==> Building on mausholdii ==> Checking for remote environment... ==> Syncing package to remote host... sending incremental file list created directory packages/haskell-crypton ./ .SRCINFO 608 100% 0.00kB/s 0:00:00 608 100% 0.00kB/s 0:00:00 (xfr#1, to-chk=7/9) .nvchecker.toml 57 100% 55.66kB/s 0:00:00 57 100% 55.66kB/s 0:00:00 (xfr#2, to-chk=6/9) LICENSE 646 100% 630.86kB/s 0:00:00 646 100% 630.86kB/s 0:00:00 (xfr#3, to-chk=5/9) PKGBUILD 1,869 100% 1.78MB/s 0:00:00 1,869 100% 1.78MB/s 0:00:00 (xfr#4, to-chk=4/9) REUSE.toml 375 100% 366.21kB/s 0:00:00 375 100% 366.21kB/s 0:00:00 (xfr#5, to-chk=3/9) haskell-crypton-1.0.3-11.log 786 100% 767.58kB/s 0:00:00 786 100% 767.58kB/s 0:00:00 (xfr#6, to-chk=2/9) LICENSES/ LICENSES/0BSD.txt -> ../LICENSE sent 2,716 bytes received 191 bytes 5,814.00 bytes/sec total size is 3,762 speedup is 1.29 ==> Patching arch to riscv64... ==> Running pkgctl build --arch riscv64 --repo extra on remote host... ==> WARNING: unsupported architecture: riscv64 ==> Building haskell-crypton  -> repo: extra  -> arch: riscv64  -> worker: felix-0 ==> Building haskell-crypton for [extra] (riscv64) ]2;🔵 Container arch-nspawn-1128231 on mausholdii.felixc.at[?25l:: Synchronizing package databases... core downloading... extra downloading... :: Starting full system upgrade... there is nothing to do [?25h==> Building in chroot for [extra] (riscv64)... ==> Synchronizing chroot copy [/var/lib/archbuild/extra-riscv64/root] -> [felix-0]...done ==> Making package: haskell-crypton 1.0.3-11 (Sat Sep 13 05:27:48 2025) ==> Retrieving sources...  -> Downloading crypton-1.0.3.tar.gz... % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 44 634k 44 280k 0 0 170k 0 0:00:03 0:00:01 0:00:02 170k 100 634k 100 634k 0 0 357k 0 0:00:01 0:00:01 --:--:-- 2786k ==> Validating source files with sha256sums... crypton-1.0.3.tar.gz ... Passed ]2;🔵 Container arch-nspawn-1129326 on mausholdii.felixc.at==> Making package: haskell-crypton 1.0.3-11 (Sat Sep 13 05:28:10 2025) ==> Checking runtime dependencies... ==> Installing missing dependencies... [?25lresolving dependencies... looking for conflicting packages... Package (4) New Version Net Change Download Size extra/numactl 2.0.19-1 0.20 MiB extra/ghc-libs 9.4.8-1.3 139.60 MiB extra/haskell-basement 0.0.16-3 6.04 MiB extra/haskell-memory 0.18.0-81 1.24 MiB 0.25 MiB Total Download Size: 0.25 MiB Total Installed Size: 147.08 MiB :: Proceed with installation? [Y/n] :: Retrieving packages... haskell-memory-0.18.0-81-riscv64 downloading... checking keyring... checking package integrity... loading package files... checking for file conflicts... :: Processing package changes... installing numactl... installing ghc-libs... installing haskell-basement... installing haskell-memory... :: Running post-transaction hooks... (1/2) Arming ConditionNeedsUpdate... (2/2) Registering Haskell modules... [?25h==> Checking buildtime dependencies... ==> Installing missing dependencies... [?25lresolving dependencies... looking for conflicting packages... Package (21) New Version Net Change Download Size extra/haskell-ansi-terminal 1.0.2-98 0.28 MiB extra/haskell-ansi-terminal-types 0.11.5-138 0.53 MiB extra/haskell-call-stack 0.4.0-324 0.06 MiB extra/haskell-colour 2.3.6-348 0.87 MiB extra/haskell-erf 2.0.0.0-26.1 0.06 MiB extra/haskell-optparse-applicative 0.18.1.0-150 1.62 MiB extra/haskell-prettyprinter 1.7.1-304 1.49 MiB extra/haskell-prettyprinter-ansi-terminal 1.1.3-371 0.30 MiB extra/haskell-quickcheck 2.15.0.1-12 3.89 MiB extra/haskell-random 1.2.1.3-98 2.06 MiB extra/haskell-splitmix 0.1.2-12 0.19 MiB extra/haskell-tagged 0.8.9-2.1 0.32 MiB extra/haskell-transformers-compat 0.7.2-3.1 0.80 MiB core/libedit 20250104_3.1-1 0.25 MiB extra/llvm14 14.0.6-5 83.34 MiB extra/llvm14-libs 14.0.6-5 104.95 MiB extra/ghc 9.4.8-1.3 288.07 MiB extra/haskell-tasty 1.5-96 1.65 MiB extra/haskell-tasty-hunit 0.10.2-17 0.13 MiB extra/haskell-tasty-kat 0.0.3-244 0.13 MiB 0.04 MiB extra/haskell-tasty-quickcheck 0.10.3-106.1 0.17 MiB Total Download Size: 0.04 MiB Total Installed Size: 491.16 MiB :: Proceed with installation? [Y/n] :: Retrieving packages... haskell-tasty-kat-0.0.3-244-riscv64 downloading... checking keyring... checking package integrity... loading package files... checking for file conflicts... :: Processing package changes... installing libedit... installing llvm14-libs... installing llvm14... installing ghc... installing haskell-colour... installing haskell-ansi-terminal-types... installing haskell-ansi-terminal... installing haskell-prettyprinter... installing haskell-prettyprinter-ansi-terminal... installing haskell-transformers-compat... installing haskell-optparse-applicative... installing haskell-tagged... installing haskell-tasty... installing haskell-call-stack... installing haskell-tasty-hunit... installing haskell-tasty-kat... installing haskell-erf... installing haskell-splitmix... installing haskell-random... installing haskell-quickcheck... installing haskell-tasty-quickcheck... :: Running post-transaction hooks... (1/2) Arming ConditionNeedsUpdate... (2/2) Registering Haskell modules... [?25h==> Retrieving sources...  -> Found crypton-1.0.3.tar.gz ==> WARNING: Skipping all source file integrity checks. ==> Extracting sources...  -> Extracting crypton-1.0.3.tar.gz with bsdtar ==> Starting build()... Configuring crypton-1.0.3... Preprocessing library for crypton-1.0.3.. Building library for crypton-1.0.3.. [ 1 of 138] Compiling Crypto.Cipher.DES.Primitive ( Crypto/Cipher/DES/Primitive.hs, dist/build/Crypto/Cipher/DES/Primitive.dyn_o ) [ 2 of 138] Compiling Crypto.Data.Padding ( Crypto/Data/Padding.hs, dist/build/Crypto/Data/Padding.dyn_o ) [ 3 of 138] Compiling Crypto.Error.Types ( Crypto/Error/Types.hs, dist/build/Crypto/Error/Types.dyn_o ) [ 4 of 138] Compiling Crypto.Error ( Crypto/Error.hs, dist/build/Crypto/Error.dyn_o ) [ 5 of 138] Compiling Crypto.Internal.Compat ( Crypto/Internal/Compat.hs, dist/build/Crypto/Internal/Compat.dyn_o ) [ 6 of 138] Compiling Crypto.Internal.ByteArray ( Crypto/Internal/ByteArray.hs, dist/build/Crypto/Internal/ByteArray.dyn_o ) [ 7 of 138] Compiling Crypto.Cipher.Types.Utils ( Crypto/Cipher/Types/Utils.hs, dist/build/Crypto/Cipher/Types/Utils.dyn_o ) [ 8 of 138] Compiling Crypto.Internal.CompatPrim ( Crypto/Internal/CompatPrim.hs, dist/build/Crypto/Internal/CompatPrim.dyn_o ) [ 9 of 138] Compiling Crypto.Internal.DeepSeq ( Crypto/Internal/DeepSeq.hs, dist/build/Crypto/Internal/DeepSeq.dyn_o ) [ 10 of 138] Compiling Crypto.Cipher.Types.Base ( Crypto/Cipher/Types/Base.hs, dist/build/Crypto/Cipher/Types/Base.dyn_o ) [ 11 of 138] Compiling Crypto.Cipher.Types.Stream ( Crypto/Cipher/Types/Stream.hs, dist/build/Crypto/Cipher/Types/Stream.dyn_o ) [ 12 of 138] Compiling Crypto.Internal.Imports ( Crypto/Internal/Imports.hs, dist/build/Crypto/Internal/Imports.dyn_o ) [ 13 of 138] Compiling Crypto.Internal.Builder ( Crypto/Internal/Builder.hs, dist/build/Crypto/Internal/Builder.dyn_o ) [ 14 of 138] Compiling Crypto.Hash.Types ( Crypto/Hash/Types.hs, dist/build/Crypto/Hash/Types.dyn_o ) [ 15 of 138] Compiling Crypto.Hash.Whirlpool ( Crypto/Hash/Whirlpool.hs, dist/build/Crypto/Hash/Whirlpool.dyn_o ) [ 16 of 138] Compiling Crypto.Hash.Tiger ( Crypto/Hash/Tiger.hs, dist/build/Crypto/Hash/Tiger.dyn_o ) [ 17 of 138] Compiling Crypto.Hash.Skein512 ( Crypto/Hash/Skein512.hs, dist/build/Crypto/Hash/Skein512.dyn_o ) [ 18 of 138] Compiling Crypto.Hash.Skein256 ( Crypto/Hash/Skein256.hs, dist/build/Crypto/Hash/Skein256.dyn_o ) [ 19 of 138] Compiling Crypto.Hash.SHA512t ( Crypto/Hash/SHA512t.hs, dist/build/Crypto/Hash/SHA512t.dyn_o ) [ 20 of 138] Compiling Crypto.Hash.SHA512 ( Crypto/Hash/SHA512.hs, dist/build/Crypto/Hash/SHA512.dyn_o ) [ 21 of 138] Compiling Crypto.Hash.SHA384 ( Crypto/Hash/SHA384.hs, dist/build/Crypto/Hash/SHA384.dyn_o ) [ 22 of 138] Compiling Crypto.Hash.SHA3 ( Crypto/Hash/SHA3.hs, dist/build/Crypto/Hash/SHA3.dyn_o ) [ 23 of 138] Compiling Crypto.Hash.SHA256 ( Crypto/Hash/SHA256.hs, dist/build/Crypto/Hash/SHA256.dyn_o ) [ 24 of 138] Compiling Crypto.Hash.SHA224 ( Crypto/Hash/SHA224.hs, dist/build/Crypto/Hash/SHA224.dyn_o ) [ 25 of 138] Compiling Crypto.Hash.SHA1 ( Crypto/Hash/SHA1.hs, dist/build/Crypto/Hash/SHA1.dyn_o ) [ 26 of 138] Compiling Crypto.Hash.RIPEMD160 ( Crypto/Hash/RIPEMD160.hs, dist/build/Crypto/Hash/RIPEMD160.dyn_o ) [ 27 of 138] Compiling Crypto.Hash.MD5 ( Crypto/Hash/MD5.hs, dist/build/Crypto/Hash/MD5.dyn_o ) [ 28 of 138] Compiling Crypto.Hash.MD4 ( Crypto/Hash/MD4.hs, dist/build/Crypto/Hash/MD4.dyn_o ) [ 29 of 138] Compiling Crypto.Hash.MD2 ( Crypto/Hash/MD2.hs, dist/build/Crypto/Hash/MD2.dyn_o ) [ 30 of 138] Compiling Crypto.Hash.Keccak ( Crypto/Hash/Keccak.hs, dist/build/Crypto/Hash/Keccak.dyn_o ) [ 31 of 138] Compiling Crypto.Hash.IO ( Crypto/Hash/IO.hs, dist/build/Crypto/Hash/IO.dyn_o ) [ 32 of 138] Compiling Crypto.Hash.Blake2sp ( Crypto/Hash/Blake2sp.hs, dist/build/Crypto/Hash/Blake2sp.dyn_o ) [ 33 of 138] Compiling Crypto.Hash.Blake2s ( Crypto/Hash/Blake2s.hs, dist/build/Crypto/Hash/Blake2s.dyn_o ) [ 34 of 138] Compiling Crypto.Hash.Blake2bp ( Crypto/Hash/Blake2bp.hs, dist/build/Crypto/Hash/Blake2bp.dyn_o ) [ 35 of 138] Compiling Crypto.Hash.Blake2b ( Crypto/Hash/Blake2b.hs, dist/build/Crypto/Hash/Blake2b.dyn_o ) [ 36 of 138] Compiling Crypto.Cipher.Types.GF ( Crypto/Cipher/Types/GF.hs, dist/build/Crypto/Cipher/Types/GF.dyn_o ) [ 37 of 138] Compiling Crypto.Cipher.Types.AEAD ( Crypto/Cipher/Types/AEAD.hs, dist/build/Crypto/Cipher/Types/AEAD.dyn_o ) [ 38 of 138] Compiling Crypto.Cipher.Types.Block ( Crypto/Cipher/Types/Block.hs, dist/build/Crypto/Cipher/Types/Block.dyn_o ) [ 39 of 138] Compiling Crypto.Cipher.Types ( Crypto/Cipher/Types.hs, dist/build/Crypto/Cipher/Types.dyn_o ) [ 40 of 138] Compiling Crypto.ConstructHash.MiyaguchiPreneel ( Crypto/ConstructHash/MiyaguchiPreneel.hs, dist/build/Crypto/ConstructHash/MiyaguchiPreneel.dyn_o ) [ 41 of 138] Compiling Crypto.Cipher.Utils ( Crypto/Cipher/Utils.hs, dist/build/Crypto/Cipher/Utils.dyn_o ) [ 42 of 138] Compiling Crypto.Cipher.TripleDES ( Crypto/Cipher/TripleDES.hs, dist/build/Crypto/Cipher/TripleDES.dyn_o ) [ 43 of 138] Compiling Crypto.Cipher.DES ( Crypto/Cipher/DES.hs, dist/build/Crypto/Cipher/DES.dyn_o ) [ 44 of 138] Compiling Crypto.Cipher.Salsa ( Crypto/Cipher/Salsa.hs, dist/build/Crypto/Cipher/Salsa.dyn_o ) [ 45 of 138] Compiling Crypto.Cipher.XSalsa ( Crypto/Cipher/XSalsa.hs, dist/build/Crypto/Cipher/XSalsa.dyn_o ) [ 46 of 138] Compiling Crypto.Cipher.RC4 ( Crypto/Cipher/RC4.hs, dist/build/Crypto/Cipher/RC4.dyn_o ) [ 47 of 138] Compiling Crypto.Cipher.ChaCha ( Crypto/Cipher/ChaCha.hs, dist/build/Crypto/Cipher/ChaCha.dyn_o ) [ 48 of 138] Compiling Crypto.Cipher.AES.Primitive ( Crypto/Cipher/AES/Primitive.hs, dist/build/Crypto/Cipher/AES/Primitive.dyn_o ) [ 49 of 138] Compiling Crypto.Cipher.AES ( Crypto/Cipher/AES.hs, dist/build/Crypto/Cipher/AES.dyn_o ) [ 50 of 138] Compiling Crypto.Internal.Nat ( Crypto/Internal/Nat.hs, dist/build/Crypto/Internal/Nat.dyn_o ) [ 51 of 138] Compiling Crypto.Hash.SHAKE ( Crypto/Hash/SHAKE.hs, dist/build/Crypto/Hash/SHAKE.dyn_o ) [ 52 of 138] Compiling Crypto.Hash.Blake2 ( Crypto/Hash/Blake2.hs, dist/build/Crypto/Hash/Blake2.dyn_o ) [ 53 of 138] Compiling Crypto.Hash.Algorithms ( Crypto/Hash/Algorithms.hs, dist/build/Crypto/Hash/Algorithms.dyn_o ) [ 54 of 138] Compiling Crypto.Hash ( Crypto/Hash.hs, dist/build/Crypto/Hash.dyn_o ) [ 55 of 138] Compiling Crypto.Internal.WordArray ( Crypto/Internal/WordArray.hs, dist/build/Crypto/Internal/WordArray.dyn_o ) [ 56 of 138] Compiling Crypto.Cipher.Twofish.Primitive ( Crypto/Cipher/Twofish/Primitive.hs, dist/build/Crypto/Cipher/Twofish/Primitive.dyn_o ) [ 57 of 138] Compiling Crypto.Cipher.Twofish ( Crypto/Cipher/Twofish.hs, dist/build/Crypto/Cipher/Twofish.dyn_o ) [ 58 of 138] Compiling Crypto.Cipher.CAST5.Primitive ( Crypto/Cipher/CAST5/Primitive.hs, dist/build/Crypto/Cipher/CAST5/Primitive.dyn_o ) [ 59 of 138] Compiling Crypto.Cipher.CAST5 ( Crypto/Cipher/CAST5.hs, dist/build/Crypto/Cipher/CAST5.dyn_o ) [ 60 of 138] Compiling Crypto.Cipher.Blowfish.Box ( Crypto/Cipher/Blowfish/Box.hs, dist/build/Crypto/Cipher/Blowfish/Box.dyn_o ) [ 61 of 138] Compiling Crypto.Cipher.Blowfish.Primitive ( Crypto/Cipher/Blowfish/Primitive.hs, dist/build/Crypto/Cipher/Blowfish/Primitive.dyn_o ) [ 62 of 138] Compiling Crypto.Cipher.Blowfish ( Crypto/Cipher/Blowfish.hs, dist/build/Crypto/Cipher/Blowfish.dyn_o ) [ 63 of 138] Compiling Crypto.Internal.Words ( Crypto/Internal/Words.hs, dist/build/Crypto/Internal/Words.dyn_o ) [ 64 of 138] Compiling Crypto.Cipher.Camellia.Primitive ( Crypto/Cipher/Camellia/Primitive.hs, dist/build/Crypto/Cipher/Camellia/Primitive.dyn_o ) [ 65 of 138] Compiling Crypto.Cipher.Camellia ( Crypto/Cipher/Camellia.hs, dist/build/Crypto/Cipher/Camellia.dyn_o ) [ 66 of 138] Compiling Crypto.KDF.Argon2 ( Crypto/KDF/Argon2.hs, dist/build/Crypto/KDF/Argon2.dyn_o ) [ 67 of 138] Compiling Crypto.KDF.BCryptPBKDF ( Crypto/KDF/BCryptPBKDF.hs, dist/build/Crypto/KDF/BCryptPBKDF.dyn_o ) [ 68 of 138] Compiling Crypto.MAC.CMAC ( Crypto/MAC/CMAC.hs, dist/build/Crypto/MAC/CMAC.dyn_o ) [ 69 of 138] Compiling Crypto.MAC.HMAC ( Crypto/MAC/HMAC.hs, dist/build/Crypto/MAC/HMAC.dyn_o ) [ 70 of 138] Compiling Crypto.KDF.PBKDF2 ( Crypto/KDF/PBKDF2.hs, dist/build/Crypto/KDF/PBKDF2.dyn_o ) [ 71 of 138] Compiling Crypto.KDF.Scrypt ( Crypto/KDF/Scrypt.hs, dist/build/Crypto/KDF/Scrypt.dyn_o ) [ 72 of 138] Compiling Crypto.KDF.HKDF ( Crypto/KDF/HKDF.hs, dist/build/Crypto/KDF/HKDF.dyn_o ) [ 73 of 138] Compiling Crypto.MAC.KMAC ( Crypto/MAC/KMAC.hs, dist/build/Crypto/MAC/KMAC.dyn_o ) [ 74 of 138] Compiling Crypto.MAC.KeyedBlake2 ( Crypto/MAC/KeyedBlake2.hs, dist/build/Crypto/MAC/KeyedBlake2.dyn_o ) [ 75 of 138] Compiling Crypto.MAC.Poly1305 ( Crypto/MAC/Poly1305.hs, dist/build/Crypto/MAC/Poly1305.dyn_o ) [ 76 of 138] Compiling Crypto.Cipher.ChaChaPoly1305 ( Crypto/Cipher/ChaChaPoly1305.hs, dist/build/Crypto/Cipher/ChaChaPoly1305.dyn_o ) [ 77 of 138] Compiling Crypto.Number.Compat ( Crypto/Number/Compat.hs, dist/build/Crypto/Number/Compat.dyn_o ) [ 78 of 138] Compiling Crypto.Number.Basic ( Crypto/Number/Basic.hs, dist/build/Crypto/Number/Basic.dyn_o ) [ 79 of 138] Compiling Crypto.ECC.Simple.Types ( Crypto/ECC/Simple/Types.hs, dist/build/Crypto/ECC/Simple/Types.dyn_o ) [ 80 of 138] Compiling Crypto.Number.F2m ( Crypto/Number/F2m.hs, dist/build/Crypto/Number/F2m.dyn_o ) [ 81 of 138] Compiling Crypto.Number.ModArithmetic ( Crypto/Number/ModArithmetic.hs, dist/build/Crypto/Number/ModArithmetic.dyn_o ) [ 82 of 138] Compiling Crypto.Number.Nat ( Crypto/Number/Nat.hs, dist/build/Crypto/Number/Nat.dyn_o ) [ 83 of 138] Compiling Crypto.Number.Serialize.Internal ( Crypto/Number/Serialize/Internal.hs, dist/build/Crypto/Number/Serialize/Internal.dyn_o ) [ 84 of 138] Compiling Crypto.Number.Serialize ( Crypto/Number/Serialize.hs, dist/build/Crypto/Number/Serialize.dyn_o ) [ 85 of 138] Compiling Crypto.Number.Serialize.Internal.LE ( Crypto/Number/Serialize/Internal/LE.hs, dist/build/Crypto/Number/Serialize/Internal/LE.dyn_o ) [ 86 of 138] Compiling Crypto.Number.Serialize.LE ( Crypto/Number/Serialize/LE.hs, dist/build/Crypto/Number/Serialize/LE.dyn_o ) [ 87 of 138] Compiling Crypto.OTP ( Crypto/OTP.hs, dist/build/Crypto/OTP.dyn_o ) [ 88 of 138] Compiling Crypto.PubKey.ECC.Types ( Crypto/PubKey/ECC/Types.hs, dist/build/Crypto/PubKey/ECC/Types.dyn_o ) [ 89 of 138] Compiling Crypto.PubKey.Internal ( Crypto/PubKey/Internal.hs, dist/build/Crypto/PubKey/Internal.dyn_o ) [ 90 of 138] Compiling Crypto.PubKey.MaskGenFunction ( Crypto/PubKey/MaskGenFunction.hs, dist/build/Crypto/PubKey/MaskGenFunction.dyn_o ) [ 91 of 138] Compiling Crypto.PubKey.RSA.Types ( Crypto/PubKey/RSA/Types.hs, dist/build/Crypto/PubKey/RSA/Types.dyn_o ) [ 92 of 138] Compiling Crypto.PubKey.RSA.Prim ( Crypto/PubKey/RSA/Prim.hs, dist/build/Crypto/PubKey/RSA/Prim.dyn_o ) [ 93 of 138] Compiling Crypto.Random.Entropy.Source ( Crypto/Random/Entropy/Source.hs, dist/build/Crypto/Random/Entropy/Source.dyn_o ) [ 94 of 138] Compiling Crypto.Random.Entropy.Unix ( Crypto/Random/Entropy/Unix.hs, dist/build/Crypto/Random/Entropy/Unix.dyn_o ) [ 95 of 138] Compiling Crypto.Random.Entropy.Backend ( Crypto/Random/Entropy/Backend.hs, dist/build/Crypto/Random/Entropy/Backend.dyn_o ) [ 96 of 138] Compiling Crypto.Random.Entropy.Unsafe ( Crypto/Random/Entropy/Unsafe.hs, dist/build/Crypto/Random/Entropy/Unsafe.dyn_o ) [ 97 of 138] Compiling Crypto.Random.Entropy ( Crypto/Random/Entropy.hs, dist/build/Crypto/Random/Entropy.dyn_o ) [ 98 of 138] Compiling Crypto.Random.EntropyPool ( Crypto/Random/EntropyPool.hs, dist/build/Crypto/Random/EntropyPool.dyn_o ) [ 99 of 138] Compiling Crypto.Random.Types ( Crypto/Random/Types.hs, dist/build/Crypto/Random/Types.dyn_o ) [100 of 138] Compiling Crypto.Random.SystemDRG ( Crypto/Random/SystemDRG.hs, dist/build/Crypto/Random/SystemDRG.dyn_o ) [101 of 138] Compiling Crypto.Random.HmacDRG ( Crypto/Random/HmacDRG.hs, dist/build/Crypto/Random/HmacDRG.dyn_o ) [102 of 138] Compiling Crypto.Random.ChaChaDRG ( Crypto/Random/ChaChaDRG.hs, dist/build/Crypto/Random/ChaChaDRG.dyn_o ) [103 of 138] Compiling Crypto.Random ( Crypto/Random.hs, dist/build/Crypto/Random.dyn_o ) [104 of 138] Compiling Crypto.Random.Probabilistic ( Crypto/Random/Probabilistic.hs, dist/build/Crypto/Random/Probabilistic.dyn_o ) [105 of 138] Compiling Crypto.PubKey.Ed448 ( Crypto/PubKey/Ed448.hs, dist/build/Crypto/PubKey/Ed448.dyn_o ) [106 of 138] Compiling Crypto.PubKey.Ed25519 ( Crypto/PubKey/Ed25519.hs, dist/build/Crypto/PubKey/Ed25519.dyn_o ) [107 of 138] Compiling Crypto.PubKey.ECC.P256 ( Crypto/PubKey/ECC/P256.hs, dist/build/Crypto/PubKey/ECC/P256.dyn_o ) [108 of 138] Compiling Crypto.PubKey.Curve448 ( Crypto/PubKey/Curve448.hs, dist/build/Crypto/PubKey/Curve448.dyn_o ) [109 of 138] Compiling Crypto.PubKey.Curve25519 ( Crypto/PubKey/Curve25519.hs, dist/build/Crypto/PubKey/Curve25519.dyn_o ) [110 of 138] Compiling Crypto.KDF.BCrypt ( Crypto/KDF/BCrypt.hs, dist/build/Crypto/KDF/BCrypt.dyn_o ) [111 of 138] Compiling Crypto.ECC.Edwards25519 ( Crypto/ECC/Edwards25519.hs, dist/build/Crypto/ECC/Edwards25519.dyn_o ) [112 of 138] Compiling Crypto.Cipher.AESGCMSIV ( Crypto/Cipher/AESGCMSIV.hs, dist/build/Crypto/Cipher/AESGCMSIV.dyn_o ) [113 of 138] Compiling Crypto.Number.Generate ( Crypto/Number/Generate.hs, dist/build/Crypto/Number/Generate.dyn_o ) [114 of 138] Compiling Crypto.PubKey.ECC.Prim ( Crypto/PubKey/ECC/Prim.hs, dist/build/Crypto/PubKey/ECC/Prim.dyn_o ) [115 of 138] Compiling Crypto.PubKey.ECC.ECDSA ( Crypto/PubKey/ECC/ECDSA.hs, dist/build/Crypto/PubKey/ECC/ECDSA.dyn_o ) [116 of 138] Compiling Crypto.PubKey.ECC.Generate ( Crypto/PubKey/ECC/Generate.hs, dist/build/Crypto/PubKey/ECC/Generate.dyn_o ) [117 of 138] Compiling Crypto.PubKey.DSA ( Crypto/PubKey/DSA.hs, dist/build/Crypto/PubKey/DSA.dyn_o ) [118 of 138] Compiling Crypto.Number.Prime ( Crypto/Number/Prime.hs, dist/build/Crypto/Number/Prime.dyn_o ) [119 of 138] Compiling Crypto.PubKey.Rabin.Types ( Crypto/PubKey/Rabin/Types.hs, dist/build/Crypto/PubKey/Rabin/Types.dyn_o ) [120 of 138] Compiling Crypto.PubKey.Rabin.OAEP ( Crypto/PubKey/Rabin/OAEP.hs, dist/build/Crypto/PubKey/Rabin/OAEP.dyn_o ) [121 of 138] Compiling Crypto.PubKey.Rabin.RW ( Crypto/PubKey/Rabin/RW.hs, dist/build/Crypto/PubKey/Rabin/RW.dyn_o ) [122 of 138] Compiling Crypto.PubKey.Rabin.Modified ( Crypto/PubKey/Rabin/Modified.hs, dist/build/Crypto/PubKey/Rabin/Modified.dyn_o ) [123 of 138] Compiling Crypto.PubKey.Rabin.Basic ( Crypto/PubKey/Rabin/Basic.hs, dist/build/Crypto/PubKey/Rabin/Basic.dyn_o ) [124 of 138] Compiling Crypto.PubKey.RSA ( Crypto/PubKey/RSA.hs, dist/build/Crypto/PubKey/RSA.dyn_o ) [125 of 138] Compiling Crypto.PubKey.RSA.PSS ( Crypto/PubKey/RSA/PSS.hs, dist/build/Crypto/PubKey/RSA/PSS.dyn_o ) [126 of 138] Compiling Crypto.PubKey.RSA.PKCS15 ( Crypto/PubKey/RSA/PKCS15.hs, dist/build/Crypto/PubKey/RSA/PKCS15.dyn_o ) [127 of 138] Compiling Crypto.PubKey.RSA.OAEP ( Crypto/PubKey/RSA/OAEP.hs, dist/build/Crypto/PubKey/RSA/OAEP.dyn_o ) [128 of 138] Compiling Crypto.PubKey.DH ( Crypto/PubKey/DH.hs, dist/build/Crypto/PubKey/DH.dyn_o ) [129 of 138] Compiling Crypto.PubKey.ElGamal ( Crypto/PubKey/ElGamal.hs, dist/build/Crypto/PubKey/ElGamal.dyn_o ) [130 of 138] Compiling Crypto.PubKey.ECC.DH ( Crypto/PubKey/ECC/DH.hs, dist/build/Crypto/PubKey/ECC/DH.dyn_o ) [131 of 138] Compiling Crypto.ECC.Simple.Prim ( Crypto/ECC/Simple/Prim.hs, dist/build/Crypto/ECC/Simple/Prim.dyn_o ) [132 of 138] Compiling Crypto.ECC ( Crypto/ECC.hs, dist/build/Crypto/ECC.dyn_o ) [133 of 138] Compiling Crypto.PubKey.EdDSA ( Crypto/PubKey/EdDSA.hs, dist/build/Crypto/PubKey/EdDSA.dyn_o ) [134 of 138] Compiling Crypto.PubKey.ECIES ( Crypto/PubKey/ECIES.hs, dist/build/Crypto/PubKey/ECIES.dyn_o ) [135 of 138] Compiling Crypto.PubKey.ECDSA ( Crypto/PubKey/ECDSA.hs, dist/build/Crypto/PubKey/ECDSA.dyn_o ) [136 of 138] Compiling Crypto.Data.AFIS ( Crypto/Data/AFIS.hs, dist/build/Crypto/Data/AFIS.dyn_o ) [137 of 138] Compiling Crypto.System.CPU ( Crypto/System/CPU.hs, dist/build/Crypto/System/CPU.dyn_o ) [138 of 138] Compiling Crypto.Tutorial ( Crypto/Tutorial.hs, dist/build/Crypto/Tutorial.dyn_o ) Preprocessing test suite 'test-crypton' for crypton-1.0.3.. Building test suite 'test-crypton' for crypton-1.0.3.. [ 1 of 58] Compiling BCryptPBKDF ( tests/BCryptPBKDF.hs, dist/build/test-crypton/test-crypton-tmp/BCryptPBKDF.dyn_o ) [ 2 of 58] Compiling KAT_AES.KATCBC ( tests/KAT_AES/KATCBC.hs, dist/build/test-crypton/test-crypton-tmp/KAT_AES/KATCBC.dyn_o ) [ 3 of 58] Compiling KAT_AES.KATCCM ( tests/KAT_AES/KATCCM.hs, dist/build/test-crypton/test-crypton-tmp/KAT_AES/KATCCM.dyn_o ) [ 4 of 58] Compiling KAT_AES.KATECB ( tests/KAT_AES/KATECB.hs, dist/build/test-crypton/test-crypton-tmp/KAT_AES/KATECB.dyn_o ) [ 5 of 58] Compiling KAT_AES.KATGCM ( tests/KAT_AES/KATGCM.hs, dist/build/test-crypton/test-crypton-tmp/KAT_AES/KATGCM.dyn_o ) [ 6 of 58] Compiling KAT_AES.KATOCB3 ( tests/KAT_AES/KATOCB3.hs, dist/build/test-crypton/test-crypton-tmp/KAT_AES/KATOCB3.dyn_o ) [ 7 of 58] Compiling KAT_AES.KATXTS ( tests/KAT_AES/KATXTS.hs, dist/build/test-crypton/test-crypton-tmp/KAT_AES/KATXTS.dyn_o ) [ 8 of 58] Compiling KAT_PBKDF2 ( tests/KAT_PBKDF2.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PBKDF2.dyn_o ) [ 9 of 58] Compiling KAT_PubKey.ECDSA ( tests/KAT_PubKey/ECDSA.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PubKey/ECDSA.dyn_o ) [10 of 58] Compiling KAT_RC4 ( tests/KAT_RC4.hs, dist/build/test-crypton/test-crypton-tmp/KAT_RC4.dyn_o ) [11 of 58] Compiling KAT_Scrypt ( tests/KAT_Scrypt.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Scrypt.dyn_o ) [12 of 58] Compiling Utils ( tests/Utils.hs, dist/build/test-crypton/test-crypton-tmp/Utils.dyn_o ) [13 of 58] Compiling Imports ( tests/Imports.hs, dist/build/test-crypton/test-crypton-tmp/Imports.dyn_o ) [14 of 58] Compiling Salsa ( tests/Salsa.hs, dist/build/test-crypton/test-crypton-tmp/Salsa.dyn_o ) [15 of 58] Compiling Poly1305 ( tests/Poly1305.hs, dist/build/test-crypton/test-crypton-tmp/Poly1305.dyn_o ) [16 of 58] Compiling Padding ( tests/Padding.hs, dist/build/test-crypton/test-crypton-tmp/Padding.dyn_o ) [17 of 58] Compiling Number.F2m ( tests/Number/F2m.hs, dist/build/test-crypton/test-crypton-tmp/Number/F2m.dyn_o ) [18 of 58] Compiling Number ( tests/Number.hs, dist/build/test-crypton/test-crypton-tmp/Number.dyn_o ) [19 of 58] Compiling KAT_PubKey.Rabin ( tests/KAT_PubKey/Rabin.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PubKey/Rabin.dyn_o ) [20 of 58] Compiling KAT_PubKey.RSA ( tests/KAT_PubKey/RSA.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PubKey/RSA.dyn_o ) [21 of 58] Compiling KAT_PubKey.PSS ( tests/KAT_PubKey/PSS.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PubKey/PSS.dyn_o ) [22 of 58] Compiling KAT_PubKey.P256 ( tests/KAT_PubKey/P256.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PubKey/P256.dyn_o ) [23 of 58] Compiling KAT_PubKey.OAEP ( tests/KAT_PubKey/OAEP.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PubKey/OAEP.dyn_o ) [24 of 58] Compiling KAT_PubKey.ECC ( tests/KAT_PubKey/ECC.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PubKey/ECC.dyn_o ) [25 of 58] Compiling KAT_PubKey.DSA ( tests/KAT_PubKey/DSA.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PubKey/DSA.dyn_o ) [26 of 58] Compiling KAT_PubKey ( tests/KAT_PubKey.hs, dist/build/test-crypton/test-crypton-tmp/KAT_PubKey.dyn_o ) [27 of 58] Compiling KAT_OTP ( tests/KAT_OTP.hs, dist/build/test-crypton/test-crypton-tmp/KAT_OTP.dyn_o ) [28 of 58] Compiling KAT_MiyaguchiPreneel ( tests/KAT_MiyaguchiPreneel.hs, dist/build/test-crypton/test-crypton-tmp/KAT_MiyaguchiPreneel.dyn_o ) [29 of 58] Compiling KAT_KMAC ( tests/KAT_KMAC.hs, dist/build/test-crypton/test-crypton-tmp/KAT_KMAC.dyn_o ) [30 of 58] Compiling KAT_HMAC ( tests/KAT_HMAC.hs, dist/build/test-crypton/test-crypton-tmp/KAT_HMAC.dyn_o ) [31 of 58] Compiling KAT_HKDF ( tests/KAT_HKDF.hs, dist/build/test-crypton/test-crypton-tmp/KAT_HKDF.dyn_o ) [32 of 58] Compiling KAT_EdDSA ( tests/KAT_EdDSA.hs, dist/build/test-crypton/test-crypton-tmp/KAT_EdDSA.dyn_o ) tests/KAT_EdDSA.hs:20:29: warning: [-Wtype-equality-requires-operators] The use of ‘~’ without TypeOperators will become an error in a future GHC release. Suggested fix: Perhaps you intended to use TypeOperators | 20 | , HashDigestSize hash ~ EdDSA.CurveDigestSize curve | ^ [33 of 58] Compiling KAT_Ed448 ( tests/KAT_Ed448.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Ed448.dyn_o ) [34 of 58] Compiling KAT_Ed25519 ( tests/KAT_Ed25519.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Ed25519.dyn_o ) [35 of 58] Compiling KAT_Curve448 ( tests/KAT_Curve448.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Curve448.dyn_o ) [36 of 58] Compiling KAT_Curve25519 ( tests/KAT_Curve25519.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Curve25519.dyn_o ) [37 of 58] Compiling KAT_CMAC ( tests/KAT_CMAC.hs, dist/build/test-crypton/test-crypton-tmp/KAT_CMAC.dyn_o ) [38 of 58] Compiling KAT_Blake2 ( tests/KAT_Blake2.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Blake2.dyn_o ) [39 of 58] Compiling KAT_Argon2 ( tests/KAT_Argon2.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Argon2.dyn_o ) [40 of 58] Compiling KAT_AFIS ( tests/KAT_AFIS.hs, dist/build/test-crypton/test-crypton-tmp/KAT_AFIS.dyn_o ) [41 of 58] Compiling KAT_AESGCMSIV ( tests/KAT_AESGCMSIV.hs, dist/build/test-crypton/test-crypton-tmp/KAT_AESGCMSIV.dyn_o ) [42 of 58] Compiling Hash ( tests/Hash.hs, dist/build/test-crypton/test-crypton-tmp/Hash.dyn_o ) [43 of 58] Compiling ECDSA ( tests/ECDSA.hs, dist/build/test-crypton/test-crypton-tmp/ECDSA.dyn_o ) [44 of 58] Compiling ECC.Edwards25519 ( tests/ECC/Edwards25519.hs, dist/build/test-crypton/test-crypton-tmp/ECC/Edwards25519.dyn_o ) [45 of 58] Compiling ECC ( tests/ECC.hs, dist/build/test-crypton/test-crypton-tmp/ECC.dyn_o ) [46 of 58] Compiling ChaChaPoly1305 ( tests/ChaChaPoly1305.hs, dist/build/test-crypton/test-crypton-tmp/ChaChaPoly1305.dyn_o ) [47 of 58] Compiling ChaCha ( tests/ChaCha.hs, dist/build/test-crypton/test-crypton-tmp/ChaCha.dyn_o ) [48 of 58] Compiling BlockCipher ( tests/BlockCipher.hs, dist/build/test-crypton/test-crypton-tmp/BlockCipher.dyn_o ) [49 of 58] Compiling KAT_Twofish ( tests/KAT_Twofish.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Twofish.dyn_o ) [50 of 58] Compiling KAT_TripleDES ( tests/KAT_TripleDES.hs, dist/build/test-crypton/test-crypton-tmp/KAT_TripleDES.dyn_o ) [51 of 58] Compiling KAT_DES ( tests/KAT_DES.hs, dist/build/test-crypton/test-crypton-tmp/KAT_DES.dyn_o ) [52 of 58] Compiling KAT_Camellia ( tests/KAT_Camellia.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Camellia.dyn_o ) [53 of 58] Compiling KAT_CAST5 ( tests/KAT_CAST5.hs, dist/build/test-crypton/test-crypton-tmp/KAT_CAST5.dyn_o ) [54 of 58] Compiling KAT_Blowfish ( tests/KAT_Blowfish.hs, dist/build/test-crypton/test-crypton-tmp/KAT_Blowfish.dyn_o ) [55 of 58] Compiling KAT_AES ( tests/KAT_AES.hs, dist/build/test-crypton/test-crypton-tmp/KAT_AES.dyn_o ) [56 of 58] Compiling BCrypt ( tests/BCrypt.hs, dist/build/test-crypton/test-crypton-tmp/BCrypt.dyn_o ) [57 of 58] Compiling XSalsa ( tests/XSalsa.hs, dist/build/test-crypton/test-crypton-tmp/XSalsa.dyn_o ) [58 of 58] Compiling Main ( tests/Tests.hs, dist/build/test-crypton/test-crypton-tmp/Main.dyn_o ) [59 of 59] Linking dist/build/test-crypton/test-crypton Unregistering crypton-1.0.3... ==> Starting check()... Running 1 test suites... Test suite test-crypton: RUNNING... crypton runtime CPU: OK (0.04s) [] number num-bits: OK +++ OK, passed 100 tests. num-bits2: OK +++ OK, passed 100 tests. generate-param: OK +++ OK, passed 100 tests. generate-param2: OK (0.03s) +++ OK, passed 100 tests. generate-param-odd: OK (0.04s) +++ OK, passed 100 tests. generate-range: OK (0.01s) +++ OK, passed 100 tests. generate-prime: OK (4.28s) +++ OK, passed 100 tests. generate-safe-prime: OK (21.70s) +++ OK, passed 100 tests. as-power-of-2-and-odd: OK +++ OK, passed 100 tests. squareRoot: OK (1.45s) +++ OK, passed 100 tests. marshalling-be: OK +++ OK, passed 100 tests. marshalling-le: OK +++ OK, passed 100 tests. be-rev-le: OK +++ OK, passed 100 tests. be-rev-le-40: OK +++ OK, passed 100 tests. le-rev-be: OK +++ OK, passed 100 tests. le-rev-be-40: OK +++ OK, passed 100 tests. marshalling-kat-to-bytearray 0: OK 1: OK 2: OK 3: OK 4: OK marshalling-kat-to-integer 0: OK 1: OK 2: OK 3: OK 4: OK number.F2m addF2m commutative: OK +++ OK, passed 100 tests. associative: OK +++ OK, passed 100 tests. 