Still FAILED build of OpenSSL branch master with options --strict-warnings

OpenSSL run-checker openssl at openssl.org
Tue Jun 8 22:10:43 UTC 2021


Platform and configuration command:

$ uname -a
Linux run 5.4.0-72-generic #80-Ubuntu SMP Mon Apr 12 17:35:00 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config --strict-warnings

Commit log since last time:

1355659bb8 OpenSSL::Test.pm: Replace all uses of rel2abs() with abs_path()
4bf696c1d0 Correctly detect decode errors when checking if a key is supported
1df8322ce0 Simplify error reporting in X509_PUBKEY_get0()
33fb6ed3ec Use the fips-and-base.cnf config file in CMP tests
15fd6c235c Mark some priv/public key paris as only available in the default provider
b2f1b36592 Actually use a legacy route in pem_read_bio_key_legacy()
237cb05d34 Just look for "Unable to load Public Key" if no SM2
29bf83c889 Only use the legacy route to decode a public key if we have to
f8da1d8005 Ensure that we consume all the data when decoding an SPKI
2b049e933a Use the right class/tag when decoding an embedded key
7834d50fa9 Fix CTLOG_new_from_base64_ex()
eaf867011e Fix the expected output of printing certificates
92b835376a EVP_PKEY_new_raw_private_key: Allow zero length keys
907720f064 Fix compilation on systems with empty _POSIX_TIMERS
69807ab8ed evp: avoid some calls to EVP_CIPHER_CTX_get_iv_length() because it's been called already
cec8854cc9 evp: fix Coverity 1485670 argument cannot be negative
3f617061ec evp: fix Coverity 1485669 improper use of negative value
dacb0d8f79 evp: fix Coverity 1485668 argument cannot be negative
9428977994 pkcs12: fix Coverity 1485667 logically dead code
0341ff9774 evp: fix coverity 1485666 argument cannot be negative
042f8f70cb evp: fix improper use of negative value issues
b0a0ab07b4 afalg: fix coverity 1485661 improper use of negative value
6c1d17c802 fix coverity 1485660 improper use of negative value
37bbe44929 bio: improve error checking fixing coverity 1485659 & 1485665
95c8a51252 doc: add PKEY life cycle documentation
75653c100f doc: build changes for PKEY life cycle documentation
dbf021c20e doc: add build info for cipher life cycle documentation
b1307e9421 doc: add references to cipher life cycle documentation
c0fc3fe349 doc: add cipher life cycle documentation
e748b4fbae doc: improve the cipher life cycle diagram
f7a19d6402 doc-nits: support out of source execution
7f0dc8da7d doc: remove empty section
8809fdff93 doc: add references to digest life cycle documentation
7b9e236177 doc: add digest life cycle documentation
618523e728 doc: add digest lifecycle diagram
e4d69413c2 life-cycles: update digest state table
178fa72ed5 Add aix64-gcc-as architecture and p2align callback
fccf3dcef4 X509_digest_sig: Handle RSA-PSS and EDDSA certificates
09345c8cab Move trust-related decls from x509.h.in to x509_vfy.h.in
3cd4e5e73f x509.h.in: extended 'documenting' comment on X509_TRUST_OK_ANY_EKU
f9ac6f6956 Improve the documentation of cert path building and validation
2576b9c31c X509_STORE_CTX_new.pod and x509_vfy.h.in: rename some params for clarity, improve their doc
f1343f45d6 x509_vfy.c: Improve a couple of internally documenting comments
62d2386bf8 x509_trs.c: rename to x509_trust.c and correct comment in trust_compat()
69e0f8cca6 Fix AIX FIPS DEP.
5d43bfa7d5 BIO_write-ex(): Improve behavior in corner cases and documentation
f41fd10d90 Add a gettable for provider ciphers to return the EVP_CIPH_RAND_KEY flag
5135a9bd92 Document missing EC/SM2 params
063e019738 Test EVP_CipherInit sequences and resets
ff555f8136 Fix CipherInit on s390x.

