@@ -123,25 +123,14 @@ jobs:
123123 # Only runs on PQC-enabled rows; OpenSSL 3.5+ has native ML-KEM/ML-DSA
124124 # in the default provider, so this proves wolfProvider's bytes are
125125 # FIPS 203/204 standards-compliant against two reference implementations.
126- - name : Diagnose OpenSSL default provider PQC support
127- if : matrix.pqc == true
128- run : |
129- export LD_LIBRARY_PATH="$(pwd)/openssl-install/lib"
130- echo "--- OpenSSL version ---"
131- ./openssl-install/bin/openssl version -a
132- echo "--- libraries linked into pqc_interop.test ---"
133- ldd ./test/pqc_interop.test | grep -E "libcrypto|libssl" || true
134- echo "--- default provider KEM algorithms ---"
135- ./openssl-install/bin/openssl list -kem-algorithms -provider default \
136- | grep -i ml-kem || echo "NO ML-KEM in default provider"
137- echo "--- default provider signature algorithms ---"
138- ./openssl-install/bin/openssl list -signature-algorithms -provider default \
139- | grep -i ml-dsa || echo "NO ML-DSA in default provider"
140-
126+ # Linux x86_64 OpenSSL installs to lib64 by default; LD_LIBRARY_PATH
127+ # must include both lib and lib64 or the dynamic linker falls through
128+ # to the system libcrypto/libssl (Ubuntu 22.04 ships 3.0.2, which has
129+ # no ML-KEM/ML-DSA in the default provider).
141130 - name : Three-way PQC interop validation
142131 if : matrix.pqc == true
143132 run : |
144- LD_LIBRARY_PATH="$(pwd)/wolfssl-install/lib:$(pwd)/openssl-install/lib" \
133+ LD_LIBRARY_PATH="$(pwd)/wolfssl-install/lib:$(pwd)/openssl-install/lib:$(pwd)/openssl-install/lib64 " \
145134 ./test/pqc_interop.test
146135
147136 - name : Print errors on failure
0 commit comments