Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build failure on ppc64el, with gcc-14 and O3 (stringop-overflow) #9743

Open
LocutusOfBorg opened this issue Oct 30, 2024 · 2 comments
Open
Labels
bug component-crypto Crypto primitives and low-level interfaces

Comments

@LocutusOfBorg
Copy link

Hello, looks like we are facing a new issue on ppc64el with -O3, please check the Ubuntu log

https://launchpadlibrarian.net/756581240/buildlog_ubuntu-plucky-ppc64el.mbedtls_3.6.2-1ubuntu1_BUILDING.txt.gz
Version is 3.6.2 + a41747ac8e824b5cb9ed6874a688a4d5a578e10c

cd /<>/obj-powerpc64le-linux-gnu/library && /usr/bin/cc -I/<>/include -I/<>/library -I/<>/obj-powerpc64le-linux-gnu/library -g -O3 -Werror=implicit-function-declaration -Werror=array-bounds -Werror=clobbered -Werror=volatile-register-var -D__DEB_CANARY_CFLAGS_ed4227734ed75d343320b6a5fd16ce57__ -fno-omit-frame-pointer -ffile-prefix-map=/<>=. -fstack-protector-strong -Wformat -Werror=format-security -fno-stack-clash-protection -fdebug-prefix-map=/<>=/usr/src/mbedtls-3.6.2-1ubuntu1 -D__DEB_CANARY_CPPFLAGS_ed4227734ed75d343320b6a5fd16ce57__ -Wdate-time -D_FORTIFY_SOURCE=3 -Wall -Wextra -Wwrite-strings -Wmissing-prototypes -Wformat=2 -Wno-format-nonliteral -Wvla -Wlogical-op -Wshadow -Wformat-signedness -Wformat-overflow=2 -Wformat-truncation -Werror -Wmissing-declarations -std=c99 -MD -MT library/CMakeFiles/mbedcrypto_static.dir/ctr_drbg.c.o -MF CMakeFiles/mbedcrypto_static.dir/ctr_drbg.c.o.d -o CMakeFiles/mbedcrypto_static.dir/ctr_drbg.c.o -c /<>/library/ctr_drbg.c
In file included from /<>/library/cmac.c:29:
In function ‘mbedtls_xor’,
inlined from ‘mbedtls_cipher_cmac_finish’ at /<>/library/cmac.c:305:5:
/<>/library/common.h:235:14: error: writing 1 byte into a region of size 0 [-Werror=stringop-overflow=]
235 | r[i] = a[i] ^ b[i];
| ~~~~~^~~~~~~~~~~~~
In file included from /<>/include/mbedtls/cmac.h:17,
from /<>/library/cmac.c:33:
/<>/include/mbedtls/cmac.h: In function ‘mbedtls_cipher_cmac_finish’:
/<>/include/mbedtls/cmac.h:61:41: note: at offset 16 into destination object ‘state’ of size 16
61 | unsigned char MBEDTLS_PRIVATE(state)[MBEDTLS_CMAC_MAX_BLOCK_SIZE];
| ^~~~~
/<>/include/mbedtls/private_access.h:17:33: note: in definition of macro ‘MBEDTLS_PRIVATE’
17 | #define MBEDTLS_PRIVATE(member) member

thanks!

@LocutusOfBorg
Copy link
Author

openwrt/openwrt@a41747a

@LocutusOfBorg
Copy link
Author

And ignoring the gcc flag brings to a test failure
https://launchpadlibrarian.net/756582176/buildlog_ubuntu-plucky-ppc64el.mbedtls_3.6.2-1ubuntu2_BUILDING.txt.gz
e.g.
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #1 ................. FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #1 (lengths set) ... FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #2 ................. FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #2 (lengths set) ... FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #1, T=4 ............ FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #1, T=4 (lengths se FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #1, T=15 ........... FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #1, T=15 (lengths s FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #1, T=16 ........... FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, 128 bytes #1, T=16 (lengths s FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= PASS
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= PASS
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= PASS
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= PASS
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= PASS
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= PASS
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 1, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD encrypt, AES-GCM, CAVS 14.0, KEY=32, IV=12, IN= FAILED
memcmp((expected_output->x), (output_data), (expected_output->len)) == 0
at step 2001, line 558, ./tests/suites/test_suite_psa_crypto.function
PSA Multipart AEAD decrypt, AES - GCM, 144 bytes #1 ............... FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, AES - GCM, 144 bytes #1 (lengths set) . FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, AES - GCM, 144 bytes #2 ............... FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, AES - GCM, 144 bytes #2 (lengths set) . FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, AES - GCM, 144 bytes, T = 4 ........... FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, AES - GCM, 144 bytes, T = 4 (lengths s FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, AES - GCM, 144 bytes, T = 15 .......... FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, AES - GCM, 144 bytes, T = 15 (lengths FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, AES-GCM, 144 bytes, T=16 .............. FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, AES-GCM, 144 bytes, T=16 (lengths set) FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=0 PASS
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=0 PASS
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=0 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=0 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0 PASS
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0 PASS
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0
PSA Multipart AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=1 FAILED
(psa_aead_verify(&operation, final_data, final_output_size, &output_part_length, (input_data->x + data_true_size), tag_length)) == PSA_SUCCESS
at step 2001, line 517, ./tests/suites/test_suite_psa_crypto.function
lhs = 0xffffffffffffff6b = -149
rhs = 0x0000000000000000 = 0

The following tests FAILED:
35 - cipher.gcm-suite (Failed)
60 - gcm.aes128_de-suite (Failed)
61 - gcm.aes128_en-suite (Failed)
62 - gcm.aes192_de-suite (Failed)
63 - gcm.aes192_en-suite (Failed)
64 - gcm.aes256_de-suite (Failed)
65 - gcm.aes256_en-suite (Failed)
66 - gcm.camellia-suite (Failed)
96 - psa_crypto-suite (Failed)

@gabor-mezei-arm gabor-mezei-arm added bug component-crypto Crypto primitives and low-level interfaces labels Nov 6, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug component-crypto Crypto primitives and low-level interfaces
Projects
Status: No status
Development

No branches or pull requests

2 participants