This new release shows a new test failure when building for Arch Linux: FAIL: ocsp-tests/ocsp-must-staple-connection.sh ============================================================================ Testsuite summary for GnuTLS 3.8.7 ============================================================================ # TOTAL: 501 # PASS: 455 # SKIP: 45 # XFAIL: 0 # FAIL: 1 # XPASS: 0 # ERROR: 0
I'm attaching the test-suite.log. Is this a new test and failure expected when building in a fakeroot chroot for packaging? -Andy Arch Linux
========================================
GnuTLS 3.8.7: tests/test-suite.log
========================================
# TOTAL: 501
# PASS: 455
# SKIP: 45
# XFAIL: 0
# FAIL: 1
# XPASS: 0
# ERROR: 0
System information (uname -a): Linux 6.6.46-1-lts #1 SMP PREEMPT_DYNAMIC Wed, 14 Aug 2024 15:21:14 +0000 x86_64
Distribution information (/etc/issue):
Arch Linux \r (\l)
.. contents:: :depth: 2
SKIP: ssl30-server-kx-neg
=========================
SKIP ssl30-server-kx-neg (exit status: 77)
SKIP: ssl30-cipher-neg
======================
SKIP ssl30-cipher-neg (exit status: 77)
SKIP: mini-dtls-large
=====================
SKIP mini-dtls-large (exit status: 77)
SKIP: mini-dtls-heartbeat
=========================
SKIP mini-dtls-heartbeat (exit status: 77)
SKIP: fips-test
===============
Please note that if in FIPS140 mode, you need to assure the library's integrity prior to running this test
We are not in FIPS140 mode
SKIP fips-test (exit status: 77)
SKIP: fips-override-test
========================
Please note that if in FIPS140 mode, you need to assure the library's integrity prior to running this test
We are not in FIPS140 mode
SKIP fips-override-test (exit status: 77)
SKIP: rehandshake-switch-srp-id
===============================
SKIP rehandshake-switch-srp-id (exit status: 77)
SKIP: srpbase64
===============
SKIP srpbase64 (exit status: 77)
SKIP: ssl30-cert-key-exchange
=============================
SKIP ssl30-cert-key-exchange (exit status: 77)
SKIP: srp
=========
SKIP srp (exit status: 77)
SKIP: xts-key-check
===================
SKIP xts-key-check (exit status: 77)
SKIP: fips-rsa-sizes
====================
We are not in FIPS140 mode
SKIP fips-rsa-sizes (exit status: 77)
SKIP: fips-mode-pthread
=======================
We are not in FIPS140 mode
SKIP fips-mode-pthread (exit status: 77)
SKIP: pkcs11/pkcs11-chainverify
===============================
cannot find softhsm bin
SKIP pkcs11/pkcs11-chainverify (exit status: 77)
SKIP: pkcs11/pkcs11-get-issuer
==============================
cannot find softhsm bin
SKIP pkcs11/pkcs11-get-issuer (exit status: 77)
SKIP: pkcs11/pkcs11-is-known
============================
cannot find softhsm bin
SKIP pkcs11/pkcs11-is-known (exit status: 77)
SKIP: pkcs11/pkcs11-combo
=========================
cannot find softhsm bin
SKIP pkcs11/pkcs11-combo (exit status: 77)
SKIP: pkcs11/pkcs11-privkey
===========================
cannot find softhsm bin
SKIP pkcs11/pkcs11-privkey (exit status: 77)
SKIP: pkcs11/pkcs11-pubkey-import-rsa
=====================================
Testing RSA key
cannot find softhsm bin
SKIP pkcs11/pkcs11-pubkey-import-rsa (exit status: 77)
SKIP: pkcs11/pkcs11-pubkey-import-ecdsa
=======================================
Testing ECDSA key
cannot find softhsm bin
SKIP pkcs11/pkcs11-pubkey-import-ecdsa (exit status: 77)
SKIP: pkcs11/pkcs11-ec-privkey-test
===================================
cannot find softhsm bin
SKIP pkcs11/pkcs11-ec-privkey-test (exit status: 77)
SKIP: pkcs11/pkcs11-import-with-pin
===================================
cannot find softhsm bin
