D: [iurt_root_command] chroot warning: Found bdb_ro Packages database while attempting sqlite backend: using bdb_ro backend. Installing /home/iurt/rpmbuild/SRPMS/crypto-policies-20210917-1.mga9.src.rpm Building target platforms: aarch64 Building for target aarch64 Executing(%prep): /bin/sh -e /home/iurt/rpmbuild/tmp/rpm-tmp.dYoX9k + umask 022 + cd /home/iurt/rpmbuild/BUILD + '[' 1 -eq 1 ']' + '[' 1 -eq 1 ']' + '[' 1 -eq 1 ']' + cd /home/iurt/rpmbuild/BUILD + rm -rf fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19 + /usr/bin/gzip -dc /home/iurt/rpmbuild/SOURCES/crypto-policies-gitc9d86d1.tar.gz + /usr/bin/tar -xof - + STATUS=0 + '[' 0 -ne 0 ']' + cd fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + perl -pi -e 's|/usr/share/asciidoc/docbook-xsl/manpage.xsl|/etc/asciidoc/docbook-xsl/manpage.xsl|' Makefile + RPM_EC=0 ++ jobs -p + exit 0 Executing(%build): /bin/sh -e /home/iurt/rpmbuild/tmp/rpm-tmp.VJ1JuF + umask 022 + cd /home/iurt/rpmbuild/BUILD + cd fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19 + '[' 1 -eq 1 ']' + '[' 1 -eq 1 ']' + /usr/bin/make -O -j8 V=1 VERBOSE=1 asciidoc.py -v -d manpage -b docbook fips-finish-install.8.txt asciidoc: reading: /etc/asciidoc/asciidoc.conf asciidoc: reading: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/fips-finish-install.8.txt asciidoc: reading: /etc/asciidoc/docbook45.conf asciidoc: reading: /etc/asciidoc/filters/source/source-highlight-filter.conf asciidoc: reading: /etc/asciidoc/filters/music/music-filter.conf asciidoc: reading: /etc/asciidoc/filters/latex/latex-filter.conf asciidoc: reading: /etc/asciidoc/filters/graphviz/graphviz-filter.conf asciidoc: reading: /etc/asciidoc/filters/code/code-filter.conf asciidoc: reading: /etc/asciidoc/lang-en.conf asciidoc: writing: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/fips-finish-install.8.xml xsltproc --nonet -o fips-finish-install.8 /etc/asciidoc/docbook-xsl/manpage.xsl fips-finish-install.8.xml Note: Writing fips-finish-install.8 asciidoc.py -v -d manpage -b docbook fips-mode-setup.8.txt asciidoc: reading: /etc/asciidoc/asciidoc.conf asciidoc: reading: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/fips-mode-setup.8.txt asciidoc: reading: /etc/asciidoc/docbook45.conf asciidoc: reading: /etc/asciidoc/filters/source/source-highlight-filter.conf asciidoc: reading: /etc/asciidoc/filters/music/music-filter.conf asciidoc: reading: /etc/asciidoc/filters/latex/latex-filter.conf asciidoc: reading: /etc/asciidoc/filters/graphviz/graphviz-filter.conf asciidoc: reading: /etc/asciidoc/filters/code/code-filter.conf asciidoc: reading: /etc/asciidoc/lang-en.conf asciidoc: writing: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/fips-mode-setup.8.xml xsltproc --nonet -o fips-mode-setup.8 /etc/asciidoc/docbook-xsl/manpage.xsl fips-mode-setup.8.xml Note: Writing fips-mode-setup.8 asciidoc.py -v -d manpage -b docbook update-crypto-policies.8.txt asciidoc: reading: /etc/asciidoc/asciidoc.conf asciidoc: reading: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/update-crypto-policies.8.txt asciidoc: reading: /etc/asciidoc/docbook45.conf asciidoc: reading: /etc/asciidoc/filters/source/source-highlight-filter.conf asciidoc: reading: /etc/asciidoc/filters/music/music-filter.conf asciidoc: reading: /etc/asciidoc/filters/latex/latex-filter.conf asciidoc: reading: /etc/asciidoc/filters/graphviz/graphviz-filter.conf asciidoc: reading: /etc/asciidoc/filters/code/code-filter.conf asciidoc: reading: /etc/asciidoc/lang-en.conf asciidoc: writing: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/update-crypto-policies.8.xml xsltproc --nonet -o update-crypto-policies.8 /etc/asciidoc/docbook-xsl/manpage.xsl update-crypto-policies.8.xml Note: Writing update-crypto-policies.8 asciidoc.py -v -d manpage -b docbook crypto-policies.7.txt asciidoc: reading: /etc/asciidoc/asciidoc.conf asciidoc: reading: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/crypto-policies.7.txt asciidoc: reading: /etc/asciidoc/docbook45.conf asciidoc: reading: /etc/asciidoc/filters/source/source-highlight-filter.conf asciidoc: reading: /etc/asciidoc/filters/music/music-filter.conf asciidoc: reading: /etc/asciidoc/filters/latex/latex-filter.conf asciidoc: reading: /etc/asciidoc/filters/graphviz/graphviz-filter.conf asciidoc: reading: /etc/asciidoc/filters/code/code-filter.conf asciidoc: reading: /etc/asciidoc/lang-en.conf asciidoc: writing: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/crypto-policies.7.xml xsltproc --nonet -o crypto-policies.7 /etc/asciidoc/docbook-xsl/manpage.xsl crypto-policies.7.xml Note: Writing crypto-policies.7 mkdir -p output python/build-crypto-policies.py --reloadcmds policies output gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL:+SIGN-DSA-SHA256:+SIGN-DSA-SHA384:+SIGN-DSA-SHA512:+SIGN-DSA-SHA224:+SIGN-DSA-SHA1:+3DES-CBC:+DHE-DSS gnutls[2]: cfg: loaded system priority /tmp/tmp7_ajpn7u mtime 1637833295 Cannot determine nss version with ctypes gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC SHA1 for TLS gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group FFDHE2048 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature RSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher AES-128-GCM for TLS gnutls[2]: cfg: disabling cipher AES-128-CCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher AES-256-CBC for TLS gnutls[2]: cfg: disabling cipher AES-128-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmp3rorgyck mtime 1637833295 Cannot determine nss version with ctypes gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group X25519 for TLS gnutls[2]: cfg: disabling group X448 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature EDDSA-ED25519 as insecure gnutls[2]: cfg: marking signature EDDSA-ED448 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CHACHA20-POLY1305 for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpow4gu8en mtime 1637833295 Cannot determine nss version with ctypes gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpns8i4f81 mtime 1637833295 Cannot determine nss version with ctypes Saving config for bind for policy LEGACY Saving config for gnutls for policy LEGACY Saving config for java for policy LEGACY Saving config for javasystem for policy LEGACY Saving config for krb5 for policy LEGACY Saving config for libreswan for policy LEGACY Saving config for libssh for policy LEGACY Saving config for nss for policy LEGACY Saving config for openssh for policy LEGACY Saving config for opensshserver for policy LEGACY Saving config for opensslcnf for policy LEGACY Saving config for openssl for policy LEGACY Saving config for bind for policy GOST-ONLY Saving config for gnutls for policy GOST-ONLY Saving config for java for policy GOST-ONLY Saving config for javasystem for policy GOST-ONLY Saving config for krb5 for policy GOST-ONLY Saving config for libreswan for policy GOST-ONLY Saving config for libssh for policy GOST-ONLY Saving config for nss for policy GOST-ONLY Saving config for openssh for policy GOST-ONLY Saving config for opensshserver for policy GOST-ONLY Saving config for opensslcnf for policy GOST-ONLY Saving config for openssl for policy GOST-ONLY Saving config for bind for policy FUTURE Saving config for gnutls for policy FUTURE Saving config for java for policy FUTURE Saving config for javasystem for policy FUTURE Saving config for krb5 for policy FUTURE Saving config for libreswan for policy FUTURE Saving config for libssh for policy FUTURE Saving config for nss for policy FUTURE Saving config for openssh for policy FUTURE Saving config for opensshserver for policy FUTURE Saving config for opensslcnf for policy FUTURE Saving config for openssl for policy FUTURE Saving config for bind for policy FIPS Saving config for gnutls for policy FIPS Saving config for java for policy FIPS Saving config for javasystem for policy FIPS Saving config for krb5 for policy FIPS Saving config for