Your message dated Sat, 13 Apr 2024 18:29:03 +0000 with message-id <e1rvi7b-0054ku...@fasolo.debian.org> and subject line Bug#1068657: fixed in pkcs11-provider 0.3-2 has caused the Debian Bug report #1068657, regarding pkcs11-provider FTBFS with openssl 3.2.1-3 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1068657: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068657 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: pkcs11-provider Version: 0.3-1 Severity: serious Tags: ftbfs https://buildd.debian.org/status/fetch.php?pkg=pkcs11-provider&arch=ppc64el&ver=0.3-1%2Bb2&stamp=1712517987&raw=0 ... FAIL: basic-softhsm =================== Executing ./tbasic ## Raw Sign check error openssl pkeyutl -sign -inkey "${BASEURI}" -pkeyopt pad-mode:none -in ${TMPPDIR}/64Brandom.bin -out ${TMPPDIR}/raw-sig.bin Public Key operation error 00493C8EFF7F0000:error:0200007A:rsa routines:p11prov_sig_operate:data too small for key size:signature.c:894: ## Sign and Verify with provided Hash and RSA openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## Sign and Verify with provided Hash and RSA with DigestInfo struct openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE} openssl pkeyutl -sign -inkey "${PRIURI}" -pkeyopt digest:sha256 -in ${TMPPDIR}/sha256.bin -out ${TMPPDIR}/sha256-sig.bin openssl pkeyutl -verify -inkey "${PUBURI}" -pkeyopt digest:sha256 -pubin -in ${TMPPDIR}/sha256.bin -sigfile ${TMPPDIR}/sha256-sig.bin Signature Verified Successfully ## DigestSign and DigestVerify with RSA openssl pkeyutl -sign -inkey "${BASEURI}" -digest sha256 -in ${RAND64FILE} -rawin -out ${TMPPDIR}/sha256-dgstsig.bin openssl pkeyutl -verify -inkey "${BASEURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully openssl pkeyutl -verify -inkey "${PUBURI}" -pubin -digest sha256 -in ${RAND64FILE} -rawin -sigfile ${TMPPDIR}/sha256-dgstsig.bin Signature Verified Successfully RSA basic encrypt and decrypt openssl pkeyutl -encrypt -inkey "${PUBURI}" -pubin -in ${SECRETFILE} -out ${SECRETFILE}.enc openssl pkeyutl -decrypt -inkey "${PRIURI}" -in ${SECRETFILE}.enc -out ${SECRETFILE}.dec ## Test Disallow Public Export openssl pkey -in $PUBURI -pubin -pubout -text ## Test CSR generation from RSA private keys openssl req -new -batch -key "${PRIURI}" -out ${TMPPDIR}/rsa_csr.pem openssl req -in ${TMPPDIR}/rsa_csr.pem -verify -noout Certificate request self-signature verify OK ## Test fetching public keys without PIN in config files openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/rsa.pub.nopin.pem openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ec.pub.nopin.pem openssl pkey -in $ECXPUBURI -pubin -pubout -out ${TMPPDIR}/ecx.pub.nopin.pem ## Test fetching public keys with a PIN in URI openssl pkey -in $BASEURIWITHPIN -pubin -pubout -out ${TMPPDIR}/rsa.pub.uripin.pem openssl pkey -in $ECBASEURIWITHPIN -pubin -pubout -out ${TMPPDIR}/ec.pub.uripin.pem openssl pkey -in $ECXBASEURIWITHPIN -pubin -pubout -out ${TMPPDIR}/ecx.pub.uripin.pem ## Test prompting without PIN in config files ## Test EVP_PKEY_eq on public RSA key both on token ## Test EVP_PKEY_eq on public EC key both on token ## Test EVP_PKEY_eq on public explicit EC key both on token Failed to load key from URI: pkcs11:type=public;id=%00%07 FAIL basic-softhsm.t (exit status: 1) ... ============================================================================ Testsuite summary for pkcs11-provider 0.3 ============================================================================ # TOTAL: 34 # PASS: 15 # SKIP: 18 # XFAIL: 0 # FAIL: 1 # XPASS: 0 # ERROR: 0 ============================================================================ See tests/test-suite.log Please report to s...