Created attachment 767760 [details] build.log.xz [...] 92% tests passed, 3 tests failed out of 37 Total Test time (real) = 40.34 sec The following tests FAILED: 1 - suite_capture (Failed) 3 - suite_decryption (Failed) 33 - suite_release (Failed) Errors while running CTest Output from these tests are in: /var/tmp/portage/net-analyzer/wireshark-3.6.2/work/wireshark-3.6.2_build/Testing/Temporary/LastTest.log Use "--rerun-failed --output-on-failure" to re-run the failed cases verbosely. * ERROR: net-analyzer/wireshark-3.6.2::gentoo failed (test phase):
Created attachment 767761 [details] LastTest.log
Created attachment 767762 [details] emerge --info
Created attachment 792626 [details] build.log.xz (ppc64, 3.6.6) Different test failures on 3.6.6. [...] ================================================= FAILURES ____________________________ case_decrypt_80211.test_80211_wpa2_ft_psk_no_roam _____________________________ [gw3] linux -- Python 3.10.5 /usr/bin/python3.10 self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_no_roam> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' capture_file = <function capture_file.<locals>.resolver at 0x3fff9831a5f0> def test_80211_wpa2_ft_psk_no_roam(self, cmd_tshark, capture_file): '''IEEE 802.11 decode WPA2 FT PSK (without roam verification)''' # Included in git sources test/captures/wpa2-ft-psk.pcapng.gz self.assertRun((cmd_tshark, '-o', 'wlan.enable_decryption: TRUE', '-r', capture_file('wpa2-ft-psk.pcapng.gz'), '-Y', 'wlan.analysis.tk == ba60c7be2944e18f31949508a53ee9d6 || wlan.analysis.gtk == 6eab6a5f8d880f81104ed65ab0c74449', )) # Verifies that traffic from initial authentication can be decrypted (both TK and GTK) > self.assertEqual(self.countOutput('DHCP Discover'), 2) E AssertionError: 0 != 2 capture_file = <function capture_file.<locals>.resolver at 0x3fff9831a5f0> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_no_roam> test/suite_decryption.py:235: AssertionError [...] ________________________________ case_decrypt_80211.test_80211_wpa2_ft_eap _________________________________ [gw2] linux -- Python 3.10.5 /usr/bin/python3.10 self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_eap> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' capture_file = <function capture_file.<locals>.resolver at 0x3fffbacdf9a0> def test_80211_wpa2_ft_eap(self, cmd_tshark, capture_file): '''IEEE 802.11 decode WPA2 FT EAP''' # Included in git sources test/captures/wpa2-ft-eap.pcapng.gz self.assertRun((cmd_tshark, '-o', 'wlan.enable_decryption: TRUE', '-r', capture_file('wpa2-ft-eap.pcapng.gz'), '-Y', 'wlan.analysis.tk == 65471b64605bf2a04af296284cb4ae2a || wlan.analysis.gtk == 1783a5c28e046df6fb58cf4406c4b22c', )) > self.assertTrue(self.grepOutput('Who has 192.168.1.1')) # Verifies GTK decryption E AssertionError: False is not true capture_file = <function capture_file.<locals>.resolver at 0x3fffbacdf9a0> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_eap> test/suite_decryption.py:271: AssertionError [...] ______________________________ case_decrypt_80211.test_80211_wpa2_ft_psk_roam ______________________________ [gw1] linux -- Python 3.10.5 /usr/bin/python3.10 self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_roam> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' capture_file = <function capture_file.<locals>.resolver at 0x3fff8fa9cca0> features = namespace(have_x64=True, have_lua=False, have_nghttp2=False, have_kerberos=False, have_libgcrypt16=True, have_libgcrypt17=True, have_libgcrypt18=True, have_gnutls=True, have_pkcs11=True, have_brotli=False, have_plugins=True) def test_80211_wpa2_ft_psk_roam(self, cmd_tshark, capture_file, features): '''IEEE 802.11 decode WPA2 FT PSK''' # Included in git sources test/captures/wpa2-ft-psk.pcapng.gz if not features.have_libgcrypt16: self.skipTest('Requires GCrypt 1.6 or later.') # Verify TK and GTK for both initial authentication (AP1) and roam(AP2). self.assertRun((cmd_tshark, '-o', 'wlan.enable_decryption: TRUE', '-r', capture_file('wpa2-ft-psk.pcapng.gz'), '-Y', 'wlan.analysis.tk == ba60c7be2944e18f31949508a53ee9d6 || wlan.analysis.gtk == 6eab6a5f8d880f81104ed65ab0c74449 || wlan.analysis.tk == a6a3304e5a8fabe0dc427cc41a707858 || wlan.analysis.gtk == a6cc605e10878f86b20a266c9b58d230', )) > self.assertEqual(self.countOutput('DHCP Discover'), 2) E AssertionError: 0 != 2 capture_file = <function capture_file.<locals>.resolver at 0x3fff8fa9cca0> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' features = namespace(have_x64=True, have_lua=False, have_nghttp2=False, have_kerberos=False, have_libgcrypt16=True, have_libgcrypt17=True, have_libgcrypt18=True, have_gnutls=True, have_pkcs11=True, have_brotli=False, have_plugins=True) self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_roam> test/suite_decryption.py:255: AssertionError
This appears to be an endianness bug. It occurs on big-endian systems: s390x (according to $URL), sparc64 (I tested), and ppc64 (I tested), but not on ppc64le.