Your message dated Sat, 10 Aug 2024 09:36:55 +0000
with message-id <e1sciwt-008ve4...@fasolo.debian.org>
and subject line Bug#1078281: fixed in golang-go.crypto 1:0.24.0-2
has caused the Debian Bug report #1078281,
regarding golang-go.crypto: FTBFS: client_test.go:149: insert(*dsa.PrivateKey): 
agent: failure
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1078281: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078281
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:golang-go.crypto
Version: 1:0.24.0-1
Severity: serious
Tags: ftbfs

Dear maintainer:

During a rebuild of all packages in unstable, your package failed to build:

--------------------------------------------------------------------------------
[...]
 debian/rules binary
dh binary --builddirectory=_build --buildsystem=golang
   dh_update_autotools_config -O--builddirectory=_build -O--buildsystem=golang
   dh_autoreconf -O--builddirectory=_build -O--buildsystem=golang
   dh_auto_configure -O--builddirectory=_build -O--buildsystem=golang
   debian/rules execute_after_dh_auto_configure
make[1]: Entering directory '/<<PKGBUILDDIR>>'
cp -av /<<PKGBUILDDIR>>/debian/go/src _build/src/golang.org/x/crypto/vendor
'/<<PKGBUILDDIR>>/debian/go/src' -> '_build/src/golang.org/x/crypto/vendor'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org/x' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org/x'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org/x/net' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org/x/net'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org/x/net/idna' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org/x/net/idna'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org/x/net/idna/example_test.go' -> 
'_build/src/golang.org/x/crypto/vendor/golang.org/x/net/idna/example_test.go'

[... snipped ...]

        debug1: /tmp/sshtest4007812330/authorized_keys:4: matching key found: 
ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI

        debug1: /tmp/sshtest4007812330/authorized_keys:4: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding

        Accepted key ECDSA SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI 
found at /tmp/sshtest4007812330/authorized_keys:4

        debug2: auth_check_authkeys_file: 
/tmp/sshtest4007812330/authorized_keys: processed 4/14 lines

        debug1: restore_uid: (unprivileged)

        debug1: auth_activate_options: setting new authentication options

        Accepted publickey for buildd from UNKNOWN port 65535 ssh2: ECDSA 
SHA256:PsCW780uRQ7Gd9AEuC41tJmMyunRxzZdcGmuQn5ZRFI

        debug1: monitor_child_preauth: user buildd authenticated by privileged 
process

=== RUN   TestClientAuthAlgorithms/ed25519
    test_unix_test.go:241: sshd:
        /tmp/sshtest2467372410/sshd_config line 10: Deprecated option 
KeyRegenerationInterval

        /tmp/sshtest2467372410/sshd_config line 11: Deprecated option 
ServerKeyBits

        /tmp/sshtest2467372410/sshd_config line 17: Deprecated option 
RSAAuthentication

        /tmp/sshtest2467372410/sshd_config line 22: Deprecated option 
RhostsRSAAuthentication

        Unable to load host key "/tmp/sshtest2467372410/id_dsa": invalid format

        Unable to load host key: /tmp/sshtest2467372410/id_dsa

        debug1: rexec start in -1 out -1 newsock -1 pipe -1 sock 7/8

        rexec line 10: Deprecated option KeyRegenerationInterval

        rexec line 11: Deprecated option ServerKeyBits

        rexec line 17: Deprecated option RSAAuthentication

        rexec line 22: Deprecated option RhostsRSAAuthentication

        debug1: network sockets: 4, 5

        Connection from UNKNOWN port 65535 on /tmp/unixConnection4048871044/ssh 
port 65535

        debug1: Local version string SSH-2.0-OpenSSH_9.8p1 Debian-3

        debug1: Remote protocol version 2.0, remote software version Go

        debug1: compat_banner: no match: Go

        debug2: fd 4 setting O_NONBLOCK

        debug2: Network child is on pid 126249

        debug1: list_hostkey_types: 
rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-...@openssh.com,rsa-sha2-256-cert-...@openssh.com,ecdsa-sha2-nistp256
 [preauth]

        debug1: SSH2_MSG_KEXINIT sent [preauth]

        debug1: SSH2_MSG_KEXINIT received [preauth]

        debug2: local server KEXINIT proposal [preauth]

        debug2: KEX algorithms: 
sntrup761x25519-sha...@openssh.com,curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-s,kex-strict-s-...@openssh.com
 [preauth]

        debug2: host key algorithms: 
rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-...@openssh.com,rsa-sha2-256-cert-...@openssh.com,ecdsa-sha2-nistp256
 [preauth]

        debug2: ciphers ctos: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]

        debug2: ciphers stoc: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]

        debug2: MACs ctos: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]

        debug2: MACs stoc: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]

        debug2: compression ctos: none,z...@openssh.com [preauth]

        debug2: compression stoc: none,z...@openssh.com [preauth]

        debug2: languages ctos:  [preauth]

        debug2: languages stoc:  [preauth]

        debug2: first_kex_follows 0  [preauth]

        debug2: reserved 0  [preauth]

        debug2: peer client KEXINIT proposal [preauth]

        debug2: KEX algorithms: 
curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c,kex-strict-c-...@openssh.com
 [preauth]

        debug2: host key algorithms: 
ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss,ssh-ed25519
 [preauth]

        debug2: ciphers ctos: 
aes128-...@openssh.com,aes256-...@openssh.com,chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
 [preauth]

        debug2: ciphers stoc: 
aes128-...@openssh.com,aes256-...@openssh.com,chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
 [preauth]

        debug2: MACs ctos: 
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96
 [preauth]

        debug2: MACs stoc: 
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96
 [preauth]

        debug2: compression ctos: none [preauth]

        debug2: compression stoc: none [preauth]

        debug2: languages ctos:  [preauth]

        debug2: languages stoc:  [preauth]

        debug2: first_kex_follows 0  [preauth]

        debug2: reserved 0  [preauth]

        debug1: kex: algorithm: curve25519-sha256 [preauth]

        debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]

        debug1: kex: client->server cipher: aes128-...@openssh.com MAC: 
<implicit> compression: none [preauth]

        debug1: kex: server->client cipher: aes128-...@openssh.com MAC: 
<implicit> compression: none [preauth]

        debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]

        debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth]

        debug2: monitor_read: 6 used once, disabling now

        debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 [preauth]

        debug2: ssh_set_newkeys: mode 1 [preauth]

        debug1: rekey out after 4294967296 blocks [preauth]

        debug1: SSH2_MSG_NEWKEYS sent [preauth]

        debug1: Sending SSH2_MSG_EXT_INFO [preauth]

        debug1: expecting SSH2_MSG_NEWKEYS [preauth]

        debug1: ssh_packet_read_poll2: resetting read seqnr 3 [preauth]

        debug1: SSH2_MSG_NEWKEYS received [preauth]

        debug2: ssh_set_newkeys: mode 0 [preauth]

        debug1: rekey in after 4294967296 blocks [preauth]

        debug2: KEX algorithms: 
sntrup761x25519-sha...@openssh.com,curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-s,kex-strict-s-...@openssh.com
 [preauth]

        debug2: host key algorithms: 
rsa-sha2-512,rsa-sha2-256,rsa-sha2-512-cert-...@openssh.com,rsa-sha2-256-cert-...@openssh.com,ecdsa-sha2-nistp256
 [preauth]

        debug2: ciphers ctos: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]

        debug2: ciphers stoc: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]

        debug2: MACs ctos: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]

        debug2: MACs stoc: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]

        debug2: compression ctos: none,z...@openssh.com [preauth]

        debug2: compression stoc: none,z...@openssh.com [preauth]

        debug2: languages ctos:  [preauth]

