Looks like something is tryimng to communicate with TPM module (which I haven't)
What I can do in that situation?
```
+ /usr/bin/mkdir -p /home/tkloczko/.gnupg
+ /usr/bin/make -O -j48 V=1 VERBOSE=1 check
Making check in m4
make[1]: Nothing to be done for 'check'.
Making check in common
/usr/bin/make check-am
/usr/bin/make check-TESTS
make[3]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/common'
PASS: t-stringhelp
PASS: t-timestuff
PASS: t-convert
PASS: t-percent
PASS: t-gettime
PASS: t-sysutils
t-sexputil.c:468: test 0 failed: Unknown elliptic curve - ignored
This is likely due to a patched version of Libgcrypt with removed support for Brainpool curves
t-sexputil.c:468: test 1 failed: Unknown elliptic curve - ignored
PASS: t-sexputil
> Known envvars: GPG_TTY(ttyname) TERM(ttytype) DISPLAY(display)
> XAUTHORITY(xauthority) XMODIFIERS WAYLAND_DISPLAY XDG_SESSION_TYPE
> QT_QPA_PLATFORM GTK_IM_MODULE DBUS_SESSION_BUS_ADDRESS
> QT_IM_MODULE INSIDE_EMACS PINENTRY_USER_DATA(pinentry-user-data)
PASS: t-session-env
PASS: t-openpgp-oid
PASS: t-ssh-utils
PASS: t-mapstrings
PASS: t-zb32
PASS: t-mbox-util
PASS: t-iobuf
PASS: t-strlist
PASS: t-name-value
PASS: t-ccparray
PASS: t-recsel
PASS: t-w32-cmdline
PASS: t-exechelp
error running '/bin/false': exit status 1
PASS: t-exectool
===================
All 21 tests passed
===================
make[3]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/common'
Making check in regexp
/usr/bin/make check-am
make[2]: Nothing to be done for 'check-am'.
Making check in kbx
make[1]: Nothing to be done for 'check'.
Making check in g10
/usr/bin/make check-TESTS
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/g10'
PASS: t-rmd160
can't allocate lock for '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/g10/t-keydb-keyring.kbx'
PASS: t-keydb
PASS: t-keydb-get-keyblock
PASS: t-stutter
==================
All 4 tests passed
==================
make[2]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/g10'
Making check in sm
/usr/bin/make check-TESTS
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/sm'
==================
All 0 tests passed
==================
make[2]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/sm'
Making check in agent
/usr/bin/make check-TESTS
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/agent'
PASS: t-protect
=============
1 test passed
=============
make[2]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/agent'
Making check in scd
make[1]: Nothing to be done for 'check'.
Making check in g13
/usr/bin/make check-TESTS
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/g13'
PASS: t-g13tuple
=============
1 test passed
=============
make[2]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/g13'
Making check in dirmngr
/usr/bin/make check-TESTS
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/dirmngr'
PASS: t-http-basic
PASS: t-ldap-parse-uri
PASS: t-ldap-misc
==================
All 3 tests passed
==================
make[2]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/dirmngr'
Making check in tools
make[1]: Nothing to be done for 'check'.
Making check in po
Making check in doc
/usr/bin/make check-am
make[2]: Nothing to be done for 'check-am'.
Making check in tests
Making check in gpgscm
/usr/bin/make check-local
make[3]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm'
EXEEXT= GPGSCM_PATH=. \
./gpgscm ./t-child.scm
Testing process and IPC primitives...
hello world.
All good.
make[3]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm'
Making check in openpgp
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/openpgp'
LC_ALL=C EXEEXT= PATH="../gpgscm:/usr/bin:/usr/sbin:/usr/local/sbin" abs_top_srcdir="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2" objdir="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2" GPGSCM_PATH="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm" /home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm/gpgscm \
/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/openpgp/run-tests.scm
PASS: tests/openpgp/setup.scm
Printing the GPG version
PASS: <standard>tests/openpgp/version.scm
Checking armor encoding and decoding
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/enarmor.scm
Hashing the empty string
> MD5 SHA1 RIPEMD160 SHA224 SHA256 SHA384 SHA512 <
Hashing the string "abcdefghijklmnopqrstuvwxyz"
> MD5 SHA1 RIPEMD160 SHA224 SHA256 SHA384 SHA512 <
PASS: <standard>tests/openpgp/mds.scm
Checking decryption of supplied files
> plain-1 plain-2 plain-3 plain-large <
PASS: <standard>tests/openpgp/decrypt.scm
Checking decryption of supplied files using --multifile.
Verifying files:
> plain-1 plain-2 plain-3 plain-large <
PASS: <standard>tests/openpgp/decrypt-multifile.scm
Checking decryption of supplied DSA encrypted file
> plain-1 <
PASS: <standard>tests/openpgp/decrypt-dsa.scm
Checking decryption of supplied files using the session key.
> plain-1 plain-2 plain-3 plain-large <
PASS: <standard>tests/openpgp/decrypt-session-key.scm
Checking unwrapping the encryption.
> encsig-2-keys-3 encsig-2-keys-4 <
PASS: <standard>tests/openpgp/decrypt-unwrap-verify.scm
Checking signing with the default hash algorithm
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking signing with a specific hash algorithm
> SHA1 RIPEMD160 SHA256 SHA384 SHA512 SHA224 <
PASS: <standard>tests/openpgp/sigs.scm
Checking signing using DSA with the default hash algorithm
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking signing using DSA with a specific hash algorithm
> SHA1 RIPEMD160 <
PASS: <standard>tests/openpgp/sigs-dsa.scm
Checking encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking encryption using a specific cipher algorithm
> IDEA ........ 3DES ........ CAST5 ........ BLOWFISH ........ AES ........ AES192 ........ AES256 ........ TWOFISH ........ CAMELLIA128 ........ CAMELLIA192 ........ CAMELLIA256 ........ <
Checking encryption using a key from file
> plain-1 plain-2 plain-3 plain-large <
PASS: <standard>tests/openpgp/encrypt.scm
Checking encryption of supplied files using --multifile.
