Your message dated Sat, 13 Apr 2024 18:29:03 +0000
with message-id <e1rvi7b-0054ku...@fasolo.debian.org>
and subject line Bug#1068657: fixed in pkcs11-provider 0.3-2
has caused the Debian Bug report #1068657,
regarding pkcs11-provider FTBFS with openssl 3.2.1-3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1068657: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068657
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: pkcs11-provider
Version: 0.3-1
Severity: serious
Tags: ftbfs

https://buildd.debian.org/status/fetch.php?pkg=pkcs11-provider&arch=ppc64el&ver=0.3-1%2Bb2&stamp=1712517987&raw=0

...
FAIL: basic-softhsm
===================

Executing ./tbasic

## Raw Sign check error
 openssl 
pkeyutl -sign -inkey "${BASEURI}"
              -pkeyopt pad-mode:none
              -in ${TMPPDIR}/64Brandom.bin
              -out ${TMPPDIR}/raw-sig.bin
Public Key operation error
00493C8EFF7F0000:error:0200007A:rsa routines:p11prov_sig_operate:data too small 
for key size:signature.c:894:


## Sign and Verify with provided Hash and RSA
 openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE}

 openssl 
pkeyutl -sign -inkey "${PRIURI}"
              -in ${TMPPDIR}/sha256.bin
              -out ${TMPPDIR}/sha256-sig.bin

 openssl 
pkeyutl -verify -inkey "${PUBURI}"
                -pubin
                -in ${TMPPDIR}/sha256.bin
                -sigfile ${TMPPDIR}/sha256-sig.bin
Signature Verified Successfully

## Sign and Verify with provided Hash and RSA with DigestInfo struct
 openssl dgst -sha256 -binary -out ${TMPPDIR}/sha256.bin ${SEEDFILE}

 openssl 
pkeyutl -sign -inkey "${PRIURI}" -pkeyopt digest:sha256
              -in ${TMPPDIR}/sha256.bin
              -out ${TMPPDIR}/sha256-sig.bin

 openssl 
pkeyutl -verify -inkey "${PUBURI}" -pkeyopt digest:sha256
                -pubin
                -in ${TMPPDIR}/sha256.bin
                -sigfile ${TMPPDIR}/sha256-sig.bin
Signature Verified Successfully

## DigestSign and DigestVerify with RSA
 openssl 
pkeyutl -sign -inkey "${BASEURI}"
              -digest sha256
              -in ${RAND64FILE}
              -rawin
              -out ${TMPPDIR}/sha256-dgstsig.bin

 openssl 
pkeyutl -verify -inkey "${BASEURI}" -pubin
                -digest sha256
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha256-dgstsig.bin
Signature Verified Successfully
 openssl 
pkeyutl -verify -inkey "${PUBURI}"
                -pubin
                -digest sha256
                -in ${RAND64FILE}
                -rawin
                -sigfile ${TMPPDIR}/sha256-dgstsig.bin
Signature Verified Successfully
RSA basic encrypt and decrypt
 openssl 
pkeyutl -encrypt -inkey "${PUBURI}" -pubin
                 -in ${SECRETFILE}
                 -out ${SECRETFILE}.enc

 openssl 
pkeyutl -decrypt -inkey "${PRIURI}"
                 -in ${SECRETFILE}.enc
                 -out ${SECRETFILE}.dec


## Test Disallow Public Export
 openssl pkey -in $PUBURI -pubin -pubout -text

## Test CSR generation from RSA private keys
 openssl 
req -new -batch -key "${PRIURI}" -out ${TMPPDIR}/rsa_csr.pem

 openssl 
req -in ${TMPPDIR}/rsa_csr.pem -verify -noout
Certificate request self-signature verify OK

