Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 835963 - net-analyzer/wireshark-3.6.2 - fails suite_capture, suite_decryption, suite_release tests
Summary: net-analyzer/wireshark-3.6.2 - fails suite_capture, suite_decryption, suite_r...
Status: CONFIRMED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: PPC64 Linux
: Normal normal (vote)
Assignee: Sam James
URL:
Whiteboard:
Keywords: TESTFAILURE
Depends on:
Blocks:
 
Reported: 2022-03-24 22:24 UTC by ernsteiswuerfel
Modified: 2022-09-03 01:12 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
build.log.xz (wireshark-3.6.2:20220324-220712.log.xz,73.59 KB, application/x-xz)
2022-03-24 22:24 UTC, ernsteiswuerfel
Details
LastTest.log (LastTest.log,108.60 KB, text/plain)
2022-03-24 22:24 UTC, ernsteiswuerfel
Details
emerge --info (file_835963.txt,6.45 KB, text/plain)
2022-03-24 22:25 UTC, ernsteiswuerfel
Details
build.log.xz (ppc64, 3.6.6) (wireshark-3.6.6:20220720-153002.log.xz,74.62 KB, application/x-xz)
2022-07-20 20:00 UTC, ernsteiswuerfel
Details

Note You need to log in before you can comment on or make changes to this bug.
Description ernsteiswuerfel archtester 2022-03-24 22:24:23 UTC
Created attachment 767760 [details]
build.log.xz

[...]
92% tests passed, 3 tests failed out of 37

Total Test time (real) =  40.34 sec

The following tests FAILED:
          1 - suite_capture (Failed)
          3 - suite_decryption (Failed)
         33 - suite_release (Failed)
Errors while running CTest
Output from these tests are in: /var/tmp/portage/net-analyzer/wireshark-3.6.2/work/wireshark-3.6.2_build/Testing/Temporary/LastTest.log
Use "--rerun-failed --output-on-failure" to re-run the failed cases verbosely.
 * ERROR: net-analyzer/wireshark-3.6.2::gentoo failed (test phase):
Comment 1 ernsteiswuerfel archtester 2022-03-24 22:24:41 UTC
Created attachment 767761 [details]
LastTest.log
Comment 2 ernsteiswuerfel archtester 2022-03-24 22:25:04 UTC
Created attachment 767762 [details]
emerge --info
Comment 3 ernsteiswuerfel archtester 2022-07-20 20:00:15 UTC
Created attachment 792626 [details]
build.log.xz (ppc64, 3.6.6)

Different test failures on 3.6.6.

[...]
================================================= FAILURES
____________________________ case_decrypt_80211.test_80211_wpa2_ft_psk_no_roam _____________________________
[gw3] linux -- Python 3.10.5 /usr/bin/python3.10

self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_no_roam>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
capture_file = <function capture_file.<locals>.resolver at 0x3fff9831a5f0>

    def test_80211_wpa2_ft_psk_no_roam(self, cmd_tshark, capture_file):
        '''IEEE 802.11 decode WPA2 FT PSK (without roam verification)'''
        # Included in git sources test/captures/wpa2-ft-psk.pcapng.gz
        self.assertRun((cmd_tshark,
                '-o', 'wlan.enable_decryption: TRUE',
                '-r', capture_file('wpa2-ft-psk.pcapng.gz'),
                '-Y', 'wlan.analysis.tk == ba60c7be2944e18f31949508a53ee9d6 || wlan.analysis.gtk == 6eab6a5f8d880f81104ed65ab0c74449',
                ))
        # Verifies that traffic from initial authentication can be decrypted (both TK and GTK)
>       self.assertEqual(self.countOutput('DHCP Discover'), 2)
E       AssertionError: 0 != 2

capture_file = <function capture_file.<locals>.resolver at 0x3fff9831a5f0>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
self       = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_no_roam>

test/suite_decryption.py:235: AssertionError

[...]

________________________________ case_decrypt_80211.test_80211_wpa2_ft_eap _________________________________
[gw2] linux -- Python 3.10.5 /usr/bin/python3.10

self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_eap>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
capture_file = <function capture_file.<locals>.resolver at 0x3fffbacdf9a0>

    def test_80211_wpa2_ft_eap(self, cmd_tshark, capture_file):
        '''IEEE 802.11 decode WPA2 FT EAP'''
        # Included in git sources test/captures/wpa2-ft-eap.pcapng.gz
        self.assertRun((cmd_tshark,
                '-o', 'wlan.enable_decryption: TRUE',
                '-r', capture_file('wpa2-ft-eap.pcapng.gz'),
                '-Y', 'wlan.analysis.tk == 65471b64605bf2a04af296284cb4ae2a || wlan.analysis.gtk == 1783a5c28e046df6fb58cf4406c4b22c',
                ))
>       self.assertTrue(self.grepOutput('Who has 192.168.1.1'))    # Verifies GTK decryption
E       AssertionError: False is not true

capture_file = <function capture_file.<locals>.resolver at 0x3fffbacdf9a0>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
self       = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_eap>

test/suite_decryption.py:271: AssertionError

[...]

______________________________ case_decrypt_80211.test_80211_wpa2_ft_psk_roam ______________________________
[gw1] linux -- Python 3.10.5 /usr/bin/python3.10

self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_roam>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
capture_file = <function capture_file.<locals>.resolver at 0x3fff8fa9cca0>
features = namespace(have_x64=True, have_lua=False, have_nghttp2=False, have_kerberos=False, have_libgcrypt16=True, have_libgcrypt17=True, have_libgcrypt18=True, have_gnutls=True, have_pkcs11=True, have_brotli=False, have_plugins=True)

    def test_80211_wpa2_ft_psk_roam(self, cmd_tshark, capture_file, features):
        '''IEEE 802.11 decode WPA2 FT PSK'''
        # Included in git sources test/captures/wpa2-ft-psk.pcapng.gz
        if not features.have_libgcrypt16:
            self.skipTest('Requires GCrypt 1.6 or later.')
    
        # Verify TK and GTK for both initial authentication (AP1) and roam(AP2).
        self.assertRun((cmd_tshark,
                '-o', 'wlan.enable_decryption: TRUE',
                '-r', capture_file('wpa2-ft-psk.pcapng.gz'),
                '-Y', 'wlan.analysis.tk == ba60c7be2944e18f31949508a53ee9d6 || wlan.analysis.gtk == 6eab6a5f8d880f81104ed65ab0c74449 || wlan.analysis.tk == a6a3304e5a8fabe0dc427cc41a707858 || wlan.analysis.gtk == a6cc605e10878f86b20a266c9b58d230',
                ))
>       self.assertEqual(self.countOutput('DHCP Discover'), 2)
E       AssertionError: 0 != 2

capture_file = <function capture_file.<locals>.resolver at 0x3fff8fa9cca0>
cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark'
features   = namespace(have_x64=True,
          have_lua=False,
          have_nghttp2=False,
          have_kerberos=False,
          have_libgcrypt16=True,
          have_libgcrypt17=True,
          have_libgcrypt18=True,
          have_gnutls=True,
          have_pkcs11=True,
          have_brotli=False,
          have_plugins=True)
self       = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_roam>

test/suite_decryption.py:255: AssertionError
Comment 4 Matt Turner gentoo-dev 2022-09-03 01:12:33 UTC
This appears to be an endianness bug. It occurs on big-endian systems: s390x (according to $URL), sparc64 (I tested), and ppc64 (I tested), but not on ppc64le.