0 is neutral: OK +++ OK, passed 100 tests. nullable: OK +++ OK, passed 100 tests. works per bit: OK +++ OK, passed 100 tests. modF2m idempotent: OK +++ OK, passed 100 tests. upper bound: OK +++ OK, passed 100 tests. reach upper: OK +++ OK, passed 100 tests. lower bound: OK +++ OK, passed 100 tests. reach lower: OK +++ OK, passed 100 tests. additive: OK +++ OK, passed 100 tests. mulF2m commutative: OK +++ OK, passed 100 tests. associative: OK +++ OK, passed 100 tests. 1 is neutral: OK +++ OK, passed 100 tests. 0 is annihilator: OK +++ OK, passed 100 tests. distributive: OK +++ OK, passed 100 tests. squareF2m sqr(a) == a * a: OK +++ OK, passed 100 tests. sqrt(a) * sqrt(a) = a in GF(2^16): OK (5.08s) +++ OK, passed 100 tests. powF2m 2 is square: OK +++ OK, passed 100 tests. 1 is identity: OK +++ OK, passed 100 tests. 0 is annihilator: OK +++ OK, passed 100 tests. (a * b) ^ c == (a ^ c) * (b ^ c): OK +++ OK, passed 100 tests. a ^ (b + c) == (a ^ b) * (a ^ c): OK +++ OK, passed 100 tests. a ^ (b * c) == (a ^ b) ^ c: OK +++ OK, passed 100 tests. invF2m 1 / a * a == 1: OK +++ OK, passed 100 tests. 1 / a == a (mod a^2-1): OK +++ OK, passed 100 tests. divF2m 1 / a == inv a: OK +++ OK, passed 100 tests. a / b == a * inv b: OK +++ OK, passed 100 tests. a * b / b == a: OK +++ OK, passed 100 tests. hash KATs MD2 1: OK 2: OK 3: OK MD4 1: OK 2: OK 3: OK MD5 1: OK 2: OK 3: OK SHA1 1: OK 2: OK 3: OK SHA224 1: OK 2: OK 3: OK SHA256 1: OK 2: OK 3: OK SHA384 1: OK 2: OK 3: OK SHA512 1: OK 2: OK 3: OK SHA512/224 1: OK 2: OK 3: OK SHA512/256 1: OK 2: OK 3: OK RIPEMD160 1: OK 2: OK 3: OK Tiger 1: OK 2: OK 3: OK Skein256-256 1: OK 2: OK 3: OK Skein512-384 1: OK 2: OK 3: OK Skein512-512 1: OK 2: OK 3: OK Whirlpool 1: OK 2: OK 3: OK Keccak-224 1: OK 2: OK 3: OK Keccak-256 1: OK 2: OK 3: OK Keccak-384 1: OK 2: OK 3: OK Keccak-512 1: OK 2: OK 3: OK SHA3-224 1: OK 2: OK 3: OK SHA3-256 1: OK 2: OK 3: OK SHA3-384 1: OK 2: OK 3: OK SHA3-512 1: OK 2: OK 3: OK Blake2b-160 1: OK 2: OK 3: OK Blake2b-224 1: OK 2: OK 3: OK Blake2b-256 1: OK 2: OK 3: OK Blake2b-384 1: OK 2: OK 3: OK Blake2b-512 1: OK 2: OK 3: OK Blake2s-160 1: OK 2: OK 3: OK Blake2s-224 1: OK 2: OK 3: OK Blake2s-256 1: OK 2: OK 3: OK SHAKE128_4096 1: OK 2: OK 3: OK SHAKE256_4096 1: OK 2: OK 3: OK Blake2b 160 1: OK 2: OK 3: OK Blake2b 224 1: OK 2: OK 3: OK Blake2b 256 1: OK 2: OK 3: OK Blake2b 384 1: OK 2: OK 3: OK Blake2b 512 1: OK 2: OK 3: OK Blake2s 160 1: OK 2: OK 3: OK Blake2s 224 1: OK 2: OK 3: OK Blake2s 256 1: OK 2: OK 3: OK Chunking MD2: OK (0.48s) +++ OK, passed 100 tests. MD4: OK (0.39s) +++ OK, passed 100 tests. MD5: OK (0.32s) +++ OK, passed 100 tests. SHA1: OK (0.38s) +++ OK, passed 100 tests. SHA224: OK (0.40s) +++ OK, passed 100 tests. SHA256: OK (0.36s) +++ OK, passed 100 tests. SHA384: OK (0.40s) +++ OK, passed 100 tests. SHA512: OK (0.38s) +++ OK, passed 100 tests. SHA512/224: OK (0.38s) +++ OK, passed 100 tests. SHA512/256: OK (0.40s) +++ OK, passed 100 tests. RIPEMD160: OK (0.39s) +++ OK, passed 100 tests. Tiger: OK (0.37s) +++ OK, passed 100 tests. Skein256-256: OK (0.40s) +++ OK, passed 100 tests. Skein512-384: OK (0.39s) +++ OK, passed 100 tests. Skein512-512: OK (0.36s) +++ OK, passed 100 tests. Whirlpool: OK (0.37s) +++ OK, passed 100 tests. Keccak-224: OK (0.43s) +++ OK, passed 100 tests. Keccak-256: OK (0.39s) +++ OK, passed 100 tests. Keccak-384: OK (0.37s) +++ OK, passed 100 tests. Keccak-512: OK (0.38s) +++ OK, passed 100 tests. SHA3-224: OK (0.41s) +++ OK, passed 100 tests. SHA3-256: OK (0.40s) +++ OK, passed 100 tests. SHA3-384: OK (0.39s) +++ OK, passed 100 tests. SHA3-512: OK (0.40s) +++ OK, passed 100 tests. Blake2b-160: OK (0.38s) +++ OK, passed 100 tests. Blake2b-224: OK (0.33s) +++ OK, passed 100 tests. Blake2b-256: OK (0.37s) +++ OK, passed 100 tests. Blake2b-384: OK (0.41s) +++ OK, passed 100 tests. Blake2b-512: OK (0.37s) +++ OK, passed 100 tests. Blake2s-160: OK (0.36s) +++ OK, passed 100 tests. Blake2s-224: OK (0.41s) +++ OK, passed 100 tests. Blake2s-256: OK (0.35s) +++ OK, passed 100 tests. SHAKE128_4096: OK (0.38s) +++ OK, passed 100 tests. SHAKE256_4096: OK (0.40s) +++ OK, passed 100 tests. Blake2b 160: OK (0.34s) +++ OK, passed 100 tests. Blake2b 224: OK (0.41s) +++ OK, passed 100 tests. Blake2b 256: OK (0.33s) +++ OK, passed 100 tests. Blake2b 384: OK (0.38s) +++ OK, passed 100 tests. Blake2b 512: OK (0.38s) +++ OK, passed 100 tests. Blake2s 160: OK (0.35s) +++ OK, passed 100 tests. Blake2s 224: OK (0.39s) +++ OK, passed 100 tests. Blake2s 256: OK (0.36s) +++ OK, passed 100 tests. Prefix MD5: OK (0.33s) +++ OK, passed 100 tests. SHA1: OK (0.32s) +++ OK, passed 100 tests. SHA224: OK (0.33s) +++ OK, passed 100 tests. SHA256: OK (0.28s) +++ OK, passed 100 tests. SHA384: OK (0.28s) +++ OK, passed 100 tests. SHA512: OK (0.30s) +++ OK, passed 100 tests. Hybrid MD5: OK (0.58s) +++ OK, passed 100 tests. SHA1: OK (0.61s) +++ OK, passed 100 tests. SHA224: OK (0.64s) +++ OK, passed 100 tests. SHA256: OK (0.62s) +++ OK, passed 100 tests. SHA384: OK (0.60s) +++ OK, passed 100 tests. SHA512: OK (0.58s) +++ OK, passed 100 tests. Truncating SHAKE128 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK Padding Cases 1: OK 2: OK 3: OK ZeroCases 1: OK 2: OK 3: OK ConstructHash MiyaguchiPreneel KATs aes128 1: OK 2: OK 3: OK 4: OK MAC Poly1305 V0: OK Chunking: OK (0.05s) +++ OK, passed 100 tests. Blake2 KATs Blake2b_512 1: OK incr-1: OK 2: OK incr-2: OK 3: OK incr-3: OK Blake2bp_512 1: OK incr-1: OK 2: OK incr-2: OK 3: OK incr-3: OK Blake2s_512 1: OK incr-1: OK 2: OK incr-2: OK 3: OK incr-3: OK Blake2sp_512 1: OK incr-1: OK 2: OK incr-2: OK 3: OK incr-3: OK properties Blake2b_512 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.13s) +++ OK, passed 100 tests. Blake2bp_512 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.13s) +++ OK, passed 100 tests. Blake2s_256 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.12s) +++ OK, passed 100 tests. Blake2sp_256 list-one: OK (0.02s) +++ OK, passed 100 tests. list-multi: OK (0.15s) +++ OK, passed 100 tests. CMAC KAT - NIST test vectors aes128 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK aes192 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK aes256 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK Three Key TDEA 1: OK (0.01s) 2: OK (0.01s) 3: OK 4: OK (0.02s) 5: OK (0.02s) 6: OK (0.04s) 7: OK (0.05s) Two Key TDEA 1: OK (0.01s) 2: OK (0.01s) 3: OK 4: OK 5: OK (0.02s) 6: OK (0.04s) 7: OK (0.05s) HMAC KATs md5 1: OK incr-1: OK 2: OK incr-2: OK sha1 1: OK incr-1: OK 2: OK incr-2: OK sha256 1: OK incr-1: OK 2: OK incr-2: OK keccak-224 1: OK incr-1: OK keccak-256 1: OK incr-1: OK keccak-384 1: OK incr-1: OK keccak-512 1: OK incr-1: OK sha3-224 1: OK incr-1: OK sha3-256 1: OK incr-1: OK sha3-384 1: OK incr-1: OK sha3-512 1: OK incr-1: OK properties MD5 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.16s) +++ OK, passed 100 tests. SHA1 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.13s) +++ OK, passed 100 tests. SHA256 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.13s) +++ OK, passed 100 tests. SHA3_224 list-one: OK (0.04s) +++ OK, passed 100 tests. list-multi: OK (0.14s) +++ OK, passed 100 tests. SHA3_256 list-one: OK (0.04s) +++ OK, passed 100 tests. list-multi: OK (0.13s) +++ OK, passed 100 tests. SHA3_384 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.14s) +++ OK, passed 100 tests. SHA3_512 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.15s) +++ OK, passed 100 tests. KMAC KATs SHAKE128 1: OK incr-1: OK 2: OK incr-2: OK 3: OK incr-3: OK SHAKE256 1: OK incr-1: OK 2: OK incr-2: OK 3: OK incr-3: OK properties SHAKE128_256 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.14s) +++ OK, passed 100 tests. SHAKE256_512 list-one: OK (0.03s) +++ OK, passed 100 tests. list-multi: OK (0.14s) +++ OK, passed 100 tests. Curve25519 KATs 0: OK 1: OK 2: OK 3: OK Curve448 KATs 0: OK 1: OK 2: FAIL tests/KAT_Curve448.hs:42: expected: PublicKey "\155\b\247\204\&1\183\227\230}\"\213\174\161!\aJ';\210\184=\224\156c\250\167=,\"\197\217\187\200\&6drA\217S\212\f[\DC2\218\136\DC2\rS\ETB\DEL\128\229\&2\196\US\160" but got: PublicKey "L\t\234=\137\DLE9\232\165\159\132\&7`\147f\STX\144=Z\253\175\204\NUL\145\232\204\SI\224\243\188\ENQ\208n\DC45o\SO~\t;\128\198F\146\US^\164\226\&3>`\209K\186\164\CAN" Use -p '/Curve448.KATs.2/' to rerun this test only. 3: OK Ed25519 gen secretkey: OK gen publickey 0: OK 1: OK (0.02s) 2: OK 3: OK 4: OK gen signature 0: OK 1: OK 2: OK 3: OK 4: OK verify sig 0: OK 1: OK 2: OK 3: OK 4: OK Ed448 gen secretkey: OK gen publickey 0: FAIL tests/KAT_Ed448.hs:96: expected: PublicKey "_\215D\155Y\180a\253,\231\135\236aj\212j\GS\161\&4$\133\167\SO\US\138\SO\167]\128\233gx\237\241$v\155F\199\ACK\ESC\214x=\241\229\SIl\209\250\SUB\190\175\232%a\128" but got: PublicKey "T\234\191y\211d\190\227\b\184\nkK\252\156\157o\SO\221PH&\138\SOH\242\DEL4\183\FS\254^\231uN,\154\201\143\245\136\209\&9\254\204\210\233\NUL\DLE\207x\239?0=\246N\128" Use -p '/Ed448.gen publickey.0/' to rerun this test only. 1: FAIL (0.01s) tests/KAT_Ed448.hs:96: expected: PublicKey "C\186(\244\&0\205\255Ej\229\&1T_~\205\n\200\&4\165]\147X\192\&7+\250\flg\152\192\134j\234\SOH\235\NULt(\STX\184C\142\164\203\130\SYN\156#Q`b{L:\148\128" but got: PublicKey "=i6\CANP\ETX\ESC\234a\DC22\136\136\161&\225\210\212\169\255\230\179\162\177co9t\EOTB\bEnZ$\178\244\139\163\250\226iUq4\234\150\&6\227\132\225R\208-\199!\NUL" Use -p '/Ed448.gen publickey.1/' to rerun this test only. 2: FAIL tests/KAT_Ed448.hs:96: expected: PublicKey "\220\234\158x\243Z\ESC\243I\154\131\ESC\DLE\184l\144\170\192\FS\216Kg\160\DLE\155U\163n\147(\177\227e\252\225a\215\FS\231\DC3\SUBT>\164\203_~\159\GS\139\NULidG\NUL\DC4\NUL" but got: PublicKey "\140j\185\143\154\212\222\SUB\EMS\DLE+\246\207}\t\"\168\247H\148Agix\249\231\&1\190\174\252\DC4A\183\SOfK\165\205\254}\156\v\221L\130\175\235\202v\n9\187r2\184\128" Use -p '/Ed448.gen publickey.2/' to rerun this test only. 3: FAIL (0.02s) tests/KAT_Ed448.hs:96: expected: PublicKey ";\161m\160\198\242\204\US0\CANw@uo^y\141k\197\252\SOH]|c\204\149\DLE\238?