[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #14958 [Tor]: address/get_if_addrs_ifaddrs and address/get_if_addrs_ioctl fail on FreeBSD 10.1
#14958: address/get_if_addrs_ifaddrs and address/get_if_addrs_ioctl fail on FreeBSD
10.1
--------------------+------------------------------------
Reporter: reezer | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor | Version: Tor: 0.2.6.3-alpha
Keywords: | Actual Points:
Parent ID: | Points:
--------------------+------------------------------------
When running Tor 2.6.3-alpha tests on FreeBSD 10.1 (inside a jail) I
receive two FAILs.
http://pastebin.com/74nXVS7e
Verbose output:
{{{
$ ./src/test/test --verbose --info address/get_if_addrs_ifaddrs
Feb 19 22:41:59.715 [info] int crypto_early_init()(): OpenSSL version
matches version from headers (100010af: OpenSSL 1.0.1j-freebsd 15 Oct
2014).
Feb 19 22:41:59.715 [info] int crypto_strongest_rand(uint8_t *, size_t)():
Reading entropy from "/dev/urandom"
Feb 19 22:41:59.715 [info] int crypto_global_init(int, const char *, const
char *)(): NOT using OpenSSL engine support.
Feb 19 22:41:59.715 [info] int evaluate_evp_for_aes(int)(): This version
of OpenSSL has a known-good EVP counter-mode implementation. Using it.
Feb 19 22:41:59.715 [info] int crypto_strongest_rand(uint8_t *, size_t)():
Reading entropy from "/dev/urandom"
address/get_if_addrs_ifaddrs: [forking]
OK src/test/test_address.c:227: assert(smartlist_len(results) >=
1): 1 vs 1
FAIL src/test/test_address.c:228:
assert(smartlist_contains_localhost_tor_addr(results))
[get_if_addrs_ifaddrs FAILED]
1/1 TESTS FAILED. (0 skipped)
}}}
{{{
./src/test/test --verbose --info address/get_if_addrs_ioctl
Feb 19 22:44:26.198 [info] int crypto_early_init()(): OpenSSL version
matches version from headers (100010af: OpenSSL 1.0.1j-freebsd 15 Oct
2014).
Feb 19 22:44:26.199 [info] int crypto_strongest_rand(uint8_t *, size_t)():
Reading entropy from "/dev/urandom"
Feb 19 22:44:26.199 [info] int crypto_global_init(int, const char *, const
char *)(): NOT using OpenSSL engine support.
Feb 19 22:44:26.199 [info] int evaluate_evp_for_aes(int)(): This version
of OpenSSL has a known-good EVP counter-mode implementation. Using it.
Feb 19 22:44:26.199 [info] int crypto_strongest_rand(uint8_t *, size_t)():
Reading entropy from "/dev/urandom"
address/get_if_addrs_ioctl: [forking]
OK src/test/test_address.c:440: assert(result)
OK src/test/test_address.c:441: assert(smartlist_len(result) >=
1): 1 vs 1
FAIL src/test/test_address.c:443:
assert(smartlist_contains_localhost_tor_addr(result))
[get_if_addrs_ioctl FAILED]
1/1 TESTS FAILED. (0 skipped)
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14958>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs