FailedOk

th/SRPMS[OK]
th/x32[OK]
th/i686[OK]
th/x86_64[OK]

ac/SRPMS[OK]
ac/i386[OK]
ac/i586[OK]
ac/i686[OK]
ac/alpha[OK]
ac/amd64[OK]
ac/athlon[OK]
ac/ppc[OK]
ac/sparc[OK]
ac/sparc64[OK]

Advanced Search
main()
Powered by PLD Linux
(c) 2002-2021 PLD Team
$Revision: 1.37 $
Powered by ed.
Your IP: 3.236.239.91

python-cryptography f9da55e4-d0e9-4034-9b20-36efba92fb40

Status:Failed
Source URL:https://buildlogs.pld-linux.org/pld/th/i686/FAIL/python-cryptography,f9da55e4-d0e9-4034-9b20-36efba92fb40.bz2
text/plain URL:View!
full text:View!
rpm -qa of builder:View!
Date:2021/10/10 12:27:11
Runtime:0:23:41.329746

Toc:

  • error 1
  • E InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])
  • error 2
  • E AssertionError: assert 50331786L == 101183626
  • error 3
  • E + where 50331786L = _OpenSSLErrorWithText(code=50331786L, lib=6, func=0, reason=138, reason_text='error:0300008A:digital envelope routines::data not multiple of block length').code
  • error 4
  • E InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])
  • error 5
  • if not errors:
  • error 6
  • E ValueError: Could not deserialize key data. The data may be in an incorrect format or it may be encrypted with an unsupported algorithm.
  • error 7
  • E ValueError: Invalid password or PKCS12 data
  • error 8
  • E ValueError: Invalid password or PKCS12 data
  • error 9
  • E AssertionError: assert [<Certificate...A CA)>, ...)>] == [<Certificate(...y X3)>, ...)>]
  • error 10
  • error: Bad exit status from /tmp/B.7vbk0w9o/BUILD/tmp/rpm-tmp.ZAPQKN (%build)
  • error 11
  • RPM build errors:
  • error 12
  • error: No files produced.

Content:

........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
.....................................                                    [ 98%]
tests/hazmat/primitives/test_scrypt.py ....s........s.....               [ 98%]
tests/hazmat/primitives/test_serialization.py .......................... [ 98%]
........................................................................ [ 98%]
...............................................................s........ [ 99%]
.....                                                                    [ 99%]
tests/hazmat/primitives/test_x25519.py s...................              [ 99%]
tests/hazmat/primitives/test_x448.py s.................                  [ 99%]
tests/hazmat/primitives/test_x963_vectors.py ........................... [ 99%]
........................................................................ [ 99%]
..                                                                       [ 99%]
tests/hazmat/primitives/test_x963kdf.py ........                         [ 99%]
tests/hazmat/primitives/twofactor/test_hotp.py ......................... [ 99%]
..............                                                           [ 99%]
tests/hazmat/primitives/twofactor/test_totp.py ......................... [ 99%]
................                                                         [ 99%]
tests/hypothesis/test_fernet.py .                                        [ 99%]
tests/hypothesis/test_padding.py ..                                      [ 99%]
tests/wycheproof/test_utils.py .                                         [ 99%]
tests/x509/test_ocsp.py ................................................ [ 99%]
..........s....                                                          [ 99%]
tests/x509/test_x509.py ................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
................                                                         [ 99%]
tests/x509/test_x509_crlbuilder.py ..................................... [ 99%]
.                                                                        [ 99%]
tests/x509/test_x509_ext.py ............................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
.........................................................s.......        [ 99%]
tests/x509/test_x509_revokedcertbuilder.py ....................          [100%]