\212J\220$\216\233h\182\228no\148\209\155\148Sark\215^\DC4\158\240\152\ETB\245\128" but got: PublicKey "\FS\NAK\197\229\191\NUL:\240\213\233\141\179h/Y\223\132\190\201/\191\232<\249tQ\135\b}\144\133\&7\254_BZ\175\145SCn\b\155]q\137Y\253\191\165\159\SO\211\201\134\220\NUL" Use -p '/Ed448.gen publickey.3/' to rerun this test only. 4: FAIL (0.02s) tests/KAT_Ed448.hs:96: expected: PublicKey "\179\218\a\155\n\164\147\165w )\240F{\174\190\229\168\DC1-\157:\"S#a\218)O{\179\129\\]\197\158\ETBkM\159\&8\FS\160\147\142\DC3\198\192{\ETBK\230]\250W\142\128" but got: PublicKey "\179&T\194\227\nx\195\157I\"\SO\179\157F\243\159)\137&b\STX\240^\190O\234\225\211\NAK\ACK\233\210%d\249\186\185\135d\174w\144\ETB\183i\161\237\238\179\209\EOT\164<\b\220\128" Use -p '/Ed448.gen publickey.4/' to rerun this test only. 5: FAIL (0.02s) tests/KAT_Ed448.hs:96: expected: PublicKey "\223\151\ENQ\245\142\219\171\128,\DEL\131c\207\229V\n\177\198\DC3, \169\241\221\SYN4\131\162o\138\197:9\214\128\139\244\161\223\189&\ESC\t\155\176;?\181\t\ACK\203(\189\138\b\US\NUL" but got: PublicKey "\221'\184\132~}/\CAN)JZVk\222F\133\"\213\187\222m\168\159\170+\209*M\186\DEL\SUB\194\SI\NULH\172\161/\230\249=\ESC\173\253\229\&8\t\195\132y\204\133\200\&7\202\DEL\128" Use -p '/Ed448.gen publickey.5/' to rerun this test only. 6: FAIL tests/KAT_Ed448.hs:96: expected: PublicKey "yuo\SOHM\207\226\a\159]\217\231\CAN\190Aq\226\239$\134\160\143%\CANok\255C\169\147k\155\254\DC2@+\b\174ey\138=\129\226.\158\200\SOv\144\134.\243\212\237:\NUL" but got: PublicKey "\ACKI\201R \223\131[\a\EOT\247I\EOT\240\156\174:v\252j\ACKh\231\DC1\235+{\147\139\229f\DC3!NQ\NAK4`\SYN\170B\NULMu\237\128q\141\139p\139\215u\238;\184\128" Use -p '/Ed448.gen publickey.6/' to rerun this test only. 7: FAIL (0.02s) tests/KAT_Ed448.hs:96: expected: PublicKey "\168\ESC.\138p\165\172\148\255\219\204\155\173\252?\235\b\SOH\242XW\139\177\DC4\173D\236\225\236\SOy\157\160\142\255\184\FS]h\\\fV\246N\236\174\248\205\241\FS\195\135\&7\131\140\244\NUL" but got: PublicKey "/\189;\191\174\213(\RS\211\192O\157\RS\248\166\240\253\182\222\195z[\202\FS\223y\131Q\"\ACK}\tk\ETB\144\EM\145\194?\181\165\184\167\249\173\ETXv\129\178w\v\196\167,\236P\NUL" Use -p '/Ed448.gen publickey.7/' to rerun this test only. gen signature 0: FAIL (0.02s) tests/KAT_Ed448.hs:101: expected: Signature "S:7\246\187\228W%\US\STX<\r\136\249v\174-\251PJ\132>4\210\aO\216#\212\SUBY\US+#?\ETXOb\130\129\242\253z\"\221\212}x(\197\155\208\162\ESC\253\&9\128\255\r (\212\177\138\157\246>\NULl]\FS-4[\146]\141\192\vA\EOT\133-\185\154\197\199\205\218\133\&0\161\DC3\160\244\219\182\DC1I\240Zsc&\140q\217X\b\255.e&\NUL" but got: Signature "\141\232\237\213\CAN\235\134\217\160\SI,\138p\134\202\251W3L\207\149\157\136\211\156\148m\193E\165\226\211\194\&7\GS\162l\226J{l\160\US6\181\226\168\173_\223\169O\FS\151mA\NUL\173\194w\156\217\178W\219\DLEk\234\157t\131\253I\245\&2V\"\243\143yz\155\175\139m\253qu\249\198C\209\ENQ\ETX\v\178\173\225\177T#dn\238\142\DC4W\USx\SUB\244\US\"\NUL" Use -p '/Ed448.gen signature.0/' to rerun this test only. 1: FAIL (0.02s) tests/KAT_Ed448.hs:101: expected: Signature "&\184\249\ETB'\189b\137z\241^A\235C\195w\239\185\198\DLE\212\143#5\203\v\208\bx\DLE\244\&5%A\177C\196\185\129\183\225\143b\222\140\205\246\&3\252\ESC\240\&7\171|\215y\128^\r\188\192\170\225\203\206\225\175\178\224'\223\&6\188\EOT\220\236\191\NAKC6\193\159\n\247\224\166G)\ENQ\231\153\241\149=*\SI\243\&4\138\178\SUB\164\173\175\209\210\&4D\FS\248\a\192:\NUL" but got: Signature "\183\231O\128\248\249\207\218\143@\174\170\&9 5\166g\165\240\135\210\177t!\248\DLEG\217\ETBv\174\b\166V\191r\183+\249\233\ETX\187))uS\198\225\207E(\229\255\202\226\183\NUL:\"\191\145\175\180\252\193_\189\SYN\168\164\167l\GSo \217\174O\243,\154\204{\215\176P\249\179H\186\ACK\174\239\240\221}l.W\236\207\EOT\"rZi\197\216w5\133y\NAK\NUL" Use -p '/Ed448.gen signature.1/' to rerun this test only. 2: FAIL tests/KAT_Ed448.hs:101: expected: Signature "\US\n\136\136\206%\232\212X\162\DC10\135\155\132\n\144\137\217\153\170\186\ETX\158\175>:\250\t\n\t\211\137\219\168,O\242\174\138\197\205\251|U\233M]\150\SUB)\254\SOH\t\148\RS\NUL\184\219\222\234m;\ENQ\DLEh\223rT\192\205\193)\203\230-\178\220\149}\187G\181\US\211\242\DC3\251\134\152\240dwBP\165\STX\137a\201\191\143\253\151?\229\213\194\ACKI+\DC4\SO\NUL" but got: Signature "\136\213k\NAK;\CAN\192\DC3\155\236l\202\SOW|c\226\237\138\208\ESC\US\193\254\RSy\198\NUL\200PY\202\182\138\155\216\138\134\218\208GT\218\244\235\NAKv\253\SOH\225\\#hB\249\254\128\168Dh\r\165\234\FS\255\136pu\f\138\171\132\DC4\137\ACK\131\t\SOHz,\146\EOT\RSz\RSU/\149\246\152\190S\175\179\142\250\234\234\242\205\161\183\"-\245\209\ACK<\134i\211\197+\NUL" Use -p '/Ed448.gen signature.2/' to rerun this test only. 3: FAIL tests/KAT_Ed448.hs:101: expected: Signature "~\238\171|NP\251y\155A\142\229\227\EM\DEL\246\191\NAK\212:\DC4\195C\137\181\157\209\167\177\184[J\233\EOT8\172\166\&4\190\164^:&\149\241'\SI\a\253\205\247\198+\142\254\175\NUL\180\\,\150\186E~\177\168\191\aZ=\178\142\\$\246\185#\237J\215G\195\201\224\215\160\149\246\NUL\182\f\146\149:\196\238qNX\210(yn\165\198\SYN\188\210\160\157\171\179\228\SOH\196#\203\243\229\213\209\&9@-\172\225\139\SOAe\215\246(\132C\166\157\239\153\190\DC4(\CANb\"\NUL" Use -p '/Ed448.gen signature.3/' to rerun this test only. 4: FAIL (0.02s) tests/KAT_Ed448.hs:101: expected: Signature "j\DC2\ACKoU3\ESCl\"\172\213\213\191\197\215\DC2(\251\218\128\174\141\236&\189\211\ACKt\235X\201\139\178\208\225\206H\138\152\177\141\253\233\185\185\au\230\DELG\212\161\195H X\239\201\244\r,\160\&3\160\128\ESCc\212[;r.\245R\186\211\180\204\182g\218\&5\SOH\146\182\FSP\140\247\182\181\173\173\194\200\217\164F\239\NUL?\176\\\186_0\232\142\&6\236'\ETX\179I\202\"\156&p\131\&9\NUL" but got: Signature "\ETXw0z\DEL\179$\185\222\176\SO\191\134\DEL\156\142p\254\a\ESC6'\164\199\177\248\164X,}\245\216,\202\207'P\247\132\163\145\180K\144\198OM$\233h\212+:\156\212V\NUL\237\175\153\163W\180\n3\198\138h\131\n\146\225\"\GS\157\154\CAN\fJ\136\US\250\134r~\NAK\202\NUL'$\147\204d\NUL|+\213B\163\141M\152\211\196\159_\183=\ESC\250\195\143\&9\NUL" Use -p '/Ed448.gen signature.5/' to rerun this test only. 6: FAIL (0.02s) tests/KAT_Ed448.hs:101: expected: Signature "\198P\221\187\ACK\SOH\193\156\161\DC49\225d\r\217\&1\244e\202\254*=\NUL" but got: Signature "\198P\221\187\ACK\SOH\193\156\161\DC49\225d\r\217\&1\244Z\128\NULM)\"\NUL\215\187\&2<\236^\219\159\FS{5l\239\&8e\195]{\217\137\130\242\187'\162\155e\215(\a\169\153m\DC1\243\189\175\ETB\SYN\NUL" Use -p '/Ed448.gen signature.6/' to rerun this test only. 7: FAIL tests/KAT_Ed448.hs:101: expected: Signature "\227\SOH4ZA\163\154Mr\255\248\223i\201\128u\160\204\b+\128/\201\178\182\188P?\146ke\189\223\DELL\143\FS\180\159c\150\175\200\167\n\190m\138\239\r\180x\212\198\178\151\NULv\198\160HO\231mv\179\169v%\215\159\FS\226@\231\197vu\r)U((oq\155A=\233\173\163\232\235x\237W6\ETX\206\&0\216\187v\ETB\133\220\&0\219\195 \134\158\SUB\NUL" but got: Signature "\227\SOH4ZA\163\154Mr\255\248\223i\201\128u\160\204\b+\128/\201\178\182\188P?\146ke\189\223\DELL\143\FS\180\159c\150\175\200\167\n\190m\138\239\r\180x\212\198\178\151\NUL\139V\197K\218\NAKzyK\DEL\219\t\SO\DC3\169p\133\239>\152\&5\RS\RS \255\147\140l\213\151\177\241\159\135j\181v'\210\161\172\159\ETB\200V\180\188\162\STX\235\199\136\DEL\146p*\NUL" Use -p '/Ed448.gen signature.7/' to rerun this test only. verify sig 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK EdDSA gen publickey 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK gen signature 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK verify sig 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK PubKey MGF1 0: OK RSA SHA1 signature 0: OK 1: OK 2: OK verify 0: OK 1: OK RSA-PSS signature internal 0: OK verify internal 0: OK signature key 1024 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK verify key 1024 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK signature key 1025 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK verify key 1025 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK signature key 1026 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK verify key 1026 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK signature key 1031 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK verify key 1031 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK RSA-OAEP internal 0: OK 0: OK encryption key 1024 bits 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK decryption key 1024 bits 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK DSA SHA1 signature 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK 10: OK 11: OK 12: OK 13: OK verify 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK 10: OK 11: OK 12: OK 13: OK SHA224 signature 0: OK 1: OK 2: OK 3: OK verify 0: OK 1: OK 2: OK 3: OK SHA256 signature 0: OK 1: OK 2: OK 3: OK verify 0: OK 1: OK 2: OK 3: OK SHA384 signature 0: OK 1: OK 2: OK 3: OK verify 0: OK 1: OK 2: OK 3: OK SHA512 signature 0: OK 1: OK 2: OK 3: OK verify 0: OK 1: OK 2: OK 3: OK ECC valid-point 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK 10: OK 11: OK property point-add: OK (2.99s) +++ OK, passed 20 tests. point-negate-add: OK (5.89s) +++ OK, passed 20 tests. point-negate-negate: OK (7.91s) +++ OK, passed 20 tests. point-mul-mul: OK (20.48s) +++ OK, passed 20 tests. double-scalar-mult: OK (14.18s) +++ OK, passed 20 tests. ECDSA GEC 2 SEC_p160r1."abc".SHA1 public: OK signature: OK verify: OK SEC_t163k1."\162\193\160?\221\NULR\ESC".SHA1 public: OK (0.12s) signature: OK (0.13s) verify: OK (0.18s) SEC_t163k1."g\EOT\128\128\218\174\183}".SHA1 public: OK (0.13s) signature: OK (0.13s) verify: OK (0.18s) SEC_t163k1."w\224\a\220*\205rH".SHA1 public: OK (0.13s) signature: OK (0.13s) verify: OK (0.17s) SEC_t163k1."