SKIP pkcs11/pkcs11-import-with-pin (exit status: 77)
SKIP: pkcs11/pkcs11-obj-import
==============================
cannot find softhsm bin
SKIP pkcs11/pkcs11-obj-import (exit status: 77)
SKIP: pkcs11/pkcs11-rsa-pss-privkey-test
========================================
cannot find softhsm bin
SKIP pkcs11/pkcs11-rsa-pss-privkey-test (exit status: 77)
SKIP: pkcs11/tls-neg-pkcs11-key
===============================
cannot find softhsm bin
SKIP pkcs11/tls-neg-pkcs11-key (exit status: 77)
SKIP: pkcs11/pkcs11-privkey-generate
====================================
cannot find softhsm bin
SKIP pkcs11/pkcs11-privkey-generate (exit status: 77)
SKIP: pkcs11/gnutls_x509_crt_list_import_url
============================================
cannot find softhsm bin
SKIP pkcs11/gnutls_x509_crt_list_import_url (exit status: 77)
SKIP: pkcs11/gnutls_pcert_list_import_x509_file
===============================================
cannot find softhsm bin
SKIP pkcs11/gnutls_pcert_list_import_x509_file (exit status: 77)
SKIP: pkcs11/pkcs11-eddsa-privkey-test
======================================
cannot find softhsm bin
SKIP pkcs11/pkcs11-eddsa-privkey-test (exit status: 77)
SKIP: tls13/post-handshake-with-cert-pkcs11
===========================================
cannot find softhsm module
SKIP tls13/post-handshake-with-cert-pkcs11 (exit status: 77)
SKIP: pkcs11/tls-neg-pkcs11-no-key
==================================
cannot find softhsm module
SKIP pkcs11/tls-neg-pkcs11-no-key (exit status: 77)
SKIP: pkcs11/distrust-after
===========================
cannot find softhsm module
SKIP pkcs11/distrust-after (exit status: 77)
SKIP: tpm2
==========
Need swtpm package to run this test.
SKIP tpm2.sh (exit status: 77)
SKIP: starttls
==============
SKIP starttls.sh (exit status: 77)
SKIP: starttls-ftp
==================
SKIP starttls-ftp.sh (exit status: 77)
SKIP: starttls-smtp
===================
SKIP starttls-smtp.sh (exit status: 77)
SKIP: starttls-lmtp
===================
SKIP starttls-lmtp.sh (exit status: 77)
SKIP: starttls-pop3
===================
SKIP starttls-pop3.sh (exit status: 77)
SKIP: starttls-xmpp
===================
SKIP starttls-xmpp.sh (exit status: 77)
SKIP: starttls-nntp
===================
SKIP starttls-nntp.sh (exit status: 77)
SKIP: starttls-sieve
====================
SKIP starttls-sieve.sh (exit status: 77)
FAIL: ocsp-tests/ocsp-must-staple-connection
============================================
reserved port 47218
reserved port 44730
=== Generating good server certificate ===
=== Bringing OCSP server up ===
ocsp: waiting for OCSP client connections...
=== Verifying OCSP server is up ===
Connecting to OCSP server: localhost...
ocsp: received request, 1st line: POST /ocsp/ HTTP/1.0
ocsp: sending response, 1st line: HTTP/1.0 200 OK
Assuming response's signer = issuer (use --load-signer to override).
Resolving 'localhost:44730'...
Connecting to '::1:44730'...
Connecting to '127.0.0.1:44730'...
OCSP Response Information:
Response Status: Successful
Response Type: Basic OCSP Response
Version: 1
Responder ID: CN=Testing Authority OCSP Responder
Produced At: Thu Aug 15 11:31:06 UTC 2024
Responses:
Certificate ID:
Hash Algorithm: SHA1
Issuer Name Hash: bac68790352ceb4c4de1534445348f8b4b5309b3
Issuer Key Hash: e865fcb9123c7285fc28c803149f06ad94dfd934
Serial Number: 02
Certificate Status: good
This Update: Thu Aug 15 11:31:06 UTC 2024
Extensions:
Signature Algorithm: RSA-SHA256
-----BEGIN OCSP RESPONSE-----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-----END OCSP RESPONSE-----
Verifying OCSP Response: Success.
=== Test 1: Server with valid certificate - no staple ===
Echo Server listening on IPv4 0.0.0.0 port 47218...done
Echo Server listening on IPv6 :: port 47218...done
*** Fatal error: Error in the certificate.
Error in handshake: A TLS fatal alert has been received.
Processed 1 CA certificate(s).
Resolving 'localhost:47218'...
Connecting to '::1:47218'...
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
- subject `CN=localhost', issuer `CN=Testing Authority', serial 0x02, RSA key 3072 bits, signed using RSA-SHA256, activated `2016-03-29 16:21:42 UTC', expires `2026-03-29 16:24:41 UTC', pin-sha256="STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0="
Public Key ID:
sha1:e4d27568778399f943e2efe21575b3a6bd47ec22
sha256:4935de9d21fd5999550ce70d044e59cb2c6a5b13454ecc29be8e4d00e74a556d
Public Key PIN:
pin-sha256:STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0=
- Status: The certificate is NOT trusted. The certificate requires the server to include an OCSP status in its response, but the OCSP status is missing.
*** PKI verification of server certificate failed...
Exiting via signal 15
=== Test 2: Server with valid certificate - valid staple ===
reserved port 34358
Echo Server listening on IPv4 0.0.0.0 port 34358...done
Echo Server listening on IPv6 :: port 34358...done
Processed 1 CA certificate(s).
Resolving 'localhost:34358'...
Connecting to '::1:34358'...
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
- subject `CN=localhost', issuer `CN=Testing Authority', serial 0x02, RSA key 3072 bits, signed using RSA-SHA256, activated `2016-03-29 16:21:42 UTC', expires `2026-03-29 16:24:41 UTC', pin-sha256="STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0="
Public Key ID:
sha1:e4d27568778399f943e2efe21575b3a6bd47ec22
sha256:4935de9d21fd5999550ce70d044e59cb2c6a5b13454ecc29be8e4d00e74a556d
Public Key PIN:
pin-sha256:STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0=
- Status: The certificate is trusted.
- Description: (TLS1.3-X.509)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM)
- Session ID: 5B:56:06:9B:0C:E8:6F:EE:D0:95:93:F2:27:27:A2:1D:F6:6D:36:88:FC:89:6C:E2:90:84:5D:61:F7:1A:B9:7C
- Options: OCSP status request,
- Handshake was completed
- Simple Client Mode:
received cmd: test 123456
*** Processing 12 bytes command: test 123456
test 123456
- Peer has closed the GnuTLS connection
Exiting via signal 15
=== Test 3: Server with valid certificate - invalid staple ===
reserved port 41795
Echo Server listening on IPv4 0.0.0.0 port 41795...done
Echo Server listening on IPv6 :: port 41795...done
|<1>| There was an error parsing the OCSP response: ASN1 parser: Error in TAG..
*** Fatal error: Error in the certificate.
Error in handshake: A TLS fatal alert has been received.
Processed 1 CA certificate(s).
Resolving 'localhost:41795'...
Connecting to '::1:41795'...
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
- subject `CN=localhost', issuer `CN=Testing Authority', serial 0x02, RSA key 3072 bits, signed using RSA-SHA256, activated `2016-03-29 16:21:42 UTC', expires `2026-03-29 16:24:41 UTC', pin-sha256="STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0="
Public Key ID:
sha1:e4d27568778399f943e2efe21575b3a6bd47ec22
sha256:4935de9d21fd5999550ce70d044e59cb2c6a5b13454ecc29be8e4d00e74a556d
Public Key PIN:
pin-sha256:STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0=
- Status: The certificate is NOT trusted. The received OCSP status response is invalid.
*** PKI verification of server certificate failed...
Exiting via signal 15
=== Test 4: Server with valid certificate - unrelated cert staple ===
reserved port 41832
Echo Server listening on IPv4 0.0.0.0 port 41832...done
Echo Server listening on IPv6 :: port 41832...done
|<1>| Got OCSP response with an unrelated certificate.
*** Fatal error: Error in the certificate.
Error in handshake: A TLS fatal alert has been received.
