From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp2.migadu.com ([2001:41d0:303:e224::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms13.migadu.com with LMTPS id QCGNILgsfWclqwAAe85BDQ:P1 (envelope-from ) for ; Tue, 07 Jan 2025 13:31:36 +0000 Received: from aspmx1.migadu.com ([2001:41d0:303:e224::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp2.migadu.com with LMTPS id QCGNILgsfWclqwAAe85BDQ (envelope-from ) for ; Tue, 07 Jan 2025 14:31:36 +0100 X-Envelope-To: larch@yhetil.org Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=debbugs.gnu.org header.s=debbugs-gnu-org header.b=apbK8yc3; dkim=fail ("headers rsa verify failed") header.d=web.de header.s=s29768273 header.b="aPTZQS/X"; spf=pass (aspmx1.migadu.com: domain of "bug-guix-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="bug-guix-bounces+larch=yhetil.org@gnu.org"; dmarc=pass (policy=none) header.from=gnu.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1736256696; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type:resent-cc:resent-from:resent-sender: resent-message-id:list-id:list-help:list-unsubscribe:list-subscribe: list-post:dkim-signature; bh=6fSm4uwBusMGi879gkL0leYix0ORwHVy9NyAQYRKqnQ=; b=RoDDJEeCvzSM0dOYRP2Ll09egNsXNLNvxxiZCEFfKi8v1kbwx/b2lxFVnzoyJCMVrHE3Dn JmJc8Q+ayk8bqUlBV27x045CwEGbMErmSOdJGUwAuDjVcNCW2hTSiGFA3VZA6qWJTfDne3 rcTdCbhm7YEJM1yYzNY8XIMcKu0fUuxp2e5BWCnuf1ZIH845Ub22BccsK+wgfH8PsqKSLs CHgRWID8syvzgz2p7+zNJrPxqj0v1gk+rvD/IqMhFUR5KbEghTOqR2gE5P7N6szQY2o8YH GlQliO3ilL9+o4gGvhRQLLgQkSWZ9oOixU6WqDqW4tSQjKBLluc/3u7JOO0n/g== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=debbugs.gnu.org header.s=debbugs-gnu-org header.b=apbK8yc3; dkim=fail ("headers rsa verify failed") header.d=web.de header.s=s29768273 header.b="aPTZQS/X"; spf=pass (aspmx1.migadu.com: domain of "bug-guix-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="bug-guix-bounces+larch=yhetil.org@gnu.org"; dmarc=pass (policy=none) header.from=gnu.org ARC-Seal: i=1; s=key1; d=yhetil.org; t=1736256696; a=rsa-sha256; cv=none; b=gs2oYqfNhnwaqVABCGXFpTzW23Ihjw8qC+o7zG9PUxw+7fds4PGkpAZ2Oh7RfvfmZlD90N ZTMlFb4JRN06MjeO0sjYpCtLHyGp3LSzK6o+6YWCQCFjqmxuwMucnxgcg+MoBaHiRXTiDN QvjC/fMBH8mJYYbxn0xh5hXa4g6LHIrRxDm9whHNlOrXaJD84wDf5ZV1OtLzMvE9bU04Sx ezKoTD2RPm/TboDr4rk/h4uOfYuM01lE5IUppYB4srA3fZPIKb/1RXEKDZVWTPo/cpefAb AZY7PBMz4DFBkeeJqhbuI9n5RTHOW8tUWQVj4AGY0g1A1JkHVBvU0Es1rVYyQg== Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id F34BE1CA1F for ; Tue, 07 Jan 2025 14:31:35 +0100 (CET) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1tV9fq-0001DM-Vl; Tue, 07 Jan 2025 08:31:11 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1tV9fj-00017E-OF for bug-guix@gnu.org; Tue, 07 Jan 2025 08:31:05 -0500 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1tV9fj-0002ig-0Q for bug-guix@gnu.org; Tue, 07 Jan 2025 08:31:03 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debbugs.gnu.org; s=debbugs-gnu-org; h=MIME-Version:Date:From:To:Subject; bh=6fSm4uwBusMGi879gkL0leYix0ORwHVy9NyAQYRKqnQ=; b=apbK8yc3rKTsXd78vR4y2tsWYgsBOb8NfQq1u41C9jXm4dbrGw9vKN5DVtAQuP/vjo+qhMn21pD0p0kl3IYT7qs0vjFuPRRxMzDrDPt9XvCCsZn8tCOYw6VCDn3soF2aFJMS0uSDxqg9Ba7sTSGZFaE+rWHfS/cQMOxetjrn93ivVeY5CZAX1Q6oV4j8SKupBHi74JU8cYns0wTw6dM0kMcj+qUR/SOfsOfrT0umatzKQbftkO9SQ1Pl0pIEJIqZAjQY4Ng4PotiPNDGtoVOBDAu1I57UELsVFY25A94gidxFjOh6ppqOnX6xc2z9ZQw3EJDsMp14MOU73bs9wRBuA==; Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1tV9fi-0007eY-Qd for bug-guix@gnu.org; Tue, 07 Jan 2025 08:31:02 -0500 X-Loop: help-debbugs@gnu.org Subject: bug#75419: python-celery build failed: spurious linebreaks in tests Resent-From: "Dr. Arne Babenhauserheide" Original-Sender: "Debbugs-submit" Resent-CC: bug-guix@gnu.org Resent-Date: Tue, 07 Jan 2025 13:31:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 75419 X-GNU-PR-Package: guix X-GNU-PR-Keywords: To: 75419@debbugs.gnu.org X-Debbugs-Original-To: bug-guix@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.173625661128904 (code B ref -1); Tue, 07 Jan 2025 13:31:02 +0000 Received: (at submit) by debbugs.gnu.org; 7 Jan 2025 13:30:11 +0000 Received: from localhost ([127.0.0.1]:42090 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1tV9er-0007V6-Il for submit@debbugs.gnu.org; Tue, 07 Jan 2025 08:30:11 -0500 Received: from lists.gnu.org ([2001:470:142::17]:37062) by debbugs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from ) id 1tV9en-0007Tc-Na for submit@debbugs.gnu.org; Tue, 