Verifying files:
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/encrypt-multifile.scm
Checking encryption using DSA
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking encryption using DSA and a specific cipher algorithm
> IDEA ........ 3DES ........ CAST5 ........ BLOWFISH ........ AES ........ AES192 ........ AES256 ........ TWOFISH ........ CAMELLIA128 ........ CAMELLIA192 ........ CAMELLIA256 ........ <
PASS: <standard>tests/openpgp/encrypt-dsa.scm
Checking encryption using a specific compression algorithm
> Uncompressed ........ ZIP ........ ZLIB ........ BZIP2 ........ <
PASS: <standard>tests/openpgp/compression.scm
Checking encryption, signing, and producing armored output
> plain-1 plain-2 plain-3 plain-large <
PASS: <standard>tests/openpgp/seat.scm
Checking signing and verifying plain text messages
> plain-1 plain-2 plain-3 plain-large plain-large <
Checking signing and verifying test vectors
> 0 1 2 3 4 5 <
PASS: <standard>tests/openpgp/clearsig.scm
Checking encryption and decryption using pipes
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/encryptp.scm
Checking detached signatures
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/detach.scm
Checking detached signatures of multiple files
PASS: <standard>tests/openpgp/detachm.scm
Checking armored signatures
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/armsigs.scm
Checking armored encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/armencrypt.scm
Checking armored encryption and decryption using pipes
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/armencryptp.scm
Checking signing and encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking bug 537: MDC problem with old style compressed packets.
PASS: <standard>tests/openpgp/signencrypt.scm
Checking signing and encryption using DSA
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking signing and encryption using DSA with a specific hash algorithm
> SHA1 RIPEMD160 <
PASS: <standard>tests/openpgp/signencrypt-dsa.scm
Checking armored signing and encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/armsignencrypt.scm
Checking armored detached signatures
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/armdetach.scm
Checking armored detached signatures of multiple files
PASS: <standard>tests/openpgp/armdetachm.scm
Checking batch key generation
PASS: <standard>tests/openpgp/genkey1024.scm
Checking conventional encryption
> plain-2 data-32000 <
Checking conventional encryption using a specific cipher
> IDEA .. 3DES .. CAST5 .. BLOWFISH .. AES .. AES192 .. AES256 .. TWOFISH .. CAMELLIA128 .. CAMELLIA192 .. CAMELLIA256 .. <
PASS: <standard>tests/openpgp/conventional.scm
Checking conventional encryption with MDC
> IDEA .. 3DES .. CAST5 .. BLOWFISH .. AES .. AES192 .. AES256 .. TWOFISH .. CAMELLIA128 .. CAMELLIA192 .. CAMELLIA256 .. <
Checking sign+symencrypt
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <standard>tests/openpgp/conventional-mdc.scm
Checking that a valid signature is verified as such
> sig-sl-valid <
Checking that an invalid signature is verified as such
> sig-1ls1ls-valid sig-ls-valid sig-1lsls-invalid sig-lsls-invalid sig-lss-invalid sig-slsl-invalid <
PASS: <standard>tests/openpgp/multisig.scm
Checking bogus signature
> #x2d #xca <
Checking that a valid signature is verified as such
> msg_ols_asc msg_cols_asc msg_sl_asc msg_oolss_asc msg_cls_asc msg_clss_asc <
Checking that a valid signature over multiple messages is rejected
> msg_olsols_asc_multiple msg_clsclss_asc_multiple <
Checking that an invalid signature is verified as such
> bad_ls_asc bad_fols_asc bad_olsf_asc bad_ools_asc <
Checking that a valid Ed25519 signature is verified as such
> msg_ed25519_rshort msg_ed25519_sshort <
PASS: <standard>tests/openpgp/verify.scm
Checking verification of supplied files using --multifile.
PASS: <standard>tests/openpgp/verify-multifile.scm
Checking bogus signature
> #x2d #xca <
Checking that a valid signature is verified as such
> msg_ols_asc msg_cols_asc msg_sl_asc msg_oolss_asc msg_cls_asc msg_clss_asc <
Checking that an invalid signature is verified as such
> bad_ls_asc bad_fols_asc bad_olsf_asc bad_ools_asc <
Checking that a valid Ed25519 signature is verified as such
> msg_ed25519_rshort msg_ed25519_sshort <
PASS: <standard>tests/openpgp/gpgv.scm
Checking that a signature by bad key should not be verified
> msg_signed_asc <
PASS: <standard>tests/openpgp/gpgv-forged-keyring.scm
Checking armored_key_8192
Importing alpha_seckey
Checking for bug #1179
PASS: <standard>tests/openpgp/armor.scm
Checking bug 894: segv importing certain keys.
Checking bug 1223: designated revoker sigs are not properly merged.
Checking import of two keys with colliding long key ids.
PASS: <standard>tests/openpgp/import.scm
Test import of new subkey, from a certificate without uid
Test import of a subkey revocation, from a certificate without uid
Test import of revocation, from a certificate without uid
PASS: <standard>tests/openpgp/import-incomplete.scm
Checking key revocation.
PASS: <standard>tests/openpgp/import-revocation-certificate.scm
Preparing for ECC test
Importing ECC public keys
Checking opaque ECDSA signatures
> msg_opaque_signed_256 msg_opaque_signed_384 msg_opaque_signed_521 <
Importing ECC secret keys
Checking ECC encryption
Checking ECDH decryption
> msg_encrypted_256 msg_encrypted_384 msg_encrypted_521 <
Checking ECC encryption and decryption
> plain-1 ... plain-2 ... plain-3 ... plain-large ... data-500 ... data-9000 ... data-32000 ... data-80000 ... <
Checking ECC signing and verifiction
> plain-1 ... plain-2 ... plain-3 ... plain-large ... data-500 ... data-9000 ... data-32000 ... data-80000 ... <
Importing ECC secret keys directly
PASS: <standard>tests/openpgp/ecc.scm
PASS: <standard>tests/openpgp/4gb-packet.scm
Checking tofu policies and trust...
Setting a fixed policy...
> good ..... unknown ..... bad ..... <
Checking TOFU stats...
Checking cross sigs...
> Two keys. <
> Adding cross signatures. <
> Adding conflicting user id. <
> Adding cross signature on user id. <
Checking UTK sigs...
> Two keys. <
> Adding cross signatures. <
> Marking 1938C3A0E4674B6C217AC0B987DB2814EC38277E as ultimately trusted. <
> Adding conflicting user id. <
> Adding cross signature on user id. <
PASS: <standard>tests/openpgp/tofu.scm
Checking basic WoT (classic trust model)...
