FailedOk

th/SRPMS[OK]
th/x32[OK]
th/i686[OK]
th/x86_64[OK]

ac/SRPMS[OK]
ac/i386[OK]
ac/i586[OK]
ac/i686[OK]
ac/alpha[OK]
ac/amd64[OK]
ac/athlon[OK]
ac/ppc[OK]
ac/sparc[OK]
ac/sparc64[OK]

Advanced Search
main()
Powered by PLD Linux
(c) 2002-2021 PLD Team
$Revision: 1.37 $
Powered by NASA.
Your IP: 35.175.107.77

python-cryptography f9da55e4-d0e9-4034-9b20-36efba92fb40

Status:Failed
Source URL:https://buildlogs.pld-linux.org/pld/th/x32/FAIL/python-cryptography,f9da55e4-d0e9-4034-9b20-36efba92fb40.bz2
text/plain URL:View!
full text:View!
rpm -qa of builder:View!
Date:2021/10/10 12:12:21
Runtime:0:14:05.031327

Toc:

  • error 1
  • E InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])
  • error 2
  • E AssertionError: assert 50331786L == 101183626
  • error 3
  • E + where 50331786L = _OpenSSLErrorWithText(code=50331786L, lib=6, func=0, reason=138, reason_text='error:0300008A:digital envelope routines::data not multiple of block length').code
  • error 4
  • E InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])
  • error 5
  • if not errors:
  • error 6
  • E ValueError: Could not deserialize key data. The data may be in an incorrect format or it may be encrypted with an unsupported algorithm.
  • error 7
  • E ValueError: Invalid password or PKCS12 data
  • error 8
  • E ValueError: Invalid password or PKCS12 data
  • error 9
  • E AssertionError: assert [<Certificate...A CA)>, ...)>] == [<Certificate(...y X3)>, ...)>]
  • error 10
  • error: Bad exit status from /tmp/B.ffsjbv79/BUILD/tmp/rpm-tmp.rN8qua (%build)
  • error 11
  • RPM build errors:
  • error 12
  • error: No files produced.

Content:

........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
.....................................                                    [ 98%]
tests/hazmat/primitives/test_scrypt.py ....s........s.....               [ 98%]
tests/hazmat/primitives/test_serialization.py .......................... [ 98%]
........................................................................ [ 98%]
...............................................................s........ [ 99%]
.....                                                                    [ 99%]
tests/hazmat/primitives/test_x25519.py s...................              [ 99%]
tests/hazmat/primitives/test_x448.py s.................                  [ 99%]
tests/hazmat/primitives/test_x963_vectors.py ........................... [ 99%]
........................................................................ [ 99%]
..                                                                       [ 99%]
tests/hazmat/primitives/test_x963kdf.py ........                         [ 99%]
tests/hazmat/primitives/twofactor/test_hotp.py ......................... [ 99%]
..............                                                           [ 99%]
tests/hazmat/primitives/twofactor/test_totp.py ......................... [ 99%]
................                                                         [ 99%]
tests/hypothesis/test_fernet.py .                                        [ 99%]
tests/hypothesis/test_padding.py ..                                      [ 99%]
tests/wycheproof/test_utils.py .                                         [ 99%]
tests/x509/test_ocsp.py ................................................ [ 99%]
..........s....                                                          [ 99%]
tests/x509/test_x509.py ................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
................                                                         [ 99%]
tests/x509/test_x509_crlbuilder.py ..................................... [ 99%]
.                                                                        [ 99%]
tests/x509/test_x509_ext.py ............................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
.........................................................s.......        [ 99%]
tests/x509/test_x509_revokedcertbuilder.py ....................          [100%]

=================================== FAILURES ===================================
_ TestFernet.test_invalid[cw_0x689RpI-jtRR7oE8h_eQsKImvJapLeSbXpwF4e4=-gAAAAAAdwJ6xAAECAwQFBgcICQoLDA0OD3HkMATM5lFqGaerZ-fWPOm73QeoCk9uGib28Xe5vz6oxq5nmxbx_v7mrfyudzUm-1985-10-26T01:20:01-07:00-60] _

self = <tests.test_fernet.TestFernet object at 0xe0299cb0>
secret = 'cw_0x689RpI-jtRR7oE8h_eQsKImvJapLeSbXpwF4e4='
token = 'gAAAAAAdwJ6xAAECAwQFBgcICQoLDA0OD3HkMATM5lFqGaerZ-fWPOm73QeoCk9uGib28Xe5vz6oxq5nmxbx_v7mrfyudzUm'
now = '1985-10-26T01:20:01-07:00', ttl_sec = 60
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>
monkeypatch = <_pytest.monkeypatch.MonkeyPatch object at 0xe0299df0>

    @json_parametrize(("secret", "token", "now", "ttl_sec"), "invalid.json")
    def test_invalid(self, secret, token, now, ttl_sec, backend, monkeypatch):
        f = Fernet(secret.encode("ascii"), backend=backend)
        current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple())
        with pytest.raises(InvalidToken):
            f.decrypt_at_time(
                token.encode("ascii"),
                ttl=ttl_sec,
>               current_time=current_time,
            )

tests/test_fernet.py:92: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
build-2/lib.linux-x86_64-2.7/cryptography/fernet.py:84: in decrypt_at_time
    return self._decrypt_data(data, timestamp, ttl, current_time)
build-2/lib.linux-x86_64-2.7/cryptography/fernet.py:134: in _decrypt_data
    plaintext_padded += decryptor.finalize()
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/ciphers/base.py:164: in finalize
    data = self._ctx.finalize()
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/ciphers.py:179: in finalize
    errors=errors,
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:245: in openssl_assert
    return binding._openssl_assert(self._lib, ok, errors=errors)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

lib = <module 'lib' (built-in)>, ok = False
errors = [<cryptography.hazmat.bindings.openssl.binding._OpenSSLError object at 0xdf51e850>]

    def _openssl_assert(lib, ok, errors=None):
        if not ok:
            if errors is None:
                errors = _consume_errors(lib)
            errors_with_text = _errors_with_text(errors)
    
            raise InternalError(
                "Unknown OpenSSL error. This error is commonly encountered when "
                "another library is not cleaning up the OpenSSL error stack. If "
                "you are using cryptography with another library that uses "
                "OpenSSL try disabling it before reporting a bug. Otherwise "
                "please file an issue at https://github.com/pyca/cryptography/"
                "issues with information on how to reproduce "
                "this. ({0!r})".format(errors_with_text),
>               errors_with_text,
            )
E           InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/bindings/openssl/binding.py:88: InternalError
________________ TestOpenSSL.test_openssl_assert_error_on_stack ________________

self = <test_openssl.TestOpenSSL object at 0xdf9651d0>

    def test_openssl_assert_error_on_stack(self):
        b = Binding()
        b.lib.ERR_put_error(
            b.lib.ERR_LIB_EVP,
            b.lib.EVP_F_EVP_ENCRYPTFINAL_EX,
            b.lib.EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH,
            b"",
            -1,
        )
        with pytest.raises(InternalError) as exc_info:
            _openssl_assert(b.lib, False)
    
        error = exc_info.value.err_code[0]
>       assert error.code == 101183626
E       AssertionError: assert 50331786L == 101183626
E        +  where 50331786L = _OpenSSLErrorWithText(code=50331786L, lib=6, func=0, reason=138, reason_text='error:0300008A:digital envelope routines::data not multiple of block length').code

tests/hazmat/bindings/test_openssl.py:95: AssertionError
__________________ TestCipherContext.test_incorrectly_padded ___________________

self = <tests.hazmat.primitives.test_block.TestCipherContext object at 0xc571b510>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>

    def test_incorrectly_padded(self, backend):
        cipher = Cipher(
            algorithms.AES(b"\x00" * 16), modes.CBC(b"\x00" * 16), backend
        )
        encryptor = cipher.encryptor()
        encryptor.update(b"1")
        with pytest.raises(ValueError):
>           encryptor.finalize()

tests/hazmat/primitives/test_block.py:122: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/ciphers/base.py:164: in finalize
    data = self._ctx.finalize()
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/ciphers.py:179: in finalize
    errors=errors,
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:245: in openssl_assert
    return binding._openssl_assert(self._lib, ok, errors=errors)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

lib = <module 'lib' (built-in)>, ok = False
errors = [<cryptography.hazmat.bindings.openssl.binding._OpenSSLError object at 0xc571b8d0>]

    def _openssl_assert(lib, ok, errors=None):
        if not ok:
            if errors is None:
                errors = _consume_errors(lib)
            errors_with_text = _errors_with_text(errors)
    
