openssl: build fails in test_encoder_decoder with OPENSSL_TEST_RAND_ORDER=0
The builds currently show:
# ERROR: (int) 'OSSL_ENCODER_CTX_get_num_encoders(ectx) > 0' failed @ test/endecode_test.c:187
# [0] compared to [0]
# ERROR: (bool) 'encode_cb(&encoded, &encoded_len, pkey, selection, output_type, output_structure, pass, pcipher) == true' failed @ test/endecode_test.c:127
# false
not ok 7 - test_protected_DSA_via_DER
# ------------------------------------------------------------------------------
# ERROR: (int) 'OSSL_ENCODER_CTX_get_num_encoders(ectx) > 0' failed @ test/endecode_test.c:187
# [0] compared to [0]
# ERROR: (bool) 'encode_cb(&encoded, &encoded_len, pkey, selection, output_type, output_structure, pass, pcipher) == true' failed @ test/endecode_test.c:127
# false
not ok 12 - test_unprotected_DSA_via_PEM
# ------------------------------------------------------------------------------
# ERROR: (int) 'OSSL_ENCODER_CTX_get_num_encoders(ectx) > 0' failed @ test/endecode_test.c:187
# [0] compared to [0]
# ERROR: (bool) 'encode_cb(&encoded, &encoded_len, pkey, selection, output_type, output_structure, pass, pcipher) == true' failed @ test/endecode_test.c:127
# false
not ok 16 - test_params_DSA_via_PEM
[...]
# ------------------------------------------------------------------------------
../../util/wrap.pl ../../test/endecode_test => 1
not ok 1
# ------------------------------------------------------------------------------
# Failed test at test/recipes/04-test_encoder_decoder.t line 23.
# Looks like you failed 1 test of 1.04-test_encoder_decoder.t ..........
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/1 subtests
About this issue
- Original URL
- State: closed
- Created 4 years ago
- Comments: 25 (25 by maintainers)
Commits related to this issue
- DECODER EVP_PKEY: Don't store all the EVP_KEYMGMTs OSSL_DECODER_CTX_new_by_EVP_PKEY() would keep copies of all the EVP_KEYMGMTs it finds. This turns out to be fragile in certain circumstances, so we ... — committed to levitte/openssl by levitte 4 years ago
- MSBLOB & PVK: Make it possible to write EVP_PKEYs with provided internal key So far, the MSBLOB and PVK writers could only handle EVP_PKEYs with legacy internal keys. Specially to be able to compile... — committed to levitte/openssl by levitte 4 years ago
- CORE: Separate OSSL_PROVIDER activation from OSSL_PROVIDER reference This introduces a separate activation counter, and the function ossl_provider_deactivate() for provider deactivation. Something t... — committed to levitte/openssl by levitte 4 years ago
- EVP: Fix memory leak in EVP_PKEY_CTX_dup() In most error cases, EVP_PKEY_CTX_dup() would only free the EVP_PKEY_CTX without freeing the duplicated contents. Fixes #13503 — committed to levitte/openssl by levitte 4 years ago
- MSBLOB & PVK: Make it possible to write EVP_PKEYs with provided internal key So far, the MSBLOB and PVK writers could only handle EVP_PKEYs with legacy internal keys. Specially to be able to compile... — committed to openssl/openssl by levitte 4 years ago
- CORE: Separate OSSL_PROVIDER activation from OSSL_PROVIDER reference This introduces a separate activation counter, and the function ossl_provider_deactivate() for provider deactivation. Something t... — committed to openssl/openssl by levitte 4 years ago
- EVP: Fix memory leak in EVP_PKEY_CTX_dup() In most error cases, EVP_PKEY_CTX_dup() would only free the EVP_PKEY_CTX without freeing the duplicated contents. Fixes #13503 Reviewed-by: Tomas Mraz <tm... — committed to openssl/openssl by levitte 4 years ago
I actually figured it out.
Found one cause!
do_i2b(incrypto/pem/pvkfmt.c) forcedly downgrades the input pkey. That needs being corrected…I’m running tests now. I can’t see any reason why
no-asmshould make any difference, so I’m trying without that to avoid the abysmal slowness…