libreswan for policy FIPS Saving config for libssh for policy FIPS Saving config for nss for policy FIPS Saving config for openssh for policy FIPS Saving config for opensshserver for policy FIPS Saving config for opensslcnf for policy FIPS Saving config for openssl for policy FIPS Saving config for bind for policy EMPTY Saving config for gnutls for policy EMPTY Saving config for java for policy EMPTY Saving config for javasystem for policy EMPTY Saving config for krb5 for policy EMPTY Saving config for libreswan for policy EMPTY Saving config for libssh for policy EMPTY Saving config for nss for policy EMPTY Saving config for openssh for policy EMPTY Saving config for opensshserver for policy EMPTY Saving config for opensslcnf for policy EMPTY Saving config for openssl for policy EMPTY Saving config for bind for policy DEFAULT Saving config for gnutls for policy DEFAULT Saving config for java for policy DEFAULT Saving config for javasystem for policy DEFAULT Saving config for krb5 for policy DEFAULT Saving config for libreswan for policy DEFAULT Saving config for libssh for policy DEFAULT Saving config for nss for policy DEFAULT Saving config for openssh for policy DEFAULT Saving config for opensshserver for policy DEFAULT Saving config for opensslcnf for policy DEFAULT Saving config for openssl for policy DEFAULT + RPM_EC=0 ++ jobs -p + exit 0 Executing(%install): /bin/sh -e /home/iurt/rpmbuild/tmp/rpm-tmp.CkHW88 + umask 022 + cd /home/iurt/rpmbuild/BUILD + '[' 1 -eq 1 ']' + '[' /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64 '!=' / ']' + rm -rf /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64 ++ dirname /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64 + mkdir -p /home/iurt/rpmbuild/BUILDROOT + mkdir /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64 + cd fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19 + '[' 1 -eq 1 ']' + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/ + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/ + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/ + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/state/ + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/local.d/ + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/policies/ + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/policies/modules/ + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/bin + make DESTDIR=/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64 DIR=/usr/share/crypto-policies MANDIR=/usr/share/man -j8 install mkdir -p /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/man mkdir -p /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/man/man7 mkdir -p /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/man/man8 mkdir -p /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/bin install -p -m 644 crypto-policies.7 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/man/man7 install -p -m 644 update-crypto-policies.8 fips-finish-install.8 fips-mode-setup.8 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/man/man8 install -p -m 755 update-crypto-policies fips-finish-install fips-mode-setup /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/bin mkdir -p /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/ install -p -m 644 default-config /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies install -p -m 644 output/reload-cmds.sh /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies for f in $(find output -name '*.txt') ; do d=$(dirname $f | cut -f 2- -d '/') ; install -p -m 644 -D -t /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d $f ; done for f in $(find policies -name '*.p*') ; do d=$(dirname $f) ; install -p -m 644 -D -t /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d $f ; done for f in $(find python -name '*.py') ; do d=$(dirname $f) ; install -p -m 644 -D -t /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d $f ; done chmod 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/update-crypto-policies.py chmod 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/build-crypto-policies.py + install -p -m 644 default-config /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/config + touch /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/state/current + touch /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/state/CURRENT.pol + rm -rf /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/GOST-ONLY + for d in LEGACY DEFAULT FUTURE FIPS + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/bind.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/bind.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/bind.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/gnutls.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/gnutls.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/gnutls.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/java.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/java.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/java.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/javasystem.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/javasystem.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/javasystem.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/krb5.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/krb5.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/krb5.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/libreswan.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/libreswan.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/libreswan.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/libssh.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/libssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/libssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/nss.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/nss.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/nss.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/openssh.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/openssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/openssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/opensshserver.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/opensshserver.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/opensshserver.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/openssl.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/openssl.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/openssl.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/opensslcnf.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/LEGACY/opensslcnf.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/LEGACY/opensslcnf.config + for d in LEGACY DEFAULT FUTURE FIPS + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/bind.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/bind.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/bind.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/gnutls.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/gnutls.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/gnutls.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/java.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/java.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/java.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/javasystem.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/javasystem.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/javasystem.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/krb5.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/krb5.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/krb5.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/libreswan.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/libreswan.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/libreswan.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/libssh.