7SLD6nBgloIFxrCETu9oWJtxaSL7Lz8 lNypPpvHJB8PVCKjQV1uNNg85O9fIWVWMI49jeMCMVLk9NmgDb7lDuWthGHLpsCx PiIih/YHKSaXkq6bILdJq/yAjjfaBvz0aFEpqGwP+Mfp8BrvvuBWPVfpShocj+tW LopOfWDwnaI2oCko
-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My ED25519 Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signature type: ed25519
Negotiated TLS1.3 group: X25519MLKEM768
---
SSL handshake has read 2040 bytes and written 1613 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 256 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 89E09805D52EA9FFEAFEC43193D5D915660A613046A43A3C1A2E4E1E3DB88EA3
Session-ID-ctx:
Resumption PSK: C2C71D8074E7D31843A0235A587D84A8FA08939D854946716F4E6B051870DBADA81354F373F6EE6C75BBFDA543A08C37
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - a8 88 f6 ca f1 9d 29 19-d5 65 8e 1f 2c e3 03 0d ......)..e..,...
0010 - 91 29 3f d9 09 87 5a 47-9e 7e 8e 01 4d d8 f7 e8 .)?...ZG.~..M...
0020 - a9 7d d8 a9 d8 23 0d b0-a2 15 15 56 b5 78 a9 47 .}...#.....V.x.G
0030 - 45 e8 83 57 9f 60 41 e5-1a 21 c4 1d 68 c2 1c 6d E..W.`A..!..h..m
0040 - 57 17 61 a9 65 6e b4 b9-b8 04 7e 9a ae a5 31 6f W.a.en....~...1o
0050 - f4 0f 0b 62 fb 3d d7 5f-03 c1 5b c6 e5 dd 5f c8 ...b.=._..[..._.
0060 - 43 3c 82 c9 55 3a ee 9f-a5 8f c6 69 68 57 cd 1e C<..U:.....ihW..
0070 - f2 e7 6d a1 9d 61 84 62-cf 83 96 e8 7f e6 ff 88 ..m..a.b........
0080 - 1a 6d 85 5e a6 60 e3 37-e4 be 7f e2 0b 67 3c 3e .m.^.`.7.....g<>
0090 - d5 4d 77 cb 1d a0 e0 e5-25 53 8a 92 a0 fb 8b ba .Mw.....%S......
00a0 - f3 da 52 de 26 e7 a8 92-76 fb bf 7f af 18 ef ed ..R.&...v.......
00b0 - a7 97 a9 4e 53 1e fc 77-fc 6a 5b 85 14 e4 b4 1f ...NS..w.j[.....
00c0 - 39 2a 15 1f 7b 88 f6 66-d0 0e cb 1b fb 07 e4 e5 9*..{..f........
Start Time: 1744452410
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 2B2F505CEEE4A03DC52BF179439B5CE3DB1506D7C54E47375647DABBB233BE67
Session-ID-ctx:
Resumption PSK: 6BFE0D237895976F3ED8F914DFBFAE0DBF13B5A8344FE87C37F6FA1530174D39E63705B688A17D4337609927B504DBED
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - a8 88 f6 ca f1 9d 29 19-d5 65 8e 1f 2c e3 03 0d ......)..e..,...
0010 - ef b6 99 31 be dd 74 b3-89 6b a6 8c 05 1d 8b 12 ...1..t..k......
0020 - 7a b5 ef ab 95 a9 33 ba-c2 68 78 e5 0a 9b 26 87 z.....3..hx...&.
0030 - fa bd a9 7c 1f 3f b9 11-1d b8 17 68 3e ab be 4f ...|.?.....h>..O
0040 - c4 d9 be f6 88 c7 45 17-b7 f9 9e 27 00 45 b7 e9 ......E....'.E..
0050 - c2 3a 3c 65 b7 13 04 02-6f a6 15 2b d6 9f 79 4c .:<e....o..+..yL
0060 - 8f 80 9a d3 04 f2 68 8f-b0 7a 68 49 2b 8a 0a f5 ......h..zhI+...
0070 - 24 cd 51 72 9e 59 f7 96-d2 45 eb 50 e2 d4 61 82 $.Qr.Y...E.P..a.
0080 - b3 37 4f 52 bd 5b 45 e6-82 94 33 c9 91 b0 f7 e8 .7OR.[E...3.....
0090 - 73 d9 e6 4d 3a fc 1f 93-30 2d 10 5f 01 7a 20 6b s..M:...0-._.z k
00a0 - 57 25 5c 69 81 16 b9 a5-9f b6 0f 63 4a fd 13 3c W%\i.......cJ..<
00b0 - 72 1f 32 34 ec 2a b5 8d-6b 17 45 e9 f4 ab 8e c1 r.24.*..k.E.....
00c0 - 0d 5e a0 cd a2 cd 2b 9c-e6 46 41 ad ea 58 21 91 .^....+..FA..X!.
