Comment # 2 on bug 1055478 from
I wondered why did the tests succeed with our openssl 1.0.2, which has
basically the same FIPS patches.
It turned out, the tests were skipped there:

120 def skip_if_memtesting_not_supported():
121     return pytest.mark.skipif(                                              
122         not Binding().lib.Cryptography_HAS_MEM_FUNCTIONS,
123         reason="Requires OpenSSL memory functions (>=1.1.0)"
124     )

Our FIPS patches do a lot of stuff at the library load, CRYPTO_malloc() is
called many times from several places. That prevents subsequent memory
debugging via CRYPTO_set_mem_functions().
I'm afraid we'll need to disable the openssl memleak test.

Corresponding submit request:
https://build.opensuse.org/request/show/521999


You are receiving this mail because: