[Pkg-openssl-devel] Bug#929903: openssl: m2crypto test case regression
Sebastian Andrzej Siewior
sebastian at breakpoint.cc
Tue Jun 4 13:15:54 BST 2019
On 2019-06-04 12:12:35 [+0200], Kurt Roeckx wrote:
> On Tue, Jun 04, 2019 at 12:46:07AM +0200, Sebastian Andrzej Siewior wrote:
> >
> > So if I decoded it right, it does
> >
> > | fbuf = sha1("The magic words are squeamish ossifrage."); /* 0xbf, 0xf0, 0x04 … */
> > | flen = RSA_public_encrypt(20, fbuf, tobuf, )
> > | /* flen -> 128 */
> > | r = RSA_private_decrypt(128, tobuf, tobuf2, )
> >
> > before the change, RSA_private_decrypt() used to return an error
> > r -> -1, rsa routines|rsa_ossl_private_decrypt|padding check failed>
> >
> > after that, it return `20' and probably passes. Would it be likely that
> > m2crypto tested that an openssl bug existed which got fixed?
>
> I have no idea what they're testing, but I expect that if you just
> encrypt something, that decryting that should work.
But it didn't.
Let me ping upstream: Matěj, could you please take a look at
https://bugs.debian.org/929903
and check if it is okay the test no longer fails or if openssl suddenly
eats up the error code. Afterall:
--- tests/test_rsa.py 2019-06-03 21:16:33.840000000 +0000
+++ tests/test_rsa.py.new 2019-06-04 12:14:21.168000000 +0000
@@ -124,10 +124,10 @@
# sslv23_padding
ctxt = priv.public_encrypt(self.data, RSA.sslv23_padding)
- with self.assertRaises(RSA.RSAError):
- priv.private_decrypt(ctxt, RSA.sslv23_padding)
- with self.assertRaises(RSA.RSAError):
- priv.private_decrypt(ctxt, RSA.sslv23_padding)
+ ptxt = priv.private_decrypt(ctxt, RSA.sslv23_padding)
+ self.assertEqual(ptxt, self.data)
+ ptxt = priv.private_decrypt(ctxt, RSA.sslv23_padding)
+ self.assertEqual(ptxt, self.data)
# no_padding
with self.assertRaises(RSA.RSAError):
passes now and the result is `equal'.
> Kurt
Sebastian
More information about the Pkg-openssl-devel
mailing list