PASS: <standard>tests/openpgp/trust-pgp-1.scm
Checking WoT with trust signatures (PGP trust model)...
PASS: <standard>tests/openpgp/trust-pgp-2.scm
Checking max depth of trust signature chains...
PASS: <standard>tests/openpgp/trust-pgp-3.scm
Checking gpgtar without encryption
Checking gpgtar without encryption with nicer actions
Checking gpgtar with asymmetric encryption
Checking gpgtar with asymmetric encryption and signature
Checking gpgtar with signature
Checking gpgtar with symmetric encryption
Checking gpgtar with symmetric encryption and chosen cipher
Checking gpgtar with both symmetric and asymmetric encryption
PASS: <standard>tests/openpgp/gpgtar.scm
Importing public key.
Checking that the most recent, valid signing subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
Checking that we can select a specific signing key
> 8BC90111 F5F77B83 1EA97479 <
PASS: <standard>tests/openpgp/use-exact-key.scm
Importing public key.
Checking that the most recent, valid signing subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
Checking that the most recent, valid encryption subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
PASS: <standard>tests/openpgp/default-key.scm
Checking key export
> D74C5F22 C40FDECF ECABF51D <
PASS: <standard>tests/openpgp/export.scm
Importing ssh keys...
> dsa rsa ecdsa ed25519 <
Checking for issue2316...
PASS: <standard>tests/openpgp/ssh-import.scm
Checking ssh export...
PASS: <standard>tests/openpgp/ssh-export.scm
Checking quick key generation...
Checking that we can add a user ID...
Checking that we can mark an user ID as primary.
Checking that we get an error making non-existent user ID the primary one.
Checking that we can revoke a user ID...
Checking that we get an error revoking a non-existent user ID.
Checking that we get an error revoking the last valid user ID.
Checking that we can change the expiration time.
Checking that we can add subkeys...
> () (- - -) (default default never) (rsa sign auth encr seconds=600) (rsa auth,encr 2) (rsa sign 2038-01-01) (rsa sign 20380101T115500) (rsa sign 2d) (rsa1024 sign 2w) (rsa2048 encr 2m) (rsa4096 sign,auth 2y) (future-default) <
PASS: <standard>tests/openpgp/quick-key-manipulation.scm
Checking key selection
> 5 4 4 3 4 3 3 2 4 3 3 2 3 2 2 1 4 3 3 2 3 2 2 1 3 2 2 1 2 1 1 <
PASS: <standard>tests/openpgp/key-selection.scm
PASS: <standard>tests/openpgp/delete-keys.scm
Checking reading and writing configuration via gpgconf...
> compliance ............. verbose ............. quiet ............. <
PASS: <standard>tests/openpgp/gpgconf.scm
Checking passphrase cache (issue2015)...
PASS: <standard>tests/openpgp/issue2015.scm
Checking import statistics (issue2346)...
PASS: <standard>tests/openpgp/issue2346.scm
Checking robustness wrt empty databases in gnupghome (issue2417)...
PASS: <standard>tests/openpgp/issue2417.scm
Checking iobuf_peek corner case (issue2419)...
PASS: <standard>tests/openpgp/issue2419.scm
Checking TOFU trust model with ultimately trusted keys (issue2929).
PASS: <standard>tests/openpgp/issue2929.scm
Checking invocation with invalid file descriptors (issue2941).
> status-fd attribute-fd logger-fd override-session-key-fd passphrase-fd command-fd <
PASS: <standard>tests/openpgp/issue2941.scm
Checking trust signature with domain restrictions...
PASS: <standard>tests/openpgp/trust-pgp-4.scm
PASS: <use-keyboxd>tests/openpgp/setup.scm
Printing the GPG version
PASS: <keyboxd>tests/openpgp/version.scm
Checking armor encoding and decoding
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/enarmor.scm
Hashing the empty string
> MD5 SHA1 RIPEMD160 SHA224 SHA256 SHA384 SHA512 <
Hashing the string "abcdefghijklmnopqrstuvwxyz"
> MD5 SHA1 RIPEMD160 SHA224 SHA256 SHA384 SHA512 <
PASS: <keyboxd>tests/openpgp/mds.scm
Checking decryption of supplied files
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyboxd>tests/openpgp/decrypt.scm
Checking decryption of supplied files using --multifile.
Verifying files:
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyboxd>tests/openpgp/decrypt-multifile.scm
Checking decryption of supplied DSA encrypted file
> plain-1 <
PASS: <keyboxd>tests/openpgp/decrypt-dsa.scm
Checking decryption of supplied files using the session key.
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyboxd>tests/openpgp/decrypt-session-key.scm
Checking unwrapping the encryption.
> encsig-2-keys-3 encsig-2-keys-4 <
PASS: <keyboxd>tests/openpgp/decrypt-unwrap-verify.scm
Checking signing with the default hash algorithm
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking signing with a specific hash algorithm
> SHA1 RIPEMD160 SHA256 SHA384 SHA512 SHA224 <
PASS: <keyboxd>tests/openpgp/sigs.scm
Checking signing using DSA with the default hash algorithm
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking signing using DSA with a specific hash algorithm
> SHA1 RIPEMD160 <
PASS: <keyboxd>tests/openpgp/sigs-dsa.scm
Checking encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking encryption using a specific cipher algorithm
> IDEA ........ 3DES ........ CAST5 ........ BLOWFISH ........ AES ........ AES192 ........ AES256 ........ TWOFISH ........ CAMELLIA128 ........ CAMELLIA192 ........ CAMELLIA256 ........ <
Checking encryption using a key from file
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyboxd>tests/openpgp/encrypt.scm
Checking encryption of supplied files using --multifile.
Verifying files:
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/encrypt-multifile.scm
Checking encryption using DSA
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking encryption using DSA and a specific cipher algorithm
> IDEA ........ 3DES ........ CAST5 ........ BLOWFISH ........ AES ........ AES192 ........ AES256 ........ TWOFISH ........ CAMELLIA128 ........ CAMELLIA192 ........ CAMELLIA256 ........ <
PASS: <keyboxd>tests/openpgp/encrypt-dsa.scm
Checking encryption using a specific compression algorithm
> Uncompressed ........ ZIP ........ ZLIB ........ BZIP2 ........ <
PASS: <keyboxd>tests/openpgp/compression.scm
Checking encryption, signing, and producing armored output
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyboxd>tests/openpgp/seat.scm
Checking signing and verifying plain text messages
> plain-1 plain-2 plain-3 plain-large plain-large <
Checking signing and verifying test vectors
> 0 1 2 3 4 5 <
PASS: <keyboxd>tests/openpgp/clearsig.scm
Checking encryption and decryption using pipes
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/encryptp.scm
Checking detached signatures
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/detach.scm
Checking detached signatures of multiple files
PASS: <keyboxd>tests/openpgp/detachm.scm
Checking armored signatures
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/armsigs.scm
Checking armored encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/armencrypt.scm
Checking armored encryption and decryption using pipes
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/armencryptp.scm
Checking signing and encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking bug 537: MDC problem with old style compressed packets.