            raise InternalError(
                "Unknown OpenSSL error. This error is commonly encountered when "
                "another library is not cleaning up the OpenSSL error stack. If "
                "you are using cryptography with another library that uses "
                "OpenSSL try disabling it before reporting a bug. Otherwise "
                "please file an issue at https://github.com/pyca/cryptography/"
                "issues with information on how to reproduce "
                "this. ({0!r})".format(errors_with_text),
>               errors_with_text,
            )
E           InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/bindings/openssl/binding.py:88: InternalError
______________________ TestDH.test_bad_exchange[vector0] _______________________

self = <tests.hazmat.primitives.test_dh.TestDH object at 0xc534ec50>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>
vector = {'g': '2', 'p1': '6982449264326893170076800712455263291469349829090516222210222668518102590295128975951345863513171140...2516566390315327913029035641903575640872665137366552076226566411004476255204566867879551828094289388660251782046', ...}

    @pytest.mark.parametrize(
        "vector",
        load_vectors_from_file(
            os.path.join("asymmetric", "DH", "bad_exchange.txt"),
            load_nist_vectors,
        ),
    )
    def test_bad_exchange(self, backend, vector):
        if (
            backend._fips_enabled
            and int(vector["p1"]) < backend._fips_dh_min_modulus
        ):
            pytest.skip("modulus too small for FIPS mode")
        parameters1 = dh.DHParameterNumbers(
            int(vector["p1"]), int(vector["g"])
        )
        public1 = dh.DHPublicNumbers(int(vector["y1"]), parameters1)
        private1 = dh.DHPrivateNumbers(int(vector["x1"]), public1)
        key1 = private1.private_key(backend)
        pub_key1 = key1.public_key()
    
        parameters2 = dh.DHParameterNumbers(
            int(vector["p2"]), int(vector["g"])
        )
        public2 = dh.DHPublicNumbers(int(vector["y2"]), parameters2)
        private2 = dh.DHPrivateNumbers(int(vector["x2"]), public2)
        key2 = private2.private_key(backend)
        pub_key2 = key2.public_key()
    
        if pub_key2.public_numbers().y >= parameters1.p:
            with pytest.raises(ValueError):
>               key1.exchange(pub_key2)
E               Failed: DID NOT RAISE <type 'exceptions.ValueError'>

tests/hazmat/primitives/test_dh.py:384: Failed
____________________ TestDH.test_load_256bit_key_from_pkcs8 ____________________

self = <tests.hazmat.primitives.test_dh.TestDH object at 0xc5359dd0>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>

    @pytest.mark.skip_fips(reason="key_size too small for FIPS")
    def test_load_256bit_key_from_pkcs8(self, backend):
        data = load_vectors_from_file(
            os.path.join("asymmetric", "DH", "dh_key_256.pem"),
            lambda pemfile: pemfile.read(),
            mode="rb",
        )
>       key = serialization.load_pem_private_key(data, None, backend)

tests/hazmat/primitives/test_dh.py:400: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/serialization/base.py:18: in load_pem_private_key
    return backend.load_pem_private_key(data, password)
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:1248: in load_pem_private_key
    password,
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:1475: in _load_key
    self._handle_key_loading_error()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>

    def _handle_key_loading_error(self):
        errors = self._consume_errors()
    
        if not errors:
            raise ValueError(
                "Could not deserialize key data. The data may be in an "
                "incorrect format or it may be encrypted with an unsupported "
                "algorithm."
            )
        elif errors[0]._lib_reason_match(
            self._lib.ERR_LIB_EVP, self._lib.EVP_R_BAD_DECRYPT
        ) or errors[0]._lib_reason_match(
            self._lib.ERR_LIB_PKCS12,
            self._lib.PKCS12_R_PKCS12_CIPHERFINAL_ERROR,
        ):
            raise ValueError("Bad decrypt. Incorrect password?")
    
        elif any(
            error._lib_reason_match(
                self._lib.ERR_LIB_EVP,
                self._lib.EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM,
            )
            for error in errors
        ):
            raise ValueError("Unsupported public key algorithm.")
    
        else:
            raise ValueError(
>               "Could not deserialize key data. The data may be in an "
                "incorrect format or it may be encrypted with an unsupported "
                "algorithm."
            )
E           ValueError: Could not deserialize key data. The data may be in an incorrect format or it may be encrypted with an unsupported algorithm.

