Package: src:golang-go.crypto
Version: 1:0.24.0-1
Severity: serious
Tags: ftbfs

Dear maintainer:

During a rebuild of all packages in unstable, your package failed to build:

--------------------------------------------------------------------------------
[...]
 debian/rules binary
dh binary --builddirectory=_build --buildsystem=golang
   dh_update_autotools_config -O--builddirectory=_build -O--buildsystem=golang
   dh_autoreconf -O--builddirectory=_build -O--buildsystem=golang
   dh_auto_configure -O--builddirectory=_build -O--buildsystem=golang
   debian/rules execute_after_dh_auto_configure
make[1]: Entering directory '/<<PKGBUILDDIR>>'
cp -av /<<PKGBUILDDIR>>/debian/go/src _build/src/golang.org/x/crypto/vendor
'/<<PKGBUILDDIR>>/debian/go/src' -> '_build/src/golang.org/x/crypto/vendor'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org/x' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org/x'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org/x/net' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org/x/net'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org/x/net/idna' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org/x/net/idna'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org/x/net/idna/example_test.go' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org/x/net/idna/example_test.go'

[... snipped ...]

        debug1: /tmp/sshtest4007812330/authorized_keys:4: matching key found: 
ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI

        debug1: /tmp/sshtest4007812330/authorized_keys:4: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding

        Accepted key ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI 
found at /tmp/sshtest4007812330/authorized_keys:4

        debug2: auth_check_authkeys_file: 
/tmp/sshtest4007812330/authorized_keys: processed 4/14 lines

        debug1: restore_uid: (unprivileged)

        debug1: auth_activate_options: setting new authentication options

        Accepted publickey for buildd from UNKNOWN port 65535 ssh2: ECDSA 
SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI

        debug1: monitor_child_preauth: user buildd authenticated by privileged 
process

=== RUN   TestClientAuthAlgorithms/ed25519
    test_unix_test.go:241: sshd:
        /tmp/sshtest2467372410/sshd_config line 10: Deprecated option 
KeyRegenerationInterval

        /tmp/sshtest2467372410/sshd_config line 11: Deprecated option 
ServerKeyBits

        /tmp/sshtest2467372410/sshd_config line 17: Deprecated option 
RSAAuthentication

        /tmp/sshtest2467372410/sshd_config line 22: Deprecated option 
RhostsRSAAuthentication

        Unable to load host key "/tmp/sshtest2467372410/id_dsa": invalid format

        Unable to load host key: /tmp/sshtest2467372410/id_dsa

        debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8

        rexec line 10: Deprecated option KeyRegenerationInterval

        rexec line 11: Deprecated option ServerKeyBits

        rexec line 17: Deprecated option RSAAuthentication

        rexec line 22: Deprecated option RhostsRSAAuthentication

        debug1: network sockets: 4, 5

        Connection from UNKNOWN port 65535 on /tmp/unixConnection4048871044/ssh 
port 65535

        debug1: Local version string SSH-2.0-OpenSSH_9.8p1 Debian-3

        debug1: Remote protocol version 2.0, remote software version Go

        debug1: compat_banner: no match: Go

        debug2: fd 4 setting O_NONBLOCK

        debug2: Network child is on pid 126249

        debug1: list_hostkey_types: 
rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-...@openssh.com,rsa-sha2-256-cert-...@openssh.com,ecdsa-sha2-nistp256
 [preauth]

        debug1: SSH2_MSG_KEXINIT sent [preauth]

        debug1: SSH2_MSG_KEXINIT received [preauth]

        debug2: local server KEXINIT proposal [preauth]

        debug2: KEX algorithms: 
sntrup761x25519-sha...@openssh.com,curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-s,kex-strict-s-...@openssh.com
 [preauth]

        debug2: host key algorithms: 
rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-...@openssh.com,rsa-sha2-256-cert-...@openssh.com,ecdsa-sha2-nistp256
 [preauth]

        debug2: ciphers ctos: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]

        debug2: ciphers stoc: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]

        debug2: MACs ctos: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]

        debug2: MACs stoc: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]

        debug2: compression ctos: none,z...@openssh.com [preauth]

        debug2: compression stoc: none,z...@openssh.com [preauth]

        debug2: languages ctos:  [preauth]

        debug2: languages stoc:  [preauth]

        debug2: first_kex_follows 0  [preauth]

        debug2: reserved 0  [preauth]

        debug2: peer client KEXINIT proposal [preauth]

        debug2: KEX algorithms: 
curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c,kex-strict-c-...@openssh.com
 [preauth]

        debug2: host key algorithms: 
ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss,ssh-ed25519
 [preauth]

