FailedOk

th/SRPMS[OK]
th/x32[OK]
th/i686[OK]
th/x86_64[OK]

ac/SRPMS[OK]
ac/i386[OK]
ac/i586[OK]
ac/i686[OK]
ac/alpha[OK]
ac/amd64[OK]
ac/athlon[OK]
ac/ppc[OK]
ac/sparc[OK]
ac/sparc64[OK]

Advanced Search
main()
Powered by PLD Linux
(c) 2002-2021 PLD Team
$Revision: 1.37 $
Powered by NASA.
Your IP: 3.238.204.31

python-cryptography f9da55e4-d0e9-4034-9b20-36efba92fb40

Status:Failed
Source URL:https://buildlogs.pld-linux.org/pld/th/x86_64/FAIL/python-cryptography,f9da55e4-d0e9-4034-9b20-36efba92fb40.bz2
text/plain URL:View!
full text:View!
rpm -qa of builder:View!
Date:2021/10/10 12:07:47
Runtime:0:12:04.148700

Toc:

  • error 1
  • E InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])
  • error 2
  • E AssertionError: assert 50331786L == 101183626
  • error 3
  • E + where 50331786L = _OpenSSLErrorWithText(code=50331786L, lib=6, func=0, reason=138, reason_text='error:0300008A:digital envelope routines::data not multiple of block length').code
  • error 4
  • E InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])
  • error 5
  • if not errors:
  • error 6
  • E ValueError: Could not deserialize key data. The data may be in an incorrect format or it may be encrypted with an unsupported algorithm.
  • error 7
  • E ValueError: Invalid password or PKCS12 data
  • error 8
  • E ValueError: Invalid password or PKCS12 data
  • error 9
  • E AssertionError: assert [<Certificate...A CA)>, ...)>] == [<Certificate(...y X3)>, ...)>]
  • error 10
  • error: Bad exit status from /tmp/B.j0cm4dap/BUILD/tmp/rpm-tmp.PBZAgf (%build)
  • error 11
  • RPM build errors:
  • error 12
  • error: No files produced.

Content:

........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
........................................................................ [ 98%]
.....................................                                    [ 98%]
tests/hazmat/primitives/test_scrypt.py ...................               [ 98%]
tests/hazmat/primitives/test_serialization.py .......................... [ 98%]
........................................................................ [ 98%]
...............................................................s........ [ 99%]
.....                                                                    [ 99%]
tests/hazmat/primitives/test_x25519.py s...................              [ 99%]
tests/hazmat/primitives/test_x448.py s.................                  [ 99%]
tests/hazmat/primitives/test_x963_vectors.py ........................... [ 99%]
........................................................................ [ 99%]
..                                                                       [ 99%]
tests/hazmat/primitives/test_x963kdf.py ........                         [ 99%]
tests/hazmat/primitives/twofactor/test_hotp.py ......................... [ 99%]
..............                                                           [ 99%]
tests/hazmat/primitives/twofactor/test_totp.py ......................... [ 99%]
................                                                         [ 99%]
tests/hypothesis/test_fernet.py .                                        [ 99%]
tests/hypothesis/test_padding.py ..                                      [ 99%]
tests/wycheproof/test_utils.py .                                         [ 99%]
tests/x509/test_ocsp.py ................................................ [ 99%]
..........s....                                                          [ 99%]
tests/x509/test_x509.py ................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
................                                                         [ 99%]
tests/x509/test_x509_crlbuilder.py ..................................... [ 99%]
.                                                                        [ 99%]
tests/x509/test_x509_ext.py ............................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
........................................................................ [ 99%]
.........................................................s.......        [ 99%]
tests/x509/test_x509_revokedcertbuilder.py ....................          [100%]

=================================== FAILURES ===================================
_ TestFernet.test_invalid[cw_0x689RpI-jtRR7oE8h_eQsKImvJapLeSbXpwF4e4=-gAAAAAAdwJ6xAAECAwQFBgcICQoLDA0OD3HkMATM5lFqGaerZ-fWPOm73QeoCk9uGib28Xe5vz6oxq5nmxbx_v7mrfyudzUm-1985-10-26T01:20:01-07:00-60] _

self = <tests.test_fernet.TestFernet object at 0x7ff72511e450>
secret = 'cw_0x689RpI-jtRR7oE8h_eQsKImvJapLeSbXpwF4e4='
token = 'gAAAAAAdwJ6xAAECAwQFBgcICQoLDA0OD3HkMATM5lFqGaerZ-fWPOm73QeoCk9uGib28Xe5vz6oxq5nmxbx_v7mrfyudzUm'
now = '1985-10-26T01:20:01-07:00', ttl_sec = 60
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>
monkeypatch = <_pytest.monkeypatch.MonkeyPatch object at 0x7ff726e8c6d0>