PASS: <keyboxd>tests/openpgp/signencrypt.scm
Checking signing and encryption using DSA
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking signing and encryption using DSA with a specific hash algorithm
> SHA1 RIPEMD160 <
PASS: <keyboxd>tests/openpgp/signencrypt-dsa.scm
Checking armored signing and encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/armsignencrypt.scm
Checking armored detached signatures
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/armdetach.scm
Checking armored detached signatures of multiple files
PASS: <keyboxd>tests/openpgp/armdetachm.scm
Checking batch key generation
PASS: <keyboxd>tests/openpgp/genkey1024.scm
Checking conventional encryption
> plain-2 data-32000 <
Checking conventional encryption using a specific cipher
> IDEA .. 3DES .. CAST5 .. BLOWFISH .. AES .. AES192 .. AES256 .. TWOFISH .. CAMELLIA128 .. CAMELLIA192 .. CAMELLIA256 .. <
PASS: <keyboxd>tests/openpgp/conventional.scm
Checking conventional encryption with MDC
> IDEA .. 3DES .. CAST5 .. BLOWFISH .. AES .. AES192 .. AES256 .. TWOFISH .. CAMELLIA128 .. CAMELLIA192 .. CAMELLIA256 .. <
Checking sign+symencrypt
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyboxd>tests/openpgp/conventional-mdc.scm
Checking that a valid signature is verified as such
> sig-sl-valid <
Checking that an invalid signature is verified as such
> sig-1ls1ls-valid sig-ls-valid sig-1lsls-invalid sig-lsls-invalid sig-lss-invalid sig-slsl-invalid <
PASS: <keyboxd>tests/openpgp/multisig.scm
Checking bogus signature
> #x2d #xca <
Checking that a valid signature is verified as such
> msg_ols_asc msg_cols_asc msg_sl_asc msg_oolss_asc msg_cls_asc msg_clss_asc <
Checking that a valid signature over multiple messages is rejected
> msg_olsols_asc_multiple msg_clsclss_asc_multiple <
Checking that an invalid signature is verified as such
> bad_ls_asc bad_fols_asc bad_olsf_asc bad_ools_asc <
Checking that a valid Ed25519 signature is verified as such
> msg_ed25519_rshort msg_ed25519_sshort <
PASS: <keyboxd>tests/openpgp/verify.scm
Checking verification of supplied files using --multifile.
PASS: <keyboxd>tests/openpgp/verify-multifile.scm
Checking bogus signature
> #x2d #xca <
Checking that a valid signature is verified as such
> msg_ols_asc msg_cols_asc msg_sl_asc msg_oolss_asc msg_cls_asc msg_clss_asc <
Checking that an invalid signature is verified as such
> bad_ls_asc bad_fols_asc bad_olsf_asc bad_ools_asc <
Checking that a valid Ed25519 signature is verified as such
> msg_ed25519_rshort msg_ed25519_sshort <
PASS: <keyboxd>tests/openpgp/gpgv.scm
Checking that a signature by bad key should not be verified
> msg_signed_asc <
PASS: <keyboxd>tests/openpgp/gpgv-forged-keyring.scm
Checking armored_key_8192
Importing alpha_seckey
Checking for bug #1179
PASS: <keyboxd>tests/openpgp/armor.scm
Checking bug 894: segv importing certain keys.
Checking bug 1223: designated revoker sigs are not properly merged.
Checking import of two keys with colliding long key ids.
PASS: <keyboxd>tests/openpgp/import.scm
Test import of new subkey, from a certificate without uid
Test import of a subkey revocation, from a certificate without uid
Test import of revocation, from a certificate without uid
PASS: <keyboxd>tests/openpgp/import-incomplete.scm
Checking key revocation.
PASS: <keyboxd>tests/openpgp/import-revocation-certificate.scm
Preparing for ECC test
Importing ECC public keys
Checking opaque ECDSA signatures
> msg_opaque_signed_256 msg_opaque_signed_384 msg_opaque_signed_521 <
Importing ECC secret keys
Checking ECC encryption
Checking ECDH decryption
> msg_encrypted_256 msg_encrypted_384 msg_encrypted_521 <
Checking ECC encryption and decryption
> plain-1 ... plain-2 ... plain-3 ... plain-large ... data-500 ... data-9000 ... data-32000 ... data-80000 ... <
Checking ECC signing and verifiction
> plain-1 ... plain-2 ... plain-3 ... plain-large ... data-500 ... data-9000 ... data-32000 ... data-80000 ... <
Importing ECC secret keys directly
PASS: <keyboxd>tests/openpgp/ecc.scm
PASS: <keyboxd>tests/openpgp/4gb-packet.scm
Checking tofu policies and trust...
Setting a fixed policy...
> good ..... unknown ..... bad ..... <
Checking TOFU stats...
Checking cross sigs...
> Two keys. <
> Adding cross signatures. <
> Adding conflicting user id. <
> Adding cross signature on user id. <
Checking UTK sigs...
> Two keys. <
> Adding cross signatures. <
> Marking 1938C3A0E4674B6C217AC0B987DB2814EC38277E as ultimately trusted. <
> Adding conflicting user id. <
> Adding cross signature on user id. <
PASS: <keyboxd>tests/openpgp/tofu.scm
Checking basic WoT (classic trust model)...
PASS: <keyboxd>tests/openpgp/trust-pgp-1.scm
Checking WoT with trust signatures (PGP trust model)...
PASS: <keyboxd>tests/openpgp/trust-pgp-2.scm
Checking max depth of trust signature chains...