07 Jan 2025 08:30:07 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1tV9ee-0000N0-4T for bug-guix@gnu.org; Tue, 07 Jan 2025 08:29:58 -0500 Received: from mout.web.de ([212.227.15.3]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1tV9ea-0002Jt-1s for bug-guix@gnu.org; Tue, 07 Jan 2025 08:29:55 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=web.de; s=s29768273; t=1736256585; x=1736861385; i=arne_bab@web.de; bh=6fSm4uwBusMGi879gkL0leYix0ORwHVy9NyAQYRKqnQ=; h=X-UI-Sender-Class:From:To:Subject:Date:Message-ID:MIME-Version: Content-Type:cc:content-transfer-encoding:content-type:date:from: message-id:mime-version:reply-to:subject:to; b=aPTZQS/Xr+pCkBHGp6xAeNXgOpxL4qagMxLSZpoBRup8Ra+gVA53LpBcFoKdMBqx EKncumQWQh0k+PCo93lEBT/Aos2e5lxCR/duZjeOMVZAMYUPZ5GXuL/la0hdoxCAK a44oMpR+6ZwhTqvcRubQjXsFrJFRv5MdN+9USH4z9X0R5ohThr6VzzCt5zsTzIECj 0RFBA5kkm/nmxI3GodysEdHH9s9WBpm0h5GDnxtMBWVLYryrwyJmjLL8HwNxBzrU2 pcXj2ZJPMC6SJVtMJBw+JoKSTpy5iYQuxhA4JB93TtX4YaGriYLXj3zcADXZ28CyZ gDOGyBDP6uz+0uGfoQ== X-UI-Sender-Class: 814a7b36-bfc1-4dae-8640-3722d8ec6cd6 Received: from fluss ([84.165.21.171]) by smtp.web.de (mrweb005 [213.165.67.108]) with ESMTPSA (Nemesis) id 1MpCqh-1toEvm2HhX-00ntFb; Tue, 07 Jan 2025 14:29:45 +0100 User-Agent: mu4e 1.12.7; emacs 30.0.91 Date: Tue, 07 Jan 2025 14:29:42 +0100 Message-ID: <87wmf6bvll.fsf@web.de> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha256; protocol="application/pgp-signature" X-Provags-ID: V03:K1:K3glV+rOkalkS1ZljoGfRiBM+sZBwcDfe1fpHZMWAGjIvo/gYxP ZjDMYrCD7ZyBZIbPu/RncpH4VNYu9cxf9Qs6/8yKz/Dahb9o4wMvt0I0eBUu4KJYrn9Q5ux MePVBwM24sX7n1r39Um94H/TNNxl01KRr+LdJvsMkBXoecczNgtBc30nRrXRm91+grBI/pC 15cDmRHTyj1eUY0Z3g/iA== UI-OutboundReport: notjunk:1;M01:P0:Rc+BXNUlQYk=;0GevpoYnRRwG2heTXHQ7JL37WYI AbGcIU6qTPEv/bvwXLsRgJfS766FIERmL4LXdFRg+REU8IHmHdPfTcTm5Zze4ZfiOuZKlQXwI ytnEngF/StFQx2yUehV2IVVa6/ahChbUkC+Tj3wQYqsAYgCu34mN+7aWL7zdnjhSJZoZLGnhA F9H/x5Pwlc8lbUq7+uYRKyq6GZnsu0gXgb3Q7Y9oSYlWpM60bQw6RM2y8vc+EvdfxW5Mrn09T 6tH+dc4reGhl5hKIEXWqaYaxZsJSz2VGAukf9Rr86ofkmr4MZiJ9V6/pmNIaAJ3IMu1TvET8h AirgLdzEvKsHGMcPbw2xNx9igxBHYzYtWV6SXrk4L3TaIMY8Pel3AQkn5RIYxHiTyEMxJLYzB jNEloVdOOGFo+MiWohRORGjh7gHbPJ+bHD+g5g7qlTfhFcnRjS6R2XkTaAcynKWTPeLabDXnW urQOhtPZVhbahvqirZlCj/BIHvbEbPHMFLMTrvwmyDZUeESTnRBSgH6kQC17y2wjstUA1gC3s w3IbpQWv6XpvDmywjy6S3Tf3ayYf3rhTCCeceg0fBNimCOxvDxRlHs3Ozg3ROWN/53o1+9gCu BClseAmbWF6pEO0C7esKHjKuQ/6MerogBcBgeFgEME2Bxmm/2eXIXGr4hxVBtpYmJWZMxDpM7 sfwZvWDx8S58fBdYrv0g2c+SpCFZW8C1iREWVwK7hcAj8JMIgP0MH38Tll9+1QIFuvcZuhMND Ko9IG3Zvkt/5l7sDq0xmg4nLNOPRtRMFtEPWbDWE+vxVO+F8Nx2CrNi9qCq7QJ5Pdozl4TABb cY0+A85OneAEd0ALnoceP6MK3hbaqYsc91bSwUpp3RsfZ/vgRZlIzW78984tkxApdD6p5rXPm iFGohdW3VTGlhn9Suyx8KBiq8Wtf4SxNkGVNxEBjHsMNslqbj8pfJsIMhZl4GUndkJ9s4Hyjz gzj8/dbcqV/aJejrdL40Cu1fKC7L1uckJ9Drvx+gn1jJWXHxXe7oTF3Eem6A0102rjFvy7f8y ORLa8zRKgZyZsUKzprwMNkT95N5SbLGbT5ox3qhgHT4K7+9p7sGQF+DbbQeh+HXudnBG42WCc g+01sZFC0= Received-SPF: pass client-ip=212.227.15.3; envelope-from=arne_bab@web.de; helo=mout.web.de X-Spam_score_int: -27 X-Spam_score: -2.8 X-Spam_bar: -- X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: bug-guix@gnu.org List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-to: "Dr. Arne Babenhauserheide" From: "Dr. Arne Babenhauserheide" via Bug reports for GNU Guix Errors-To: bug-guix-bounces+larch=yhetil.org@gnu.org Sender: bug-guix-bounces+larch=yhetil.org@gnu.org X-Migadu-Flow: FLOW_IN X-Migadu-Country: US X-Migadu-Scanner: mx12.migadu.com X-Migadu-Spam-Score: -1.58 X-Spam-Score: -1.58 X-Migadu-Queue-Id: F34BE1CA1F X-TUID: fAjvL1Naf5ca --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable The build of python-celery fails because test TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptograph= yECKey] fails. The reason seems to be that linebreaks are inserted at different places than expected. End of the logfile /var/log/guix/drvs/fx/d67zlmgm6mh90pdc4db8j22l47r15l-python-jose-3.3.0.drv.= gz: tests/test_utils.py::TestUtils::test_long_to_base64 PASSED [1= 00%] =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D FAILURES =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D _ TestBackendEcdsaCompatibility.test_public_key_to_pem[ECDSAECKey-Cryptogra= phyECKey] _ self =3D BackendFrom =3D BackendTo =3D @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_public_key_to_pem(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) key2 =3D BackendTo(private_key, ALGORITHMS.ES256) =20=20=20=20 > assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t= o_pem().strip() E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj= 0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+= DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D= b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ= 7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn= Tm88Q=3D=3D\n-----END PUBLIC KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 91 diff: b'\n' !