Build log ended with (last 100 lines):

        # ERROR: (bool) 'create_ssl_ctx_pair(NULL, TLS_server_method(), TLS_client_method(), TLS1_VERSION, 0, &sctx, &cctx, ciphers[idx].certnum == 0 ? cert1 : cert2, ciphers[idx].certnum == 0 ? privkey1 : privkey2) == true' failed @ ../openssl/test/gosttest.c:57
        # false
        # 80B19ACB517F0000:error:03000072:digital envelope routines:X509_PUBKEY_get0:decode error:../openssl/crypto/x509/x_pubkey.c:424:
        # 80B19ACB517F0000:error:0A00018F:SSL routines:SSL_CTX_use_certificate:ee key too small:../openssl/ssl/ssl_rsa.c:221:
        # OPENSSL_TEST_RAND_ORDER=1623190037
        not ok 3 - iteration 3
# ------------------------------------------------------------------------------
        # ERROR: (int) 'SSL_CTX_use_certificate_file(serverctx, certfile, SSL_FILETYPE_PEM) == 1' failed @ ../openssl/test/helpers/ssltestlib.c:741
        # [0] compared to [1]
        # ERROR: (bool) 'create_ssl_ctx_pair(NULL, TLS_server_method(), TLS_client_method(), TLS1_VERSION, 0, &sctx, &cctx, ciphers[idx].certnum == 0 ? cert1 : cert2, ciphers[idx].certnum == 0 ? privkey1 : privkey2) == true' failed @ ../openssl/test/gosttest.c:57
        # false
        # 80B19ACB517F0000:error:03000072:digital envelope routines:X509_PUBKEY_get0:decode error:../openssl/crypto/x509/x_pubkey.c:424:
        # 80B19ACB517F0000:error:0A00018F:SSL routines:SSL_CTX_use_certificate:ee key too small:../openssl/ssl/ssl_rsa.c:221:
        # OPENSSL_TEST_RAND_ORDER=1623190037
        not ok 4 - iteration 4
# ------------------------------------------------------------------------------
        # ERROR: (int) 'SSL_CTX_use_certificate_file(serverctx, certfile, SSL_FILETYPE_PEM) == 1' failed @ ../openssl/test/helpers/ssltestlib.c:741
        # [0] compared to [1]
        # ERROR: (bool) 'create_ssl_ctx_pair(NULL, TLS_server_method(), TLS_client_method(), TLS1_VERSION, 0, &sctx, &cctx, ciphers[idx].certnum == 0 ? cert1 : cert2, ciphers[idx].certnum == 0 ? privkey1 : privkey2) == true' failed @ ../openssl/test/gosttest.c:57
        # false
        # 80B19ACB517F0000:error:03000072:digital envelope routines:X509_PUBKEY_get0:decode error:../openssl/crypto/x509/x_pubkey.c:424:
        # 80B19ACB517F0000:error:0A00018F:SSL routines:SSL_CTX_use_certificate:ee key too small:../openssl/ssl/ssl_rsa.c:221:
        # OPENSSL_TEST_RAND_ORDER=1623190037
        not ok 5 - iteration 5
# ------------------------------------------------------------------------------
        # ERROR: (int) 'SSL_CTX_use_certificate_file(serverctx, certfile, SSL_FILETYPE_PEM) == 1' failed @ ../openssl/test/helpers/ssltestlib.c:741
        # [0] compared to [1]
        # ERROR: (bool) 'create_ssl_ctx_pair(NULL, TLS_server_method(), TLS_client_method(), TLS1_VERSION, 0, &sctx, &cctx, ciphers[idx].certnum == 0 ? cert1 : cert2, ciphers[idx].certnum == 0 ? privkey1 : privkey2) == true' failed @ ../openssl/test/gosttest.c:57
        # false
        # 80B19ACB517F0000:error:03000072:digital envelope routines:X509_PUBKEY_get0:decode error:../openssl/crypto/x509/x_pubkey.c:424:
        # 80B19ACB517F0000:error:0A00018F:SSL routines:SSL_CTX_use_certificate:ee key too small:../openssl/ssl/ssl_rsa.c:221:
        # OPENSSL_TEST_RAND_ORDER=1623190037
        not ok 6 - iteration 6
# ------------------------------------------------------------------------------
        # ERROR: (int) 'SSL_CTX_use_certificate_file(serverctx, certfile, SSL_FILETYPE_PEM) == 1' failed @ ../openssl/test/helpers/ssltestlib.c:741
        # [0] compared to [1]
        # ERROR: (bool) 'create_ssl_ctx_pair(NULL, TLS_server_method(), TLS_client_method(), TLS1_VERSION, 0, &sctx, &cctx, ciphers[idx].certnum == 0 ? cert1 : cert2, ciphers[idx].certnum == 0 ? privkey1 : privkey2) == true' failed @ ../openssl/test/gosttest.c:57
        # false
        # 80B19ACB517F0000:error:03000072:digital envelope routines:X509_PUBKEY_get0:decode error:../openssl/crypto/x509/x_pubkey.c:424:
        # 80B19ACB517F0000:error:0A00018F:SSL routines:SSL_CTX_use_certificate:ee key too small:../openssl/ssl/ssl_rsa.c:221:
        # OPENSSL_TEST_RAND_ORDER=1623190037
        not ok 7 - iteration 7
# ------------------------------------------------------------------------------
        # ERROR: (int) 'SSL_CTX_use_certificate_file(serverctx, certfile, SSL_FILETYPE_PEM) == 1' failed @ ../openssl/test/helpers/ssltestlib.c:741
        # [0] compared to [1]
        # ERROR: (bool) 'create_ssl_ctx_pair(NULL, TLS_server_method(), TLS_client_method(), TLS1_VERSION, 0, &sctx, &cctx, ciphers[idx].certnum == 0 ? cert1 : cert2, ciphers[idx].certnum == 0 ? privkey1 : privkey2) == true' failed @ ../openssl/test/gosttest.c:57
        # false
        # 80B19ACB517F0000:error:03000072:digital envelope routines:X509_PUBKEY_get0:decode error:../openssl/crypto/x509/x_pubkey.c:424:
        # 80B19ACB517F0000:error:0A00018F:SSL routines:SSL_CTX_use_certificate:ee key too small:../openssl/ssl/ssl_rsa.c:221:
        # OPENSSL_TEST_RAND_ORDER=1623190037
        not ok 8 - iteration 8
# ------------------------------------------------------------------------------
    # OPENSSL_TEST_RAND_ORDER=1623190037
    not ok 1 - test_tls13
# ------------------------------------------------------------------------------
../../util/wrap.pl ../../test/gosttest ../../../openssl/test/recipes/90-test_gost_data/server-cert2001.pem ../../../openssl/test/recipes/90-test_gost_data/server-key2001.pem ../../../openssl/test/recipes/90-test_gost_data/server-cert2012.pem ../../../openssl/test/recipes/90-test_gost_data/server-key2012.pem => 1
not ok 1 - running gosttest
# ------------------------------------------------------------------------------
#   Failed test 'running gosttest'
#   at ../openssl/test/recipes/90-test_gost.t line 39.
# Looks like you failed 1 test of 1.90-test_gost.t ..................... 
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/1 subtests 
90-test_ige.t ...................... ok
90-test_memleak.t .................. ok
90-test_includes.t ................. ok
90-test_overhead.t ................. ok
90-test_secmem.t ................... ok
90-test_srp.t ...................... ok
90-test_shlibload.t ................ ok
90-test_sslbuffers.t ............... ok