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/libssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/libssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/nss.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/nss.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/nss.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/openssh.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/openssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/openssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/opensshserver.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/opensshserver.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/opensshserver.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/openssl.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/openssl.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/openssl.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/opensslcnf.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/opensslcnf.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/DEFAULT/opensslcnf.config + for d in LEGACY DEFAULT FUTURE FIPS + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/bind.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/bind.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/bind.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/gnutls.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/gnutls.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/gnutls.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/java.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/java.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/java.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/javasystem.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/javasystem.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/javasystem.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/krb5.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/krb5.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/krb5.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/libreswan.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/libreswan.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/libreswan.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/libssh.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/libssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/libssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/nss.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/nss.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/nss.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/openssh.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/openssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/openssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/opensshserver.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/opensshserver.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/opensshserver.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/openssl.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/openssl.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/openssl.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/opensslcnf.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FUTURE/opensslcnf.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FUTURE/opensslcnf.config + for d in LEGACY DEFAULT FUTURE FIPS + mkdir -p -m 755 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/bind.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/bind.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/bind.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/gnutls.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/gnutls.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/gnutls.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/java.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/java.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/java.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/javasystem.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/javasystem.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/javasystem.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/krb5.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/krb5.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/krb5.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/libreswan.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/libreswan.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/libreswan.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/libssh.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/libssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/libssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/nss.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/nss.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/nss.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/openssh.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/openssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/openssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/opensshserver.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/opensshserver.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/opensshserver.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/openssl.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/openssl.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/openssl.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/$d/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/opensslcnf.txt .txt + ln /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/FIPS/opensslcnf.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/back-ends/FIPS/opensslcnf.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/bind.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/bind.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/bind.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/bind.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/gnutls.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/gnutls.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/gnutls.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/gnutls.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/java.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/java.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/java.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/java.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/javasystem.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/javasystem.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/javasystem.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/javasystem.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/krb5.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/krb5.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/krb5.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/krb5.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/libreswan.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/libreswan.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/libreswan.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/libreswan.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/libssh.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/libssh.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/libssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/libssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/nss.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/nss.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/nss.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/nss.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/openssh.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/openssh.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/openssh.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/openssh.