=3D b't' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD= QgAE7gb4edKJ7' E - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? -- E + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? ++ E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') tests/algorithms/test_EC_compat.py:40: AssertionError _ TestBackendEcdsaCompatibility.test_public_key_to_pem[CryptographyECKey-EC= DSAECKey] _ self =3D BackendFrom =3D BackendTo =3D @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_public_key_to_pem(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) key2 =3D BackendTo(private_key, ALGORITHMS.ES256) =20=20=20=20 > assert key.public_key().to_pem().strip() =3D=3D key2.public_key().t= o_pem().strip() E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj= 0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+= DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D= b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ= 7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn= Tm88Q=3D=3D\n-----END PUBLIC KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 91 diff: b't' !=3D b'\n' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD= QgAE7gb4edKJ7' E - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? -- E + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? ++ E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') tests/algorithms/test_EC_compat.py:40: AssertionError _ TestBackendEcdsaCompatibility.test_private_key_to_pem[ECDSAECKey-Cryptogr= aphyECKey] _ self =3D BackendFrom =3D BackendTo =3D @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_private_key_to_pem(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) key2 =3D BackendTo(private_key, ALGORITHMS.ES256) =20=20=20=20 > assert key.to_pem().strip() =3D=3D key2.to_pem().strip() E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO= iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK= nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE = KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A= wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR= lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 95 diff: b'\n' !=3D b'A' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR= mzYybKdMlGniS' E - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? -- E + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? ++ E - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? -- E + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? ++ E b'E KEY-----') tests/algorithms/test_EC_compat.py:48: AssertionError _ TestBackendEcdsaCompatibility.test_private_key_to_pem[CryptographyECKey-E= CDSAECKey] _ self =3D BackendFrom =3D BackendTo =3D @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_private_key_to_pem(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) key2 =3D BackendTo(private_key, ALGORITHMS.ES256) =20=20=20=20 > assert key.to_pem().strip() =3D=3D key2.to_pem().strip() E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO= iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK= nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE = KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\= nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI= ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 95 diff: b'A' !=3D b'\n' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR= mzYybKdMlGniS' E - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? -- E + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? ++ E - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? -- E + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? ++ E b'E KEY-----') tests/algorithms/test_EC_compat.py:48: AssertionError _ TestBackendEcdsaCompatibility.test_public_key_load_cycle[ECDSAECKey-Crypt= ographyECKey] _ self =3D BackendFrom =3D BackendTo =3D @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_public_key_load_cycle(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) pubkey =3D key.public_key() =20=20=20=20 pub_pem_source =3D pubkey.to_pem().strip() =20=20=20=20 pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256) =20=20=20=20 > assert pub_pem_source =3D=3D pub_target.to_pem().strip() E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj= 0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+= DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D= b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ= 7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn= Tm88Q=3D=3D\n-----END PUBLIC KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 91 diff: b'\n' !