NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

bin/52986: netpgpverify broken on sparc64



>Number:         52986
>Category:       bin
>Synopsis:       netpgpverify broken on sparc64
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    bin-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Wed Feb 07 15:55:00 +0000 2018
>Originator:     Martin Husemann
>Release:        NetBSD 8.99.12
>Organization:
The NetBSD Foundation, Inc.
>Environment:
System: NetBSD thirdstage.duskware.de 8.99.12 NetBSD 8.99.12 (MODULAR) #59: Tue Jan 30 13:52:49 CET 2018 martin%thirdstage.duskware.de@localhost:/usr/src/sys/arch/sparc64/compile/MODULAR sparc64
Architecture: sparc64
Machine: sparc64
>Description:

Recent changes (to openssl or netpgp) did break the atf tests for netpgpverify
on sparc64.

>How-To-Repeat:

Extract the dsa-pubring.gpg and in2.asc files from 
/usr/tests/usr.bin/netpgpverify/t_netpgpverify by uudecoding the respective
chunks. Then:

gdb netpgpverify
(gdb) break digest_init
(gdb) run -k dsa-pubring.gpg in2.asc
(gdb) cont
(gdb) cont
(gdb) cont
(gdb) p hashalg
$1 = 0

and watch:

109             switch(hash->alg = hashalg) {
110             case MD5_HASH_ALG:
...
145             default:
146                     printf("hash_any: bad algorithm\n");
147                     return 0;
148             }

... hit the default case and fail.

>Fix:
n/a



Home | Main Index | Thread Index | Old Index