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/opensshserver.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/opensshserver.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/opensshserver.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/opensshserver.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/openssl.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/openssl.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/openssl.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/openssl.config + for f in /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/* ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/opensslcnf.txt ++ basename /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/DEFAULT/opensslcnf.txt .txt + ln -sf /usr/share/crypto-policies/DEFAULT/opensslcnf.txt /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/etc/crypto-policies/back-ends/opensslcnf.config + [[ /usr/bin/python3 =~ - ]] ++ /usr/bin/python3 -c 'import sys; sys.stdout.write('\''{0.major}{0.minor}'\''.format(sys.version_info))' + python_version=39 + '[' 39 -ge 39 ']' + py39_byte_compile /usr/bin/python3 /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python + python_binary='env PYTHONHASHSEED=0 /usr/bin/python3' + bytecode_compilation_path=/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python + env PYTHONHASHSEED=0 /usr/bin/python3 -s -B -m compileall -o 0 -o 1 -s /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64 -p / /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python Listing '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/build-crypto-policies.py'... Listing '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies/__init__.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies/alg_lists.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies/cryptopolicies.py'... Listing '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies/validation'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies/validation/__init__.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies/validation/alg_lists.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies/validation/general.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies/validation/rules.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/cryptopolicies/validation/scope.py'... Listing '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/__init__.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/bind.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/configgenerator.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/gnutls.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/java.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/krb5.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/libreswan.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/libssh.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/nss.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/openssh.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/policygenerators/openssl.py'... Compiling '/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/crypto-policies/python/update-crypto-policies.py'... + /usr/bin/find-debuginfo -j8 --strict-build-id -m -i --build-id-seed 20210917-1.mga9 --unique-debug-suffix -20210917-1.mga9.aarch64 --unique-debug-src-base crypto-policies-20210917-1.mga9.aarch64 --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 -S debugsourcefiles.list /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19 + /usr/lib/rpm/check-buildroot + '[' -n '' ']' + /usr/share/spec-helper/clean_files + '[' -n '' ']' + /usr/share/spec-helper/compress_files .xz + '[' -n '' ']' + /usr/share/spec-helper/relink_symlinks + '[' -n '' ']' + /usr/share/spec-helper/clean_perl + '[' -n '' ']' + /usr/share/spec-helper/lib_symlinks + '[' -n '' ']' + /usr/share/spec-helper/gprintify + '[' -n '' ']' + /usr/share/spec-helper/fix_mo + '[' -n '' ']' + /usr/share/spec-helper/fix_pamd + '[' -n '' ']' + /usr/share/spec-helper/remove_info_dir + '[' -n '' ']' + /usr/share/spec-helper/fix_eol + '[' -n '' ']' + /usr/share/spec-helper/check_desktop_files + '[' -n '' ']' + /usr/share/spec-helper/check_elf_files + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python3 1 0 + /usr/lib/rpm/check-rpaths + /usr/lib/rpm/brp-remove-la-files + /usr/lib/rpm/redhat/brp-mangle-shebangs mangling shebang in /usr/bin/fips-mode-setup from /bin/bash to #!/usr/bin/bash mangling shebang in /usr/bin/fips-finish-install from /bin/bash to #!/usr/bin/bash Executing(%check): /bin/sh -e /home/iurt/rpmbuild/tmp/rpm-tmp.IcpEBg + umask 022 + cd /home/iurt/rpmbuild/BUILD + cd fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19 + '[' 1 -eq 1 ']' + make test -j8 python/build-crypto-policies.py --strict --test --flat policies tests/outputs codespell -L gost -S .git,./tests/krb5check/* PYTHONPATH=. pylint-3 --rcfile=pylintrc python # Don't trust coverage testing coverage run --source python/cryptopolicies/ --branch -m pytest -vv --doctest-modules python/ &>/dev/null gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL:+SIGN-DSA-SHA256:+SIGN-DSA-SHA384:+SIGN-DSA-SHA512:+SIGN-DSA-SHA224:+SIGN-DSA-SHA1:+3DES-CBC:+DHE-DSS gnutls[2]: cfg: loaded system priority /tmp/tmp7x0uqqpl mtime 1637833297 Cannot determine nss version with ctypes gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC SHA1 for TLS gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group FFDHE2048 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature RSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher AES-128-GCM for TLS gnutls[2]: cfg: disabling cipher AES-128-CCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher AES-256-CBC for TLS gnutls[2]: cfg: disabling cipher AES-128-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpe0n_28gf mtime 1637833297 Cannot determine nss version with ctypes ============================= test session starts ============================== platform linux -- Python 3.9.8, pytest-6.2.4, py-1.10.0, pluggy-1.0.0 -- /usr/bin/python3 cachedir: .pytest_cache rootdir: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19, configfile: pytest.ini collecting ... gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group X25519 for TLS gnutls[2]: cfg: disabling group X448 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature EDDSA-ED25519 as insecure gnutls[2]: cfg: marking signature EDDSA-ED448 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CHACHA20-POLY1305 for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpliqiyjtu mtime 1637833297 ============================= test session starts ============================== platform linux -- Python 3.9.8, pytest-6.2.4, py-1.10.0, pluggy-1.0.0 -- /usr/bin/python3 cachedir: .pytest_cache rootdir: /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19, configfile: pytest.ini collecting ... Cannot determine nss version with ctypes collected 12 items python/cryptopolicies/alg_lists.py::cryptopolicies.alg_lists.earliest_occurrence PASSED [ 8%] python/cryptopolicies/alg_lists.py::cryptopolicies.alg_lists.glob PASSED [ 16%] python/cryptopolicies/alg_lists.py::cryptopolicies.alg_lists.max_dtls_version PASSED [ 25%] python/cryptopolicies/alg_lists.py::cryptopolicies.alg_lists.max_tls_version PASSED [ 33%] python/cryptopolicies/alg_lists.py::cryptopolicies.alg_lists.min_dtls_version PASSED [ 41%] python/cryptopolicies/alg_lists.py::cryptopolicies.alg_lists.min_tls_version PASSED [ 50%] python/cryptopolicies/cryptopolicies.py::cryptopolicies.cryptopolicies.ScopeSelector.