        debug2: ciphers ctos: 
aes128-...@openssh.com,aes256-...@openssh.com,chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
 [preauth]

        debug2: ciphers stoc: 
aes128-...@openssh.com,aes256-...@openssh.com,chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
 [preauth]

        debug2: MACs ctos: 
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96
 [preauth]

        debug2: MACs stoc: 
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96
 [preauth]

        debug2: compression ctos: none [preauth]

        debug2: compression stoc: none [preauth]

        debug2: languages ctos:  [preauth]

        debug2: languages stoc:  [preauth]

        debug2: first_kex_follows 0  [preauth]

        debug2: reserved 0  [preauth]

        debug1: kex: algorithm: curve25519-sha256 [preauth]

        debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]

        debug1: kex: client->server cipher: aes128-...@openssh.com MAC: 
<implicit> compression: none [preauth]

        debug1: kex: server->client cipher: aes128-...@openssh.com MAC: 
<implicit> compression: none [preauth]

        debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]

        debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth]

        debug2: monitor_read: 6 used once, disabling now

        debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 [preauth]

        debug2: ssh_set_newkeys: mode 1 [preauth]

        debug1: rekey out after 4294967296 blocks [preauth]

        debug1: SSH2_MSG_NEWKEYS sent [preauth]

        debug1: Sending SSH2_MSG_EXT_INFO [preauth]

        debug1: expecting SSH2_MSG_NEWKEYS [preauth]

        debug1: ssh_packet_read_poll2: resetting read seqnr 3 [preauth]

        debug1: SSH2_MSG_NEWKEYS received [preauth]

        debug2: ssh_set_newkeys: mode 0 [preauth]

        debug1: rekey in after 4294967296 blocks [preauth]

        debug2: KEX algorithms: 
sntrup761x25519-sha...@openssh.com,curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-s,kex-strict-s-...@openssh.com
 [preauth]

        debug2: host key algorithms: 
rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-...@openssh.com,rsa-sha2-256-cert-...@openssh.com,ecdsa-sha2-nistp256
 [preauth]

        debug2: ciphers ctos: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]

        debug2: ciphers stoc: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]

        debug2: MACs ctos: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]

        debug2: MACs stoc: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]

        debug2: compression ctos: none,z...@openssh.com [preauth]

        debug2: compression stoc: none,z...@openssh.com [preauth]

        debug2: languages ctos:  [preauth]

        debug2: languages stoc:  [preauth]

        debug2: first_kex_follows 0  [preauth]

        debug2: reserved 0  [preauth]

        debug1: KEX done [preauth]

        debug1: userauth-request for user buildd service ssh-connection method 
none [preauth]

        debug1: attempt 0 failures 0 [preauth]

        debug2: parse_server_config_depth: config reprocess config len 688

        reprocess config line 17: Deprecated option RSAAuthentication

        reprocess config line 22: Deprecated option RhostsRSAAuthentication

        debug2: monitor_read: 8 used once, disabling now

        debug2: input_userauth_request: setting up authctxt for buildd [preauth]

        debug2: monitor_read: 4 used once, disabling now

        debug2: monitor_read: 10 used once, disabling now

        debug1: userauth_send_banner: sent [preauth]

        debug2: input_userauth_request: try method none [preauth]

        debug1: userauth-request for user buildd service ssh-connection method 
publickey [preauth]

        debug1: attempt 1 failures 0 [preauth]

        debug2: input_userauth_request: try method publickey [preauth]

        debug2: userauth_pubkey: valid user buildd querying public key 
ssh-ed25519 
AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ [preauth]

        debug1: userauth_pubkey: publickey test pkalg ssh-ed25519 pkblob 
ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw [preauth]

        debug1: temporarily_use_uid: 924/924 (e=924/924)

        debug1: trying public key file /tmp/sshtest2467372410/authorized_keys

        debug1: fd 6 clearing O_NONBLOCK

        debug2: /tmp/sshtest2467372410/authorized_keys:1: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:1: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:2: check options: 
'ecdsa-sha2-nistp521 
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:2: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:3: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:3: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:4: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:4: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:5: check options: 
'ecdsa-sha2-nistp384 
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:5: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:6: check options: 
'ecdsa-sha2-nistp521 
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:6: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:7: check options: 
'ecdsa-sha2-nistp384 
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:7: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:8: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:8: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:9: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:9: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:10: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:10: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:11: check options: 
'ssh-dss 
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
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:11: advance: 
'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
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:12: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:12: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:13: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:13: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/
        '

        debug1: /tmp/sshtest2467372410/authorized_keys:14: matching key found: 
ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw

        debug1: /tmp/sshtest2467372410/authorized_keys:14: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding

        Accepted key ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw 
found at /tmp/sshtest2467372410/authorized_keys:14

        debug2: auth_check_authkeys_file: 
/tmp/sshtest2467372410/authorized_keys: processed 14/14 lines

        debug1: restore_uid: (unprivileged)

        debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519 [preauth]

        Postponed publickey for buildd from UNKNOWN port 65535 ssh2 [preauth]

        debug1: userauth-request for user buildd service ssh-connection method 
publickey [preauth]

        debug1: attempt 2 failures 0 [preauth]

        debug2: input_userauth_request: try method publickey [preauth]

        debug2: userauth_pubkey: valid user buildd attempting public key 
ssh-ed25519 
AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ [preauth]

        debug1: temporarily_use_uid: 924/924 (e=924/924)

        debug1: trying public key file /tmp/sshtest2467372410/authorized_keys

        debug1: fd 6 clearing O_NONBLOCK

        debug2: /tmp/sshtest2467372410/authorized_keys:1: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:1: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:2: check options: 
'ecdsa-sha2-nistp521 
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:2: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:3: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:3: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:4: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:4: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:5: check options: 
'ecdsa-sha2-nistp384 
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:5: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:6: check options: 
'ecdsa-sha2-nistp521 
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:6: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:7: check options: 
'ecdsa-sha2-nistp384 
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:7: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:8: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:8: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:9: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:9: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:10: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:10: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:11: check options: 
'ssh-dss 
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
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:11: advance: 
'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
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:12: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:12: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:13: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:13: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/
        '

        debug1: /tmp/sshtest2467372410/authorized_keys:14: matching key found: 
ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw

        debug1: /tmp/sshtest2467372410/authorized_keys:14: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding

        Accepted key ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw 
found at /tmp/sshtest2467372410/authorized_keys:14

        debug2: auth_check_authkeys_file: 
/tmp/sshtest2467372410/authorized_keys: processed 14/14 lines

        debug1: restore_uid: (unprivileged)

        debug1: auth_activate_options: setting new authentication options

        Accepted publickey for buildd from UNKNOWN port 65535 ssh2: ED25519 
SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw

        debug1: monitor_child_preauth: user buildd authenticated by privileged 
process

--- PASS: TestClientAuthAlgorithms (0.11s)
    --- PASS: TestClientAuthAlgorithms/rsa (0.04s)
    --- PASS: TestClientAuthAlgorithms/ecdsa (0.04s)
    --- PASS: TestClientAuthAlgorithms/ed25519 (0.04s)
=== RUN   TestSSHCLIAuth
--- PASS: TestSSHCLIAuth (0.19s)
FAIL
FAIL    golang.org/x/crypto/ssh/test    2.679s
=== RUN   TestBlocksize
--- PASS: TestBlocksize (0.00s)
=== RUN   TestInvalidKeySize
--- PASS: TestInvalidKeySize (0.00s)
=== RUN   TestCipherEncrypt
--- PASS: TestCipherEncrypt (0.00s)
PASS
ok      golang.org/x/crypto/tea 0.002s
=== RUN   TestSbox
--- PASS: TestSbox (0.00s)
=== RUN   TestCipher
--- PASS: TestCipher (0.00s)
PASS
ok      golang.org/x/crypto/twofish     0.004s
=== RUN   TestParseCertData
=== RUN   TestParseCertData/valid_certs
=== RUN   TestParseCertData/cert_obj,_no_trust_obj
=== RUN   TestParseCertData/trust_obj,_no_cert_obj
=== RUN   TestParseCertData/missing_certificate_der
=== RUN   TestParseCertData/untrusted_cert_(cert)
=== RUN   TestParseCertData/untrusted_cert_(trust)
=== RUN   TestParseCertData/malformed_class
=== RUN   TestParseCertData/malformed_cert_octal
=== RUN   TestParseCertData/malformed_hash_octal
=== RUN   TestParseCertData/malformed_distrust_octal
--- PASS: TestParseCertData (0.00s)
    --- PASS: TestParseCertData/valid_certs (0.00s)
    --- PASS: TestParseCertData/cert_obj,_no_trust_obj (0.00s)
    --- PASS: TestParseCertData/trust_obj,_no_cert_obj (0.00s)
    --- PASS: TestParseCertData/missing_certificate_der (0.00s)
    --- PASS: TestParseCertData/untrusted_cert_(cert) (0.00s)
    --- PASS: TestParseCertData/untrusted_cert_(trust) (0.00s)
    --- PASS: TestParseCertData/malformed_class (0.00s)
    --- PASS: TestParseCertData/malformed_cert_octal (0.00s)
    --- PASS: TestParseCertData/malformed_hash_octal (0.00s)
    --- PASS: TestParseCertData/malformed_distrust_octal (0.00s)
PASS
ok      golang.org/x/crypto/x509roots/nss       0.004s
=== RUN   TestBlocksize
--- PASS: TestBlocksize (0.00s)
=== RUN   TestCipherInit
--- PASS: TestCipherInit (0.00s)
=== RUN   TestInvalidKeySize
--- PASS: TestInvalidKeySize (0.00s)
=== RUN   TestEncodeDecode
--- PASS: TestEncodeDecode (0.00s)
=== RUN   TestCipherEncrypt
--- PASS: TestCipherEncrypt (0.00s)
=== RUN   TestCipherDecrypt
--- PASS: TestCipherDecrypt (0.00s)
PASS
ok      golang.org/x/crypto/xtea        0.002s
=== RUN   TestXTS
--- PASS: TestXTS (0.00s)
=== RUN   TestShorterCiphertext
--- PASS: TestShorterCiphertext (0.00s)
PASS
ok      golang.org/x/crypto/xts 0.002s
FAIL
dh_auto_test: error: cd _build && go test -vet=off -v -p 2 
golang.org/x/crypto/acme golang.org/x/crypto/acme/autocert 
golang.org/x/crypto/acme/autocert/internal/acmetest 
golang.org/x/crypto/acme/internal/acmeprobe golang.org/x/crypto/argon2 
golang.org/x/crypto/bcrypt golang.org/x/crypto/blake2b golang.org/x/crypto/blake2s 
golang.org/x/crypto/blowfish golang.org/x/crypto/bn256 golang.org/x/crypto/cast5 
golang.org/x/crypto/chacha20 golang.org/x/crypto/chacha20poly1305 
golang.org/x/crypto/cryptobyte golang.org/x/crypto/cryptobyte/asn1 
golang.org/x/crypto/curve25519 golang.org/x/crypto/curve25519/internal/field 
golang.org/x/crypto/ed25519 golang.org/x/crypto/hkdf golang.org/x/crypto/internal/alias 
golang.org/x/crypto/internal/poly1305 golang.org/x/crypto/internal/testenv 
golang.org/x/crypto/internal/wycheproof 
golang.org/x/crypto/internal/wycheproof/internal/dsa golang.org/x/crypto/md4 
golang.org/x/crypto/nacl/auth golang.org/x/crypto/nacl/box 
golang.org/x/crypto/nacl/secretbox golang.org/x/crypto/nacl/sign 
golang.org/x/crypto/ocsp golang.org/x/crypto/openpgp golang.org/x/crypto/openpgp/armor 
golang.org/x/crypto/openpgp/clearsign golang.org/x/crypto/openpgp/elgamal 
golang.org/x/crypto/openpgp/errors golang.org/x/crypto/openpgp/packet 
golang.org/x/crypto/openpgp/s2k golang.org/x/crypto/otr golang.org/x/crypto/pbkdf2 
golang.org/x/crypto/pkcs12 golang.org/x/crypto/pkcs12/internal/rc2 
golang.org/x/crypto/poly1305 golang.org/x/crypto/ripemd160 golang.org/x/crypto/salsa20 
golang.org/x/crypto/salsa20/salsa golang.org/x/crypto/scrypt golang.org/x/crypto/sha3 
golang.org/x/crypto/ssh golang.org/x/crypto/ssh/agent 
golang.org/x/crypto/ssh/internal/bcrypt_pbkdf golang.org/x/crypto/ssh/knownhosts 
golang.org/x/crypto/ssh/terminal golang.org/x/crypto/ssh/test golang.org/x/crypto/tea 
golang.org/x/crypto/twofish golang.org/x/crypto/x509roots/fallback 
golang.org/x/crypto/x509roots/fallback/internal/goissue52287 
golang.org/x/crypto/x509roots/nss golang.org/x/crypto/xtea golang.org/x/crypto/xts 
returned exit code 1
make: *** [debian/rules:4: binary] Error 25
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------

The above is just how the build ends and not necessarily the most relevant part.
If required, the full build log is available here:

https://people.debian.org/~sanvila/build-logs/202408/

About the archive rebuild: The build was made on virtual machines
of type m6a.large and r6a.large from AWS, using sbuild and a
reduced chroot with only build-essential packages.

If you could not reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.

If this is really a bug in one of the build-depends, please use
reassign and affects, so that this is still visible in the BTS web
page for this package.

Thanks.

Reply via email to