=================================== FAILURES ===================================
_ TestFernet.test_invalid[cw_0x689RpI-jtRR7oE8h_eQsKImvJapLeSbXpwF4e4=-gAAAAAAdwJ6xAAECAwQFBgcICQoLDA0OD3HkMATM5lFqGaerZ-fWPOm73QeoCk9uGib28Xe5vz6oxq5nmxbx_v7mrfyudzUm-1985-10-26T01:20:01-07:00-60] _

self = <tests.test_fernet.TestFernet object at 0xdec3118c>
secret = 'cw_0x689RpI-jtRR7oE8h_eQsKImvJapLeSbXpwF4e4='
token = 'gAAAAAAdwJ6xAAECAwQFBgcICQoLDA0OD3HkMATM5lFqGaerZ-fWPOm73QeoCk9uGib28Xe5vz6oxq5nmxbx_v7mrfyudzUm'
now = '1985-10-26T01:20:01-07:00', ttl_sec = 60
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>
monkeypatch = <_pytest.monkeypatch.MonkeyPatch object at 0xdec3122c>

    @json_parametrize(("secret", "token", "now", "ttl_sec"), "invalid.json")
    def test_invalid(self, secret, token, now, ttl_sec, backend, monkeypatch):
        f = Fernet(secret.encode("ascii"), backend=backend)
        current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple())
        with pytest.raises(InvalidToken):
            f.decrypt_at_time(
                token.encode("ascii"),
                ttl=ttl_sec,
>               current_time=current_time,
            )

tests/test_fernet.py:92: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
build-2/lib.linux-i686-2.7/cryptography/fernet.py:84: in decrypt_at_time
    return self._decrypt_data(data, timestamp, ttl, current_time)
build-2/lib.linux-i686-2.7/cryptography/fernet.py:134: in _decrypt_data
    plaintext_padded += decryptor.finalize()
build-2/lib.linux-i686-2.7/cryptography/hazmat/primitives/ciphers/base.py:164: in finalize
    data = self._ctx.finalize()
build-2/lib.linux-i686-2.7/cryptography/hazmat/backends/openssl/ciphers.py:179: in finalize
    errors=errors,
build-2/lib.linux-i686-2.7/cryptography/hazmat/backends/openssl/backend.py:245: in openssl_assert
    return binding._openssl_assert(self._lib, ok, errors=errors)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

lib = <module 'lib' (built-in)>, ok = False
errors = [<cryptography.hazmat.bindings.openssl.binding._OpenSSLError object at 0xdec313ec>]

    def _openssl_assert(lib, ok, errors=None):
        if not ok:
            if errors is None:
                errors = _consume_errors(lib)
            errors_with_text = _errors_with_text(errors)
    
            raise InternalError(
                "Unknown OpenSSL error. This error is commonly encountered when "
                "another library is not cleaning up the OpenSSL error stack. If "
                "you are using cryptography with another library that uses "
                "OpenSSL try disabling it before reporting a bug. Otherwise "
                "please file an issue at https://github.com/pyca/cryptography/"
                "issues with information on how to reproduce "
                "this. ({0!r})".format(errors_with_text),
>               errors_with_text,
            )
E           InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])

build-2/lib.linux-i686-2.7/cryptography/hazmat/bindings/openssl/binding.py:88: InternalError
________________ TestOpenSSL.test_openssl_assert_error_on_stack ________________

self = <test_openssl.TestOpenSSL object at 0xdf2efbcc>

    def test_openssl_assert_error_on_stack(self):
        b = Binding()
        b.lib.ERR_put_error(
            b.lib.ERR_LIB_EVP,
            b.lib.EVP_F_EVP_ENCRYPTFINAL_EX,
            b.lib.EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH,
            b"",
            -1,
        )
        with pytest.raises(InternalError) as exc_info:
            _openssl_assert(b.lib, False)
    
        error = exc_info.value.err_code[0]
>       assert error.code == 101183626
E       AssertionError: assert 50331786L == 101183626
E        +  where 50331786L = _OpenSSLErrorWithText(code=50331786L, lib=6, func=0, reason=138, reason_text='error:0300008A:digital envelope routines::data not multiple of block length').code