## Test fetching public keys without PIN in config files
 openssl pkey -in $PUBURI -pubin -pubout -out ${TMPPDIR}/rsa.pub.nopin.pem

 openssl pkey -in $ECPUBURI -pubin -pubout -out ${TMPPDIR}/ec.pub.nopin.pem

 openssl pkey -in $ECXPUBURI -pubin -pubout -out ${TMPPDIR}/ecx.pub.nopin.pem


## Test fetching public keys with a PIN in URI
 openssl pkey -in $BASEURIWITHPIN -pubin -pubout -out 
${TMPPDIR}/rsa.pub.uripin.pem

 openssl pkey -in $ECBASEURIWITHPIN -pubin -pubout -out 
${TMPPDIR}/ec.pub.uripin.pem

 openssl pkey -in $ECXBASEURIWITHPIN -pubin -pubout -out 
${TMPPDIR}/ecx.pub.uripin.pem


## Test prompting without PIN in config files

## Test EVP_PKEY_eq on public RSA key both on token

## Test EVP_PKEY_eq on public EC key both on token

## Test EVP_PKEY_eq on public explicit EC key both on token
Failed to load key from URI: pkcs11:type=public;id=%00%07

FAIL basic-softhsm.t (exit status: 1)
...
============================================================================
Testsuite summary for pkcs11-provider 0.3
============================================================================
# TOTAL: 34
# PASS:  15
# SKIP:  18
# XFAIL: 0
# FAIL:  1
# XPASS: 0
# ERROR: 0
============================================================================
See tests/test-suite.log
Please report to s...@redhat.com
============================================================================
make[4]: *** [Makefile:1070: test-suite.log] Error 1

--- End Message ---
--- Begin Message ---
Source: pkcs11-provider
Source-Version: 0.3-2
Done: Luca Boccassi <bl...@debian.org>

We believe that the bug you reported is fixed in the latest version of
pkcs11-provider, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1068...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luca Boccassi <bl...@debian.org> (supplier of updated pkcs11-provider package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 13 Apr 2024 18:31:26 +0100
Source: pkcs11-provider
Architecture: source
Version: 0.3-2
Distribution: unstable
Urgency: medium
Maintainer: Luca Boccassi <bl...@debian.org>
Changed-By: Luca Boccassi <bl...@debian.org>
Closes: 1068657
Changes:
 pkcs11-provider (0.3-2) unstable; urgency=medium
 .
   * Disable tests (Closes: #1068657)
   * Switch to pkgconf
   * Bump Standards-Version to 4.7.0, no changes
Checksums-Sha1:
 b4628c4fdf238fa96f3b2b1b65657620da805a0d 1986 pkcs11-provider_0.3-2.dsc
 c5bc3e4d751538f4dea5d0a08a3c6755a5075a24 2324 
pkcs11-provider_0.3-2.debian.tar.xz
 b557b127b02295da7b89614365b463055a9f0876 7079 
pkcs11-provider_0.3-2_source.buildinfo
Checksums-Sha256:
 463da30a393d2aa9fd4ecf296e93e8ab18c8f353c2461451d8b99b318af94ea6 1986 
pkcs11-provider_0.3-2.dsc
 a5d264b3733a5e28b58dd756a61a3827f93d1f08d0e742c1d1584baf047821f3 2324 
pkcs11-provider_0.3-2.debian.tar.xz
 49099e4fad9113b571cf0ee44740e45e0f43c4cd829c842738d04869ae631a7a 7079 
pkcs11-provider_0.3-2_source.buildinfo
Files:
 f4987047d27ede2639eacc75303abe32 1986 libs optional pkcs11-provider_0.3-2.dsc
 a2d5056ef4748ee177a1b35ce76026fc 2324 libs optional 
pkcs11-provider_0.3-2.debian.tar.xz
 a2225932f6076afa66a5721b94b2c295 7079 libs optional 
pkcs11-provider_0.3-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=ZquC
-----END PGP SIGNATURE-----

Attachment: pgpAQxJCFMmBj.pgp
Description: PGP signature


--- End Message ---

Reply via email to