Created attachment 767760 [details] build.log.xz [...] 92% tests passed, 3 tests failed out of 37 Total Test time (real) = 40.34 sec The following tests FAILED: 1 - suite_capture (Failed) 3 - suite_decryption (Failed) 33 - suite_release (Failed) Errors while running CTest Output from these tests are in: /var/tmp/portage/net-analyzer/wireshark-3.6.2/work/wireshark-3.6.2_build/Testing/Temporary/LastTest.log Use "--rerun-failed --output-on-failure" to re-run the failed cases verbosely. * ERROR: net-analyzer/wireshark-3.6.2::gentoo failed (test phase):
Created attachment 767761 [details] LastTest.log
Created attachment 767762 [details] emerge --info
Created attachment 792626 [details] build.log.xz (ppc64, 3.6.6) Different test failures on 3.6.6. [...] ================================================= FAILURES ____________________________ case_decrypt_80211.test_80211_wpa2_ft_psk_no_roam _____________________________ [gw3] linux -- Python 3.10.5 /usr/bin/python3.10 self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_no_roam> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' capture_file = <function capture_file.<locals>.resolver at 0x3fff9831a5f0> def test_80211_wpa2_ft_psk_no_roam(self, cmd_tshark, capture_file): '''IEEE 802.11 decode WPA2 FT PSK (without roam verification)''' # Included in git sources test/captures/wpa2-ft-psk.pcapng.gz self.assertRun((cmd_tshark, '-o', 'wlan.enable_decryption: TRUE', '-r', capture_file('wpa2-ft-psk.pcapng.gz'), '-Y', 'wlan.analysis.tk == ba60c7be2944e18f31949508a53ee9d6 || wlan.analysis.gtk == 6eab6a5f8d880f81104ed65ab0c74449', )) # Verifies that traffic from initial authentication can be decrypted (both TK and GTK) > self.assertEqual(self.countOutput('DHCP Discover'), 2) E AssertionError: 0 != 2 capture_file = <function capture_file.<locals>.resolver at 0x3fff9831a5f0> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_no_roam> test/suite_decryption.py:235: AssertionError [...] ________________________________ case_decrypt_80211.test_80211_wpa2_ft_eap _________________________________ [gw2] linux -- Python 3.10.5 /usr/bin/python3.10 self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_eap> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' capture_file = <function capture_file.<locals>.resolver at 0x3fffbacdf9a0> def test_80211_wpa2_ft_eap(self, cmd_tshark, capture_file): '''IEEE 802.11 decode WPA2 FT EAP''' # Included in git sources test/captures/wpa2-ft-eap.pcapng.gz self.assertRun((cmd_tshark, '-o', 'wlan.enable_decryption: TRUE', '-r', capture_file('wpa2-ft-eap.pcapng.gz'), '-Y', 'wlan.analysis.tk == 65471b64605bf2a04af296284cb4ae2a || wlan.analysis.gtk == 1783a5c28e046df6fb58cf4406c4b22c', )) > self.assertTrue(self.grepOutput('Who has 192.168.1.1')) # Verifies GTK decryption E AssertionError: False is not true capture_file = <function capture_file.