PASS: <keyboxd>tests/openpgp/trust-pgp-3.scm
Checking gpgtar without encryption
Checking gpgtar without encryption with nicer actions
Checking gpgtar with asymmetric encryption
Checking gpgtar with asymmetric encryption and signature
Checking gpgtar with signature
Checking gpgtar with symmetric encryption
Checking gpgtar with symmetric encryption and chosen cipher
Checking gpgtar with both symmetric and asymmetric encryption
PASS: <keyboxd>tests/openpgp/gpgtar.scm
Importing public key.
Checking that the most recent, valid signing subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
Checking that we can select a specific signing key
> 8BC90111 F5F77B83 1EA97479 <
PASS: <keyboxd>tests/openpgp/use-exact-key.scm
Importing public key.
Checking that the most recent, valid signing subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
Checking that the most recent, valid encryption subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
PASS: <keyboxd>tests/openpgp/default-key.scm
Checking key export
> D74C5F22 C40FDECF ECABF51D <
PASS: <keyboxd>tests/openpgp/export.scm
Importing ssh keys...
> dsa rsa ecdsa ed25519 <
Checking for issue2316...
PASS: <keyboxd>tests/openpgp/ssh-import.scm
Checking ssh export...
PASS: <keyboxd>tests/openpgp/ssh-export.scm
Checking quick key generation...
Checking that we can add a user ID...
Checking that we can mark an user ID as primary.
Checking that we get an error making non-existent user ID the primary one.
Checking that we can revoke a user ID...
Checking that we get an error revoking a non-existent user ID.
Checking that we get an error revoking the last valid user ID.
Checking that we can change the expiration time.
Checking that we can add subkeys...
> () (- - -) (default default never) (rsa sign auth encr seconds=600) (rsa auth,encr 2) (rsa sign 2038-01-01) (rsa sign 20380101T115500) (rsa sign 2d) (rsa1024 sign 2w) (rsa2048 encr 2m) (rsa4096 sign,auth 2y) (future-default) <
PASS: <keyboxd>tests/openpgp/quick-key-manipulation.scm
Checking key selection
> 5 4 4 3 4 3 3 2 4 3 3 2 3 2 2 1 4 3 3 2 3 2 2 1 3 2 2 1 2 1 1 <
PASS: <keyboxd>tests/openpgp/key-selection.scm
PASS: <keyboxd>tests/openpgp/delete-keys.scm
Checking reading and writing configuration via gpgconf...
> compliance ............. verbose ............. quiet ............. <
PASS: <keyboxd>tests/openpgp/gpgconf.scm
Checking passphrase cache (issue2015)...
PASS: <keyboxd>tests/openpgp/issue2015.scm
Checking import statistics (issue2346)...
PASS: <keyboxd>tests/openpgp/issue2346.scm
Checking robustness wrt empty databases in gnupghome (issue2417)...
PASS: <keyboxd>tests/openpgp/issue2417.scm
Checking iobuf_peek corner case (issue2419)...
PASS: <keyboxd>tests/openpgp/issue2419.scm
Checking TOFU trust model with ultimately trusted keys (issue2929).
PASS: <keyboxd>tests/openpgp/issue2929.scm
Checking invocation with invalid file descriptors (issue2941).
> status-fd attribute-fd logger-fd override-session-key-fd passphrase-fd command-fd <
PASS: <keyboxd>tests/openpgp/issue2941.scm
Checking trust signature with domain restrictions...
PASS: <keyboxd>tests/openpgp/trust-pgp-4.scm
PASS: <use-keyring>tests/openpgp/setup.scm
Printing the GPG version
PASS: <keyring>tests/openpgp/version.scm
Checking armor encoding and decoding
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/enarmor.scm
Hashing the empty string
> MD5 SHA1 RIPEMD160 SHA224 SHA256 SHA384 SHA512 <
Hashing the string "abcdefghijklmnopqrstuvwxyz"
> MD5 SHA1 RIPEMD160 SHA224 SHA256 SHA384 SHA512 <
PASS: <keyring>tests/openpgp/mds.scm
Checking decryption of supplied files
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyring>tests/openpgp/decrypt.scm
Checking decryption of supplied files using --multifile.
Verifying files:
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyring>tests/openpgp/decrypt-multifile.scm
Checking decryption of supplied DSA encrypted file
> plain-1 <
PASS: <keyring>tests/openpgp/decrypt-dsa.scm
Checking decryption of supplied files using the session key.
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyring>tests/openpgp/decrypt-session-key.scm
Checking unwrapping the encryption.
> encsig-2-keys-3 encsig-2-keys-4 <
PASS: <keyring>tests/openpgp/decrypt-unwrap-verify.scm
Checking signing with the default hash algorithm
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking signing with a specific hash algorithm
> SHA1 RIPEMD160 SHA256 SHA384 SHA512 SHA224 <
PASS: <keyring>tests/openpgp/sigs.scm
Checking signing using DSA with the default hash algorithm
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking signing using DSA with a specific hash algorithm
> SHA1 RIPEMD160 <
PASS: <keyring>tests/openpgp/sigs-dsa.scm
Checking encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking encryption using a specific cipher algorithm
> IDEA ........ 3DES ........ CAST5 ........ BLOWFISH ........ AES ........ AES192 ........ AES256 ........ TWOFISH ........ CAMELLIA128 ........ CAMELLIA192 ........ CAMELLIA256 ........ <
Checking encryption using a key from file
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyring>tests/openpgp/encrypt.scm
Checking encryption of supplied files using --multifile.
Verifying files:
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/encrypt-multifile.scm
Checking encryption using DSA
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking encryption using DSA and a specific cipher algorithm
> IDEA ........ 3DES ........ CAST5 ........ BLOWFISH ........ AES ........ AES192 ........ AES256 ........ TWOFISH ........ CAMELLIA128 ........ CAMELLIA192 ........ CAMELLIA256 ........ <
PASS: <keyring>tests/openpgp/encrypt-dsa.scm
Checking encryption using a specific compression algorithm
> Uncompressed ........ ZIP ........ ZLIB ........ BZIP2 ........ <
PASS: <keyring>tests/openpgp/compression.scm
Checking encryption, signing, and producing armored output
> plain-1 plain-2 plain-3 plain-large <
PASS: <keyring>tests/openpgp/seat.scm
Checking signing and verifying plain text messages
> plain-1 plain-2 plain-3 plain-large plain-large <
Checking signing and verifying test vectors
> 0 1 2 3 4 5 <
PASS: <keyring>tests/openpgp/clearsig.scm
Checking encryption and decryption using pipes
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/encryptp.scm
Checking detached signatures
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/detach.scm
Checking detached signatures of multiple files
PASS: <keyring>tests/openpgp/detachm.scm
Checking armored signatures
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/armsigs.scm
Checking armored encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/armencrypt.scm
Checking armored encryption and decryption using pipes
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/armencryptp.scm
Checking signing and encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking bug 537: MDC problem with old style compressed packets.
