[rtems-test] sparc/erc32: RTEMS_DEBUG, RTEMS_POSIX_API, RTEMS_PROFILING, RTEMS_SMP: Passed:633 Failed:10 Timeout:0 Test-Too-long:1 Invalid:0 Wrong:0
joel at rtems.org
joel at rtems.org
Sat Jan 30 12:21:36 UTC 2021
Testing time : 0:05:49.316313
Average test time: 0:00:00.534122
Host
====
Linux-4.15.0-123-generic-x86_64-with-Ubuntu-18.04-bionic (Linux rtbf64a 4.15.0-123-generic #126-Ubuntu SMP Wed Oct 21 09:40:11 UTC 2020 x86_64 x86_64)
Configuration
=============
Version: 6.0.0.44ae183090f3bc1a4ee281ff98525209b3fda7a7
Build : RTEMS_DEBUG,RTEMS_POSIX_API,RTEMS_PROFILING,RTEMS_SMP
Tools : 10.2.1 20210125 (RTEMS 6, RSB ade089253e70d75105a8311844f82f6d20cc30a8, Newlib cb41c37)
Summary
=======
Passed: 633
Failed: 10
User Input: 6
Expected Fail: 1
Indeterminate: 0
Benchmark: 3
Timeout: 0
Test too long: 1
Invalid: 0
Wrong Version: 0
Wrong Build: 0
Wrong Tools: 0
------------------
Total: 654
Failures:
dl06.exe
spintrcritical09.exe
smpmulticast01.exe
spintrcritical05.exe
spintrcritical03.exe
spintrcritical01.exe
spintrcritical04.exe
spintrcritical02.exe
smpirqs01.exe
minimum.exe
User Input:
dl10.exe
monitor.exe
top.exe
termios.exe
capture.exe
fileio.exe
Expected Fail:
psxfenv01.exe
Benchmark:
dhrystone.exe
whetstone.exe
linpack.exe
Test too long:
crypt01.exe
Log
===
RTEMS Testing - Tester, 6.0.not_released
Command Line: /home/joel/rtems-cron-6/tools/6/bin/rtems-test --rtems-tools=/home/joel/rtems-cron-6/tools/6 --rtems-bsp=erc32-sis --log=run.log --mail --mail-from=joel at rtems.org --mail-to=build at rtems.org .
Host: Linux rtbf64a 4.15.0-123-generic #126-Ubuntu SMP Wed Oct 21 09:40:11 UTC 2020 x86_64
Python: 2.7.17 (default, Sep 30 2020, 13:38:04) [GCC 7.5.0]
Host: Linux-4.15.0-123-generic-x86_64-with-Ubuntu-18.04-bionic (Linux rtbf64a 4.15.0-123-generic #126-Ubuntu SMP Wed Oct 21 09:40:11 UTC 2020 x86_64 x86_64)
[ 1/654] p:0 f:0 u:0 e:0 I:0 B:0 t:0 L:0 i:0 W:0 | sparc/erc32: dhrystone.exe
<<skipping passes>>
[ 82/654] p:75 f:0 u:0 e:0 I:0 B:3 t:0 L:0 i:0 W:0 | sparc/erc32: crypt01.exe
Result: test-too-long Time: 0:05:00.454119 crypt01.exe
=> exe: /home/joel/rtems-cron-6/tools/6/bin/sparc-rtems6-sis -nouartrx -r -tlim 600 s ./build/sparc/erc32/testsuites/libtests/crypt01.exe
]
] SIS - SPARC/RISCV instruction simulator 2.26, copyright Jiri Gaisler 2020
] Bug-reports to jiri at gaisler.se
]
] ERC32 emulation enabled
]
] Loaded ./build/sparc/erc32/testsuites/libtests/crypt01.exe, entry 0x02000000
]
]
=> test start: CRYPT 1
] *** BEGIN OF TEST CRYPT 1 ***
] *** TEST VERSION: 6.0.0.44ae183090f3bc1a4ee281ff98525209b3fda7a7
] *** TEST STATE: EXPECTED_PASS
] *** TEST BUILD: RTEMS_DEBUG RTEMS_POSIX_API RTEMS_PROFILING RTEMS_SMP
] *** TEST TOOLS: 10.2.1 20210125 (RTEMS 6, RSB ade089253e70d75105a8311844f82f6d20cc30a8, Newlib cb41c37)
] test crypt_md5_r()
] test crypt_sha256_r()
] input: Hello world!
] salt: $5$saltstring
] expected: $5$saltstring$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5
] actual: $5$saltstring$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5
] input: Hello world!
] salt: $5$rounds=10000$saltstringsaltstring
] expected: $5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2.opqey6IcA
] actual: $5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2.opqey6IcA
] input: This is just a test
] salt: $5$rounds=5000$toolongsaltstring
] expected: $5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8mGRcvxa5
] actual: $5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8mGRcvxa5
] input: a very much longer text to encrypt. This one even stretches over morethan one line.
] salt: $5$rounds=1400$anotherlongsaltstring
] expected: $5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12oP84Bnq1
] actual: $5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12oP84Bnq1
] input: we have a short salt string but not a short password
] salt: $5$rounds=77777$short
] expected: $5$rounds=77777$short$JiO1O3ZpDAxGJeaDIuqCoEFysAe1mZNJRs3pw0KQRd/
] actual: $5$rounds=77777$short$JiO1O3ZpDAxGJeaDIuqCoEFysAe1mZNJRs3pw0KQRd/
] input: a short string
] salt: $5$rounds=123456$asaltof16chars..