__init__ PASSED [ 58%] python/cryptopolicies/cryptopolicies.py::cryptopolicies.cryptopolicies.ScopeSelector.matches gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected PASSED [ 66%]gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpmon02t3y mtime 1637833297 python/cryptopolicies/cryptopolicies.py::cryptopolicies.cryptopolicies.ScopedPolicy PASSED [ 75%] python/cryptopolicies/cryptopolicies.py::cryptopolicies.cryptopolicies.parse_line PASSED [ 83%] python/cryptopolicies/cryptopolicies.py::cryptopolicies.cryptopolicies.parse_rhs PASSED [ 91%] python/cryptopolicies/cryptopolicies.py::cryptopolicies.cryptopolicies.preprocess_text PASSED [100%] ============================== 12 passed in 0.19s ============================== Cannot determine nss version with ctypes collected 43 items tests/unit/test_alg_lists.py::test_glob_alg_sanity PASSED [ 2%] tests/unit/test_alg_lists.py::test_glob_alg_globbing PASSED [ 4%] tests/unit/test_alg_lists.py::test_glob_alg_algorithm_empty PASSED [ 6%] tests/unit/test_alg_lists.py::test_glob_alg_algorithm_class_unknown PASSED [ 9%] tests/unit/test_alg_lists.py::test_min_versions PASSED [ 11%] tests/unit/test_alg_lists.py::test_max_versions PASSED [ 13%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_is_empty PASSED [ 16%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_not_found PASSED [ 18%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_smoke_broken PASSED [ 20%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_smoke_basic PASSED [ 23%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_smoke_subpolicy PASSED [ 25%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_smoke_several_subpolicies PASSED [ 27%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_compat_diamond_new_recommended python/build-crypto-policies.py --strict --policy FIPS:OSPP --test --flat policies tests/outputs PASSED [ 30%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_compat_diamond_old_recommended PASSED [ 32%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_compat_diamond_breaking1 PASSED [ 34%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_compat_diamond_breaking2 PASSED [ 37%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_sha1_in_dnssec PASSED [ 39%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_prepend_order PASSED [ 41%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_no_duplicates PASSED [ 44%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_minver PASSED [ 46%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_maxver PASSED [ 48%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_to_string_empty PASSED [ 51%] tests/unit/test_cryptopolicy.py::test_cryptopolicy_to_string_twisted PASSED [ 53%] tests/unit/test_parse_line.py::test_parse_line PASSED [ 55%] tests/unit/test_parse_line.py::test_parse_bad PASSED [ 58%] tests/unit/test_parse_rhs.py::test_parse_rhs PASSED [ 60%] tests/unit/test_preprocess_text.py::test_preprocess_text_basics PASSED [ 62%] tests/unit/test_preprocess_text.py::test_preprocess_text_compat PASSED [ 65%] tests/unit/test_preprocess_text.py::test_preprocess_text_compat_problematic PASSED [ 67%] tests/unit/test_preprocess_text.py::test_preprocess_text_compat_diamond_problem PASSED [ 69%] tests/unit/test_scope_selector.py::test_scope_selector_any PASSED [ 72%] tests/unit/test_scope_selector.py::test_scope_selector_tls PASSED [ 74%] tests/unit/test_scope_selector.py::test_scope_selector_nontls PASSED [ 76%] tests/unit/test_scope_selector.py::test_scope_selector_posglob PASSED [ 79%] tests/unit/test_scope_selector.py::test_scope_selector_negglob PASSED [ 81%] tests/unit/test_scope_selector.py::test_scope_selector_posmixed PASSED [ 83%] tests/unit/test_scope_selector.py::test_scope_selector_negmixed PASSED [ 86%] tests/unit/test_scope_selector.py::test_scope_selector_curly_brackets PASSED [ 88%] tests/unit/test_scope_selector.py::test_scope_selector_empty PASSED [ 90%] tests/unit/test_scope_selector.py::test_scope_selector_illegal_character PASSED [ 93%] tests/unit/test_scope_selector.py::test_scope_selector_comma PASSED [ 95%] tests/unit/test_scope_selector.py::test_scope_selector_unknown PASSED [ 97%] tests/unit/test_scope_selector.py::test_scope_selector_nomatch PASSED [100%] ============================== 43 passed in 0.35s ============================== gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA3-256 as insecure gnutls[2]: cfg: marking hash SHA3-384 as insecure gnutls[2]: cfg: marking hash SHA3-512 as insecure gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC SHA1 for TLS gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group X25519 for TLS gnutls[2]: cfg: disabling group X448 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature RSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA512 as insecure gnutls[2]: cfg: marking signature EDDSA-ED25519 as insecure gnutls[2]: cfg: marking signature EDDSA-ED448 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher AES-256-CCM for TLS gnutls[2]: cfg: disabling cipher AES-128-CCM for TLS gnutls[2]: cfg: disabling cipher CHACHA20-POLY1305 for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.3 gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpj93x_5r5 mtime 1637833298 Cannot determine nss version with ctypes python/build-crypto-policies.py --strict --policy FIPS:ECDHE-ONLY --test --flat policies tests/outputs gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group X25519 for TLS gnutls[2]: cfg: disabling group X448 for TLS gnutls[2]: cfg: disabling group FFDHE2048 for TLS gnutls[2]: cfg: disabling group FFDHE3072 for TLS gnutls[2]: cfg: disabling group FFDHE4096 for TLS gnutls[2]: cfg: disabling group FFDHE6144 for TLS gnutls[2]: cfg: disabling group FFDHE8192 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature EDDSA-ED25519 as insecure gnutls[2]: cfg: marking signature EDDSA-ED448 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CHACHA20-POLY1305 for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS coverage run --append --source python/cryptopolicies/ --branch -m pytest -vv tests/unit/ &>/dev/null gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange PSK for TLS gnutls[2]: cfg: disabling key exchange DHE-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpmjuhps8j mtime 1637833298 Cannot determine nss version with ctypes python/build-crypto-policies.py --strict --policy DEFAULT:GOST --test --flat policies tests/outputs gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpkz3j8emc mtime 1637833298 Cannot determine nss version with ctypes python/build-crypto-policies.py --strict --policy GOST-ONLY --test --flat policies tests/outputs python/build-crypto-policies.py --strict --policy LEGACY:AD-SUPPORT --test --flat policies tests/outputs gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL:+SIGN-DSA-SHA256:+SIGN-DSA-SHA384:+SIGN-DSA-SHA512:+SIGN-DSA-SHA224:+SIGN-DSA-SHA1:+3DES-CBC:+DHE-DSS gnutls[2]: cfg: loaded system priority /tmp/tmp3goszug9 mtime 1637833298 Cannot determine nss version with ctypes python/build-crypto-policies.py --strict --policy DEFAULT:FEDORA32 --test --flat policies tests/outputs gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpqh1egaoa mtime 1637833299 Cannot determine nss version with ctypes coverage report --fail-under=100 tests/openssl.pl Checking the OpenSSL configuration Checking policy LEGACY:AD-SUPPORT Checking policy LEGACY Checking policy GOST-ONLY Checking policy FUTURE Checking policy FIPS:OSPP Checking policy FIPS:ECDHE-ONLY Checking policy FIPS Checking policy EMPTY Checking policy DEFAULT:GOST Checking policy DEFAULT:FEDORA32 Checking policy DEFAULT tests/gnutls.pl Checking the GnuTLS configuration Checking policy LEGACY:AD-SUPPORT Checking policy LEGACY Checking policy GOST-ONLY Checking policy FUTURE Checking policy FIPS:OSPP Checking policy FIPS:ECDHE-ONLY Checking policy FIPS Checking policy EMPTY Checking policy DEFAULT:GOST Checking policy DEFAULT:FEDORA32 Checking policy DEFAULT tests/nss.py nss-policy-check not found, skipping check tests/java.pl Name Stmts Miss Branch BrPart Cover --------------------------------------------------------------------------------- python/cryptopolicies/__init__.py 2 0 0 0 100% python/cryptopolicies/alg_lists.py 35 0 10 0 100% python/cryptopolicies/cryptopolicies.py 234 0 122 0 