Bug#1082952: libcryptx-perl: t/sshkey.t fails on some architectures

gregor herrmann gregoa at debian.org
Sat Sep 28 23:28:56 BST 2024


Source: libcryptx-perl
Version: 0.081-1
Severity: serious
Tags: upstream ftbfs
Justification: fails to build from source (but built successfully in the past)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

0.081-1 has test failures on some architectures (s390x, ppc64,
sparc64, x32):
https://buildd.debian.org/status/package.php?p=libcryptx-perl

At least for the first three the failure is the same:

FATAL: pem_decode_openssh failed: Invalid argument provided. at t/sshkey.t line 129.
# Looks like your test exited with 255 just after 54.
t/sshkey.t .......................... 
1..756
ok 1 - RSA new
ok 2 - ECC new
ok 3 - DSA new
ok 4 - ssh_rsa_1024/ssh_rsa_1024_pkcs8/e
ok 5 - ssh_rsa_1024/ssh_rsa_1024_pkcs8/N
ok 6 - ssh_rsa_1024/ssh_rsa_1024_pkcs8/is_private
ok 7 - ssh_rsa_1024/ssh_rsa_1024_pkcs8/d
ok 8 - ssh_rsa_1024/ssh_rsa_1024_pkcs8/p
ok 9 - ssh_rsa_1024/ssh_rsa_1024_pkcs8/q
ok 10 - ssh_rsa_1024/ssh_rsa_1024_pkcs8/qP
ok 11 - ssh_rsa_1024/ssh_rsa_1024_pkcs8/dP
ok 12 - ssh_rsa_1024/ssh_rsa_1024_pkcs8/dQ
ok 13 - ssh_rsa_1024/ssh_rsa_1024_pkcs8_pw/e
ok 14 - ssh_rsa_1024/ssh_rsa_1024_pkcs8_pw/N
ok 15 - ssh_rsa_1024/ssh_rsa_1024_pkcs8_pw/is_private
ok 16 - ssh_rsa_1024/ssh_rsa_1024_pkcs8_pw/d
ok 17 - ssh_rsa_1024/ssh_rsa_1024_pkcs8_pw/p
ok 18 - ssh_rsa_1024/ssh_rsa_1024_pkcs8_pw/q
ok 19 - ssh_rsa_1024/ssh_rsa_1024_pkcs8_pw/qP
ok 20 - ssh_rsa_1024/ssh_rsa_1024_pkcs8_pw/dP
ok 21 - ssh_rsa_1024/ssh_rsa_1024_pkcs8_pw/dQ
ok 22 - ssh_rsa_1024/ssh_rsa_1024_pkcs8.pub/e
ok 23 - ssh_rsa_1024/ssh_rsa_1024_pkcs8.pub/N
ok 24 - ssh_rsa_1024/ssh_rsa_1024_pkcs8.pub/is_not_private
ok 25 - ssh_rsa_1024/ssh_rsa_1024_pem/e
ok 26 - ssh_rsa_1024/ssh_rsa_1024_pem/N
ok 27 - ssh_rsa_1024/ssh_rsa_1024_pem/is_private
ok 28 - ssh_rsa_1024/ssh_rsa_1024_pem/d
ok 29 - ssh_rsa_1024/ssh_rsa_1024_pem/p
ok 30 - ssh_rsa_1024/ssh_rsa_1024_pem/q
ok 31 - ssh_rsa_1024/ssh_rsa_1024_pem/qP
ok 32 - ssh_rsa_1024/ssh_rsa_1024_pem/dP
ok 33 - ssh_rsa_1024/ssh_rsa_1024_pem/dQ
ok 34 - ssh_rsa_1024/ssh_rsa_1024_pem_pw/e
ok 35 - ssh_rsa_1024/ssh_rsa_1024_pem_pw/N
ok 36 - ssh_rsa_1024/ssh_rsa_1024_pem_pw/is_private
ok 37 - ssh_rsa_1024/ssh_rsa_1024_pem_pw/d
ok 38 - ssh_rsa_1024/ssh_rsa_1024_pem_pw/p
ok 39 - ssh_rsa_1024/ssh_rsa_1024_pem_pw/q
ok 40 - ssh_rsa_1024/ssh_rsa_1024_pem_pw/qP
ok 41 - ssh_rsa_1024/ssh_rsa_1024_pem_pw/dP
ok 42 - ssh_rsa_1024/ssh_rsa_1024_pem_pw/dQ
ok 43 - ssh_rsa_1024/ssh_rsa_1024_pem.pub/e
ok 44 - ssh_rsa_1024/ssh_rsa_1024_pem.pub/N
ok 45 - ssh_rsa_1024/ssh_rsa_1024_pem.pub/is_not_private
ok 46 - ssh_rsa_1024/ssh_rsa_1024_openssh/e
ok 47 - ssh_rsa_1024/ssh_rsa_1024_openssh/N
ok 48 - ssh_rsa_1024/ssh_rsa_1024_openssh/is_private
ok 49 - ssh_rsa_1024/ssh_rsa_1024_openssh/d
ok 50 - ssh_rsa_1024/ssh_rsa_1024_openssh/p
ok 51 - ssh_rsa_1024/ssh_rsa_1024_openssh/q
ok 52 - ssh_rsa_1024/ssh_rsa_1024_openssh/qP
ok 53 - ssh_rsa_1024/ssh_rsa_1024_openssh/dP
ok 54 - ssh_rsa_1024/ssh_rsa_1024_openssh/dQ
Dubious, test returned 255 (wstat 65280, 0xff00)
Failed 702/756 subtests 

Test Summary Report
- -------------------
t/sshkey.t                        (Wstat: 65280 (exited 255) Tests: 54 Failed: 0)
  Non-zero exit status: 255
  Parse errors: Bad plan.  You planned 756 tests but ran 54.
Files=137, Tests=24533, 14 wallclock secs ( 0.77 usr  0.08 sys + 12.84 cusr  0.63 csys = 14.32 CPU)
Result: FAIL
Failed 1/137 test programs. 0/24533 subtests failed.
make[1]: *** [Makefile:1771: test_dynamic] Error 255


Cheers,
gregor

-----BEGIN PGP SIGNATURE-----
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=gZ0M
-----END PGP SIGNATURE-----



More information about the pkg-perl-maintainers mailing list