tests/hazmat/bindings/test_openssl.py:95: AssertionError
__________________ TestCipherContext.test_incorrectly_padded ___________________

self = <tests.hazmat.primitives.test_block.TestCipherContext object at 0xc6f5ffec>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>

    def test_incorrectly_padded(self, backend):
        cipher = Cipher(
            algorithms.AES(b"\x00" * 16), modes.CBC(b"\x00" * 16), backend
        )
        encryptor = cipher.encryptor()
        encryptor.update(b"1")
        with pytest.raises(ValueError):
>           encryptor.finalize()

tests/hazmat/primitives/test_block.py:122: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
build-2/lib.linux-i686-2.7/cryptography/hazmat/primitives/ciphers/base.py:164: in finalize
    data = self._ctx.finalize()
build-2/lib.linux-i686-2.7/cryptography/hazmat/backends/openssl/ciphers.py:179: in finalize
    errors=errors,
build-2/lib.linux-i686-2.7/cryptography/hazmat/backends/openssl/backend.py:245: in openssl_assert
    return binding._openssl_assert(self._lib, ok, errors=errors)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

lib = <module 'lib' (built-in)>, ok = False
errors = [<cryptography.hazmat.bindings.openssl.binding._OpenSSLError object at 0xc6f6924c>]

    def _openssl_assert(lib, ok, errors=None):
        if not ok:
            if errors is None:
                errors = _consume_errors(lib)
            errors_with_text = _errors_with_text(errors)
    
            raise InternalError(
                "Unknown OpenSSL error. This error is commonly encountered when "
                "another library is not cleaning up the OpenSSL error stack. If "
                "you are using cryptography with another library that uses "
                "OpenSSL try disabling it before reporting a bug. Otherwise "
                "please file an issue at https://github.com/pyca/cryptography/"
                "issues with information on how to reproduce "
                "this. ({0!r})".format(errors_with_text),
>               errors_with_text,
            )
E           InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])

build-2/lib.linux-i686-2.7/cryptography/hazmat/bindings/openssl/binding.py:88: InternalError
______________________ TestDH.test_bad_exchange[vector0] _______________________

self = <tests.hazmat.primitives.test_dh.TestDH object at 0xc6bdb4cc>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>
vector = {'g': '2', 'p1': '6982449264326893170076800712455263291469349829090516222210222668518102590295128975951345863513171140...2516566390315327913029035641903575640872665137366552076226566411004476255204566867879551828094289388660251782046', ...}

    @pytest.mark.parametrize(
        "vector",
        load_vectors_from_file(
            os.path.join("asymmetric", "DH", "bad_exchange.txt"),
            load_nist_vectors,
        ),
    )
    def test_bad_exchange(self, backend, vector):
        if (
            backend._fips_enabled
            and int(vector["p1"]) < backend._fips_dh_min_modulus
        ):
            pytest.skip("modulus too small for FIPS mode")
        parameters1 = dh.DHParameterNumbers(
            int(vector["p1"]), int(vector["g"])
        )
        public1 = dh.DHPublicNumbers(int(vector["y1"]), parameters1)
        private1 = dh.DHPrivateNumbers(int(vector["x1"]), public1)
        key1 = private1.private_key(backend)
        pub_key1 = key1.public_key()
    
        parameters2 = dh.DHParameterNumbers(
            int(vector["p2"]), int(vector["g"])
        )
        public2 = dh.DHPublicNumbers(int(vector["y2"]), parameters2)
        private2 = dh.DHPrivateNumbers(int(vector["x2"]), public2)
        key2 = private2.private_key(backend)
        pub_key2 = key2.public_key()
    
        if pub_key2.public_numbers().y >= parameters1.p:
            with pytest.raises(ValueError):
>               key1.exchange(pub_key2)
E               Failed: DID NOT RAISE <type 'exceptions.ValueError'>

tests/hazmat/primitives/test_dh.py:384: Failed
____________________ TestDH.test_load_256bit_key_from_pkcs8 ____________________

self = <tests.hazmat.primitives.test_dh.TestDH object at 0xc6eb116c>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>