# 
Killing mock server with pid=3410380-test_cmp_http.t ................. ok
90-test_sysdefault.t ............... ok
90-test_threads.t .................. ok
90-test_time_offset.t .............. ok
80-test_ssl_old.t .................. ok
90-test_tls13encryption.t .......... ok
90-test_tls13ccs.t ................. ok
90-test_tls13secrets.t ............. ok
90-test_v3name.t ................... ok
95-test_external_gost_engine.t ..... skipped: No external tests in this configuration
91-test_pkey_check.t ............... ok
95-test_external_krb5.t ............ skipped: No external tests in this configuration
99-test_ecstress.t ................. ok
95-test_external_pyca.t ............ skipped: No external tests in this configuration
90-test_store.t .................... ok
90-test_sslapi.t ................... ok

Test Summary Report
-------------------
90-test_gost.t                   (Wstat: 256 Tests: 1 Failed: 1)
  Failed test:  1
  Non-zero exit status: 1
Files=236, Tests=3236, 158 wallclock secs (12.48 usr  1.32 sys + 471.61 cusr 57.74 csys = 543.15 CPU)
Result: FAIL
make[1]: *** [Makefile:3228: run_tests] Error 1
make[1]: Leaving directory '/home/openssl/run-checker/default'
make: *** [Makefile:3224: tests] Error 2


More information about the openssl-commits mailing list