Dear Sebastian, Kurt, On 19-03-2022 12:33, Adam D Barratt wrote:
Upload details ==============Package: openssl Version: 1.1.1n-0+deb10u1 Explanation: new upstream release
We're seeing a regression in buster in the autopkgtest of gnutls28 with the new version of openssl on all tested architectures. Can you please have a look and advise? (bullseye doesn't seem to have the test anymore, hence it doesn't fail).
https://ci.debian.net/data/autopkgtest/oldstable/amd64/g/gnutls28/20199677/log.gz Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)... %COMPAT: Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)... *** Fatal error: A TLS fatal alert has been received. Failure: Failed *** Fatal error: A TLS fatal alert has been received. %NO_ETM: Checking TLS 1.0 with ECDHE-ECDSA (SECP384R1)... Failure: Failed *** Fatal error: A TLS fatal alert has been received. Failure: Failed FAIL [11]../../tests/suite/testcompat-main-openssl Which, according to me, is this check: https://sources.debian.org/src/gnutls28/3.6.7-4%2Bdeb10u7/tests/suite/testcompat-main-openssl/#L307 Paul
OpenPGP_signature
Description: OpenPGP digital signature