    @json_parametrize(("secret", "token", "now", "ttl_sec"), "invalid.json")
    def test_invalid(self, secret, token, now, ttl_sec, backend, monkeypatch):
        f = Fernet(secret.encode("ascii"), backend=backend)
        current_time = calendar.timegm(iso8601.parse_date(now).utctimetuple())
        with pytest.raises(InvalidToken):
            f.decrypt_at_time(
                token.encode("ascii"),
                ttl=ttl_sec,
>               current_time=current_time,
            )

tests/test_fernet.py:92: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
build-2/lib.linux-x86_64-2.7/cryptography/fernet.py:84: in decrypt_at_time
    return self._decrypt_data(data, timestamp, ttl, current_time)
build-2/lib.linux-x86_64-2.7/cryptography/fernet.py:134: in _decrypt_data
    plaintext_padded += decryptor.finalize()
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/ciphers/base.py:164: in finalize
    data = self._ctx.finalize()
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/ciphers.py:179: in finalize
    errors=errors,
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:245: in openssl_assert
    return binding._openssl_assert(self._lib, ok, errors=errors)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

lib = <module 'lib' (built-in)>, ok = False
errors = [<cryptography.hazmat.bindings.openssl.binding._OpenSSLError object at 0x7ff7250fa7d0>]

    def _openssl_assert(lib, ok, errors=None):
        if not ok:
            if errors is None:
                errors = _consume_errors(lib)
            errors_with_text = _errors_with_text(errors)
    
            raise InternalError(
                "Unknown OpenSSL error. This error is commonly encountered when "
                "another library is not cleaning up the OpenSSL error stack. If "
                "you are using cryptography with another library that uses "
                "OpenSSL try disabling it before reporting a bug. Otherwise "
                "please file an issue at https://github.com/pyca/cryptography/"
                "issues with information on how to reproduce "
                "this. ({0!r})".format(errors_with_text),
>               errors_with_text,
            )
E           InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/bindings/openssl/binding.py:88: InternalError
________________ TestOpenSSL.test_openssl_assert_error_on_stack ________________

self = <test_openssl.TestOpenSSL object at 0x7ff7251ecd10>

    def test_openssl_assert_error_on_stack(self):
        b = Binding()
        b.lib.ERR_put_error(
            b.lib.ERR_LIB_EVP,
            b.lib.EVP_F_EVP_ENCRYPTFINAL_EX,
            b.lib.EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH,
            b"",
            -1,
        )
        with pytest.raises(InternalError) as exc_info:
            _openssl_assert(b.lib, False)
    
        error = exc_info.value.err_code[0]
>       assert error.code == 101183626
E       AssertionError: assert 50331786L == 101183626
E        +  where 50331786L = _OpenSSLErrorWithText(code=50331786L, lib=6, func=0, reason=138, reason_text='error:0300008A:digital envelope routines::data not multiple of block length').code

tests/hazmat/bindings/test_openssl.py:95: AssertionError
__________________ TestCipherContext.test_incorrectly_padded ___________________

self = <tests.hazmat.primitives.test_block.TestCipherContext object at 0x7ff702b95050>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>

    def test_incorrectly_padded(self, backend):
        cipher = Cipher(
            algorithms.AES(b"\x00" * 16), modes.CBC(b"\x00" * 16), backend
        )
        encryptor = cipher.encryptor()
        encryptor.update(b"1")
        with pytest.raises(ValueError):
>           encryptor.finalize()

tests/hazmat/primitives/test_block.py:122: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/ciphers/base.py:164: in finalize
    data = self._ctx.finalize()
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/ciphers.py:179: in finalize
    errors=errors,
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:245: in openssl_assert
    return binding._openssl_assert(self._lib, ok, errors=errors)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

lib = <module 'lib' (built-in)>, ok = False
errors = [<cryptography.hazmat.bindings.openssl.binding._OpenSSLError object at 0x7ff702b95490>]

    def _openssl_assert(lib, ok, errors=None):
        if not ok:
            if errors is None:
                errors = _consume_errors(lib)
            errors_with_text = _errors_with_text(errors)
    
            raise InternalError(
                "Unknown OpenSSL error. This error is commonly encountered when "
                "another library is not cleaning up the OpenSSL error stack. If "
                "you are using cryptography with another library that uses "
                "OpenSSL try disabling it before reporting a bug. Otherwise "
                "please file an issue at https://github.com/pyca/cryptography/"
                "issues with information on how to reproduce "
                "this. ({0!r})".format(errors_with_text),
>               errors_with_text,
            )
E           InternalError: Unknown OpenSSL error. This error is commonly encountered when another library is not cleaning up the OpenSSL error stack. If you are using cryptography with another library that uses OpenSSL try disabling it before reporting a bug. Otherwise please file an issue at https://github.com/pyca/cryptography/issues with information on how to reproduce this. ([_OpenSSLErrorWithText(code=478150763L, lib=57, func=0, reason=107, reason_text='error:1C80006B:Provider routines::wrong final block length')])

