authprogs/ckpasswd fails because OpenBSD crypt(3) is not compatible with the expectations of the test suite, which uses the legacy UNIX hash algorithm. OpenBSD only supports Blowfish ($2b$). This will require a bit of effort to fix, since I suspect some other systems don't support $2b$(although Linux does). The test will have to be conditional.
(Russ' analysis.)
Failed Set Fail/Total (%) Skip Stat Failing Tests
-------------------------- -------------- ---- ---- ------------------------
authprogs/ckpasswd 5/7 71% 0 0 1-5
not ok 1
not ok 2
not ok 3
not ok 4
not ok 5
saw:
not: ckpasswd: invalid password for user foo
ok 6
ok 7
FAILED 1-5
authprogs/ckpasswd fails because OpenBSD crypt(3) is not compatible with the expectations of the test suite, which uses the legacy UNIX hash algorithm. OpenBSD only supports Blowfish (
$2b$
). This will require a bit of effort to fix, since I suspect some other systems don't support$2b$
(although Linux does). The test will have to be conditional. (Russ' analysis.)