Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 835963 - net-analyzer/wireshark-3.6.2 - fails suite_capture, suite_decryption, suite_release tests
Summary: net-analyzer/wireshark-3.6.2 - fails suite_capture, suite_decryption, suite_r...
Status: CONFIRMED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: PPC64 Linux
: Normal normal
Assignee: Sam James
URL: https://gitlab.com/wireshark/wireshar...
Whiteboard:
Keywords: TESTFAILURE
: 934572 (view as bug list)
Depends on:
Blocks:
 
Reported: 2022-03-24 22:24 UTC by ernsteiswuerfel
Modified: 2024-07-29 00:54 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
build.log.xz (wireshark-3.6.2:20220324-220712.log.xz,73.59 KB, application/x-xz)
2022-03-24 22:24 UTC, ernsteiswuerfel
Details
LastTest.log (LastTest.log,108.60 KB, text/plain)
2022-03-24 22:24 UTC, ernsteiswuerfel
Details
emerge --info (file_835963.txt,6.45 KB, text/plain)
2022-03-24 22:25 UTC, ernsteiswuerfel
Details
build.log.xz (ppc64, 3.6.6) (wireshark-3.6.6:20220720-153002.log.xz,74.62 KB, application/x-xz)
2022-07-20 20:00 UTC, ernsteiswuerfel
Details
build.log and emerge --info (build.log.gz,138.04 KB, application/gzip)
2024-07-15 06:26 UTC, matoro
Details

Note You need to log in before you can comment on or make changes to this bug.
Description ernsteiswuerfel archtester 2022-03-24 22:24:23 UTC
Created attachment 767760 [details]
build.log.xz

[...]
92% tests passed, 3 tests failed out of 37

Total Test time (real) =  40.34 sec

The following tests FAILED:
          1 - suite_capture (Failed)
          3 - suite_decryption (Failed)
         33 - suite_release (Failed)
Errors while running CTest
Output from these tests are in: /var/tmp/portage/net-analyzer/wireshark-3.6.2/work/wireshark-3.6.2_build/Testing/Temporary/LastTest.log
Use "--rerun-failed --output-on-failure" to re-run the failed cases verbosely.
 * ERROR: net-analyzer/wireshark-3.6.2::gentoo failed (test phase):
Comment 1 ernsteiswuerfel archtester 2022-03-24 22:24:41 UTC
Created attachment 767761 [details]
LastTest.log
Comment 2 ernsteiswuerfel archtester 2022-03-24 22:25:04 UTC
Created attachment 767762 [details]
emerge --info
Comment 3 ernsteiswuerfel archtester 2022-07-20 20:00:15 UTC
Created attachment 792626 [details]
build.log.xz (ppc64, 3.6.6)

Different test failures on 3.6.6.

[...]
================================================= FAILURES
____________________________ case_decrypt_80211.test_80211_wpa2_ft_psk_no_roam _____________________________
[gw3] linux -- Python 3.10.5 /usr/bin/python3.10

self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_no_roam>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
capture_file = <function capture_file.<locals>.resolver at 0x3fff9831a5f0>

    def test_80211_wpa2_ft_psk_no_roam(self, cmd_tshark, capture_file):
        '''IEEE 802.11 decode WPA2 FT PSK (without roam verification)'''
        # Included in git sources test/captures/wpa2-ft-psk.pcapng.gz
        self.assertRun((cmd_tshark,
                '-o', 'wlan.enable_decryption: TRUE',
                '-r', capture_file('wpa2-ft-psk.pcapng.gz'),
                '-Y', 'wlan.analysis.tk == ba60c7be2944e18f31949508a53ee9d6 || wlan.analysis.gtk == 6eab6a5f8d880f81104ed65ab0c74449',
                ))
        # Verifies that traffic from initial authentication can be decrypted (both TK and GTK)
>       self.assertEqual(self.countOutput('DHCP Discover'), 2)
E       AssertionError: 0 != 2

capture_file = <function capture_file.<locals>.resolver at 0x3fff9831a5f0>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
self       = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_no_roam>

test/suite_decryption.py:235: AssertionError

[...]

________________________________ case_decrypt_80211.test_80211_wpa2_ft_eap _________________________________
[gw2] linux -- Python 3.10.5 /usr/bin/python3.10

self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_eap>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
capture_file = <function capture_file.<locals>.resolver at 0x3fffbacdf9a0>

    def test_80211_wpa2_ft_eap(self, cmd_tshark, capture_file):
        '''IEEE 802.11 decode WPA2 FT EAP'''
        # Included in git sources test/captures/wpa2-ft-eap.pcapng.gz
        self.assertRun((cmd_tshark,
                '-o', 'wlan.enable_decryption: TRUE',
                '-r', capture_file('wpa2-ft-eap.pcapng.gz'),
                '-Y', 'wlan.analysis.tk == 65471b64605bf2a04af296284cb4ae2a || wlan.analysis.gtk == 1783a5c28e046df6fb58cf4406c4b22c',
                ))
>       self.assertTrue(self.grepOutput('Who has 192.168.1.1'))    # Verifies GTK decryption
E       AssertionError: False is not true

capture_file = <function capture_file.<locals>.resolver at 0x3fffbacdf9a0>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
self       = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_eap>

test/suite_decryption.py:271: AssertionError

[...]