] expected: $5$rounds=123456$asaltof16chars..$gP3VQ/6X7UUEW3HkBn2w1/Ptq2jxPyzV/cZKmF/wJvD
] actual: $5$rounds=123456$asaltof16chars..$gP3VQ/6X7UUEW3HkBn2w1/Ptq2jxPyzV/cZKmF/wJvD
] input: the minimum number is still observed
] salt: $5$rounds=10$roundstoolow
] expected: $5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL972bIC
] actual: $5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL972bIC
] test crypt_sha512_r()
] input: Hello world!
] salt: $6$saltstring
] expected: $6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJuesI68u4OTLiBFdcbYEdFCoEOfaS35inz1
] actual: $6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJuesI68u4OTLiBFdcbYEdFCoEOfaS35inz1
] input: Hello world!
] salt: $6$rounds=10000$saltstringsaltstring
] expected: $6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/YTBmSK6H9qs/y3RnOaw5v.
] actual: $6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/YTBmSK6H9qs/y3RnOaw5v.
] input: This is just a test
] salt: $6$rounds=5000$toolongsaltstring
] expected: $6$rounds=5000$toolongsaltstrin$lQ8jolhgVRVhY4b5pZKaysCLi0QBxGoNeKQzQ3glMhwllF7oGDZxUhx1yxdYcz/e1JSbq3y6JMxxl8audkUEm0
] actual: $6$rounds=5000$toolongsaltstrin$lQ8jolhgVRVhY4b5pZKaysCLi0QBxGoNeKQzQ3glMhwllF7oGDZxUhx1yxdYcz/e1JSbq3y6JMxxl8audkUEm0
] input: a very much longer text to encrypt. This one even stretches over morethan one line.
] salt: $6$rounds=1400$anotherlongsaltstring
] expected: $6$rounds=1400$anotherlongsalts$POfYwTEok97VWcjxIiSOjiykti.o/pQs.wPvMxQ6Fm7I6IoYN3CmLs66x9t0oSwbtEW7o7UmJEiDwGqd8p4ur1
] actual: $6$rounds=1400$anotherlongsalts$POfYwTEok97VWcjxIiSOjiykti.o/pQs.wPvMxQ6Fm7I6IoYN3CmLs66x9t0oSwbtEW7o7UmJEiDwGqd8p4ur1
] input: we have a short salt string but not a short password
] salt: $6$rounds=77777$short
] expected: $6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0gge1a1x3yRULJ5CCaUeOxFmtlcGZelFl5CxtgfiAc0
] actual: $6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0gge1a1x3yRULJ5CCaUeOxFmtlcGZelFl5CxtgfiAc0
] input: a short string
] salt: $6$rounds=123456$asaltof16chars..
] expected: $6$rounds=123456$asaltof16chars..$BtCwjqMJGx5hrJhZywWvt0RLE8uZ4oPwcelCjmw2kSYu.Ec6ycULevoBK25fs2xXgMNrCzIMVcgEJAstJeonj1
] actual: $6$rounds=123456$asaltof16chars..$BtCwjqMJGx5hrJhZywWvt0RLE8uZ4oPwcelCjmw2kSYu.Ec6ycULevoBK25fs2xXgMNrCzIMVcgEJAstJeonj1
] input: the minimum number is still observed
] salt: $6$rounds=10$roundstoolow
] expected: $6$rounds=1000$roundstoolow$kUMsbe306n21p9R.FRkW3IGn.S9NPN0x50YhH1xhLsPuWGsUSklZt58jaTfF4ZEQpyUNGc0dqbpBYYBaHHrsX.
] actual: $6$rounds=1000$roundstoolow$kUMsbe306n21p9R.FRkW3IGn.S9NPN0x50YhH1xhLsPuWGsUSklZt58jaTfF4ZEQpyUNGc0dqbpBYYBaHHrsX.
] test crypt_r()
] input: Hello world!
] salt: saltstring
] expected: $6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJuesI68u4OTLiBFdcbYEdFCoEOfaS35inz1
] actual: $6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJuesI68u4OTLiBFdcbYEdFCoEOfaS35inz1
] input: 0.s0.l33t
] salt: $1$deadbeef
] expected: $1$deadbeef$0Huu6KHrKLVWfqa4WljDE0
] actual: $1$deadbeef$0Huu6KHrKLVWfqa4WljDE0
] *** TEST TOO LONG
[ 83/654] p:76 f:0 u:0 e:0 I:0 B:3 t:0 L:0 i:0 W:0 | sparc/erc32: defaultconfig01.exe
<<skipping passes>>
[654/654] p:631 f:10 u:6 e:1 I:0 B:3 t:0 L:0 i:0 W:0 | sparc/erc32: ts-validation-0.exe
Passed: 633
Failed: 10
User Input: 6
Expected Fail: 1
Indeterminate: 0
Benchmark: 3
Timeout: 0
Test too long: 1
Invalid: 0
Wrong Version: 0
Wrong Build: 0
Wrong Tools: 0
------------------
Total: 654
Failures:
dl06.exe
spintrcritical09.exe
smpmulticast01.exe
spintrcritical05.exe
spintrcritical03.exe
spintrcritical01.exe
spintrcritical04.exe
spintrcritical02.exe
smpirqs01.exe
minimum.exe
User Input:
dl10.exe
monitor.exe
top.exe
termios.exe
capture.exe
fileio.exe
Expected Fail:
psxfenv01.exe
Benchmark:
dhrystone.exe
whetstone.exe
linpack.exe
Test too long:
crypt01.exe
Average test time: 0:00:00.534122
Testing time : 0:05:49.316313
More information about the build
mailing list