PASS: <keyring>tests/openpgp/signencrypt.scm
Checking signing and encryption using DSA
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
Checking signing and encryption using DSA with a specific hash algorithm
> SHA1 RIPEMD160 <
PASS: <keyring>tests/openpgp/signencrypt-dsa.scm
Checking armored signing and encryption
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/armsignencrypt.scm
Checking armored detached signatures
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/armdetach.scm
Checking armored detached signatures of multiple files
PASS: <keyring>tests/openpgp/armdetachm.scm
Checking batch key generation
PASS: <keyring>tests/openpgp/genkey1024.scm
Checking conventional encryption
> plain-2 data-32000 <
Checking conventional encryption using a specific cipher
> IDEA .. 3DES .. CAST5 .. BLOWFISH .. AES .. AES192 .. AES256 .. TWOFISH .. CAMELLIA128 .. CAMELLIA192 .. CAMELLIA256 .. <
PASS: <keyring>tests/openpgp/conventional.scm
Checking conventional encryption with MDC
> IDEA .. 3DES .. CAST5 .. BLOWFISH .. AES .. AES192 .. AES256 .. TWOFISH .. CAMELLIA128 .. CAMELLIA192 .. CAMELLIA256 .. <
Checking sign+symencrypt
> plain-1 plain-2 plain-3 plain-large data-500 data-9000 data-32000 data-80000 <
PASS: <keyring>tests/openpgp/conventional-mdc.scm
Checking that a valid signature is verified as such
> sig-sl-valid <
Checking that an invalid signature is verified as such
> sig-1ls1ls-valid sig-ls-valid sig-1lsls-invalid sig-lsls-invalid sig-lss-invalid sig-slsl-invalid <
PASS: <keyring>tests/openpgp/multisig.scm
Checking bogus signature
> #x2d #xca <
Checking that a valid signature is verified as such
> msg_ols_asc msg_cols_asc msg_sl_asc msg_oolss_asc msg_cls_asc msg_clss_asc <
Checking that a valid signature over multiple messages is rejected
> msg_olsols_asc_multiple msg_clsclss_asc_multiple <
Checking that an invalid signature is verified as such
> bad_ls_asc bad_fols_asc bad_olsf_asc bad_ools_asc <
Checking that a valid Ed25519 signature is verified as such
> msg_ed25519_rshort msg_ed25519_sshort <
PASS: <keyring>tests/openpgp/verify.scm
Checking verification of supplied files using --multifile.
PASS: <keyring>tests/openpgp/verify-multifile.scm
Checking bogus signature
> #x2d #xca <
Checking that a valid signature is verified as such
> msg_ols_asc msg_cols_asc msg_sl_asc msg_oolss_asc msg_cls_asc msg_clss_asc <
Checking that an invalid signature is verified as such
> bad_ls_asc bad_fols_asc bad_olsf_asc bad_ools_asc <
Checking that a valid Ed25519 signature is verified as such
> msg_ed25519_rshort msg_ed25519_sshort <
PASS: <keyring>tests/openpgp/gpgv.scm
Checking that a signature by bad key should not be verified
> msg_signed_asc <
PASS: <keyring>tests/openpgp/gpgv-forged-keyring.scm
Checking armored_key_8192
Importing alpha_seckey
Checking for bug #1179
PASS: <keyring>tests/openpgp/armor.scm
Checking bug 894: segv importing certain keys.
Checking bug 1223: designated revoker sigs are not properly merged.
Checking import of two keys with colliding long key ids.
PASS: <keyring>tests/openpgp/import.scm
Test import of new subkey, from a certificate without uid
Test import of a subkey revocation, from a certificate without uid
Test import of revocation, from a certificate without uid
PASS: <keyring>tests/openpgp/import-incomplete.scm
Checking key revocation.
PASS: <keyring>tests/openpgp/import-revocation-certificate.scm
Preparing for ECC test
Importing ECC public keys
Checking opaque ECDSA signatures
> msg_opaque_signed_256 msg_opaque_signed_384 msg_opaque_signed_521 <
Importing ECC secret keys
Checking ECC encryption
Checking ECDH decryption
> msg_encrypted_256 msg_encrypted_384 msg_encrypted_521 <
Checking ECC encryption and decryption
> plain-1 ... plain-2 ... plain-3 ... plain-large ... data-500 ... data-9000 ... data-32000 ... data-80000 ... <
Checking ECC signing and verifiction
> plain-1 ... plain-2 ... plain-3 ... plain-large ... data-500 ... data-9000 ... data-32000 ... data-80000 ... <
Importing ECC secret keys directly
PASS: <keyring>tests/openpgp/ecc.scm
PASS: <keyring>tests/openpgp/4gb-packet.scm
Checking tofu policies and trust...
Setting a fixed policy...
> good ..... unknown ..... bad ..... <
Checking TOFU stats...
Checking cross sigs...
> Two keys. <
> Adding cross signatures. <
> Adding conflicting user id. <
> Adding cross signature on user id. <
Checking UTK sigs...
> Two keys. <
> Adding cross signatures. <
> Marking 1938C3A0E4674B6C217AC0B987DB2814EC38277E as ultimately trusted. <
> Adding conflicting user id. <
> Adding cross signature on user id. <
PASS: <keyring>tests/openpgp/tofu.scm
Checking basic WoT (classic trust model)...
PASS: <keyring>tests/openpgp/trust-pgp-1.scm
Checking WoT with trust signatures (PGP trust model)...
PASS: <keyring>tests/openpgp/trust-pgp-2.scm
Checking max depth of trust signature chains...
PASS: <keyring>tests/openpgp/trust-pgp-3.scm
Checking gpgtar without encryption
Checking gpgtar without encryption with nicer actions
Checking gpgtar with asymmetric encryption
Checking gpgtar with asymmetric encryption and signature
Checking gpgtar with signature
Checking gpgtar with symmetric encryption
Checking gpgtar with symmetric encryption and chosen cipher
Checking gpgtar with both symmetric and asymmetric encryption
PASS: <keyring>tests/openpgp/gpgtar.scm
Importing public key.