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/bindings/openssl/binding.py:88: InternalError
______________________ TestDH.test_bad_exchange[vector0] _______________________

self = <tests.hazmat.primitives.test_dh.TestDH object at 0x7ff7024b32d0>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>
vector = {'g': '2', 'p1': '6982449264326893170076800712455263291469349829090516222210222668518102590295128975951345863513171140...2516566390315327913029035641903575640872665137366552076226566411004476255204566867879551828094289388660251782046', ...}

    @pytest.mark.parametrize(
        "vector",
        load_vectors_from_file(
            os.path.join("asymmetric", "DH", "bad_exchange.txt"),
            load_nist_vectors,
        ),
    )
    def test_bad_exchange(self, backend, vector):
        if (
            backend._fips_enabled
            and int(vector["p1"]) < backend._fips_dh_min_modulus
        ):
            pytest.skip("modulus too small for FIPS mode")
        parameters1 = dh.DHParameterNumbers(
            int(vector["p1"]), int(vector["g"])
        )
        public1 = dh.DHPublicNumbers(int(vector["y1"]), parameters1)
        private1 = dh.DHPrivateNumbers(int(vector["x1"]), public1)
        key1 = private1.private_key(backend)
        pub_key1 = key1.public_key()
    
        parameters2 = dh.DHParameterNumbers(
            int(vector["p2"]), int(vector["g"])
        )
        public2 = dh.DHPublicNumbers(int(vector["y2"]), parameters2)
        private2 = dh.DHPrivateNumbers(int(vector["x2"]), public2)
        key2 = private2.private_key(backend)
        pub_key2 = key2.public_key()
    
        if pub_key2.public_numbers().y >= parameters1.p:
            with pytest.raises(ValueError):
>               key1.exchange(pub_key2)
E               Failed: DID NOT RAISE <type 'exceptions.ValueError'>

tests/hazmat/primitives/test_dh.py:384: Failed
____________________ TestDH.test_load_256bit_key_from_pkcs8 ____________________

self = <tests.hazmat.primitives.test_dh.TestDH object at 0x7ff7024c5850>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>

    @pytest.mark.skip_fips(reason="key_size too small for FIPS")
    def test_load_256bit_key_from_pkcs8(self, backend):
        data = load_vectors_from_file(
            os.path.join("asymmetric", "DH", "dh_key_256.pem"),
            lambda pemfile: pemfile.read(),
            mode="rb",
        )
>       key = serialization.load_pem_private_key(data, None, backend)

tests/hazmat/primitives/test_dh.py:400: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/serialization/base.py:18: in load_pem_private_key
    return backend.load_pem_private_key(data, password)
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:1248: in load_pem_private_key
    password,
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:1475: in _load_key
    self._handle_key_loading_error()
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>

    def _handle_key_loading_error(self):
        errors = self._consume_errors()
    
        if not errors:
            raise ValueError(
                "Could not deserialize key data. The data may be in an "
                "incorrect format or it may be encrypted with an unsupported "
                "algorithm."
            )
        elif errors[0]._lib_reason_match(
            self._lib.ERR_LIB_EVP, self._lib.EVP_R_BAD_DECRYPT
        ) or errors[0]._lib_reason_match(
            self._lib.ERR_LIB_PKCS12,
            self._lib.PKCS12_R_PKCS12_CIPHERFINAL_ERROR,
        ):
            raise ValueError("Bad decrypt. Incorrect password?")
    
        elif any(
            error._lib_reason_match(
                self._lib.ERR_LIB_EVP,
                self._lib.EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM,
            )
            for error in errors
        ):
            raise ValueError("Unsupported public key algorithm.")
    
        else:
            raise ValueError(
>               "Could not deserialize key data. The data may be in an "
                "incorrect format or it may be encrypted with an unsupported "
                "algorithm."
            )
E           ValueError: Could not deserialize key data. The data may be in an incorrect format or it may be encrypted with an unsupported algorithm.