\251\172\252\206F\136t\132".SHA1 public: OK (0.13s) signature: OK (0.13s) verify: OK (0.17s) RFC 6979 SEC_p192r1."sample".SHA1 public: OK nonce: OK signature: OK verify: OK SEC_p192r1."sample".SHA224 public: OK nonce: OK signature: OK verify: OK SEC_p192r1."sample".SHA256 public: OK nonce: OK signature: OK verify: OK SEC_p192r1."sample".SHA384 public: OK nonce: OK signature: OK verify: OK SEC_p192r1."sample".SHA512 public: OK nonce: OK signature: OK verify: OK SEC_p192r1."test".SHA1 public: OK nonce: OK signature: OK verify: OK SEC_p192r1."test".SHA224 public: OK nonce: OK signature: OK verify: OK SEC_p192r1."test".SHA256 public: OK nonce: OK signature: OK verify: OK SEC_p192r1."test".SHA384 public: OK nonce: OK signature: OK verify: OK SEC_p192r1."test".SHA512 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."sample".SHA1 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."sample".SHA224 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."sample".SHA256 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."sample".SHA384 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."sample".SHA512 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."test".SHA1 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."test".SHA224 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."test".SHA256 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."test".SHA384 public: OK nonce: OK signature: OK verify: OK SEC_p224r1."test".SHA512 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."sample".SHA1 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."sample".SHA224 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."sample".SHA256 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."sample".SHA384 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."sample".SHA512 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."test".SHA1 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."test".SHA224 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."test".SHA256 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."test".SHA384 public: OK nonce: OK signature: OK verify: OK SEC_p256r1."test".SHA512 public: OK nonce: OK signature: OK verify: OK SEC_p384r1."sample".SHA1 public: OK (0.01s) nonce: OK signature: OK (0.01s) verify: OK (0.01s) SEC_p384r1."sample".SHA224 public: OK nonce: OK signature: OK (0.01s) verify: OK (0.01s) SEC_p384r1."sample".SHA256 public: OK (0.01s) nonce: OK signature: OK (0.01s) verify: OK (0.01s) SEC_p384r1."sample".SHA384 public: OK (0.01s) nonce: OK signature: OK (0.01s) verify: OK (0.01s) SEC_p384r1."sample".SHA512 public: OK (0.01s) nonce: OK signature: OK (0.01s) verify: OK SEC_p384r1."test".SHA1 public: OK (0.01s) nonce: OK signature: OK (0.01s) verify: OK (0.01s) SEC_p384r1."test".SHA224 public: OK (0.01s) nonce: OK signature: OK (0.01s) verify: OK SEC_p384r1."test".SHA256 public: OK (0.01s) nonce: OK signature: OK (0.01s) verify: OK (0.01s) SEC_p384r1."test".SHA384 public: OK (0.01s) nonce: OK signature: OK (0.01s) verify: OK (0.01s) SEC_p384r1."test".SHA512 public: OK (0.01s) nonce: OK signature: OK verify: OK SEC_p521r1."sample".SHA1 public: OK nonce: OK signature: OK (0.02s) verify: OK (0.02s) SEC_p521r1."sample".SHA224 public: OK (0.02s) nonce: OK signature: OK (0.02s) verify: OK (0.02s) SEC_p521r1."sample".SHA256 public: OK (0.02s) nonce: OK signature: OK (0.02s) verify: OK (0.02s) SEC_p521r1."sample".SHA384 public: OK nonce: OK signature: OK (0.02s) verify: OK (0.02s) SEC_p521r1."sample".SHA512 public: OK (0.01s) nonce: OK signature: OK (0.02s) verify: OK (0.02s) SEC_p521r1."test".SHA1 public: OK (0.02s) nonce: OK signature: OK (0.02s) verify: OK (0.02s) SEC_p521r1."test".SHA224 public: OK nonce: OK signature: OK verify: OK SEC_p521r1."test".SHA256 public: OK (0.02s) nonce: OK signature: OK (0.02s) verify: OK (0.01s) SEC_p521r1."test".SHA384 public: OK (0.02s) nonce: OK signature: OK (0.02s) verify: OK (0.02s) SEC_p521r1."test".SHA512 public: OK (0.02s) nonce: OK signature: OK verify: OK (0.02s) SEC_t163k1."sample".SHA1 public: OK (0.15s) nonce: OK signature: OK (0.15s) verify: OK (0.18s) SEC_t163k1."sample".SHA224 public: OK (0.15s) nonce: OK signature: OK (0.15s) verify: OK (0.17s) SEC_t163k1."sample".SHA256 public: OK (0.14s) nonce: OK signature: OK (0.14s) verify: OK (0.17s) SEC_t163k1."sample".SHA384 public: OK (0.15s) nonce: OK signature: OK (0.16s) verify: OK (0.18s) SEC_t163k1."sample".SHA512 public: OK (0.15s) nonce: OK signature: OK (0.15s) verify: OK (0.17s) SEC_t163k1."test".SHA1 public: OK (0.15s) nonce: OK signature: OK (0.15s) verify: OK (0.16s) SEC_t163k1."test".SHA224 public: OK (0.15s) nonce: OK signature: OK (0.15s) verify: OK (0.18s) SEC_t163k1."test".SHA256 public: OK (0.15s) nonce: OK signature: OK (0.15s) verify: OK (0.18s) SEC_t163k1."test".SHA384 public: OK (0.15s) nonce: OK signature: OK (0.16s) verify: OK (0.18s) SEC_t163k1."test".SHA512 public: OK (0.15s) nonce: OK signature: OK (0.15s) verify: OK (0.18s) SEC_t233k1."sample".SHA1 public: OK (0.33s) nonce: OK signature: OK (0.33s) verify: OK (0.37s) SEC_t233k1."sample".SHA224 public: OK (0.33s) nonce: OK signature: OK (0.34s) verify: OK (0.39s) SEC_t233k1."sample".SHA256 public: OK (0.32s) nonce: OK signature: OK (0.33s) verify: OK (0.39s) SEC_t233k1."sample".SHA384 public: OK (0.33s) nonce: OK signature: OK (0.33s) verify: OK (0.38s) SEC_t233k1."sample".SHA512 public: OK (0.33s) nonce: OK signature: OK (0.33s) verify: OK (0.39s) SEC_t233k1."test".SHA1 public: OK (0.32s) nonce: OK signature: OK (0.33s) verify: OK (0.37s) SEC_t233k1."test".SHA224 public: OK (0.33s) nonce: OK signature: OK (0.34s) verify: OK (0.38s) SEC_t233k1."test".SHA256 public: OK (0.33s) nonce: OK signature: OK (0.34s) verify: OK (0.39s) SEC_t233k1."test".SHA384 public: OK (0.33s) nonce: OK signature: OK (0.33s) verify: OK (0.37s) SEC_t233k1."test".SHA512 public: OK (0.32s) nonce: OK signature: OK (0.34s) verify: OK (0.38s) SEC_t283k1."sample".SHA1 public: OK (0.50s) nonce: OK signature: OK (0.50s) verify: OK (0.58s) SEC_t283k1."sample".SHA224 public: OK (0.49s) nonce: OK signature: OK (0.50s) verify: OK (0.58s) SEC_t283k1."sample".SHA256 public: OK (0.50s) nonce: OK signature: OK (0.51s) verify: OK (0.58s) SEC_t283k1."sample".SHA384 public: OK (0.51s) nonce: OK signature: OK (0.48s) verify: OK (0.60s) SEC_t283k1."sample".SHA512 public: OK (0.49s) nonce: OK signature: OK (0.49s) verify: OK (0.58s) SEC_t283k1."test".SHA1 public: OK (0.51s) nonce: OK signature: OK (0.48s) verify: OK (0.55s) SEC_t283k1."test".SHA224 public: OK (0.51s) nonce: OK signature: OK (0.48s) verify: OK (0.58s) SEC_t283k1."test".SHA256 public: OK (0.50s) nonce: OK signature: OK (0.49s) verify: OK (0.58s) SEC_t283k1."test".SHA384 public: OK (0.51s) nonce: OK signature: OK (0.49s) verify: OK (0.57s) SEC_t283k1."test".SHA512 public: OK (0.51s) nonce: OK signature: OK (0.49s) verify: OK (0.58s) SEC_t409k1."sample".SHA1 public: OK (1.08s) nonce: OK signature: OK (1.02s) verify: OK (1.24s) SEC_t409k1."sample".SHA224 public: OK (1.05s) nonce: OK signature: OK (1.04s) verify: OK (1.22s) SEC_t409k1."sample".SHA256 public: OK (1.05s) nonce: OK signature: OK (1.05s) verify: OK (1.23s) SEC_t409k1."sample".SHA384 public: OK (1.05s) nonce: OK signature: OK (1.06s) verify: OK (1.23s) SEC_t409k1."sample".SHA512 public: OK (1.06s) nonce: OK signature: OK (1.05s) verify: OK (1.19s) SEC_t409k1."test".SHA1 public: OK (1.04s) nonce: OK signature: OK (1.02s) verify: OK (1.23s) SEC_t409k1."test".SHA224 public: OK (1.04s) nonce: OK signature: OK (1.04s) verify: OK (1.21s) SEC_t409k1."test".SHA256 public: OK (1.06s) nonce: OK signature: OK (1.04s) verify: OK (1.22s) SEC_t409k1."test".SHA384 public: OK (1.06s) nonce: OK signature: OK (1.03s) verify: OK (1.20s) SEC_t409k1."test".SHA512 public: OK (1.04s) nonce: OK signature: OK (1.03s) verify: OK (1.23s) SEC_t571k1."sample".SHA1 public: OK (2.08s) nonce: OK signature: OK (2.13s) verify: OK (2.45s) SEC_t571k1."sample".SHA224 public: OK (2.07s) nonce: OK signature: OK (2.09s) verify: OK (2.47s) SEC_t571k1."sample".SHA256 public: OK (2.07s) nonce: OK signature: OK (2.14s) verify: OK (2.44s) SEC_t571k1."sample".SHA384 public: OK (2.06s) nonce: OK signature: OK (2.10s) verify: OK (2.46s) SEC_t571k1."sample".SHA512 public: OK (2.08s) nonce: OK signature: OK (2.11s) verify: OK (2.42s) SEC_t571k1."test".SHA1 public: OK (2.06s) nonce: OK signature: OK (2.10s) verify: OK (2.41s) SEC_t571k1."test".SHA224 public: OK (2.07s) nonce: OK signature: OK (2.12s) verify: OK (2.48s) SEC_t571k1."test".SHA256 public: OK (2.08s) nonce: OK signature: OK (2.09s) verify: OK (2.40s) SEC_t571k1."test".SHA384 public: OK (2.08s) nonce: OK signature: OK (2.11s) verify: OK (2.46s) SEC_t571k1."test".SHA512 public: OK (2.06s) nonce: OK signature: OK (2.06s) verify: OK (2.42s) SEC_t163r2."sample".SHA1 public: OK (0.16s) nonce: OK signature: OK (0.13s) verify: OK (0.18s) SEC_t163r2."sample".SHA224 public: OK (0.16s) nonce: OK signature: OK (0.14s) verify: OK (0.17s) SEC_t163r2."sample".SHA256 public: OK (0.16s) nonce: OK signature: OK (0.15s) verify: OK (0.16s) SEC_t163r2."sample".SHA384 public: OK (0.15s) nonce: OK signature: OK (0.15s) verify: OK (0.17s) SEC_t163r2."sample".SHA512 public: OK (0.16s) nonce: OK signature: OK (0.16s) verify: OK (0.17s) SEC_t163r2."test".SHA1 public: OK (0.16s) nonce: OK signature: OK (0.15s) verify: OK (0.17s) SEC_t163r2."test".SHA224 public: OK (0.16s) nonce: OK signature: OK (0.15s) verify: OK (0.18s) SEC_t163r2."test".SHA256 public: OK (0.16s) nonce: OK signature: OK (0.15s) verify: OK (0.16s) SEC_t163r2."test".SHA384 public: OK (0.16s) nonce: OK signature: OK (0.15s) verify: OK (0.17s) SEC_t163r2."test".SHA512 public: OK (0.16s) nonce: OK signature: OK (0.15s) verify: OK (0.18s) SEC_t233r1."sample".SHA1 public: OK (0.33s) nonce: OK signature: OK (0.34s) verify: OK (0.39s) SEC_t233r1."sample".SHA224 public: OK (0.34s) nonce: OK signature: OK (0.34s) verify: OK (0.38s) SEC_t233r1."sample".SHA256 public: OK (0.34s) nonce: OK signature: OK (0.32s) verify: OK (0.38s) SEC_t233r1."sample".SHA384 public: OK (0.34s) nonce: OK signature: OK (0.32s) verify: OK (0.38s) SEC_t233r1."sample".SHA512 public: OK (0.34s) nonce: OK signature: OK (0.33s) verify: OK (0.39s) SEC_t233r1."test".SHA1 public: OK (0.35s) nonce: OK signature: OK (0.34s) verify: OK (0.39s) SEC_t233r1."test".SHA224 public: OK (0.35s) nonce: OK signature: OK (0.34s) verify: OK (0.38s) SEC_t233r1."test".SHA256 public: OK (0.35s) nonce: OK signature: OK (0.33s) verify: OK (0.39s) SEC_t233r1."test".SHA384 public: OK (0.35s) nonce: OK signature: OK (0.33s) verify: OK (0.39s) SEC_t233r1."test".SHA512 public: OK (0.34s) nonce: OK signature: OK (0.34s) verify: OK (0.38s) SEC_t283r1."sample".SHA1 public: OK (0.48s) nonce: OK signature: OK (0.50s) verify: OK (0.56s) SEC_t283r1."sample".SHA224 public: OK (0.48s) nonce: OK signature: OK (0.50s) verify: OK (0.57s) SEC_t283r1."sample".SHA256 public: OK (0.48s) nonce: OK signature: OK (0.49s) verify: OK (0.58s) SEC_t283r1."sample".SHA384 public: OK (0.48s) nonce: OK signature: OK (0.48s) verify: OK (0.59s) SEC_t283r1."sample".SHA512 public: OK (0.48s) nonce: OK signature: OK (0.48s) verify: OK (0.57s) SEC_t283r1."test".SHA1 public: OK (0.47s) nonce: OK signature: OK (0.49s) verify: OK (0.57s) SEC_t283r1."test".SHA224 public: OK (0.47s) nonce: OK signature: OK (0.50s) verify: OK (0.58s) SEC_t283r1."test".SHA256 public: OK (0.48s) nonce: OK signature: OK (0.49s) verify: OK (0.58s) SEC_t283r1."test".SHA384 public: OK (0.48s) nonce: OK signature: OK (0.49s) verify: OK (0.57s) SEC_t283r1."test".SHA512 public: OK (0.48s) nonce: OK signature: OK (0.47s) verify: OK (0.56s) SEC_t409r1."sample".SHA1 public: OK (1.03s) nonce: OK signature: OK (1.07s) verify: OK (1.24s) SEC_t409r1."sample".SHA224 public: OK (1.03s) nonce: OK signature: OK (1.05s) verify: OK (1.23s) SEC_t409r1."sample".SHA256 public: OK (1.02s) nonce: OK signature: OK (1.05s) verify: OK (1.23s) SEC_t409r1."sample".SHA384 public: OK (1.02s) nonce: OK signature: OK (1.03s) verify: OK (1.22s) SEC_t409r1."sample".SHA512 public: OK (1.02s) nonce: OK signature: OK (1.06s) verify: OK (1.21s) SEC_t409r1."test".SHA1 public: OK (1.02s) nonce: OK signature: OK (1.04s) verify: OK (1.23s) SEC_t409r1."test".SHA224 public: OK (1.02s) nonce: OK signature: OK (1.02s) verify: OK (1.23s) SEC_t409r1."test".SHA256 public: OK (1.02s) nonce: OK signature: OK (1.06s) verify: OK (1.24s) SEC_t409r1."test".SHA384 public: OK (1.02s) nonce: OK signature: OK (1.05s) verify: OK (1.24s) SEC_t409r1."test".SHA512 public: OK (1.01s) nonce: OK signature: OK (1.04s) verify: OK (1.23s) SEC_t571r1."sample".SHA1 public: OK (2.08s) nonce: OK signature: OK (2.15s) verify: OK (2.46s) SEC_t571r1."sample".SHA224 public: OK (2.07s) nonce: OK signature: OK (2.12s) verify: OK (2.42s) SEC_t571r1."sample".SHA256 public: OK (2.08s) nonce: OK signature: OK (2.15s) verify: OK (2.42s) SEC_t571r1."sample".SHA384 public: OK (2.09s) nonce: OK signature: OK (2.16s) verify: OK (2.47s) SEC_t571r1."sample".SHA512 public: OK (2.09s) nonce: OK signature: OK (2.11s) verify: OK (2.44s) SEC_t571r1."test".SHA1 public: OK (2.08s) nonce: OK signature: OK (2.08s) verify: OK (2.43s) SEC_t571r1."test".SHA224 public: OK (2.08s) nonce: OK signature: OK (2.05s) verify: OK (2.47s) SEC_t571r1."test".SHA256 public: OK (2.09s) nonce: OK signature: OK (2.13s) verify: OK (2.44s) SEC_t571r1."test".SHA384 public: OK (2.08s) nonce: OK signature: OK (2.12s) verify: OK (2.47s) SEC_t571r1."test".SHA512 public: OK (2.08s) nonce: OK signature: OK (2.11s) verify: OK (2.45s) P256 scalar marshalling: OK +++ OK, passed 100 tests. add: OK +++ OK, passed 100 tests. add0: OK +++ OK, passed 100 tests. sub: OK (0.01s) +++ OK, passed 100 tests. sub0: OK +++ OK, passed 100 tests. mul: OK (0.01s) +++ OK, passed 100 tests. inv: OK +++ OK, passed 100 tests. inv-safe: OK (0.02s) +++ OK, passed 100 tests. inv-safe-mul: OK (0.02s) +++ OK, passed 100 tests. inv-safe-zero: OK +++ OK, passed 100 tests. point marshalling: OK +++ OK, passed 100 tests. marshalling-integer: OK +++ OK, passed 100 tests. valid-point-1: OK valid-point-2: OK valid-point-3: OK point-add-1: OK lift-to-curve: OK (0.68s) +++ OK, passed 100 tests. point-add: OK (1.37s) +++ OK, passed 100 tests. point-negate: OK (0.67s) +++ OK, passed 100 tests. point-mul: OK (1.00s) +++ OK, passed 100 tests. infinity: OK +++ OK, passed 100 tests. Rabin Basic encrypt 0: OK decrypt 0: OK sign 0: OK verify 0: OK Modified sign 0: OK verify 0: OK RW encrypt 0: OK decrypt 0: OK sign 0: OK verify 0: OK OTP HOTP KATs 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK properties resync-expected: OK (0.02s) +++ OK, passed 100 tests. TOTP KATs SHA1 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK SHA256 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK SHA512 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK KDF PBKDF2 KATs-HMAC-SHA1 1: OK 2: OK (0.12s) 3: OK (0.18s) 4: OK (0.09s) KATs-HMAC-SHA1 (fast) 1: OK 2: OK 3: OK 4: OK KATs-HMAC-SHA256 1: OK 2: OK (0.19s) KATs-HMAC-SHA256 (fast) 1: OK 2: OK (0.02s) KATs-HMAC-SHA512 1: OK 2: OK 3: OK (0.12s) 4: OK KATs-HMAC-SHA512 (fast) 1: OK 2: OK 3: OK (0.01s) 4: OK Scrypt 1: OK 2: OK (0.18s) 3: OK 4: OK (13.28s) bcrypt KATs 1: OK (0.02s) 2: OK (0.02s) 3: OK (0.02s) 4: OK (0.02s) 5: OK (0.01s) 6: OK 7: OK (0.02s) 8: OK (0.02s) 9: OK (0.01s) 10: OK (0.02s) 11: OK (0.02s) 12: OK (0.02s) 13: OK (0.02s) 14: OK (0.03s) 15: OK (0.12s) 16: OK (0.47s) 17: OK (1.89s) 18: OK (0.02s) 19: OK (0.10s) 20: OK (1.86s) 21: OK (0.03s) 22: OK (0.11s) 23: OK (0.43s) 24: OK (0.03s) Invalid hash length: OK Hash and validate: OK (0.02s) BCryptPBKDF generate 1: OK (0.47s) 2: OK (0.82s) 3: OK (0.20s) hashInternal 1: OK (0.01s) HKDF KATs sha256 1: OK 2: OK Argon2 KATs 1: OK (0.64s) block-cipher AES AES128 KAT ECB E0: OK D0: OK E1: OK D1: OK E2: OK D2: OK E3: OK D3: OK E4: OK D4: OK E5: OK D5: OK CBC E0: OK D0: OK E1: OK D1: OK E2: OK D2: OK E3: OK D3: OK E4: OK D4: OK E5: OK D5: OK E6: OK D6: OK E7: OK D7: OK E8: OK D8: OK E9: OK D9: OK E10: OK D10: OK E11: OK D11: OK CFB E0: OK D0: OK AEAD AE0: OK AD0: OK E0: OK D0: OK AE1: OK AD1: OK E1: OK D1: OK AE2: OK AD2: OK E2: OK D2: OK AE3: OK AD3: OK E3: OK D3: OK AE4: OK AD4: OK E4: OK D4: OK AE5: OK AD5: OK E5: OK D5: OK AE6: OK AD6: OK E6: OK D6: OK AE7: OK AD7: OK E7: OK D7: OK AE8: OK AD8: OK E8: OK D8: OK AE9: OK AD9: OK E9: OK D9: OK AE10: OK AD10: OK E10: OK D10: OK AE11: OK AD11: OK E11: OK D11: OK AE12: OK AD12: OK E12: OK D12: OK AE13: OK AD13: OK E13: OK D13: OK AE14: OK AD14: OK E14: OK D14: OK AE15: OK AD15: OK E15: OK D15: OK AE16: OK AD16: OK E16: OK D16: OK AE17: OK AD17: OK E17: OK D17: OK AE18: OK AD18: OK E18: OK D18: OK AE19: OK AD19: OK E19: OK D19: OK AE20: OK AD20: OK E20: OK D20: OK AE21: OK AD21: OK E21: OK D21: OK AE22: OK AD22: OK E22: OK D22: OK AE23: OK AD23: OK E23: OK D23: OK AE24: OK AD24: OK E24: OK D24: OK AE25: OK AD25: OK E25: OK D25: OK AE26: OK AD26: OK E26: OK D26: OK AE27: OK AD27: OK E27: OK D27: OK AE28: OK AD28: OK E28: OK D28: OK AE29: OK AD29: OK E29: OK D29: OK AE30: OK AD30: OK E30: OK D30: OK AE31: OK AD31: OK E31: OK D31: OK AE32: OK AD32: OK E32: OK D32: OK AE33: OK AD33: OK E33: OK D33: OK AE34: OK AD34: OK E34: OK D34: OK AE35: OK AD35: OK E35: OK D35: OK decrypt.encrypt==id ECB: OK (0.25s) +++ OK, passed 100 tests. CBC: OK (0.23s) +++ OK, passed 100 tests. CFB: OK (0.35s) +++ OK, passed 100 tests. CTR: OK (0.05s) +++ OK, passed 100 tests. OCB: OK (0.09s) +++ OK, passed 100 tests. CCM: OK (0.09s) +++ OK, passed 100 tests. EAX: OK +++ OK, passed 100 tests. CWC: OK +++ OK, passed 100 tests. GCM: OK (0.07s) +++ OK, passed 100 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 100 tests. AES192 KAT ECB E0: OK D0: OK E1: OK D1: OK E2: OK D2: OK E3: OK D3: OK E4: OK D4: OK CBC E0: OK D0: OK E1: OK D1: OK E2: OK D2: OK E3: OK D3: OK E4: OK D4: OK E5: OK D5: OK E6: OK D6: OK E7: OK D7: OK E8: OK D8: OK E9: OK D9: OK E10: OK D10: OK E11: OK D11: OK decrypt.encrypt==id ECB: OK (0.24s) +++ OK, passed 100 tests. CBC: OK (0.23s) +++ OK, passed 100 tests. CFB: OK (0.37s) +++ OK, passed 100 tests. CTR: OK (0.04s) +++ OK, passed 100 tests. OCB: OK (0.09s) +++ OK, passed 100 tests. CCM: OK (0.11s) +++ OK, passed 100 tests. EAX: OK +++ OK, passed 100 tests. CWC: OK +++ OK, passed 100 tests. GCM: OK (0.09s) +++ OK, passed 100 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 100 tests. AES256 KAT ECB E0: OK D0: OK E1: OK D1: OK E2: OK D2: OK E3: OK D3: OK E4: OK D4: OK CBC E0: OK D0: OK E1: OK D1: OK E2: OK D2: OK E3: OK D3: OK E4: OK D4: OK E5: OK D5: OK E6: OK D6: OK E7: OK D7: OK E8: OK D8: OK E9: OK D9: OK E10: OK D10: OK E11: OK D11: OK AEAD AE0: OK AD0: OK E0: OK D0: OK AE1: OK AD1: OK E1: OK D1: OK AE2: OK AD2: OK E2: OK D2: OK decrypt.encrypt==id ECB: OK (0.22s) +++ OK, passed 100 tests. CBC: OK (0.26s) +++ OK, passed 100 tests. CFB: OK (0.33s) +++ OK, passed 100 tests. CTR: OK (0.05s) +++ OK, passed 100 tests. OCB: OK (0.08s) +++ OK, passed 100 tests. CCM: OK (0.07s) +++ OK, passed 100 tests. EAX: OK +++ OK, passed 100 tests. CWC: OK (0.01s) +++ OK, passed 100 tests. GCM: OK (0.09s) +++ OK, passed 100 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 100 tests. AES-GCM-SIV KATs encrypt AES128 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK 10: OK 11: OK 12: OK 13: OK 14: OK 15: OK 16: OK 17: OK 18: OK 19: OK 20: OK 21: OK 22: OK 23: OK 24: OK AES256 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK 10: OK 11: OK 12: OK 13: OK 14: OK 15: OK 16: OK 17: OK 18: OK 19: OK 20: OK 21: OK 22: OK 23: OK 24: OK CounterWrap 1: OK 2: OK decrypt AES128 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK 10: OK 11: OK 12: OK 13: OK 14: OK 15: OK 16: OK 17: OK 18: OK 19: OK 20: OK 21: OK 22: OK 23: OK 24: OK AES256 