Checking that the most recent, valid signing subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
Checking that we can select a specific signing key
> 8BC90111 F5F77B83 1EA97479 <
PASS: <keyring>tests/openpgp/use-exact-key.scm
Importing public key.
Checking that the most recent, valid signing subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
Checking that the most recent, valid encryption subkey is used by default
> 8BC90111 3E880CFF F5F77B83 45117079 1EA97479 <
PASS: <keyring>tests/openpgp/default-key.scm
Checking key export
> D74C5F22 C40FDECF ECABF51D <
PASS: <keyring>tests/openpgp/export.scm
Importing ssh keys...
> dsa rsa ecdsa ed25519 <
Checking for issue2316...
PASS: <keyring>tests/openpgp/ssh-import.scm
Checking ssh export...
PASS: <keyring>tests/openpgp/ssh-export.scm
Checking quick key generation...
Checking that we can add a user ID...
Checking that we can mark an user ID as primary.
Checking that we get an error making non-existent user ID the primary one.
Checking that we can revoke a user ID...
Checking that we get an error revoking a non-existent user ID.
Checking that we get an error revoking the last valid user ID.
Checking that we can change the expiration time.
Checking that we can add subkeys...
> () (- - -) (default default never) (rsa sign auth encr seconds=600) (rsa auth,encr 2) (rsa sign 2038-01-01) (rsa sign 20380101T115500) (rsa sign 2d) (rsa1024 sign 2w) (rsa2048 encr 2m) (rsa4096 sign,auth 2y) (future-default) <
PASS: <keyring>tests/openpgp/quick-key-manipulation.scm
Checking key selection
> 5 4 4 3 4 3 3 2 4 3 3 2 3 2 2 1 4 3 3 2 3 2 2 1 3 2 2 1 2 1 1 <
PASS: <keyring>tests/openpgp/key-selection.scm
PASS: <keyring>tests/openpgp/delete-keys.scm
Checking reading and writing configuration via gpgconf...
> compliance ............. verbose ............. quiet ............. <
PASS: <keyring>tests/openpgp/gpgconf.scm
Checking passphrase cache (issue2015)...
PASS: <keyring>tests/openpgp/issue2015.scm
Checking import statistics (issue2346)...
PASS: <keyring>tests/openpgp/issue2346.scm
Checking robustness wrt empty databases in gnupghome (issue2417)...
PASS: <keyring>tests/openpgp/issue2417.scm
Checking iobuf_peek corner case (issue2419)...
PASS: <keyring>tests/openpgp/issue2419.scm
Checking TOFU trust model with ultimately trusted keys (issue2929).
PASS: <keyring>tests/openpgp/issue2929.scm
Checking invocation with invalid file descriptors (issue2941).
> status-fd attribute-fd logger-fd override-session-key-fd passphrase-fd command-fd <
PASS: <keyring>tests/openpgp/issue2941.scm
Checking trust signature with domain restrictions...
PASS: <keyring>tests/openpgp/trust-pgp-4.scm
===================
186 tests run, 186 succeeded, 0 failed, 0 failed expectedly, 0 succeeded unexpectedly, 0 skipped.
===================
make[2]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/openpgp'
Making check in cms
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/cms'
LC_ALL=C EXEEXT= PATH="../gpgscm:/usr/bin:/usr/sbin:/usr/local/sbin" abs_top_srcdir="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2" objdir="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2" GPGSCM_PATH="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm" /home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm/gpgscm \
/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/cms/run-tests.scm
PASS: tests/cms/setup.scm
Checking certificate import.
> cert_dfn_pca01.der cert_dfn_pca15.der <
PASS: tests/cms/import.scm
Checking encryption
> plain-1 ... plain-2 ... plain-3 ... plain-large ... data-500 ... data-9000 ... data-32000 ... data-80000 ... <
PASS: tests/cms/encrypt.scm
Checking bogus signature.
> #x2d #xca <
Checking that a valid signature is verified as such.
Checking that an invalid signature is verified as such.
PASS: tests/cms/verify.scm
Checking decryption of supplied files.
> plain-1 plain-2 plain-3 plain-large <
PASS: tests/cms/decrypt.scm
Checking signing.
> plain-1 ...... plain-2 ...... plain-3 ...... plain-large ...... data-500 ...... data-9000 ...... data-32000 ...... data-80000 ...... <
PASS: tests/cms/sign.scm
Checking certificate export.
> test cert 1 <
PASS: tests/cms/export.scm
===================
6 tests run, 6 succeeded, 0 failed, 0 failed expectedly, 0 succeeded unexpectedly, 0 skipped.
===================
make[2]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/cms'
Making check in migrations
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/migrations'
GPG_AGENT_INFO= LC_ALL=C EXEEXT= PATH="../gpgscm:/usr/bin:/usr/sbin:/usr/local/sbin" abs_top_srcdir="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2" objdir="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2" GPGSCM_PATH="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm" /home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm/gpgscm \
/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/migrations/run-tests.scm
Testing a clean migration ...
Testing a migration with existing private-keys-v1.d ...
Testing a migration with existing but weird private-keys-v1.d ...
PASS: tests/migrations/from-classic.scm
Testing the extended private key format ...
PASS: tests/migrations/extended-pkf.scm
Checking migration with legacy key (issue2276)...
PASS: tests/migrations/issue2276.scm
===================
3 tests run, 3 succeeded, 0 failed, 0 failed expectedly, 0 succeeded unexpectedly, 0 skipped.
===================
make[2]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/migrations'
Making check in gpgme
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgme'
LC_ALL=C EXEEXT= PATH="../gpgscm:/usr/bin:/usr/sbin:/usr/local/sbin" abs_top_srcdir=/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2 objdir=/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2 GPGSCM_PATH=/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm /home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm/gpgscm \
/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgme/run-tests.scm
SKIP: Environment variable 'XTEST_GPGME_SRCDIR' not set. Please point it to a recent GPGME source tree to run the GPGME test suite.
===================
0 tests run, 0 succeeded, 0 failed, 0 failed expectedly, 0 succeeded unexpectedly, 0 skipped.