100% python/cryptopolicies/validation/__init__.py 3 0 0 0 100% python/cryptopolicies/validation/alg_lists.py 9 0 0 0 100% python/cryptopolicies/validation/general.py 5 0 0 0 100% python/cryptopolicies/validation/rules.py 19 0 4 0 100% python/cryptopolicies/validation/scope.py 38 0 16 0 100% --------------------------------------------------------------------------------- TOTAL 345 0 152 0 100% Java ciphersuites per policy Checking the Java configuration Checking policy LEGACY:AD-SUPPORT TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_DSS_WITH_AES_256_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_DHE_DSS_WITH_AES_128_CBC_SHA TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_3DES_EDE_CBC_SHA SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA TLS_EMPTY_RENEGOTIATION_INFO_SCSV Checking policy LEGACY TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_DSS_WITH_AES_256_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_DHE_DSS_WITH_AES_128_CBC_SHA TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_3DES_EDE_CBC_SHA SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA TLS_EMPTY_RENEGOTIATION_INFO_SCSV Checking policy GOST-ONLY TLS_EMPTY_RENEGOTIATION_INFO_SCSV Checking policy FUTURE TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_EMPTY_RENEGOTIATION_INFO_SCSV Checking policy FIPS:OSPP TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_EMPTY_RENEGOTIATION_INFO_SCSV Checking policy FIPS:ECDHE-ONLY TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_EMPTY_RENEGOTIATION_INFO_SCSV Checking policy FIPS TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_EMPTY_RENEGOTIATION_INFO_SCSV Checking policy EMPTY Checking policy DEFAULT:GOST TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_EMPTY_RENEGOTIATION_INFO_SCSV Checking policy DEFAULT:FEDORA32 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_EMPTY_RENEGOTIATION_INFO_SCSV Checking policy DEFAULT TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_EMPTY_RENEGOTIATION_INFO_SCSV tests/krb5.py Skipping krb5 test; checker not found! top_srcdir=. tests/update-crypto-policies.sh Saving config for bind for policy LEGACY Saving config for gnutls for policy LEGACY Saving config for java for policy LEGACY Saving config for javasystem for policy LEGACY Saving config for krb5 for policy LEGACY Saving config for libreswan for policy LEGACY Saving config for libssh for policy LEGACY Saving config for nss for policy LEGACY Saving config for openssh for policy LEGACY Saving config for opensshserver for policy LEGACY Saving config for opensslcnf for policy LEGACY Saving config for openssl for policy LEGACY Saving config for bind for policy GOST-ONLY Saving config for gnutls for policy GOST-ONLY Saving config for java for policy GOST-ONLY Saving config for javasystem for policy GOST-ONLY Saving config for krb5 for policy GOST-ONLY Saving config for libreswan for policy GOST-ONLY Saving config for libssh for policy GOST-ONLY Saving config for nss for policy GOST-ONLY Saving config for openssh for policy GOST-ONLY Saving config for opensshserver for policy GOST-ONLY Saving config for opensslcnf for policy GOST-ONLY Saving config for openssl for policy GOST-ONLY Saving config for bind for policy FUTURE Saving config for gnutls for policy FUTURE Saving config for java for policy FUTURE Saving config for javasystem for policy FUTURE Saving config for krb5 for policy FUTURE Saving config for libreswan for policy FUTURE Saving config for libssh for policy FUTURE Saving config for nss for policy FUTURE Saving config for openssh for policy FUTURE Saving config for opensshserver for policy FUTURE Saving config for opensslcnf for policy FUTURE Saving config for openssl for policy FUTURE Saving config for bind for policy FIPS Saving config for gnutls for policy FIPS Saving config for java for policy FIPS Saving config for javasystem for policy FIPS Saving config for krb5 for policy FIPS Saving config for libreswan for policy FIPS Saving config for libssh for policy FIPS Saving config for nss for policy FIPS Saving config for openssh for policy FIPS Saving config for opensshserver for policy FIPS Saving config for opensslcnf for policy FIPS Saving config for openssl for policy FIPS Saving config for bind for policy EMPTY Saving config for gnutls for policy EMPTY Saving config for java for policy EMPTY Saving config for javasystem for policy EMPTY Saving config for krb5 for policy EMPTY Saving config for libreswan for policy EMPTY Saving config for libssh for policy EMPTY Saving config for nss for policy EMPTY Saving config for openssh for policy EMPTY Saving config for opensshserver for policy EMPTY Saving config for opensslcnf for policy EMPTY Saving config for openssl for policy EMPTY Saving config for bind for policy DEFAULT Saving config for gnutls for policy DEFAULT Saving config for java for policy DEFAULT Saving config for javasystem for policy DEFAULT Saving config for krb5 for policy DEFAULT Saving config for libreswan for policy DEFAULT Saving config for libssh for policy DEFAULT Saving config for nss for policy DEFAULT Saving config for openssh for policy DEFAULT Saving config for opensshserver for policy DEFAULT Saving config for opensslcnf for policy DEFAULT Saving config for openssl for policy DEFAULT tests/update-crypto-policies.sh: checking if default profile is properly selected Setting system policy to DEFAULT Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. tests/update-crypto-policies.sh: checking if current policy dump is equal to the original default profile PolicySyntaxDeprecationWarning: Option protocol is deprecated, please rewrite your rules using protocol@tls; be advised that it is not always a 1-1 replacement PYTHONPATH=. pylint-3 --rcfile=pylintrc tests Setting system policy to CURRENT Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. tests/update-crypto-policies.sh: checking if switching to other profile works Setting system policy to LEGACY Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. tests/update-crypto-policies.sh: checking if local.d works Setting system policy to DEFAULT Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. tests/update-crypto-policies.sh: checking if --check works (test 1) The configured policy matches the generated policy The configured policy does NOT match the generated policy --check works as expected tests/update-crypto-policies.sh: checking if --check works (test 2) Setting system policy to DEFAULT Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. The configured policy matches the generated policy The configured policy does NOT match the generated policy --check works as expected cp -r tests/outputs output/alt python/build-crypto-policies.py --test --flat tests/alternative-policies output/alt /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:254: PolicySyntaxDeprecationWarning: option protocol is deprecated, please rewrite your rules using protocol@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning('protocol', /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option tls_cipher is deprecated, please rewrite your rules using cipher@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_cipher is deprecated, please rewrite your rules using cipher@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_group is deprecated, please rewrite your rules using group@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ike_protocol is deprecated, please rewrite your rules using protocol@IKE; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:282: PolicySyntaxDeprecationWarning: option sha1_in_dnssec = 1 is deprecated, please rewrite your rules using hash@DNSSec = SHA1+ and sign@DNSSec = RSA-SHA1+ ECDSA-SHA1+; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL:+SIGN-DSA-SHA256:+SIGN-DSA-SHA384:+SIGN-DSA-SHA512:+SIGN-DSA-SHA224:+SIGN-DSA-SHA1:+3DES-CBC:+DHE-DSS gnutls[2]: cfg: loaded system priority /tmp/tmpmhhit7gv mtime 1637833307 