    @pytest.mark.skip_fips(reason="key_size too small for FIPS")
    def test_load_256bit_key_from_pkcs8(self, backend):
        data = load_vectors_from_file(
            os.path.join("asymmetric", "DH", "dh_key_256.pem"),
            lambda pemfile: pemfile.read(),
            mode="rb",
        )
>       key = serialization.load_pem_private_key(data, None, backend)

tests/hazmat/primitives/test_dh.py:400: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
build-2/lib.linux-i686-2.7/cryptography/hazmat/primitives/serialization/base.py:18: in load_pem_private_key
    return backend.load_pem_private_key(data, password)
build-2/lib.linux-i686-2.7/cryptography/hazmat/backends/openssl/backend.py:1248: in load_pem_private_key
    password,
build-2/lib.linux-i686-2.7/cryptography/hazmat/backends/openssl/backend.py:1475: in _load_key
    self._handle_key_loading_error()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>

    def _handle_key_loading_error(self):
        errors = self._consume_errors()
    
        if not errors:
            raise ValueError(
                "Could not deserialize key data. The data may be in an "
                "incorrect format or it may be encrypted with an unsupported "
                "algorithm."
            )
        elif errors[0]._lib_reason_match(
            self._lib.ERR_LIB_EVP, self._lib.EVP_R_BAD_DECRYPT
        ) or errors[0]._lib_reason_match(
            self._lib.ERR_LIB_PKCS12,
            self._lib.PKCS12_R_PKCS12_CIPHERFINAL_ERROR,
        ):
            raise ValueError("Bad decrypt. Incorrect password?")
    
        elif any(
            error._lib_reason_match(
                self._lib.ERR_LIB_EVP,
                self._lib.EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM,
            )
            for error in errors
        ):
            raise ValueError("Unsupported public key algorithm.")
    
        else:
            raise ValueError(
>               "Could not deserialize key data. The data may be in an "
                "incorrect format or it may be encrypted with an unsupported "
                "algorithm."
            )
E           ValueError: Could not deserialize key data. The data may be in an incorrect format or it may be encrypted with an unsupported algorithm.

build-2/lib.linux-i686-2.7/cryptography/hazmat/backends/openssl/backend.py:1518: ValueError
_ TestPKCS12Loading.test_load_pkcs12_ec_keys_rc2[cert-rc2-key-3des.p12-cryptography] _

self = <tests.hazmat.primitives.test_pkcs12.TestPKCS12Loading object at 0xc1933f4c>
filename = 'cert-rc2-key-3des.p12', password = 'cryptography'
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>

    @pytest.mark.parametrize(
        ("filename", "password"),
        [
            ("cert-rc2-key-3des.p12", b"cryptography"),
            ("no-password.p12", None),
        ],
    )
    @pytest.mark.supported(
        only_if=lambda backend: backend.cipher_supported(_RC2(), None),
        skip_message="Does not support RC2",
    )
    @pytest.mark.skip_fips(reason="Unsupported algorithm in FIPS mode")
    def test_load_pkcs12_ec_keys_rc2(self, filename, password, backend):
>       self._test_load_pkcs12_ec_keys(filename, password, backend)