===================
make[2]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgme'
Making check in pkits
/usr/bin/make check-TESTS
make[3]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/pkits'
==================
All 0 tests passed
==================
make[3]: Leaving directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/pkits'
Making check in tpm2dtests
make[2]: Entering directory '/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/tpm2dtests'
LC_ALL=C EXEEXT= PATH="../gpgscm:/usr/bin:/usr/sbin:/usr/local/sbin" abs_top_srcdir="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2" objdir="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2" TPMSERVER="" SWTPM="/bin/swtpm" SWTPM_IOCTL="/bin/swtpm_ioctl" GPGSCM_PATH="/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm" /home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/gpgscm/gpgscm \
/home/tkloczko/rpmbuild/BUILD/gnupg-2.3.2/tests/tpm2dtests/run-tests.scm
PASS: tests/openpgp/setup.scm
creating TPM rsa2048 key
keytotpm failed: Secret key is available.
sec rsa2048/8C68406504C219F9
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). rsa <rsa@example.com>
sec rsa2048/8C68406504C219F9
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). rsa <rsa@example.com>
gpg: error from TPM: Card error
("/bin/kill" "96573") failed: kill: sending signal to 96573 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
FAIL: <standard>tests/tpm2dtests/rsa.scm
creating TPM nistp256 key
keytotpm failed: Secret key is available.
sec nistp256/844BADE16A75BF37
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). nistp256
sec nistp256/844BADE16A75BF37
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). nistp256
gpg: error from TPM: Card error
("/bin/kill" "96611") failed: kill: sending signal to 96611 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
FAIL: <standard>tests/tpm2dtests/ecc.scm
creating TPM nistp256 key
keytotpm failed: Secret key is available.
sec nistp256/15BE86678DB4931E
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). ecc <ecc@example.com>
sec nistp256/15BE86678DB4931E
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). ecc <ecc@example.com>
gpg: error from TPM: Card error
("/bin/kill" "96643") failed: kill: sending signal to 96643 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
FAIL: <standard>tests/tpm2dtests/longpassphrase.scm
Checking failure to import ed25519
Checking failure to import rsa4096
("/bin/kill" "96675") failed: kill: sending signal to 96675 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
PASS: <standard>tests/tpm2dtests/unimportable.scm
PASS: <use-keyboxd>tests/openpgp/setup.scm
creating TPM rsa2048 key
keytotpm failed: gpg: Note: Please move option "use-keyboxd" to "common.conf"
Secret key is available.
sec rsa2048/EB760936BE303885
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). rsa <rsa@example.com>
sec rsa2048/EB760936BE303885
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). rsa <rsa@example.com>
gpg: error from TPM: Card error
("/bin/kill" "96803") failed: kill: sending signal to 96803 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
FAIL: <keyboxd>tests/tpm2dtests/rsa.scm
creating TPM nistp256 key
keytotpm failed: gpg: Note: Please move option "use-keyboxd" to "common.conf"
Secret key is available.
sec nistp256/10023D1BE72825AD
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). nistp256
sec nistp256/10023D1BE72825AD
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). nistp256
gpg: error from TPM: Card error
("/bin/kill" "96833") failed: kill: sending signal to 96833 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
FAIL: <keyboxd>tests/tpm2dtests/ecc.scm
creating TPM nistp256 key
keytotpm failed: gpg: Note: Please move option "use-keyboxd" to "common.conf"
Secret key is available.
sec nistp256/26863CD7D6CBF284
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). ecc <ecc@example.com>
sec nistp256/26863CD7D6CBF284
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). ecc <ecc@example.com>
gpg: error from TPM: Card error
("/bin/kill" "96865") failed: kill: sending signal to 96865 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
FAIL: <keyboxd>tests/tpm2dtests/longpassphrase.scm
Checking failure to import ed25519
Checking failure to import rsa4096
("/bin/kill" "96899") failed: kill: sending signal to 96899 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
PASS: <keyboxd>tests/tpm2dtests/unimportable.scm
PASS: <use-keyring>tests/openpgp/setup.scm
creating TPM rsa2048 key
keytotpm failed: Secret key is available.
sec rsa2048/D2479C2603D33FD4
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). rsa <rsa@example.com>
sec rsa2048/D2479C2603D33FD4
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). rsa <rsa@example.com>
gpg: error from TPM: Card error
("/bin/kill" "97010") failed: kill: sending signal to 97010 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
FAIL: <keyring>tests/tpm2dtests/rsa.scm
creating TPM nistp256 key
keytotpm failed: Secret key is available.
sec nistp256/1466B9088732BB6A
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). nistp256
sec nistp256/1466B9088732BB6A
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). nistp256
gpg: error from TPM: Card error
("/bin/kill" "97043") failed: kill: sending signal to 97043 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
FAIL: <keyring>tests/tpm2dtests/ecc.scm
creating TPM nistp256 key
keytotpm failed: Secret key is available.
sec nistp256/6E86E6BFB9B7EF41
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). ecc <ecc@example.com>
sec nistp256/6E86E6BFB9B7EF41
created: 2021-09-21 expires: 2023-09-21 usage: SC
[ unknown] (1). ecc <ecc@example.com>
gpg: error from TPM: Card error
("/bin/kill" "97075") failed: kill: sending signal to 97075 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
FAIL: <keyring>tests/tpm2dtests/longpassphrase.scm
Checking failure to import ed25519
Checking failure to import rsa4096
("/bin/kill" "97105") failed: kill: sending signal to 97105 failed: No such process
0: tests.scm:122: (throw (string-append (stringify what) " failed") (:stderr result))
1: defs.scm:367: (call-check `("/bin/kill" ,pid))
2: init.scm:671: (proc)
PASS: <keyring>tests/tpm2dtests/unimportable.scm
===================
12 tests run, 3 succeeded, 9 failed, 0 failed expectedly, 0 succeeded unexpectedly, 0 skipped.
Failed tests: <keyring>tests/tpm2dtests/longpassphrase.scm <keyring>tests/tpm2dtests/ecc.scm <keyring>tests/tpm2dtests/rsa.scm <keyboxd>tests/tpm2dtests/longpassphrase.scm <keyboxd>tests/tpm2dtests/ecc.scm <keyboxd>tests/tpm2dtests/rsa.scm <standard>tests/tpm2dtests/longpassphrase.scm <standard>tests/tpm2dtests/ecc.scm <standard>tests/tpm2dtests/rsa.scm
===================
```