=3D b't' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD= QgAE7gb4edKJ7' E - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? -- E + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? ++ E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') tests/algorithms/test_EC_compat.py:60: AssertionError _ TestBackendEcdsaCompatibility.test_public_key_load_cycle[CryptographyECKe= y-ECDSAECKey] _ self =3D BackendFrom =3D BackendTo =3D @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_public_key_load_cycle(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) pubkey =3D key.public_key() =20=20=20=20 pub_pem_source =3D pubkey.to_pem().strip() =20=20=20=20 pub_target =3D BackendTo(pub_pem_source, ALGORITHMS.ES256) =20=20=20=20 > assert pub_pem_source =3D=3D pub_target.to_pem().strip() E AssertionError: assert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj= 0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+= DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D= b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ= 7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKn= Tm88Q=3D=3D\n-----END PUBLIC KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 91 diff: b't' !=3D b'\n' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcD= QgAE7gb4edKJ7' E - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? -- E + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvX= ME+DRh6G/yVOK' E ? ++ E b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') tests/algorithms/test_EC_compat.py:60: AssertionError _ TestBackendEcdsaCompatibility.test_private_key_load_cycle[ECDSAECKey-Cryp= tographyECKey] _ self =3D BackendFrom =3D BackendTo =3D @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_private_key_load_cycle(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) =20=20=20=20 pem_source =3D key.to_pem().strip() =20=20=20=20 target =3D BackendTo(pem_source, ALGORITHMS.ES256) =20=20=20=20 > assert pem_source =3D=3D target.to_pem().strip() E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO= iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOK= nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE = KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49A= wEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIOR= lPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 95 diff: b'\n' !=3D b'A' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR= mzYybKdMlGniS' E - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? -- E + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? ++ E - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? -- E + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? ++ E b'E KEY-----') tests/algorithms/test_EC_compat.py:71: AssertionError _ TestBackendEcdsaCompatibility.test_private_key_load_cycle[CryptographyECK= ey-ECDSAECKey] _ self =3D BackendFrom =3D BackendTo =3D @pytest.mark.parametrize("BackendFrom", [ECDSAECKey, CryptographyECKey]) @pytest.mark.parametrize("BackendTo", [ECDSAECKey, CryptographyECKey]) def test_private_key_load_cycle(self, BackendFrom, BackendTo): key =3D BackendFrom(private_key, ALGORITHMS.ES256) =20=20=20=20 pem_source =3D key.to_pem().strip() =20=20=20=20 target =3D BackendTo(pem_source, ALGORITHMS.ES256) =20=20=20=20 > assert pem_source =3D=3D target.to_pem().strip() E AssertionError: assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIO= iSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOK= nTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE = KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\= nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWI= ORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PRIVATE KEY-----' E=20=20=20=20=20=20=20=20=20 E At index 95 diff: b'A' !