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK 10: OK 11: OK 12: OK 13: OK 14: OK 15: OK 16: OK 17: OK 18: OK 19: OK 20: OK 21: OK 22: OK 23: OK 24: OK CounterWrap 1: OK 2: OK properties AES128: OK (0.64s) +++ OK, passed 100 tests. AES256: OK (0.66s) +++ OK, passed 100 tests. blowfish64 KAT ECB E0: OK D0: OK E1: OK D1: OK E2: OK D2: OK E3: OK D3: OK E4: OK D4: OK E5: OK D5: OK E6: OK D6: OK E7: OK D7: OK E8: OK D8: OK E9: OK D9: OK E10: OK D10: OK E11: OK D11: OK E12: OK D12: OK E13: OK D13: OK E14: OK D14: OK E15: OK D15: OK E16: OK D16: OK E17: OK D17: OK E18: OK D18: OK E19: OK D19: OK E20: OK D20: OK E21: OK D21: OK E22: OK D22: OK E23: OK D23: OK E24: OK D24: OK E25: OK D25: OK E26: OK D26: OK E27: OK D27: OK E28: OK D28: OK E29: OK D29: OK E30: OK D30: OK E31: OK D31: OK E32: OK D32: OK E33: OK D33: OK decrypt.encrypt==id ECB: OK (0.27s) +++ OK, passed 100 tests. CBC: OK (0.45s) +++ OK, passed 100 tests. CFB: OK (0.46s) +++ OK, passed 100 tests. CTR: OK (0.11s) +++ OK, passed 100 tests. OCB: OK +++ OK, passed 100 tests. CCM: OK +++ OK, passed 100 tests. EAX: OK +++ OK, passed 100 tests. CWC: OK +++ OK, passed 100 tests. GCM: OK +++ OK, passed 100 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 100 tests. CAST5 KAT ECB E0: OK D0: OK E1: OK D1: OK E2: OK D2: OK decrypt.encrypt==id ECB: OK (0.25s) +++ OK, passed 100 tests. CBC: OK (0.47s) +++ OK, passed 100 tests. CFB: OK (0.38s) +++ OK, passed 100 tests. CTR: OK (0.07s) +++ OK, passed 100 tests. OCB: OK +++ OK, passed 100 tests. CCM: OK +++ OK, passed 100 tests. EAX: OK +++ OK, passed 100 tests. CWC: OK +++ OK, passed 100 tests. GCM: OK +++ OK, passed 100 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 100 tests. Camellia128 KAT ECB E0: OK D0: OK E1: OK D1: OK decrypt.encrypt==id ECB: OK (0.28s) +++ OK, passed 100 tests. CBC: OK (0.41s) +++ OK, passed 100 tests. CFB: OK (0.44s) +++ OK, passed 100 tests. CTR: OK (0.06s) +++ OK, passed 100 tests. OCB: OK +++ OK, passed 100 tests. CCM: OK +++ OK, passed 100 tests. EAX: OK +++ OK, passed 100 tests. CWC: OK +++ OK, passed 100 tests. GCM: OK +++ OK, passed 100 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 100 tests. DES KAT ECB E0: OK D0: OK E1: OK D1: OK E2: OK D2: OK E3: OK D3: OK E4: OK D4: OK E5: OK D5: OK E6: OK D6: OK E7: OK D7: OK E8: OK D8: OK E9: OK D9: OK E10: OK D10: OK E11: OK D11: OK E12: OK D12: OK E13: OK D13: OK E14: OK D14: OK E15: OK D15: OK E16: OK D16: OK E17: OK D17: OK E18: OK D18: OK E19: OK D19: OK E20: OK D20: OK E21: OK D21: OK E22: OK D22: OK E23: OK D23: OK E24: OK D24: OK E25: OK D25: OK E26: OK D26: OK E27: OK D27: OK E28: OK D28: OK E29: OK D29: OK E30: OK D30: OK E31: OK D31: OK E32: OK D32: OK E33: OK D33: OK decrypt.encrypt==id ECB: OK (4.71s) +++ OK, passed 5 tests. CBC: OK (4.86s) +++ OK, passed 5 tests. CFB: OK (4.34s) +++ OK, passed 5 tests. CTR: OK (0.49s) +++ OK, passed 5 tests. OCB: OK +++ OK, passed 5 tests. CCM: OK +++ OK, passed 5 tests. EAX: OK +++ OK, passed 5 tests. CWC: OK +++ OK, passed 5 tests. GCM: OK +++ OK, passed 5 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 5 tests. 3DES_EEE decrypt.encrypt==id ECB: OK (19.73s) +++ OK, passed 5 tests. CBC: OK (14.10s) +++ OK, passed 5 tests. CFB: OK (20.23s) +++ OK, passed 5 tests. CTR: OK (2.62s) +++ OK, passed 5 tests. OCB: OK +++ OK, passed 5 tests. CCM: OK +++ OK, passed 5 tests. EAX: OK +++ OK, passed 5 tests. CWC: OK +++ OK, passed 5 tests. GCM: OK +++ OK, passed 5 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 5 tests. Twofish Twofish128 KAT ECB E0: OK D0: OK E1: OK D1: OK decrypt.encrypt==id ECB: OK (1.00s) +++ OK, passed 100 tests. CBC: OK (1.11s) +++ OK, passed 100 tests. CFB: OK (0.99s) +++ OK, passed 100 tests. CTR: OK (0.41s) +++ OK, passed 100 tests. OCB: OK +++ OK, passed 100 tests. CCM: OK +++ OK, passed 100 tests. EAX: OK +++ OK, passed 100 tests. CWC: OK +++ OK, passed 100 tests. GCM: OK +++ OK, passed 100 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 100 tests. Twofish192 KAT ECB E0: OK D0: OK E1: OK D1: OK decrypt.encrypt==id ECB: OK (1.06s) +++ OK, passed 100 tests. CBC: OK (1.10s) +++ OK, passed 100 tests. CFB: OK (1.03s) +++ OK, passed 100 tests. CTR: OK (0.44s) +++ OK, passed 100 tests. OCB: OK +++ OK, passed 100 tests. CCM: OK +++ OK, passed 100 tests. EAX: OK +++ OK, passed 100 tests. CWC: OK +++ OK, passed 100 tests. GCM: OK +++ OK, passed 100 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 100 tests. Twofish256 KAT ECB E0: OK D0: OK E1: OK D1: OK decrypt.encrypt==id ECB: OK (0.96s) +++ OK, passed 100 tests. CBC: OK (1.06s) +++ OK, passed 100 tests. CFB: OK (0.95s) +++ OK, passed 100 tests. CTR: OK (0.44s) +++ OK, passed 100 tests. OCB: OK (0.01s) +++ OK, passed 100 tests. CCM: OK (0.01s) +++ OK, passed 100 tests. EAX: OK (0.01s) +++ OK, passed 100 tests. CWC: OK +++ OK, passed 100 tests. GCM: OK (0.01s) +++ OK, passed 100 tests. nullIV is null: OK ivAdd is linear: OK +++ OK, passed 100 tests. stream-cipher RC4 1: OK 2: OK 3: OK ChaCha 8-128-K0-I0: OK 12-128-K0-I0: OK 20-128-K0-I0: OK 8-256-K0-I0: OK 12-256-K0-I0: OK 20-256-K0-I0: OK XChaCha20 example KAT: OK generate-combine: OK (0.03s) +++ OK, passed 100 tests. chunking-generate: OK (0.06s) +++ OK, passed 100 tests. chunking-combine: OK (0.35s) +++ OK, passed 100 tests. ChaChaPoly1305 V1: OK V1-decrypt: OK V1-extended: OK V1-extended-decrypt: OK nonce increment: OK Salsa KAT 1: OK 2: OK generate-combine: OK (0.02s) +++ OK, passed 100 tests. chunking-generate: OK (0.06s) +++ OK, passed 100 tests. chunking-combine: OK (0.42s) +++ OK, passed 100 tests. XSalsa KAT 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK 10: OK 11: OK 12: OK 13: OK 14: OK 15: OK 16: OK 17: OK crypto_box encryption 1: OK AFIS KAT merge merge 0: OK merge 1: OK merge.split == id: OK (0.03s) +++ OK, passed 100 tests. ECC decodePoint 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK 9: OK 10: OK 11: OK 12: OK 13: OK 14: OK 15: OK 16: OK 17: OK 18: OK 19: OK 20: OK 21: OK 22: OK 23: OK 24: OK 25: OK 26: OK 27: OK 28: OK 29: OK 30: OK 31: OK 32: OK 33: OK 34: OK ECDH weak points 0: OK 1: OK 2: OK 3: OK 4: OK 5: OK 6: OK 7: OK 8: OK property decodePoint.encodePoint==id: OK (0.73s) +++ OK, passed 100 tests. ECDH commutes: FAIL (0.02s) *** Failed! Falsified (after 4 tests): TestDRG (369,1539,794,556,9) Curve_X448 Use --quickcheck-replay=489609 to reproduce. Use -p '/ECDH commutes/' to rerun this test only. decodeScalar.encodeScalar==id: OK (0.03s) +++ OK, passed 100 tests. scalarFromInteger.scalarToInteger==id: OK (0.01s) +++ OK, passed 100 tests. (a + b).P = a.P + b.P: OK (1.13s) +++ OK, passed 20 tests. (a * b).P = a.(b.P): OK (0.76s) +++ OK, passed 20 tests. ECC.Edwards25519 vectors 11*G: OK 123*G: OK 134*G: OK 123*G + 11*G: OK scalar arithmetic scalarDecodeLong.scalarEncode==id: OK +++ OK, passed 100 tests. curve order: OK addition with zero: OK (0.02s) +++ OK, passed 100 tests. addition associative: OK (0.05s) +++ OK, passed 100 tests. addition commutative: OK (0.02s) +++ OK, passed 100 tests. multiplication with zero: OK +++ OK, passed 100 tests. multiplication with one: OK (0.02s) +++ OK, passed 100 tests. multiplication associative: OK (0.04s) +++ OK, passed 100 tests. multiplication commutative: OK (0.01s) +++ OK, passed 100 tests. multiplication distributive: OK (0.05s) +++ OK, passed 100 tests. point arithmetic pointDecode.pointEncode==id: OK (0.04s) +++ OK, passed 100 tests. pointEncode.pointDecode==id: OK (0.04s) +++ OK, passed 100 tests. addition with identity: OK (0.03s) +++ OK, passed 100 tests. addition associative: OK (0.09s) +++ OK, passed 100 tests. addition commutative: OK (0.06s) +++ OK, passed 100 tests. negation: OK (0.03s) +++ OK, passed 100 tests. doubling: OK (0.03s) +++ OK, passed 100 tests. multiplication by cofactor: OK (0.05s) +++ OK, passed 100 tests. prime order: OK (0.04s) +++ OK, passed 100 tests. 8-torsion point: OK scalarmult with zero: OK (0.05s) +++ OK, passed 100 tests. scalarmult with one: OK (0.05s) +++ OK, passed 100 tests. scalarmult with two: OK (0.05s) +++ OK, passed 100 tests. scalarmult with curve order - 1: OK (0.06s) +++ OK, passed 100 tests. scalarmult commutative: OK (0.07s) +++ OK, passed 100 tests. scalarmult distributive: OK (0.11s) +++ OK, passed 100 tests. double scalarmult: OK (0.10s) +++ OK, passed 100 tests. ECDSA verification SHA1: OK (0.38s) +++ OK, passed 5 tests. SHA224: OK (0.48s) +++ OK, passed 5 tests. SHA256: OK (0.30s) +++ OK, passed 5 tests. SHA384: OK (0.43s) +++ OK, passed 5 tests. SHA512: OK (0.43s) +++ OK, passed 5 tests. recovery SEC_p128r1: OK (1.38s) +++ OK, passed 100 tests. SEC_p128r2: OK (1.34s) +++ OK, passed 100 tests. SEC_p256k1: OK (3.06s) +++ OK, passed 100 tests. SEC_p256r1: OK (3.11s) +++ OK, passed 100 tests. SEC_t131r1: OK (21.60s) +++ OK, passed 50 tests. SEC_t131r2: OK (21.37s) +++ OK, passed 50 tests. SEC_t233k1: OK (29.71s) +++ OK, passed 20 tests. SEC_t233r1: OK (29.78s) +++ OK, passed 20 tests. normalize SEC_p128r1: OK (0.58s) +++ OK, passed 100 tests. SEC_p128r2: OK (0.57s) +++ OK, passed 100 tests. SEC_p256k1: OK (0.93s) +++ OK, passed 100 tests. SEC_p256r1: OK (0.95s) +++ OK, passed 100 tests. SEC_t131r1: OK (4.93s) +++ OK, passed 50 tests. SEC_t131r2: OK (4.90s) +++ OK, passed 50 tests. SEC_t233k1: OK (6.65s) +++ OK, passed 20 tests. SEC_t233r1: OK (6.66s) +++ OK, passed 20 tests. 18 out of 2124 tests failed (635.33s) Test suite test-crypton: FAIL Test suite logged to: dist/test/crypton-1.0.3-test-crypton.log 0 of 1 test suites (0 of 1 test cases) passed. ==> ERROR: A failure occurred in check().  Aborting... ==> ERROR: Build failed, check /var/lib/archbuild/extra-riscv64/felix-0/build [?25h[?25h[?25hreceiving incremental file list haskell-crypton-1.0.3-11-riscv64-build.log haskell-crypton-1.0.3-11-riscv64-check.log sent 62 bytes received 16,581 bytes 33,286.00 bytes/sec total size is 163,461 speedup is 9.82