Processed 1 CA certificate(s).
Resolving 'localhost:41832'...
Connecting to '::1:41832'...
- Certificate type: X.509
- Got a certificate list of 1 certificates.
- Certificate[0] info:
- subject `CN=localhost', issuer `CN=Testing Authority', serial 0x02, RSA key 3072 bits, signed using RSA-SHA256, activated `2016-03-29 16:21:42 UTC', expires `2026-03-29 16:24:41 UTC', pin-sha256="STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0="
Public Key ID:
sha1:e4d27568778399f943e2efe21575b3a6bd47ec22
sha256:4935de9d21fd5999550ce70d044e59cb2c6a5b13454ecc29be8e4d00e74a556d
Public Key PIN:
pin-sha256:STXenSH9WZlVDOcNBE5ZyyxqWxNFTswpvo5NAOdKVW0=
- Status: The certificate is NOT trusted. The received OCSP status response is invalid.
*** PKI verification of server certificate failed...
Exiting via signal 15
=== Test 5: Server with valid certificate - expired staple ===
./ocsp-tests/ocsp-must-staple-connection.sh: line 301: : command not found
reserved port 30084
Cannot set OCSP status request file: /tmp/ocsp-must-staple-connection.J3rrdM/ms-resp.tmp: Error while reading file.
=== Test 5.1: Server with valid certificate - expired staple (ignoring errors) ===
Cannot set OCSP status request file: /tmp/ocsp-must-staple-connection.J3rrdM/ms-resp.tmp: Error while reading file.
try 1: waiting for port
try 2: waiting for port
try 3: waiting for port
try 4: waiting for port
try 5: waiting for port
try 6: waiting for port
try 7: waiting for port
try 8: waiting for port
try 9: waiting for port
try 10: waiting for port
try 11: waiting for port
try 12: waiting for port
try 13: waiting for port
try 14: waiting for port
try 15: waiting for port
try 16: waiting for port
try 17: waiting for port
try 18: waiting for port
try 19: waiting for port
try 20: waiting for port
try 21: waiting for port
try 22: waiting for port
try 23: waiting for port
try 24: waiting for port
try 25: waiting for port
try 26: waiting for port
try 27: waiting for port
try 28: waiting for port
try 29: waiting for port
try 30: waiting for port
try 31: waiting for port
try 32: waiting for port
try 33: waiting for port
try 34: waiting for port
try 35: waiting for port
try 36: waiting for port
try 37: waiting for port
try 38: waiting for port
try 39: waiting for port
try 40: waiting for port
try 41: waiting for port
try 42: waiting for port
try 43: waiting for port
try 44: waiting for port
try 45: waiting for port
try 46: waiting for port
try 47: waiting for port
try 48: waiting for port
try 49: waiting for port
try 50: waiting for port
try 51: waiting for port
try 52: waiting for port
try 53: waiting for port
try 54: waiting for port
try 55: waiting for port
try 56: waiting for port
try 57: waiting for port
try 58: waiting for port
try 59: waiting for port
try 60: waiting for port
try 61: waiting for port
try 62: waiting for port
try 63: waiting for port
try 64: waiting for port
try 65: waiting for port
try 66: waiting for port
try 67: waiting for port
try 68: waiting for port
try 69: waiting for port
try 70: waiting for port
try 71: waiting for port
try 72: waiting for port
try 73: waiting for port
try 74: waiting for port
try 75: waiting for port
try 76: waiting for port
try 77: waiting for port
try 78: waiting for port
try 79: waiting for port
try 80: waiting for port
try 81: waiting for port
try 82: waiting for port
try 83: waiting for port
try 84: waiting for port
try 85: waiting for port
try 86: waiting for port
try 87: waiting for port
try 88: waiting for port
try 89: waiting for port
try 90: waiting for port
Server 30084 did not come up
./scripts/common.sh: line 183: kill: (114533) - No such process
unreserved port 30084
FAIL ocsp-tests/ocsp-must-staple-connection.sh (exit status: 1)
SKIP: testpkcs11
================
Testing PKCS11 support
usage: ./testpkcs11.sh: [pkcs15|softhsm|sc-hsm]
SKIP testpkcs11.sh (exit status: 77)
SKIP: certtool-pkcs11
=====================
Testing PKCS11 verification
Could not find softhsm(2) tool
SKIP certtool-pkcs11.sh (exit status: 77)
SKIP: pkcs11-tool
=================
+ : .