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:1518: ValueError
_ TestPKCS12Loading.test_load_pkcs12_ec_keys_rc2[cert-rc2-key-3des.p12-cryptography] _

self = <tests.hazmat.primitives.test_pkcs12.TestPKCS12Loading object at 0xbfdaded0>
filename = 'cert-rc2-key-3des.p12', password = 'cryptography'
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>

    @pytest.mark.parametrize(
        ("filename", "password"),
        [
            ("cert-rc2-key-3des.p12", b"cryptography"),
            ("no-password.p12", None),
        ],
    )
    @pytest.mark.supported(
        only_if=lambda backend: backend.cipher_supported(_RC2(), None),
        skip_message="Does not support RC2",
    )
    @pytest.mark.skip_fips(reason="Unsupported algorithm in FIPS mode")
    def test_load_pkcs12_ec_keys_rc2(self, filename, password, backend):
>       self._test_load_pkcs12_ec_keys(filename, password, backend)

tests/hazmat/primitives/test_pkcs12.py:76: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
tests/hazmat/primitives/test_pkcs12.py:47: in _test_load_pkcs12_ec_keys
    mode="rb",
tests/utils.py:45: in load_vectors_from_file
    return loader(vector_file)
tests/hazmat/primitives/test_pkcs12.py:45: in <lambda>
    derfile.read(), password, backend
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/serialization/pkcs12.py:15: in load_key_and_certificates
    return backend.load_key_and_certificates_from_pkcs12(data, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>
data = "0\x82\x03R\x02\x01\x030\x82\x03\x18\x06\t*\x86H\x86\xf7\r\x01\x07\x01\xa0\x82\x03\t\x04\x82\x03\x050\x82\x03\x010\x82...2\x1a\x05\x00\x04\x14)\x00\x91\x90\xe8\x10I\xc3uw<U\xd4\xdc\xa7EM}C\x1b\x04\x08\xb7\xde6_\xa1\x95\xdd!\x02\x02\x08\x00"
password = 'cryptography'

    def load_key_and_certificates_from_pkcs12(self, data, password):
        if password is not None:
            utils._check_byteslike("password", password)
    
        bio = self._bytes_to_bio(data)
        p12 = self._lib.d2i_PKCS12_bio(bio.bio, self._ffi.NULL)
        if p12 == self._ffi.NULL:
            self._consume_errors()
            raise ValueError("Could not deserialize PKCS12 data")
    
        p12 = self._ffi.gc(p12, self._lib.PKCS12_free)
        evp_pkey_ptr = self._ffi.new("EVP_PKEY **")
        x509_ptr = self._ffi.new("X509 **")
        sk_x509_ptr = self._ffi.new("Cryptography_STACK_OF_X509 **")
        with self._zeroed_null_terminated_buf(password) as password_buf:
            res = self._lib.PKCS12_parse(
                p12, password_buf, evp_pkey_ptr, x509_ptr, sk_x509_ptr
            )
    
        if res == 0:
            self._consume_errors()
>           raise ValueError("Invalid password or PKCS12 data")
E           ValueError: Invalid password or PKCS12 data

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:2532: ValueError
_____ TestPKCS12Loading.test_load_pkcs12_ec_keys_rc2[no-password.p12-None] _____

self = <tests.hazmat.primitives.test_pkcs12.TestPKCS12Loading object at 0xbfd3e690>
filename = 'no-password.p12', password = None
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>

    @pytest.mark.parametrize(
        ("filename", "password"),
        [
            ("cert-rc2-key-3des.p12", b"cryptography"),
            ("no-password.p12", None),
        ],
    )
    @pytest.mark.supported(
        only_if=lambda backend: backend.cipher_supported(_RC2(), None),
        skip_message="Does not support RC2",
    )
    @pytest.mark.skip_fips(reason="Unsupported algorithm in FIPS mode")
    def test_load_pkcs12_ec_keys_rc2(self, filename, password, backend):
>       self._test_load_pkcs12_ec_keys(filename, password, backend)