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:1518: ValueError
_ TestPKCS12Loading.test_load_pkcs12_ec_keys_rc2[cert-rc2-key-3des.p12-cryptography] _

self = <tests.hazmat.primitives.test_pkcs12.TestPKCS12Loading object at 0x7ff6faa477d0>
filename = 'cert-rc2-key-3des.p12', password = 'cryptography'
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>

    @pytest.mark.parametrize(
        ("filename", "password"),
        [
            ("cert-rc2-key-3des.p12", b"cryptography"),
            ("no-password.p12", None),
        ],
    )
    @pytest.mark.supported(
        only_if=lambda backend: backend.cipher_supported(_RC2(), None),
        skip_message="Does not support RC2",
    )
    @pytest.mark.skip_fips(reason="Unsupported algorithm in FIPS mode")
    def test_load_pkcs12_ec_keys_rc2(self, filename, password, backend):
>       self._test_load_pkcs12_ec_keys(filename, password, backend)

tests/hazmat/primitives/test_pkcs12.py:76: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
tests/hazmat/primitives/test_pkcs12.py:47: in _test_load_pkcs12_ec_keys
    mode="rb",
tests/utils.py:45: in load_vectors_from_file
    return loader(vector_file)
tests/hazmat/primitives/test_pkcs12.py:45: in <lambda>
    derfile.read(), password, backend
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/serialization/pkcs12.py:15: in load_key_and_certificates
    return backend.load_key_and_certificates_from_pkcs12(data, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>
data = "0\x82\x03R\x02\x01\x030\x82\x03\x18\x06\t*\x86H\x86\xf7\r\x01\x07\x01\xa0\x82\x03\t\x04\x82\x03\x050\x82\x03\x010\x82...2\x1a\x05\x00\x04\x14)\x00\x91\x90\xe8\x10I\xc3uw<U\xd4\xdc\xa7EM}C\x1b\x04\x08\xb7\xde6_\xa1\x95\xdd!\x02\x02\x08\x00"
password = 'cryptography'

    def load_key_and_certificates_from_pkcs12(self, data, password):
        if password is not None:
            utils._check_byteslike("password", password)
    
        bio = self._bytes_to_bio(data)
        p12 = self._lib.d2i_PKCS12_bio(bio.bio, self._ffi.NULL)
        if p12 == self._ffi.NULL:
            self._consume_errors()
            raise ValueError("Could not deserialize PKCS12 data")
    
        p12 = self._ffi.gc(p12, self._lib.PKCS12_free)
        evp_pkey_ptr = self._ffi.new("EVP_PKEY **")
        x509_ptr = self._ffi.new("X509 **")
        sk_x509_ptr = self._ffi.new("Cryptography_STACK_OF_X509 **")
        with self._zeroed_null_terminated_buf(password) as password_buf:
            res = self._lib.PKCS12_parse(
                p12, password_buf, evp_pkey_ptr, x509_ptr, sk_x509_ptr
            )
    
        if res == 0:
            self._consume_errors()
>           raise ValueError("Invalid password or PKCS12 data")
E           ValueError: Invalid password or PKCS12 data

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:2532: ValueError
_____ TestPKCS12Loading.test_load_pkcs12_ec_keys_rc2[no-password.p12-None] _____

self = <tests.hazmat.primitives.test_pkcs12.TestPKCS12Loading object at 0x7ff6faa4f610>
filename = 'no-password.p12', password = None
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>

    @pytest.mark.parametrize(
        ("filename", "password"),
        [
            ("cert-rc2-key-3des.p12", b"cryptography"),
            ("no-password.p12", None),
        ],
    )
    @pytest.mark.supported(
        only_if=lambda backend: backend.cipher_supported(_RC2(), None),
        skip_message="Does not support RC2",
    )
    @pytest.mark.skip_fips(reason="Unsupported algorithm in FIPS mode")
    def test_load_pkcs12_ec_keys_rc2(self, filename, password, backend):
>       self._test_load_pkcs12_ec_keys(filename, password, backend)

tests/hazmat/primitives/test_pkcs12.py:76: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
tests/hazmat/primitives/test_pkcs12.py:47: in _test_load_pkcs12_ec_keys
    mode="rb",
tests/utils.py:45: in load_vectors_from_file
    return loader(vector_file)
tests/hazmat/primitives/test_pkcs12.py:45: in <lambda>
    derfile.read(), password, backend
build-2/lib.linux-x86_64-2.7/cryptography/hazmat/primitives/serialization/pkcs12.py:15: in load_key_and_certificates
    return backend.load_key_and_certificates_from_pkcs12(data, password)
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>
data = '0\x82\x03\xb0\x02\x01\x030\x82\x03w\x06\t*\x86H\x86\xf7\r\x01\x07\x01\xa0\x82\x03h\x04\x82\x03d0\x82\x03`0\x82\x02\'\...5\x00\x04\x14mL\xfc\xde\xc7i\xdc\xfd\xd4\x06x\xd7\x9d{\x19\xebm\x14"\xe4\x04\x08u+\xf6\x1b\x90\xbb\xee\xad\x02\x01\x01'
password = None

