NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
bin/52986: netpgpverify broken on sparc64
>Number: 52986
>Category: bin
>Synopsis: netpgpverify broken on sparc64
>Confidential: no
>Severity: critical
>Priority: high
>Responsible: bin-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Wed Feb 07 15:55:00 +0000 2018
>Originator: Martin Husemann
>Release: NetBSD 8.99.12
>Organization:
The NetBSD Foundation, Inc.
>Environment:
System: NetBSD thirdstage.duskware.de 8.99.12 NetBSD 8.99.12 (MODULAR) #59: Tue Jan 30 13:52:49 CET 2018 martin%thirdstage.duskware.de@localhost:/usr/src/sys/arch/sparc64/compile/MODULAR sparc64
Architecture: sparc64
Machine: sparc64
>Description:
Recent changes (to openssl or netpgp) did break the atf tests for netpgpverify
on sparc64.
>How-To-Repeat:
Extract the dsa-pubring.gpg and in2.asc files from
/usr/tests/usr.bin/netpgpverify/t_netpgpverify by uudecoding the respective
chunks. Then:
gdb netpgpverify
(gdb) break digest_init
(gdb) run -k dsa-pubring.gpg in2.asc
(gdb) cont
(gdb) cont
(gdb) cont
(gdb) p hashalg
$1 = 0
and watch:
109 switch(hash->alg = hashalg) {
110 case MD5_HASH_ALG:
...
145 default:
146 printf("hash_any: bad algorithm\n");
147 return 0;
148 }
... hit the default case and fail.
>Fix:
n/a
Home |
Main Index |
Thread Index |
Old Index