http://bugzilla.suse.com/show_bug.cgi?id=1055478
http://bugzilla.suse.com/show_bug.cgi?id=1055478#c2
--- Comment #2 from Vítězslav Čížek ---
I wondered why did the tests succeed with our openssl 1.0.2, which has
basically the same FIPS patches.
It turned out, the tests were skipped there:
120 def skip_if_memtesting_not_supported():
121 return pytest.mark.skipif(
122 not Binding().lib.Cryptography_HAS_MEM_FUNCTIONS,
123 reason="Requires OpenSSL memory functions (>=1.1.0)"
124 )
Our FIPS patches do a lot of stuff at the library load, CRYPTO_malloc() is
called many times from several places. That prevents subsequent memory
debugging via CRYPTO_set_mem_functions().
I'm afraid we'll need to disable the openssl memleak test.
Corresponding submit request:
https://build.opensuse.org/request/show/521999
--
You are receiving this mail because:
You are on the CC list for the bug.