tests/hazmat/primitives/test_pkcs12.py:76: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
tests/hazmat/primitives/test_pkcs12.py:47: in _test_load_pkcs12_ec_keys
    mode="rb",
tests/utils.py:45: in load_vectors_from_file
    return loader(vector_file)
tests/hazmat/primitives/test_pkcs12.py:45: in <lambda>
    derfile.read(), password, backend
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/serialization/pkcs12.py:15: in load_key_and_certificates
    return backend.load_key_and_certificates_from_pkcs12(data, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>
data = '0\x82\x03\xb0\x02\x01\x030\x82\x03w\x06\t*\x86H\x86\xf7\r\x01\x07\x01\xa0\x82\x03h\x04\x82\x03d0\x82\x03`0\x82\x02\'\...5\x00\x04\x14mL\xfc\xde\xc7i\xdc\xfd\xd4\x06x\xd7\x9d{\x19\xebm\x14"\xe4\x04\x08u+\xf6\x1b\x90\xbb\xee\xad\x02\x01\x01'
password = None

    def load_key_and_certificates_from_pkcs12(self, data, password):
        if password is not None:
            utils._check_byteslike("password", password)
    
        bio = self._bytes_to_bio(data)
        p12 = self._lib.d2i_PKCS12_bio(bio.bio, self._ffi.NULL)
        if p12 == self._ffi.NULL:
            self._consume_errors()
            raise ValueError("Could not deserialize PKCS12 data")
    
        p12 = self._ffi.gc(p12, self._lib.PKCS12_free)
        evp_pkey_ptr = self._ffi.new("EVP_PKEY **")
        x509_ptr = self._ffi.new("X509 **")
        sk_x509_ptr = self._ffi.new("Cryptography_STACK_OF_X509 **")
        with self._zeroed_null_terminated_buf(password) as password_buf:
            res = self._lib.PKCS12_parse(
                p12, password_buf, evp_pkey_ptr, x509_ptr, sk_x509_ptr
            )
    
        if res == 0:
            self._consume_errors()
>           raise ValueError("Invalid password or PKCS12 data")
E           ValueError: Invalid password or PKCS12 data

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:2532: ValueError
______________ TestPKCS12Creation.test_generate_with_cert_key_ca _______________

self = <tests.hazmat.primitives.test_pkcs12.TestPKCS12Creation object at 0xbfd694b0>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0xf4da2a50>

    def test_generate_with_cert_key_ca(self, backend):
        cert, key = _load_ca(backend)
        cert2 = _load_cert(
            backend, os.path.join("x509", "custom", "dsa_selfsigned_ca.pem")
        )
        cert3 = _load_cert(backend, os.path.join("x509", "letsencryptx3.pem"))
        encryption = serialization.NoEncryption()
        p12 = serialize_key_and_certificates(
            None, key, cert, [cert2, cert3], encryption
        )
    
        parsed_key, parsed_cert, parsed_more_certs = load_key_and_certificates(
            p12, None, backend
        )
        assert parsed_cert == cert
        assert parsed_key.private_numbers() == key.private_numbers()
>       assert parsed_more_certs == [cert2, cert3]
E       AssertionError: assert [<Certificate...A CA)>, ...)>] == [<Certificate(...y X3)>, ...)>]
E         At index 0 diff: <Certificate(subject=<Name(C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3)>, ...)> != <Certificate(subject=<Name(C=US,ST=Texas,L=Austin,O=Internet Widgits Pty Ltd,CN=PyCA DSA CA)>, ...)>
E         Use -v to get the full diff

tests/hazmat/primitives/test_pkcs12.py:207: AssertionError
=============================== warnings summary ===============================
/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.requires_backend_interface - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.supported - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.skip_fips - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.wycheproof_tests - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

-- Docs: https://docs.pytest.org/en/latest/warnings.html
===== 8 failed, 84549 passed, 21244 skipped, 4 warnings in 814.83 seconds ======
error: Bad exit status from /tmp/B.ffsjbv79/BUILD/tmp/rpm-tmp.rN8qua (%build)


RPM build errors:
    Bad exit status from /tmp/B.ffsjbv79/BUILD/tmp/rpm-tmp.rN8qua (%build)
ended at: Sun Oct 10 12:12:21 2021, done in 0:14:05.031327
error: No files produced.
+ chmod -R u+rwX /tmp/B.ffsjbv79/BUILD
+ rm -rf /tmp/B.ffsjbv79/tmp /tmp/B.ffsjbv79/BUILD
+ rm -rf /tmp/B.ffsjbv79
Begin-PLD-Builder-Info
Build-Time: user:828.25s sys:19.34s real:848.99s (faults io:0 non-io:838225)

End-PLD-Builder-Info
[Back to list of logs] [View rpm -qa of builder]