=3D b'\n' E=20=20=20=20=20=20=20=20=20 E Full diff: E (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJR= mzYybKdMlGniS' E - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? -- E + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQ= TZ8qktqtBfRKb' E ? ++ E - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? -- E + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n= -----END EC PRIVAT' E ? ++ E b'E KEY-----') tests/algorithms/test_EC_compat.py:71: AssertionError =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D short test summary info =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_public_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asser= t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK= J7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK= nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----= \nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKbo= a71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC = KEY-----' =20=20 At index 91 diff: b'\n' !=3D b't' =20=20 Full diff: (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4= edKJ7' - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? -- + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? ++ b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_public_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asser= t b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edK= J7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOK= nTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-----= \nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRK= boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUBLIC = KEY-----' =20=20 At index 91 diff: b't' !=3D b'\n' =20=20 Full diff: (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4= edKJ7' - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? -- + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? ++ b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_private_key_to_pem[ECDSAECKey-CryptographyECKey] - AssertionError: asse= rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG= niSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK= boa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END EC PR= IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB= lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9Igo= mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q= =3D=3D\n-----END EC PRIVATE KEY-----' =20=20 At index 95 diff: b'\n' !=3D b'A' =20=20 Full diff: (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM= lGniS' - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? -- + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? ++ - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? -- + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? ++ b'E KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_private_key_to_pem[CryptographyECKey-ECDSAECKey] - AssertionError: asse= rt b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdMlG= niSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBfRK= boa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END EC PR= IVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnB= lfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9Igo= mCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q= =3D=3D\n-----END EC PRIVATE KEY-----' =20=20 At index 95 diff: b'A' !=3D b'\n' =20=20 Full diff: (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM= lGniS' - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? -- + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? ++ - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? -- + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? ++ b'E KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_public_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: a= ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb= 4edKJ7ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/= yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-= ----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqtBf= RKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB= LIC KEY-----' =20=20 At index 91 diff: b'\n' !