https://bugzilla.suse.com/show_bug.cgi?id=1209053 https://bugzilla.suse.com/show_bug.cgi?id=1209053#c5 --- Comment #5 from Jose Lausuch <jalausuch@suse.com> --- (In reply to Pedro Monreal Gonzalez from comment #4)
Regarding MD4, it is already blocked and it shows the expected result. As Marcus mentioned in https://bugzilla.suse.com/show_bug.cgi?id=1209037#c1, the QA openssl_fips_hash test would need to capture the reported string from openssl 3 the same way. Probably the string might have changed since openssl 1.1.1.
Yes, what I meant is that for md4 it is expected, and the test is expecting the error message, so that's ok. But then problem is that "md5", "md5-sha1", "rmd160" and "ripemd160" should also fail and it works. -- You are receiving this mail because: You are on the CC list for the bug.