______________________________ case_decrypt_80211.test_80211_wpa2_ft_psk_roam ______________________________
[gw1] linux -- Python 3.10.5 /usr/bin/python3.10

self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_roam>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
capture_file = <function capture_file.<locals>.resolver at 0x3fff8fa9cca0>
features = namespace(have_x64=True, have_lua=False, have_nghttp2=False, have_kerberos=False, have_libgcrypt16=True, have_libgcrypt17=True, have_libgcrypt18=True, have_gnutls=True, have_pkcs11=True, have_brotli=False, have_plugins=True)

    def test_80211_wpa2_ft_psk_roam(self, cmd_tshark, capture_file, features):
        '''IEEE 802.11 decode WPA2 FT PSK'''
        # Included in git sources test/captures/wpa2-ft-psk.pcapng.gz
        if not features.have_libgcrypt16:
            self.skipTest('Requires GCrypt 1.6 or later.')
    
        # Verify TK and GTK for both initial authentication (AP1) and roam(AP2).
        self.assertRun((cmd_tshark,
                '-o', 'wlan.enable_decryption: TRUE',
                '-r', capture_file('wpa2-ft-psk.pcapng.gz'),
                '-Y', 'wlan.analysis.tk == ba60c7be2944e18f31949508a53ee9d6 || wlan.analysis.gtk == 6eab6a5f8d880f81104ed65ab0c74449 || wlan.analysis.tk == a6a3304e5a8fabe0dc427cc41a707858 || wlan.analysis.gtk == a6cc605e10878f86b20a266c9b58d230',
                ))
>       self.assertEqual(self.countOutput('DHCP Discover'), 2)
E       AssertionError: 0 != 2

capture_file = <function capture_file.<locals>.resolver at 0x3fff8fa9cca0>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
features   = namespace(have_x64=True,
          have_lua=False,
          have_nghttp2=False,
          have_kerberos=False,
          have_libgcrypt16=True,
          have_libgcrypt17=True,
          have_libgcrypt18=True,
          have_gnutls=True,
          have_pkcs11=True,
          have_brotli=False,
          have_plugins=True)
self       = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_roam>

test/suite_decryption.py:255: AssertionError
Comment 4 Matt Turner gentoo-dev 2022-09-03 01:12:33 UTC
This appears to be an endianness bug. It occurs on big-endian systems: s390x (according to $URL), sparc64 (I tested), and ppc64 (I tested), but not on ppc64le.
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2024-07-15 00:38:31 UTC
*** Bug 934572 has been marked as a duplicate of this bug. ***
Comment 6 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2024-07-15 00:42:08 UTC
Could you report any remaining failures with latest upstream please?
Comment 7 matoro archtester 2024-07-15 06:26:00 UTC
Created attachment 897644 [details]
build.log and emerge --info

Results from current 9999:

ERROR ../wireshark-9999_build/suite_io.py
FAILED ../wireshark-9999_build/suite_decryption.py::TestDecrypt80211::test_80211_wpa2_ft_psk_no_roam - AssertionError: assert 0 == 2
 +  where 0 = count_output('', 'DHCP Discover')
FAILED ../wireshark-9999_build/suite_decryption.py::TestDecrypt80211::test_80211_wpa2_ft_psk_roam - AssertionError: assert 0 == 2
 +  where 0 = count_output('', 'DHCP Discover')
FAILED ../wireshark-9999_build/suite_decryption.py::TestDecrypt80211::test_80211_wpa2_ft_eap - AssertionError: assert False
 +  where False = grep_output('', 'Who has 192.168.1.1')
FAILED ../wireshark-9999_build/suite_sharkd.py::TestSharkd::test_sharkd_req_download_tls_secrets - AssertionError: assert ({'jsonrpc': '2.0', 'id': 1, 'result': {'status': 'OK'}}, {'jsonrpc': '2.0', 'id': 2, 'result': {'file': 'keylog.txt', 'mime': 'text/plain', 'data': <MatchRegExp pattern='Q0xJRU5UX1JBTkRPTSBm.+'>}}) == ({'jsonrpc': '2.0', 'id': 1, 'result': {'status': 'OK'}}, {'jsonrpc': '2.0', 'id': 2, 'result': {'file': 'keylog.txt', 'mime': 'text/plain', 'data': 'Q0xJRU5UX1JBTkRPTSAxZTBkNjNiNDFkN2M3YmI2Mzk1NTljZmM5ZjA2ZmZkNWM2NWZlNGE5ZGYzMWFiYzVhZjgzM2IwZDgzNDQzNmY0IGM3ZjVkZGE1NGZiNDE3MTgxY2IyNmU1MjExMmFmYWY5ZTE3NTZhZGRkNzdkM2M0NzlkOTZhNjA5YzBkM2M5YmI5OTI5Yzg0NzVjYWZiNGRiYWQ4ZjcyZTg2OGE0M2UwMgpDTElFTlRfUkFORE9NIGY2N2EyOGIzODZiMzFjNjIwZDc2YzAwMjZmZGQ5ODg4ZWRiZTZiZjBmNWI3MTViMmNhY2ExNThmODRhZTlkNjYgY2MzOGU3ODE4MmI5ZGZkNzRlZjMxMDNkNzliYmM5OWNmYzliNGRhZDIwOWVkMjA5MDYyYjU0ODFlNjMzNTMxMjhkYTc1NzFiMTNjZmQ0ZDNhNWFlN2QwNTIwZmIzNDZkCg=='}})
  
  At index 1 diff: {'jsonrpc': '2.0', 'id': 2, 'result': {'file': 'keylog.txt', 'mime': 'text/plain', 'data': <MatchRegExp pattern='Q0xJRU5UX1JBTkRPTSBm.+'>}} != {'jsonrpc': '2.0', 'id': 2, 'result': {'file': 'keylog.txt', 'mime': 'text/plain', 'data': 'Q0xJRU5UX1JBTkRPTSAxZTBkNjNiNDFkN2M3YmI2Mzk1NTljZmM5ZjA2ZmZkNWM2NWZlNGE5ZGYzMWFiYzVhZjgzM2IwZDgzNDQzNmY0IGM3ZjVkZGE1NGZiNDE3MTgxY2IyNmU1MjExMmFmYWY5ZTE3NTZhZGRkNzdkM2M0NzlkOTZhNjA5YzBkM2M5YmI5OTI5Yzg0NzVjYWZiNGRiYWQ4ZjcyZTg2OGE0M2UwMgpDTElFTlRfUkFORE9NIGY2N2EyOGIzODZiMzFjNjIwZDc2YzAwMjZmZGQ5ODg4ZWRiZTZiZjBmNWI3MTViMmNhY2ExNThmODRhZTlkNjYgY2MzOGU3ODE4MmI5ZGZkNzRlZjMxMDNkNzliYmM5OWNmYzliNGRhZDIwOWVkMjA5MDYyYjU0ODFlNjMzNTMxMjhkYTc1NzFiMTNjZmQ0ZDNhNWFlN2QwNTIwZmIzNDZkCg=='}}
  
  Full diff:
    (
        {
            'id': 1,
            'jsonrpc': '2.0',
            'result': {
                'status': 'OK',
            },
        },
        {
            'id': 2,
            'jsonrpc': '2.0',
            'result': {
  -             'data': 'Q0xJRU5UX1JBTkRPTSAxZTBkNjNiNDFkN2M3YmI2Mzk1NTljZmM5ZjA2ZmZkNWM2NWZlNGE5ZGYzMWFiYzVhZjgzM2IwZDgzNDQzNmY0IGM3ZjVkZGE1NGZiNDE3MTgxY2IyNmU1MjExMmFmYWY5ZTE3NTZhZGRkNzdkM2M0NzlkOTZhNjA5YzBkM2M5YmI5OTI5Yzg0NzVjYWZiNGRiYWQ4ZjcyZTg2OGE0M2UwMgpDTElFTlRfUkFORE9NIGY2N2EyOGIzODZiMzFjNjIwZDc2YzAwMjZmZGQ5ODg4ZWRiZTZiZjBmNWI3MTViMmNhY2ExNThmODRhZTlkNjYgY2MzOGU3ODE4MmI5ZGZkNzRlZjMxMDNkNzliYmM5OWNmYzliNGRhZDIwOWVkMjA5MDYyYjU0ODFlNjMzNTMxMjhkYTc1NzFiMTNjZmQ0ZDNhNWFlN2QwNTIwZmIzNDZkCg==',
  +             'data': <MatchRegExp pattern='Q0xJRU5UX1JBTkRPTSBm.+'>,
                'file': 'keylog.txt',
                'mime': 'text/plain',
            },
        },
    )
======================================= 4 failed, 802 passed, 75 skipped, 5 warnings, 1 error in 28.16s =======================================
Comment 8 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2024-07-17 05:39:23 UTC
Thanks. Would you mind filing it upstream please?