        debug2: languages stoc:  [preauth]

        debug2: first_kex_follows 0  [preauth]

        debug2: reserved 0  [preauth]

        debug1: KEX done [preauth]

        debug1: userauth-request for user buildd service ssh-connection method 
none [preauth]

        debug1: attempt 0 failures 0 [preauth]

        debug2: parse_server_config_depth: config reprocess config len 688

        reprocess config line 17: Deprecated option RSAAuthentication

        reprocess config line 22: Deprecated option RhostsRSAAuthentication

        debug2: monitor_read: 8 used once, disabling now

        debug2: input_userauth_request: setting up authctxt for buildd [preauth]

        debug2: monitor_read: 4 used once, disabling now

        debug2: monitor_read: 10 used once, disabling now

        debug1: userauth_send_banner: sent [preauth]

        debug2: input_userauth_request: try method none [preauth]

        debug1: userauth-request for user buildd service ssh-connection method 
publickey [preauth]

        debug1: attempt 1 failures 0 [preauth]

        debug2: input_userauth_request: try method publickey [preauth]

        debug2: userauth_pubkey: valid user buildd querying public key 
ssh-ed25519 
AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ [preauth]

        debug1: userauth_pubkey: publickey test pkalg ssh-ed25519 pkblob 
ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw [preauth]

        debug1: temporarily_use_uid: 924/924 (e=924/924)

        debug1: trying public key file /tmp/sshtest2467372410/authorized_keys

        debug1: fd 6 clearing O_NONBLOCK

        debug2: /tmp/sshtest2467372410/authorized_keys:1: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:1: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:2: check options: 
'ecdsa-sha2-nistp521 
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:2: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:3: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:3: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:4: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:4: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:5: check options: 
'ecdsa-sha2-nistp384 
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:5: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:6: check options: 
'ecdsa-sha2-nistp521 
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:6: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:7: check options: 
'ecdsa-sha2-nistp384 
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:7: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:8: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:8: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:9: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:9: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:10: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:10: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:11: check options: 
'ssh-dss 
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
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:11: advance: 
'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
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:12: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:12: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:13: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:13: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/
        '

        debug1: /tmp/sshtest2467372410/authorized_keys:14: matching key found: 
ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw

        debug1: /tmp/sshtest2467372410/authorized_keys:14: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding

        Accepted key ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw 
found at /tmp/sshtest2467372410/authorized_keys:14

        debug2: auth_check_authkeys_file: 
/tmp/sshtest2467372410/authorized_keys: processed 14/14 lines

        debug1: restore_uid: (unprivileged)

        debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519 [preauth]

        Postponed publickey for buildd from UNKNOWN port 65535 ssh2 [preauth]

        debug1: userauth-request for user buildd service ssh-connection method 
publickey [preauth]

        debug1: attempt 2 failures 0 [preauth]

        debug2: input_userauth_request: try method publickey [preauth]

        debug2: userauth_pubkey: valid user buildd attempting public key 
ssh-ed25519 
AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/ [preauth]

        debug1: temporarily_use_uid: 924/924 (e=924/924)