Cannot determine nss version with ctypes /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:254: PolicySyntaxDeprecationWarning: option protocol is deprecated, please rewrite your rules using protocol@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning('protocol', /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option tls_cipher is deprecated, please rewrite your rules using cipher@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_cipher is deprecated, please rewrite your rules using cipher@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ike_protocol is deprecated, please rewrite your rules using protocol@IKE; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:282: PolicySyntaxDeprecationWarning: option sha1_in_dnssec = 0 is deprecated, please rewrite your rules using hash@DNSSec = -SHA1 and sign@DNSSec = -RSA-SHA1 -ECDSA-SHA1; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC SHA1 for TLS gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group FFDHE2048 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature RSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher AES-128-GCM for TLS gnutls[2]: cfg: disabling cipher AES-128-CCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher AES-256-CBC for TLS gnutls[2]: cfg: disabling cipher AES-128-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpm6ug2wd1 mtime 1637833307 Cannot determine nss version with ctypes /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:254: PolicySyntaxDeprecationWarning: option protocol is deprecated, please rewrite your rules using protocol@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning('protocol', /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option tls_cipher is deprecated, please rewrite your rules using cipher@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_cipher is deprecated, please rewrite your rules using cipher@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ike_protocol is deprecated, please rewrite your rules using protocol@IKE; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:282: PolicySyntaxDeprecationWarning: option sha1_in_dnssec = 0 is deprecated, please rewrite your rules using hash@DNSSec = -SHA1 and sign@DNSSec = -RSA-SHA1 -ECDSA-SHA1; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group X25519 for TLS gnutls[2]: cfg: disabling group X448 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature EDDSA-ED25519 as insecure gnutls[2]: cfg: marking signature EDDSA-ED448 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CHACHA20-POLY1305 for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpvq8x22mo mtime 1637833307 Cannot determine nss version with ctypes /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:254: PolicySyntaxDeprecationWarning: option protocol is deprecated, please rewrite your rules using protocol@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning('protocol', /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option tls_cipher is deprecated, please rewrite your rules using cipher@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_cipher is deprecated, please rewrite your rules using cipher@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_group is deprecated, please rewrite your rules using group@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ike_protocol is deprecated, please rewrite your rules using protocol@IKE; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:282: PolicySyntaxDeprecationWarning: option sha1_in_dnssec = 0 is deprecated, please rewrite your rules using hash@DNSSec = -SHA1 and sign@DNSSec = -RSA-SHA1 -ECDSA-SHA1; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:282: PolicySyntaxDeprecationWarning: option sha1_in_dnssec = 1 is deprecated, please rewrite your rules using hash@DNSSec = SHA1+ and sign@DNSSec = RSA-SHA1+ ECDSA-SHA1+; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpj8qc7w_5 mtime 1637833307 Cannot determine nss version with ctypes python/build-crypto-policies.py --policy FIPS:OSPP --test --flat tests/alternative-policies output/alt /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:254: PolicySyntaxDeprecationWarning: option protocol is deprecated, please rewrite your rules using protocol@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning('protocol', /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option tls_cipher is deprecated, please rewrite your rules using cipher@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_cipher is deprecated, please rewrite your rules using cipher@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ike_protocol is deprecated, please rewrite your rules using protocol@IKE; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:282: PolicySyntaxDeprecationWarning: option sha1_in_dnssec = 0 is deprecated, please rewrite your rules using hash@DNSSec = -SHA1 and sign@DNSSec = -RSA-SHA1 -ECDSA-SHA1; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_group is deprecated, please rewrite your rules using group@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA3-256 as insecure gnutls[2]: cfg: marking hash SHA3-384 as insecure gnutls[2]: cfg: marking hash SHA3-512 as insecure gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC SHA1 for TLS gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group X25519 for TLS gnutls[2]: cfg: disabling group X448 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature RSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA512 as insecure gnutls[2]: cfg: marking signature EDDSA-ED25519 as insecure gnutls[2]: cfg: marking signature EDDSA-ED448 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher AES-256-CCM for TLS gnutls[2]: cfg: disabling cipher AES-128-CCM for TLS gnutls[2]: cfg: disabling cipher CHACHA20-POLY1305 for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.3 gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmp8usrt616 mtime 1637833308 Cannot determine nss version with ctypes python/build-crypto-policies.py --policy FIPS:ECDHE-ONLY --test --flat tests/alternative-policies output/alt /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:254: PolicySyntaxDeprecationWarning: option protocol is deprecated, please rewrite your rules using protocol@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning('protocol', /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option tls_cipher is deprecated, please rewrite your rules using cipher@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_cipher is deprecated, please rewrite your rules using cipher@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ike_protocol is deprecated, please rewrite your rules using protocol@IKE; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:282: PolicySyntaxDeprecationWarning: option sha1_in_dnssec = 0 is deprecated, please rewrite your rules using hash@DNSSec = -SHA1 and sign@DNSSec = -RSA-SHA1 -ECDSA-SHA1; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group X25519 for TLS gnutls[2]: cfg: disabling group X448 for TLS gnutls[2]: cfg: disabling group FFDHE2048 for TLS gnutls[2]: cfg: disabling group FFDHE3072 for TLS gnutls[2]: cfg: disabling group FFDHE4096 for TLS gnutls[2]: cfg: disabling group FFDHE6144 for TLS gnutls[2]: cfg: disabling group FFDHE8192 for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature EDDSA-ED25519 as insecure gnutls[2]: cfg: marking signature EDDSA-ED448 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CHACHA20-POLY1305 for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange PSK for TLS gnutls[2]: cfg: disabling key exchange DHE-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA-PSK for TLS gnutls[2]: cfg: disabling key exchange RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-RSA for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmppyn869gc mtime 1637833308 Cannot determine nss version with ctypes python/build-crypto-policies.py --policy GOST-ONLY --test --flat tests/alternative-policies output/alt /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:254: PolicySyntaxDeprecationWarning: option protocol is deprecated, please rewrite your rules using protocol@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning('protocol', python/build-crypto-policies.py --policy LEGACY:AD-SUPPORT --test --flat policies tests/outputs gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL:+SIGN-DSA-SHA256:+SIGN-DSA-SHA384:+SIGN-DSA-SHA512:+SIGN-DSA-SHA224:+SIGN-DSA-SHA1:+3DES-CBC:+DHE-DSS gnutls[2]: cfg: loaded system priority /tmp/tmptsixuqub mtime 1637833308 Cannot determine nss version with ctypes python/build-crypto-policies.py --policy DEFAULT:GOST --test --flat tests/alternative-policies output/alt /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:254: PolicySyntaxDeprecationWarning: option protocol is deprecated, please rewrite your rules using protocol@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning('protocol', /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option tls_cipher is deprecated, please rewrite your rules using cipher@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_cipher is deprecated, please rewrite your rules using cipher@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ike_protocol is deprecated, please rewrite your rules using protocol@IKE; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:282: PolicySyntaxDeprecationWarning: option sha1_in_dnssec = 1 is deprecated, please rewrite your rules using hash@DNSSec = SHA1+ and sign@DNSSec = RSA-SHA1+ ECDSA-SHA1+; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash SHA1 as insecure gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature RSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature ECDSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature rsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature dsa-sha1 as insecure for certs gnutls[2]: cfg: marking signature ecdsa-sha1 as insecure for certs gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling version TLS1.1 gnutls[2]: cfg: disabling version TLS1.0 gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: disabling version DTLS1.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmph0rlii0l mtime 1637833309 Cannot determine nss version with ctypes python/build-crypto-policies.py --policy DEFAULT:FEDORA32 --test --flat tests/alternative-policies output/alt /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:254: PolicySyntaxDeprecationWarning: option protocol is deprecated, please rewrite your rules using protocol@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning('protocol', /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option tls_cipher is deprecated, please rewrite your rules using cipher@TLS; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_cipher is deprecated, please rewrite your rules using cipher@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ike_protocol is deprecated, please rewrite your rules using protocol@IKE; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:282: PolicySyntaxDeprecationWarning: option sha1_in_dnssec = 1 is deprecated, please rewrite your rules using hash@DNSSec = SHA1+ and sign@DNSSec = RSA-SHA1+ ECDSA-SHA1+; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) /home/iurt/rpmbuild/BUILD/fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19/python/cryptopolicies/cryptopolicies.py:267: PolicySyntaxDeprecationWarning: option ssh_group is deprecated, please rewrite your rules using group@SSH; be advised that it is not always a 1-1 replacement warnings.warn(PolicySyntaxDeprecationWarning(fr, to)) gnutls[2]: Enabled GnuTLS 3.7.2 logging... gnutls[2]: getrandom random generator was selected gnutls[2]: Aarch64 SHA1 was detected gnutls[2]: Aarch64 SHA2 was detected gnutls[2]: Aarch64 AES was detected gnutls[2]: Aarch64 PMULL was detected gnutls[2]: cfg: marking hash MD5 as insecure gnutls[2]: cfg: marking hash STREEBOG-256 as insecure gnutls[2]: cfg: marking hash STREEBOG-512 as insecure gnutls[2]: cfg: marking hash GOSTR341194 as insecure gnutls[2]: cfg: disabling MAC MD5 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-256 for TLS gnutls[2]: cfg: disabling MAC STREEBOG-512 for TLS gnutls[2]: cfg: disabling MAC GOST28147-TC26Z-IMIT for TLS gnutls[2]: cfg: disabling group GC256B for TLS gnutls[2]: cfg: disabling group GC512A for TLS gnutls[2]: cfg: marking signature RSA-MD5 as insecure gnutls[2]: cfg: marking signature DSA-SHA1 as insecure gnutls[2]: cfg: marking signature DSA-SHA224 as insecure gnutls[2]: cfg: marking signature DSA-SHA256 as insecure gnutls[2]: cfg: marking signature DSA-SHA384 as insecure gnutls[2]: cfg: marking signature DSA-SHA512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-512 as insecure gnutls[2]: cfg: marking signature GOSTR341012-256 as insecure gnutls[2]: cfg: marking signature GOSTR341001 as insecure gnutls[2]: cfg: disabling cipher CAMELLIA-256-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-GCM for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-256-CBC for TLS gnutls[2]: cfg: disabling cipher CAMELLIA-128-CBC for TLS gnutls[2]: cfg: disabling cipher 3DES-CBC for TLS gnutls[2]: cfg: disabling cipher ARCFOUR-128 for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPA-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPB-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPC-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-CPD-CFB for TLS gnutls[2]: cfg: disabling cipher GOST28147-TC26Z-CNT for TLS gnutls[2]: cfg: disabling key exchange DHE-DSS for TLS gnutls[2]: cfg: disabling key exchange VKO-GOST-12 for TLS gnutls[2]: cfg: disabling version SSL3.0 gnutls[2]: cfg: adding priority: SYSTEM -> NORMAL gnutls[2]: cfg: loaded system priority /tmp/tmpi67fcsj2 mtime 1637833309 Cannot determine nss version with ctypes [ OK ] + RPM_EC=0 ++ jobs -p + exit 0 Processing files: crypto-policies-20210917-1.mga9.noarch Executing(%license): /bin/sh -e /home/iurt/rpmbuild/tmp/rpm-tmp.ISDI5x + umask 022 + cd /home/iurt/rpmbuild/BUILD + cd fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19 + LICENSEDIR=/home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/licenses/crypto-policies + export LC_ALL=C + LC_ALL=C + export LICENSEDIR + /usr/bin/mkdir -p /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/licenses/crypto-policies + cp -pr COPYING.LESSER /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64/usr/share/licenses/crypto-policies + RPM_EC=0 ++ jobs -p + exit 0 Provides: config(crypto-policies) = 20210917-1.mga9 crypto-policies = 20210917-1.mga9 Requires(rpmlib): rpmlib(BuiltinLuaScripts) <= 4.2.2-1 rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PartialHardlinkSets) <= 4.0.4-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Recommends: crypto-policies-scripts Processing files: crypto-policies-scripts-20210917-1.mga9.noarch Provides: crypto-policies-scripts = 20210917-1.mga9 Requires(interp): /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): python3 Requires(posttrans): /bin/sh Checking for unpackaged file(s): /usr/lib/rpm/check-files /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64 Wrote: /home/iurt/rpmbuild/RPMS/noarch/crypto-policies-20210917-1.mga9.noarch.rpm Wrote: /home/iurt/rpmbuild/RPMS/noarch/crypto-policies-scripts-20210917-1.mga9.noarch.rpm Executing(%clean): /bin/sh -e /home/iurt/rpmbuild/tmp/rpm-tmp.xGZXdq + umask 022 + cd /home/iurt/rpmbuild/BUILD + cd fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19 + /usr/bin/rm -rf /home/iurt/rpmbuild/BUILDROOT/crypto-policies-20210917-1.mga9.aarch64 + RPM_EC=0 ++ jobs -p + exit 0 Executing(--clean): /bin/sh -e /home/iurt/rpmbuild/tmp/rpm-tmp.Sboaxz + umask 022 + cd /home/iurt/rpmbuild/BUILD + rm -rf fedora-crypto-policies-c9d86d1-c9d86d1154c4b286c9be3d5e9e32451df6f64e19 + RPM_EC=0 ++ jobs -p + exit 0 D: [iurt_root_command] Success!