Start Time: 1744452410
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
TLS SUCCESSFUL
40B75323B17F0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:691:
Server output:
spawn openssl s_server -propquery ?provider=pkcs11 -accept 23456 -naccept 1 -key pkcs11:type=private;id=%00%04 -cert pkcs11:type=cert;object=edCert
Using default temp DH parameters
ACCEPT
-----BEGIN SSL SESSION PARAMETERS----- MIGEAgEBAgIDBAQCEwIEIDIINL7amYfywjLkYswV+QBU2CWJ6r9gGUEF3zgvA4EZ BDBr/g0jeJWXbz7Y+RTfv64NvxO1qDRP6Hw39voVMBdNOeY3BbaIoX1DN2CZJ7UE 2+2hBgIEZ/o7OqIEAgIcIKQGBAQBAAAArgcCBQCB+B4PswQCAhHs
-----END SSL SESSION PARAMETERS-----
Shared ciphers:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-
Signature Algorithms: id-ml-dsa-65:id-ml-dsa-87:id-ml-dsa-44:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:DSA+SHA224:DSA+SHA256:DSA+SHA384:DSA+SHA512
Shared Signature Algorithms: id-ml-dsa-65:id-ml-dsa-87:id-ml-dsa-44:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:ed25519:ed448:ecdsa_brainpoolP256r1_sha256:ecdsa_brainpoolP384r1_sha384:ecdsa_brainpoolP512r1_sha512:rsa_pss_pss_sha256:rsa_pss_pss_sha384:rsa_pss_pss_sha512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224
Supported groups: X25519MLKEM768:x25519:secp256r1:x448:secp384r1:secp521r1:ffdhe2048:ffdhe3072
Shared groups: X25519MLKEM768:x25519:secp256r1:x448:secp384r1:secp521r1:ffdhe2048:ffdhe3072
CIPHER is TLS_AES_256_GCM_SHA384
This TLS version forbids renegotiation.
TLS SUCCESSFUL
Q
DONE
shutdown accept socket
shutting down SSL
CONNECTION CLOSED
0 items in the session cache
0 client connects (SSL_connect())
0 client renegotiates (SSL_connect())
0 client connects that finished
1 server accepts (SSL_accept())
0 server renegotiates (SSL_accept())
1 server accepts that finished
0 session cache hits
0 session cache misses
0 session cache timeouts
0 callback cache hits
0 cache full overflows (128 allowed)
## Run sanity test with default values (Ed448)
spawn openssl s_client -propquery ?provider=pkcs11 -connect localhost:23456 -CAfile /build/reproducible-path/pkcs11-provider-1.0/obj-x86_64-linux-gnu/tests/softhsm/caCert.pem
Connecting to ::1
CONNECTED(00000005)
Can't use SSL_get_servername
depth=1 CN=Issuer
verify return:1
depth=0 O=PKCS11 Provider, CN=My ED448 Cert
verify return:1
---
Certificate chain
0 s:O=PKCS11 Provider, CN=My ED448 Cert
i:CN=Issuer
a:PKEY: ED448, 456 (bit); sigalg: sha256WithRSAEncryption
v:NotBefore: Apr 12 10:06:36 2025 GMT; NotAfter: Apr 12 10:06:36 2026 GMT ---
Server certificate
-----BEGIN CERTIFICATE----- MIICXzCCAUegAwIBAgIBBzANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDEwZJc3N1 ZXIwHhcNMjUwNDEyMTAwNjM2WhcNMjYwNDEyMTAwNjM2WjAyMRgwFgYDVQQKEw9Q S0NTMTEgUHJvdmlkZXIxFjAUBgNVBAMTDU15IEVENDQ4IENlcnQwQzAFBgMrZXED OgAGMGLLVppTF80lCtXH168PTdsgjk5as47xNnTRVINtl7dzGgZJwyTJlvPAHaoX 7U7Txk1uIFyirQCjgYEwfzAMBgNVHRMBAf8EAjAAMB8GA1UdEQQYMBaBFHRlc3Rj ZXJ0QGV4YW1wbGUub3JnMA4GA1UdDwEB/wQEAwIHgDAdBgNVHQ4EFgQUOreDDh2y xNg+7pjMgqfn3al5S1gwHwYDVR0jBBgwFoAULKDyJgrt56MAGczIHb+Da+94qA8w DQYJKoZIhvcNAQELBQADggEBAFo8PoYa45uBZ18CE0G+DyoGUzoOytU4GA0tDaJh RGJ0AV/2a2LKRshg+M6NN9EV8dOhCEFm2pn00G1fU9er6Wvj9/cfgXCKlgqG5yHD /1nn/Qyi8wUH3WhtpkmNq6NIzLgTrxdBoy8VUCCiEWfk4atjfzeLB8VdzH8S6TE7 jxPzrAAMxsk6B/U1tXv05RflS8fYIALU+ZVdVzc3jvgW41HGGWcYp2o+N+TeEC58 H7ArQZeW2coK+3GEpHSxHZJlsEZSZE7oAPpUJqlLO8mU25oSf0fKOCO/5k7cFZ+d YJHvZn0ojSFvaXWVLcewoah9kiaCr0NNU1RcCbnf3wZ6EyE=
-----END CERTIFICATE-----
subject=O=PKCS11 Provider, CN=My ED448 Cert
issuer=CN=Issuer
---
No client certificate CA names sent
Peer signature type: ed448
Negotiated TLS1.3 group: X25519MLKEM768
---
SSL handshake has read 2113 bytes and written 1613 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Protocol: TLSv1.3
Server public key is 456 bit
This TLS version forbids renegotiation.
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: BC2F219CDB776F787C6E15F8E61A26C935C56FAD0CE968155A19D346BA42B2E0
Session-ID-ctx:
Resumption PSK: 03391B6638B21A9A922F1CFD1B84C737CB5ED358A638A5F6FE44EE7245A7A9F5D590272EC97C043008A65428320B0911
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 66 6e 5d 6c 3b 59 f8 b2-da 5e 9c 3b 8e 1f 15 d8 fn]l;Y...^.;....
0010 - 47 98 3b 63 c8 f5 7a eb-14 15 74 89 a0 be 51 69 G.;c..z...t...Qi
0020 - 80 ca 2b 38 bf 4d d4 4e-b5 04 68 88 05 18 86 bf ..+8.M.N..h.....
0030 - 8d ab a1 dc 76 65 9d 2e-2f 3f aa 46 47 fe 3b b2 ....ve../?.FG.;.
0040 - 72 80 b5 de ef f5 89 fe-da 64 61 14 20 1a ee 90 r........da. ...
0050 - 82 b0 e5 31 84 54 80 05-e9 78 14 18 53 7b fa 09 ...1.T...x..S{..
0060 - 4a 51 e4 9e e3 4e 45 05-00 cd 29 42 74 15 5c a8 JQ...NE...)Bt.\.
0070 - 2d c7 a2 a7 1a 56 7e 06-e0 2a b4 7a 40 77 e5 c5 -....V~..*.z@w..
0080 - 11 7a 4b 2b 7d 17 75 da-08 30 b8 77 5f 35 ec 57 .zK+}.u..0.w_5.W
0090 - e6 6e 4c 36 84 7b ac 13-5d fd 8e ab 3e 92 8b e9 .nL6.{..]...>...
00a0 - f9 10 5a 43 77 4f 77 81-65 85 26 c6 51 a6 24 a9 ..ZCwOw.e.&.Q.$.
00b0 - a1 39 a0 59 a8 3b 87 6a-62 01 a4 ce 3d f9 48 e3 .9.Y.;.jb...=.H.
00c0 - b3 cc 4a e2 62 9d 62 bf-88 04 31 05 3c f2 3e 55 ..J.b.b...1.<.>U
Start Time: 1744452411
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: DF6644B6B075C8118F146DE9AD2752B09F9407C5729A4A5BC42C436C823F6171
Session-ID-ctx:
Resumption PSK: 81F5C4220A813A0E9F79A1C21DAA5B625860670318B43B2E56AB260B624FE75A3C2634D8C28280D1F1AAC8D2E351DE56
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 66 6e 5d 6c 3b 59 f8 b2-da 5e 9c 3b 8e 1f 15 d8 fn]l;Y...^.;....
0010 - 51 f7 64 86 2d c3 91 54-9f 40 2e 06 26 da 6b dd Q.d.-..T.@..&.k.
0020 - b9 f7 f6 46 3d 0c 22 97-3a 26 f4 d2 87 0a 9f c6 ...F=.".:&......
0030 - 9a e1 ab ef 69 b7 1c e2-5e 14 08 25 89 56 6c b7 ....i...^..%.Vl.
0040 - 3b 10 f9 69 9b a2 5a a1-be 6d d9 e0 fa 36 24 85 ;..i..Z..m...6$.
0050 - 41 5b 64 4c 9a 00 ea 13-21 16 91 6f f8 2a 41 58 A[dL....!..o.*AX
0060 - ed ee 38 07 86 5f a0 f9-6d 8f 17 31 7b 34 a0 82 ..8.._..m..1{4..
0070 - 43 99 ad a6 42 e4 45 2a-ff f2 b0 1b 99 51 a6 b3 C...B.E*.....Q..
0080 - 64 7f b1 23 8b 31 87 e6-80 5a 34 4c 44 4f 40 c0 d..#.1...Z4LDO@.
0090 - 99 cc 4c f1 a9 a9 12 60-55 65 29 8f 7d 41 fb fb ..L....`Ue).}A..
00a0 - 20 66 95 b2 e6 7a 85 df-30 f9 20 f0 a2 3b 84 95 f...z..0. ..;..
00b0 - 6f b4 7e b6 69 eb 91 cb-da 76 d5 03 65 e7 2c 4a o.~.i....v..e.,J
00c0 - 16 09 60 1d 6b a2 1f 7c-e3 b3 a5 29 de f7 43 04 ..`.k..|...)..C.
Start Time: 1744452411
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
---
read R BLOCK
TLS SUCCESSFUL
40C74D70657F0000:error:0A000126:SSL routines::unexpected eof while reading:../ssl/record/rec_layer_s3.c:691:
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 486 |
Nodes: | 16 (2 / 14) |
Uptime: | 140:12:25 |
Calls: | 9,657 |
Calls today: | 5 |
Files: | 13,708 |
Messages: | 6,167,338 |