@redhat.com ============================================================================ make[4]: *** [Makefile:1070: test-suite.log] Error 1
--- End Message ---
--- Begin Message ---Source: pkcs11-provider Source-Version: 0.3-2 Done: Luca Boccassi <bl...@debian.org> We believe that the bug you reported is fixed in the latest version of pkcs11-provider, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1068...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Luca Boccassi <bl...@debian.org> (supplier of updated pkcs11-provider package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 13 Apr 2024 18:31:26 +0100 Source: pkcs11-provider Architecture: source Version: 0.3-2 Distribution: unstable Urgency: medium Maintainer: Luca Boccassi <bl...@debian.org> Changed-By: Luca Boccassi <bl...@debian.org> Closes: 1068657 Changes: pkcs11-provider (0.3-2) unstable; urgency=medium . * Disable tests (Closes: #1068657) * Switch to pkgconf * Bump Standards-Version to 4.7.0, no changes Checksums-Sha1: b4628c4fdf238fa96f3b2b1b65657620da805a0d 1986 pkcs11-provider_0.3-2.dsc c5bc3e4d751538f4dea5d0a08a3c6755a5075a24 2324 pkcs11-provider_0.3-2.debian.tar.xz b557b127b02295da7b89614365b463055a9f0876 7079 pkcs11-provider_0.3-2_source.buildinfo Checksums-Sha256: 463da30a393d2aa9fd4ecf296e93e8ab18c8f353c2461451d8b99b318af94ea6 1986 pkcs11-provider_0.3-2.dsc a5d264b3733a5e28b58dd756a61a3827f93d1f08d0e742c1d1584baf047821f3 2324 pkcs11-provider_0.3-2.debian.tar.xz 49099e4fad9113b571cf0ee44740e45e0f43c4cd829c842738d04869ae631a7a 7079 pkcs11-provider_0.3-2_source.buildinfo Files: f4987047d27ede2639eacc75303abe32 1986 libs optional pkcs11-provider_0.3-2.dsc a2d5056ef4748ee177a1b35ce76026fc 2324 libs optional pkcs11-provider_0.3-2.debian.tar.xz a2225932f6076afa66a5721b94b2c295 7079 libs optional pkcs11-provider_0.3-2_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJFBAEBCgAvFiEErCSqx93EIPGOymuRKGv37813JB4FAmYaxpwRHGJsdWNhQGRl Ymlhbi5vcmcACgkQKGv37813JB4Lpw//ZREJcTTIKhtEXFWsX8hLktLDl0/MVSsx yUYJE3zv+Rsjp44z8SbUqvi0BQEpSlMC0cncvI3nJVbdfZlA8wrrn+cqsXtl0Bry Pdk3h08Y8XbWDBokQaN3KhtJT9SSVlduH0qajF0b4U5wFU/4AH2NErHO9ewLFbxX Jcesg69g0GfwS2qkpVGr1yKW9iLyv1Z7ONzUB2nfbSVJSC+l7Kq+1hHkqvWC1lN5 0lq7a0rzI6P9Mmo8GGdy8JrwVraJZPfvJ4HdV2USMNtAruaQNkYcBw88Z1Ue7VL6 fuuRpwuOmZkIsGrjUu9Vzif+WPb49TJS82yMKBYMTXB0iTp/DcBJ9QTDBkMsByHA X4BCFTILLvncSM8vPnUGsDcN2mzX87Z4Gc1XDp2Se3gs/B/btzcFZklPQe0jADbu OUkkva1aNrM2XQPUMFgfpjU8t1CgaKw/9oOlej2r78hoY7JLojoaOc6ThxYFxYos 0LfGx/bgUl3qjqdnyBttr2uA8RaQZyLTwSx7ib8irkFrTp5w8c64dkqKBrDhDeCg 0QqrhuxFYZGeu9kkZ8kHxsUFnV9QxvNIWcgJBPjXVnO8pDAMFyRJUgt3Z4ajuJBW 6X8DrjDuyh6GV7zOut3ct9EVznXe/WQwbTsd2OY5f/swePip2X098SmzUbuD6vNg ZNUtwCgqfa4= =ZquC -----END PGP SIGNATURE-----pgpAQxJCFMmBj.pgp
Description: PGP signature
--- End Message ---