tests/hazmat/primitives/test_pkcs12.py:76: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
tests/hazmat/primitives/test_pkcs12.py:47: in _test_load_pkcs12_ec_keys
    mode="rb",
tests/utils.py:45: in load_vectors_from_file
    return loader(vector_file)
tests/hazmat/primitives/test_pkcs12.py:45: in <lambda>
    derfile.read(), password, backend
build-2/lib.linux-i686-2.7/cryptography/hazmat/primitives/serialization/pkcs12.py:15: in load_key_and_certificates
    return backend.load_key_and_certificates_from_pkcs12(data, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>
data = "0\x82\x03R\x02\x01\x030\x82\x03\x18\x06\t*\x86H\x86\xf7\r\x01\x07\x01\xa0\x82\x03\t\x04\x82\x03\x050\x82\x03\x010\x82...2\x1a\x05\x00\x04\x14)\x00\x91\x90\xe8\x10I\xc3uw<U\xd4\xdc\xa7EM}C\x1b\x04\x08\xb7\xde6_\xa1\x95\xdd!\x02\x02\x08\x00"
password = 'cryptography'

    def load_key_and_certificates_from_pkcs12(self, data, password):
        if password is not None:
            utils._check_byteslike("password", password)
    
        bio = self._bytes_to_bio(data)
        p12 = self._lib.d2i_PKCS12_bio(bio.bio, self._ffi.NULL)
        if p12 == self._ffi.NULL:
            self._consume_errors()
            raise ValueError("Could not deserialize PKCS12 data")
    
        p12 = self._ffi.gc(p12, self._lib.PKCS12_free)
        evp_pkey_ptr = self._ffi.new("EVP_PKEY **")
        x509_ptr = self._ffi.new("X509 **")
        sk_x509_ptr = self._ffi.new("Cryptography_STACK_OF_X509 **")
        with self._zeroed_null_terminated_buf(password) as password_buf:
            res = self._lib.PKCS12_parse(
                p12, password_buf, evp_pkey_ptr, x509_ptr, sk_x509_ptr
            )
    
        if res == 0:
            self._consume_errors()
>           raise ValueError("Invalid password or PKCS12 data")
E           ValueError: Invalid password or PKCS12 data

build-2/lib.linux-i686-2.7/cryptography/hazmat/backends/openssl/backend.py:2532: ValueError
_____ TestPKCS12Loading.test_load_pkcs12_ec_keys_rc2[no-password.p12-None] _____

self = <tests.hazmat.primitives.test_pkcs12.TestPKCS12Loading object at 0xe27aedec>
filename = 'no-password.p12', password = None
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>

    @pytest.mark.parametrize(
        ("filename", "password"),
        [
            ("cert-rc2-key-3des.p12", b"cryptography"),
            ("no-password.p12", None),
        ],
    )
    @pytest.mark.supported(
        only_if=lambda backend: backend.cipher_supported(_RC2(), None),
        skip_message="Does not support RC2",
    )
    @pytest.mark.skip_fips(reason="Unsupported algorithm in FIPS mode")
    def test_load_pkcs12_ec_keys_rc2(self, filename, password, backend):
>       self._test_load_pkcs12_ec_keys(filename, password, backend)

tests/hazmat/primitives/test_pkcs12.py:76: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
tests/hazmat/primitives/test_pkcs12.py:47: in _test_load_pkcs12_ec_keys
    mode="rb",
tests/utils.py:45: in load_vectors_from_file
    return loader(vector_file)
tests/hazmat/primitives/test_pkcs12.py:45: in <lambda>
    derfile.read(), password, backend
build-2/lib.linux-i686-2.7/cryptography/hazmat/primitives/serialization/pkcs12.py:15: in load_key_and_certificates
    return backend.load_key_and_certificates_from_pkcs12(data, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>
data = '0\x82\x03\xb0\x02\x01\x030\x82\x03w\x06\t*\x86H\x86\xf7\r\x01\x07\x01\xa0\x82\x03h\x04\x82\x03d0\x82\x03`0\x82\x02\'\...5\x00\x04\x14mL\xfc\xde\xc7i\xdc\xfd\xd4\x06x\xd7\x9d{\x19\xebm\x14"\xe4\x04\x08u+\xf6\x1b\x90\xbb\xee\xad\x02\x01\x01'
password = None