<locals>.resolver at 0x3fffbacdf9a0> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_eap> test/suite_decryption.py:271: AssertionError [...] ______________________________ case_decrypt_80211.test_80211_wpa2_ft_psk_roam ______________________________ [gw1] linux -- Python 3.10.5 /usr/bin/python3.10 self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_roam> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' capture_file = <function capture_file.<locals>.resolver at 0x3fff8fa9cca0> features = namespace(have_x64=True, have_lua=False, have_nghttp2=False, have_kerberos=False, have_libgcrypt16=True, have_libgcrypt17=True, have_libgcrypt18=True, have_gnutls=True, have_pkcs11=True, have_brotli=False, have_plugins=True) def test_80211_wpa2_ft_psk_roam(self, cmd_tshark, capture_file, features): '''IEEE 802.11 decode WPA2 FT PSK''' # Included in git sources test/captures/wpa2-ft-psk.pcapng.gz if not features.have_libgcrypt16: self.skipTest('Requires GCrypt 1.6 or later.') # Verify TK and GTK for both initial authentication (AP1) and roam(AP2). self.assertRun((cmd_tshark, '-o', 'wlan.enable_decryption: TRUE', '-r', capture_file('wpa2-ft-psk.pcapng.gz'), '-Y', 'wlan.analysis.tk == ba60c7be2944e18f31949508a53ee9d6 || wlan.analysis.gtk == 6eab6a5f8d880f81104ed65ab0c74449 || wlan.analysis.tk == a6a3304e5a8fabe0dc427cc41a707858 || wlan.analysis.gtk == a6cc605e10878f86b20a266c9b58d230', )) > self.assertEqual(self.countOutput('DHCP Discover'), 2) E AssertionError: 0 != 2 capture_file = <function capture_file.<locals>.resolver at 0x3fff8fa9cca0> cmd_tshark = '/var/tmp/portage/net-analyzer/wireshark-3.6.6/work/wireshark-3.6.6_build/run/tshark' features = namespace(have_x64=True, have_lua=False, have_nghttp2=False, have_kerberos=False, have_libgcrypt16=True, have_libgcrypt17=True, have_libgcrypt18=True, have_gnutls=True, have_pkcs11=True, have_brotli=False, have_plugins=True) self = <suite_decryption.case_decrypt_80211 testMethod=test_80211_wpa2_ft_psk_roam> test/suite_decryption.py:255: AssertionError
This appears to be an endianness bug. It occurs on big-endian systems: s390x (according to $URL), sparc64 (I tested), and ppc64 (I tested), but not on ppc64le.
*** Bug 934572 has been marked as a duplicate of this bug. ***
Could you report any remaining failures with latest upstream please?
Created attachment 897644 [details] build.log and emerge --info Results from current 9999: ERROR ../wireshark-9999_build/suite_io.py FAILED ../wireshark-9999_build/suite_decryption.py::TestDecrypt80211::test_80211_wpa2_ft_psk_no_roam - AssertionError: assert 0 == 2 + where 0 = count_output('', 'DHCP Discover') FAILED ../wireshark-9999_build/suite_decryption.py::TestDecrypt80211::test_80211_wpa2_ft_psk_roam - AssertionError: assert 0 == 2 + where 0 = count_output('', 'DHCP Discover') FAILED ../wireshark-9999_build/suite_decryption.py::TestDecrypt80211::test_80211_wpa2_ft_eap - AssertionError: assert False + where False = grep_output('', 'Who has 192.168.1.1') FAILED ../wireshark-9999_build/suite_sharkd.py::TestSharkd::test_sharkd_req_download_tls_secrets - AssertionError: assert ({'jsonrpc': '2.0', 'id': 1, 'result': {'status': 'OK'}}, {'jsonrpc': '2.0', 'id': 2, 'result': {'file': 'keylog.txt', 'mime': 'text/plain', 'data': <MatchRegExp pattern='Q0xJRU5UX1JBTkRPTSBm.+'>}}) == ({'jsonrpc': '2.0', 'id': 1, 'result': {'status': 'OK'}}, {'jsonrpc': '2.0', 'id': 2, 'result': {'file': 'keylog.txt', 'mime': 'text/plain', 'data': 'Q0xJRU5UX1JBTkRPTSAxZTBkNjNiNDFkN2M3YmI2Mzk1NTljZmM5ZjA2ZmZkNWM2NWZlNGE5ZGYzMWFiYzVhZjgzM2IwZDgzNDQzNmY0IGM3ZjVkZGE1NGZiNDE3MTgxY2IyNmU1MjExMmFmYWY5ZTE3NTZhZGRkNzdkM2M0NzlkOTZhNjA5YzBkM2M5YmI5OTI5Yzg0NzVjYWZiNGRiYWQ4ZjcyZTg2OGE0M2UwMgpDTElFTlRfUkFORE9NIGY2N2EyOGIzODZiMzFjNjIwZDc2YzAwMjZmZGQ5ODg4ZWRiZTZiZjBmNWI3MTViMmNhY2ExNThmODRhZTlkNjYgY2MzOGU3ODE4MmI5ZGZkNzRlZjMxMDNkNzliYmM5OWNmYzliNGRhZDIwOWVkMjA5MDYyYjU0ODFlNjMzNTMxMjhkYTc1NzFiMTNjZmQ0ZDNhNWFlN2QwNTIwZmIzNDZkCg=='}}) At index 1 diff: {'jsonrpc': '2.0', 'id': 2, 'result': {'file': 'keylog.txt', 'mime': 'text/plain', 'data': <MatchRegExp pattern='Q0xJRU5UX1JBTkRPTSBm.+'>}} != {'jsonrpc': '2.0', 'id': 2, 'result': {'file': 'keylog.txt', 'mime': 'text/plain', 'data': 'Q0xJRU5UX1JBTkRPTSAxZTBkNjNiNDFkN2M3YmI2Mzk1NTljZmM5ZjA2ZmZkNWM2NWZlNGE5ZGYzMWFiYzVhZjgzM2IwZDgzNDQzNmY0IGM3ZjVkZGE1NGZiNDE3MTgxY2IyNmU1MjExMmFmYWY5ZTE3NTZhZGRkNzdkM2M0NzlkOTZhNjA5YzBkM2M5YmI5OTI5Yzg0NzVjYWZiNGRiYWQ4ZjcyZTg2OGE0M2UwMgpDTElFTlRfUkFORE9NIGY2N2EyOGIzODZiMzFjNjIwZDc2YzAwMjZmZGQ5ODg4ZWRiZTZiZjBmNWI3MTViMmNhY2ExNThmODRhZTlkNjYgY2MzOGU3ODE4MmI5ZGZkNzRlZjMxMDNkNzliYmM5OWNmYzliNGRhZDIwOWVkMjA5MDYyYjU0ODFlNjMzNTMxMjhkYTc1NzFiMTNjZmQ0ZDNhNWFlN2QwNTIwZmIzNDZkCg=='}} Full diff: ( { 'id': 1, 'jsonrpc': '2.0', 'result': { 'status': 'OK', }, }, { 'id': 2, 'jsonrpc': '2.0', 'result': { - 'data': 'Q0xJRU5UX1JBTkRPTSAxZTBkNjNiNDFkN2M3YmI2Mzk1NTljZmM5ZjA2ZmZkNWM2NWZlNGE5ZGYzMWFiYzVhZjgzM2IwZDgzNDQzNmY0IGM3ZjVkZGE1NGZiNDE3MTgxY2IyNmU1MjExMmFmYWY5ZTE3NTZhZGRkNzdkM2M0NzlkOTZhNjA5YzBkM2M5YmI5OTI5Yzg0NzVjYWZiNGRiYWQ4ZjcyZTg2OGE0M2UwMgpDTElFTlRfUkFORE9NIGY2N2EyOGIzODZiMzFjNjIwZDc2YzAwMjZmZGQ5ODg4ZWRiZTZiZjBmNWI3MTViMmNhY2ExNThmODRhZTlkNjYgY2MzOGU3ODE4MmI5ZGZkNzRlZjMxMDNkNzliYmM5OWNmYzliNGRhZDIwOWVkMjA5MDYyYjU0ODFlNjMzNTMxMjhkYTc1NzFiMTNjZmQ0ZDNhNWFlN2QwNTIwZmIzNDZkCg==', + 'data': <MatchRegExp pattern='Q0xJRU5UX1JBTkRPTSBm.+'>, 'file': 'keylog.txt', 'mime': 'text/plain', }, }, ) ======================================= 4 failed, 802 passed, 75 skipped, 5 warnings, 1 error in 28.16s =======================================
Thanks. Would you mind filing it upstream please?