=3D b't' =20=20 Full diff: (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4= edKJ7' - b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? -- + b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? ++ b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_public_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: a= ssert b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb= 4edKJ7ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/= yVOKnTm88Q=3D=3D\n-----END PUBLIC KEY-----' =3D=3D b'-----BEGIN PUBLIC KEY-= ----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qk\ntqt= BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END PUB= LIC KEY-----' =20=20 At index 91 diff: b't' !=3D b'\n' =20=20 Full diff: (b'-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7gb4= edKJ7' - b'ul9IgomCdcOebQTZ8qk\ntqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? -- + b'ul9IgomCdcOebQTZ8qktqtBfRKboa71\nCfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G= /yVOK' ? ++ b'nTm88Q=3D=3D\n-----END PUBLIC KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_private_key_load_cycle[ECDSAECKey-CryptographyECKey] - AssertionError: = assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK= dMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END E= C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1= 0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul= 9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm8= 8Q=3D=3D\n-----END EC PRIVATE KEY-----' =20=20 At index 95 diff: b'\n' !=3D b'A' =20=20 Full diff: (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM= lGniS' - b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? -- + b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? ++ - b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? -- + b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? ++ b'E KEY-----') FAILED tests/algorithms/test_EC_compat.py::TestBackendEcdsaCompatibility::t= est_private_key_load_cycle[CryptographyECKey-ECDSAECKey] - AssertionError: = assert b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybK= dMlGniSJcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKboa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END E= C PRIVATE KEY-----' =3D=3D b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs1= 0XnBlfykk5zsJRmzYybKdMlGniSJcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul= 9IgomCdcOebQTZ8qktqtBfRKboa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm8= 8Q=3D=3D\n-----END EC PRIVATE KEY-----' =20=20 At index 95 diff: b'A' !=3D b'\n' =20=20 Full diff: (b'-----BEGIN EC PRIVATE KEY-----\nMHcCAQEEIOiSs10XnBlfykk5zsJRmzYybKdM= lGniS' - b'JcssDvUcF6DoAoGCCqGSM49\nAwEHoUQDQgAE7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? -- + b'JcssDvUcF6DoAoGCCqGSM49AwEHoUQDQgAE\n7gb4edKJ7ul9IgomCdcOebQTZ8qktqt= BfRKb' ? ++ - b'oa71CfEKzBruUi+D\nWkG0HJWIORlPbvXME+DRh6G/yVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? -- + b'oa71CfEKzBruUi+DWkG0HJWIORlPbvXME+DRh6G/\nyVOKnTm88Q=3D=3D\n-----END= EC PRIVAT' ? ++ b'E KEY-----') =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D 8 failed, 447 passed= , 12 skipped in 16.14s =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D error: in phase 'check': uncaught exception: %exception #<&invoke-error program: "pytest" arguments: ("-vv") exit-status= : 1 term-signal: #f stop-signal: #f>=20 phase `check' failed after 16.4 seconds command "pytest" "-vv" failed with status 1 build process 18 exited with status 256 Best wishes, Arne =2D-=20 Unpolitisch sein hei=C3=9Ft politisch sein, ohne es zu merken. draketo.de --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQJEBAEBCAAuFiEE801qEjXQSQPNItXAE++NRSQDw+sFAmd9LEcQHGFybmVfYmFi QHdlYi5kZQAKCRAT741FJAPD6xbTD/48Ee8tiT1l95Z+iPPkWb1vsLNARS+4vWB5 C8+CxMYC8yVpTSuFHqjtaM/jOT1EuCGwyzZGNEG2b6TWfsxyLxBLAEqcwcBnVNxQ sEmziOg2a0lJ478SIsT94OJQ55qWZWotvjhGI28DVlTZbYBF3/jDcf02uWeXw9eW rUb/Q/my+wO0XHKzz19tul4zU3MzDShxQQOrH4et1PHk25LJFViKHMHiX3lmMjvl bwRgjnTV5f3jTtERG1zPlLlca/KOwSsNKgj8sR1cM8qubv4xe6HTnXq206IrZnAS W0+e8YW25TiCZJSPdSw38mnSbubQFyn/24rqu/ggG5M7CNYsj24g3Qj7GSMLMlP3 LfNrsvGfazNDAhD3/X9p67qaJ971JuZiuR7VeaxmW8Uxn1qf+BfFy3B7qGBjvp7j eXqI1OSbzFgAJEpJ97YWnDJesdC8T3A16CLGdoQvkeYfCqFBcciAT1I940/BhcmB LeWoQn7NzBrHMdaZXjSWpRRqhPCgXpW/f3+7cwjK084LZuOVa/6Hkt5Ur66pk6IR mVnvF5U5StvSv3la8xrdQ/ugIpNF5jLLIUoA1jTCDsxkcL7oz15DG+kAHdvEh+80 5AiBaqkoTvsQy3lCrQuT6KQxwUqxK8HOXLuHkJxZLLf7VRRyDvqwZgwCs7KGl/Cx UBR7/J/pGIjEBAEBCAAuFiEE3Si95tmHXKvOSosd3M8NswvBBUgFAmd9LEgQHGFy bmVfYmFiQHdlYi5kZQAKCRDczw2zC8EFSJpaA/9WXiLnJ5rqZqpuYNnHBAhk78z8 CfmEv81ESU2dJXwRIgOyiBq+9yA5HYYF/UvtqlqUweCzW3dE3hbO8RGPyA+TDWux ghPKaRRQVnOj4OViHKEFZ3dR/xHyMzMuh9bRMHNXbfrlu451wQeNz9Uia8YF2RFx 4DIZPpWANEeakXV7fA== =SKhY -----END PGP SIGNATURE----- --=-=-=--