    def load_key_and_certificates_from_pkcs12(self, data, password):
        if password is not None:
            utils._check_byteslike("password", password)
    
        bio = self._bytes_to_bio(data)
        p12 = self._lib.d2i_PKCS12_bio(bio.bio, self._ffi.NULL)
        if p12 == self._ffi.NULL:
            self._consume_errors()
            raise ValueError("Could not deserialize PKCS12 data")
    
        p12 = self._ffi.gc(p12, self._lib.PKCS12_free)
        evp_pkey_ptr = self._ffi.new("EVP_PKEY **")
        x509_ptr = self._ffi.new("X509 **")
        sk_x509_ptr = self._ffi.new("Cryptography_STACK_OF_X509 **")
        with self._zeroed_null_terminated_buf(password) as password_buf:
            res = self._lib.PKCS12_parse(
                p12, password_buf, evp_pkey_ptr, x509_ptr, sk_x509_ptr
            )
    
        if res == 0:
            self._consume_errors()
>           raise ValueError("Invalid password or PKCS12 data")
E           ValueError: Invalid password or PKCS12 data

build-2/lib.linux-i686-2.7/cryptography/hazmat/backends/openssl/backend.py:2532: ValueError
______________ TestPKCS12Creation.test_generate_with_cert_key_ca _______________

self = <tests.hazmat.primitives.test_pkcs12.TestPKCS12Creation object at 0xc18e750c>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4a3614c>

    def test_generate_with_cert_key_ca(self, backend):
        cert, key = _load_ca(backend)
        cert2 = _load_cert(
            backend, os.path.join("x509", "custom", "dsa_selfsigned_ca.pem")
        )
        cert3 = _load_cert(backend, os.path.join("x509", "letsencryptx3.pem"))
        encryption = serialization.NoEncryption()
        p12 = serialize_key_and_certificates(
            None, key, cert, [cert2, cert3], encryption
        )
    
        parsed_key, parsed_cert, parsed_more_certs = load_key_and_certificates(
            p12, None, backend
        )
        assert parsed_cert == cert
        assert parsed_key.private_numbers() == key.private_numbers()
>       assert parsed_more_certs == [cert2, cert3]
E       AssertionError: assert [<Certificate...A CA)>, ...)>] == [<Certificate(...y X3)>, ...)>]
E         At index 0 diff: <Certificate(subject=<Name(C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3)>, ...)> != <Certificate(subject=<Name(C=US,ST=Texas,L=Austin,O=Internet Widgits Pty Ltd,CN=PyCA DSA CA)>, ...)>
E         Use -v to get the full diff

tests/hazmat/primitives/test_pkcs12.py:207: AssertionError
=============================== warnings summary ===============================
/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.requires_backend_interface - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.supported - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.skip_fips - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.wycheproof_tests - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

-- Docs: https://docs.pytest.org/en/latest/warnings.html
===== 8 failed, 84549 passed, 21244 skipped, 4 warnings in 1394.41 seconds =====
error: Bad exit status from /tmp/B.7vbk0w9o/BUILD/tmp/rpm-tmp.ZAPQKN (%build)


RPM build errors:
    Could not canonicalize hostname: nereid
    Bad exit status from /tmp/B.7vbk0w9o/BUILD/tmp/rpm-tmp.ZAPQKN (%build)
ended at: Sun Oct 10 12:27:11 2021, done in 0:23:41.329746
error: No files produced.
+ chmod -R u+rwX /tmp/B.7vbk0w9o/BUILD
+ rm -rf /tmp/B.7vbk0w9o/tmp /tmp/B.7vbk0w9o/BUILD
+ rm -rf /tmp/B.7vbk0w9o
Begin-PLD-Builder-Info
Build-Time: user:1407.25s sys:16.70s real:1425.04s (faults io:1 non-io:819271)

End-PLD-Builder-Info
[Back to list of logs] [View rpm -qa of builder]