+ : .
+ : ../src/certtool
+ : ../src/p11tool
+ : diff
+ test '' = 1
+ . ./scripts/common.sh
++ export TZ=UTC
++ TZ=UTC
++ GETPORT='
rc=0
while test $rc = 0; do
unset myrandom
if test -n "$RANDOM"; then myrandom=$(($RANDOM + $RANDOM)); fi
if test -z "$myrandom"; then myrandom=$(date +%N | sed s/^0*//); fi
if test -z "$myrandom"; then myrandom=0; fi
PORT="$(((($$<<15)|$myrandom) % 63001 + 2000))"
check_if_port_in_use $PORT;rc=$?
done
'
++ create_testdir pkcs11-tool
++ local PREFIX=pkcs11-tool
+++ mktemp -d -t pkcs11-tool.XXXXXX
++ d=/tmp/pkcs11-tool.hH2j5d
++ test 0 -ne 0
++ trap 'test -e "/tmp/pkcs11-tool.hH2j5d" && rm -rf "/tmp/pkcs11-tool.hH2j5d"' 1 15 2
++ echo /tmp/pkcs11-tool.hH2j5d
+ testdir=/tmp/pkcs11-tool.hH2j5d
+ TMP_SOFTHSM_DIR=/tmp/pkcs11-tool.hH2j5d/softhsm-load.114918.tmp
+ TEMPLATE=/tmp/pkcs11-tool.hH2j5d/cert.cfg
+ PIN=1234
+ PUK=1234
+ test -x ../src/p11tool
+ test -x ../src/certtool
+ for lib in ${libdir} ${libdir}/pkcs11 /usr/lib64/pkcs11/ /usr/lib/pkcs11/ /usr/lib/x86_64-linux-gnu/pkcs11/ /usr/lib/softhsm/
+ test -f /usr/lib/libsofthsm2.so
+ for lib in ${libdir} ${libdir}/pkcs11 /usr/lib64/pkcs11/ /usr/lib/pkcs11/ /usr/lib/x86_64-linux-gnu/pkcs11/ /usr/lib/softhsm/
+ test -f /usr/lib/pkcs11/libsofthsm2.so
+ for lib in ${libdir} ${libdir}/pkcs11 /usr/lib64/pkcs11/ /usr/lib/pkcs11/ /usr/lib/x86_64-linux-gnu/pkcs11/ /usr/lib/softhsm/
+ test -f /usr/lib64/pkcs11//libsofthsm2.so
+ for lib in ${libdir} ${libdir}/pkcs11 /usr/lib64/pkcs11/ /usr/lib/pkcs11/ /usr/lib/x86_64-linux-gnu/pkcs11/ /usr/lib/softhsm/
+ test -f /usr/lib/pkcs11//libsofthsm2.so
+ for lib in ${libdir} ${libdir}/pkcs11 /usr/lib64/pkcs11/ /usr/lib/pkcs11/ /usr/lib/x86_64-linux-gnu/pkcs11/ /usr/lib/softhsm/
+ test -f /usr/lib/x86_64-linux-gnu/pkcs11//libsofthsm2.so
+ for lib in ${libdir} ${libdir}/pkcs11 /usr/lib64/pkcs11/ /usr/lib/pkcs11/ /usr/lib/x86_64-linux-gnu/pkcs11/ /usr/lib/softhsm/
+ test -f /usr/lib/softhsm//libsofthsm2.so
+ test -f ''
+ echo 'softhsm module was not found'
softhsm module was not found
+ exit 77
SKIP pkcs11-tool.sh (exit status: 77)
SKIP: p11-kit-load
==================
located
softhsm module was not found
SKIP p11-kit-load.sh (exit status: 77)
pgpnonK__oFQ_.pgp
Description: Digitale Signatur von OpenPGP
_______________________________________________ Gnutls-help mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnutls-help
