http://bugzilla.suse.com/show_bug.cgi?id=1055478
http://bugzilla.suse.com/show_bug.cgi?id=1055478#c1
Vítězslav Čížek changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |IN_PROGRESS
CC| |vcizek@suse.com
--- Comment #1 from Vítězslav Čížek ---
The build fails in %check in test_openssl_memleak.py.
The MEMORY_LEAK_SCRIPT attempts to swap out (for testing purposes) the default
memory allocation functions via CRYPTO_set_mem_functions().
Installing the new hooks succeeds only if there hasn't been an allocation so
far.
Our FIPS patches somehow cause CRYPTO_malloc() to be called. Once it has been
invoked, CRYPTO_set_mem_functions() returns 0 and the memleak test aborts with
a failure.
I'll have a look at what's exactly going on.
--
You are receiving this mail because:
You are on the CC list for the bug.