    def load_key_and_certificates_from_pkcs12(self, data, password):
        if password is not None:
            utils._check_byteslike("password", password)
    
        bio = self._bytes_to_bio(data)
        p12 = self._lib.d2i_PKCS12_bio(bio.bio, self._ffi.NULL)
        if p12 == self._ffi.NULL:
            self._consume_errors()
            raise ValueError("Could not deserialize PKCS12 data")
    
        p12 = self._ffi.gc(p12, self._lib.PKCS12_free)
        evp_pkey_ptr = self._ffi.new("EVP_PKEY **")
        x509_ptr = self._ffi.new("X509 **")
        sk_x509_ptr = self._ffi.new("Cryptography_STACK_OF_X509 **")
        with self._zeroed_null_terminated_buf(password) as password_buf:
            res = self._lib.PKCS12_parse(
                p12, password_buf, evp_pkey_ptr, x509_ptr, sk_x509_ptr
            )
    
        if res == 0:
            self._consume_errors()
>           raise ValueError("Invalid password or PKCS12 data")
E           ValueError: Invalid password or PKCS12 data

build-2/lib.linux-x86_64-2.7/cryptography/hazmat/backends/openssl/backend.py:2532: ValueError
______________ TestPKCS12Creation.test_generate_with_cert_key_ca _______________

self = <tests.hazmat.primitives.test_pkcs12.TestPKCS12Creation object at 0x7ff6fa8a5550>
backend = <cryptography.hazmat.backends.openssl.backend.Backend object at 0x7ff74e9d4790>

    def test_generate_with_cert_key_ca(self, backend):
        cert, key = _load_ca(backend)
        cert2 = _load_cert(
            backend, os.path.join("x509", "custom", "dsa_selfsigned_ca.pem")
        )
        cert3 = _load_cert(backend, os.path.join("x509", "letsencryptx3.pem"))
        encryption = serialization.NoEncryption()
        p12 = serialize_key_and_certificates(
            None, key, cert, [cert2, cert3], encryption
        )
    
        parsed_key, parsed_cert, parsed_more_certs = load_key_and_certificates(
            p12, None, backend
        )
        assert parsed_cert == cert
        assert parsed_key.private_numbers() == key.private_numbers()
>       assert parsed_more_certs == [cert2, cert3]
E       AssertionError: assert [<Certificate...A CA)>, ...)>] == [<Certificate(...y X3)>, ...)>]
E         At index 0 diff: <Certificate(subject=<Name(C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3)>, ...)> != <Certificate(subject=<Name(C=US,ST=Texas,L=Austin,O=Internet Widgits Pty Ltd,CN=PyCA DSA CA)>, ...)>
E         Use -v to get the full diff

tests/hazmat/primitives/test_pkcs12.py:207: AssertionError
=============================== warnings summary ===============================
/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.requires_backend_interface - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.supported - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.skip_fips - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

/usr/share/python2.7/site-packages/_pytest/mark/structures.py:335
  /usr/share/python2.7/site-packages/_pytest/mark/structures.py:335: PytestUnknownMarkWarning: Unknown pytest.mark.wycheproof_tests - is this a typo?  You can register custom marks to avoid this warning - for details, see https://docs.pytest.org/en/latest/mark.html

-- Docs: https://docs.pytest.org/en/latest/warnings.html
===== 8 failed, 84551 passed, 21242 skipped, 4 warnings in 695.45 seconds ======
error: Bad exit status from /tmp/B.j0cm4dap/BUILD/tmp/rpm-tmp.PBZAgf (%build)


RPM build errors:
    Could not canonicalize hostname: ymir
    Bad exit status from /tmp/B.j0cm4dap/BUILD/tmp/rpm-tmp.PBZAgf (%build)
ended at: Sun Oct 10 12:07:46 2021, done in 0:12:04.148700
error: No files produced.
+ chmod -R u+rwX /tmp/B.j0cm4dap/BUILD
+ rm -rf /tmp/B.j0cm4dap/tmp /tmp/B.j0cm4dap/BUILD
+ rm -rf /tmp/B.j0cm4dap
Begin-PLD-Builder-Info
Build-Time: user:704.86s sys:19.76s real:727.89s (faults io:4 non-io:1372354)

End-PLD-Builder-Info
[Back to list of logs] [View rpm -qa of builder]