        debug1: trying public key file /tmp/sshtest2467372410/authorized_keys

        debug1: fd 6 clearing O_NONBLOCK

        debug2: /tmp/sshtest2467372410/authorized_keys:1: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:1: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:2: check options: 
'ecdsa-sha2-nistp521 
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:2: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:3: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:3: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQC+D11D0hEbn2Vglv4YRJ8pZNyHjIGmvth3DWOQrq++2vH2MujmGQDxfr4SVE9GpMBlKU3lwGbpgIBxAg6yZcNSfo6PWVU9ACg6NMFO+yMzc2MaG+/naQdNjSewywF5j2rkNO2XOaViRVSrZroe2B/aY2LTV0jDl8nu5NOjwRs1/s7SLe5z1rw/X0dpmXk0qJY3gQhmR8HZZ1dhEkJUGwaBCPd0T8asSYf1Ag2rUD4aQ28r3q69mbwfWOOa6rMemVZruUV5dzHwVNVNtVv+ImtnYtz8m8g+K0plaGptHn3KsaOnASkh3tujhaE7kvc4HR9Igli9+76jhZie3h/dTN5z
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:4: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:4: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:5: check options: 
'ecdsa-sha2-nistp384 
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:5: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:6: check options: 
'ecdsa-sha2-nistp521 
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:6: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:7: check options: 
'ecdsa-sha2-nistp384 
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:7: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:8: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:8: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:9: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:9: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQCitzS2KiRQTccfVApb0mbPpo1lt29JjeLBYAehXHWfQ+w8sXpd8e04n/020spx1R94yg+v0NjXyh2RNFXNBYdhNei33VJxUeKNlExaecvW2yxfuZqka+ZxT1aI8zrAsjh3Rwc6wayAJS4RwZuzlDv4jZitWqwD+mb/22Zwq/WSs4YX5dUHDklfdWSVnoBfue8K/00n8f5yMTdJvFF0qAJwf9spPEHla0lYcozJk64CO5lRkqfLor4UnsXXOiA7aRIoaUSKa+rlhiqt1EMGYiBjblPt4SwMelGGU2UfywPb4d85gpQ/s8SBARbpPxNVs2IbHDMwj70P3uZc74M3c4VJ
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:10: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:10: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAAAgQDBrjzJ9YWLe4h2rO5/1fsLZnF95r8hprDTMjAe52kXxT3ZZUiILmWgS5bX45pWLdRZ8gSNYxXW0cbKysc7C3BzfgE8ImomSdRA78q0NMFMng+vKHDVtY8L330vNr7KsJN01BgHOhE5coTFmA8WH2lMyLnCqkcO45DapkUgQjeVPQ==
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:11: check options: 
'ssh-dss 
AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:11: advance: 
'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
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:12: check options: 
'ecdsa-sha2-nistp256 
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:12: advance: 
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:13: check options: 
'ssh-rsa 
AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/
        '

        debug2: /tmp/sshtest2467372410/authorized_keys:13: advance: 
'AAAAB3NzaC1yc2EAAAADAQABAAABAQCe6jMoy1xCQgiZkZJ7gi6NLj4uRqz2OaUGK/OJYZTfBqK+SlS9iymAluHu9K+cc4+0qxx0gn7dRTJWINSgzvca6ayYe995EKgD1hE5krh9BH0bRrXB+hGqyslcZOgLNO+v8jYojClQbRtET2tS+xb4k33GCuL5wgla2790ZgOQgs7huQUjG0S8c1W+EYt6fI4cWE/DeEBnv9sqryS8rOb0PbM6WUd7XBadwySFWYQUX0ei56GNt12Z4gADEGlFQV/OnV0PvnTcAMGUl0rfToPgJ4jgogWKoTVWuZ9wyA/x+2LRLRvgm2a969ig937/AH0i0Wq+FzqfK7EXQ99Yf5K/
        '

        debug1: /tmp/sshtest2467372410/authorized_keys:14: matching key found: 
ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw

        debug1: /tmp/sshtest2467372410/authorized_keys:14: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding

        Accepted key ED25519 SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw 
found at /tmp/sshtest2467372410/authorized_keys:14

        debug2: auth_check_authkeys_file: 
/tmp/sshtest2467372410/authorized_keys: processed 14/14 lines

        debug1: restore_uid: (unprivileged)

        debug1: auth_activate_options: setting new authentication options

        Accepted publickey for buildd from UNKNOWN port 65535 ssh2: ED25519 
SHA256:mV1mPX4S6TE+odyfWDXGrC5fvQbLh+w8o2NK3q2MmYw

        debug1: monitor_child_preauth: user buildd authenticated by privileged 
process

--- PASS: TestClientAuthAlgorithms (0.11s)
    --- PASS: TestClientAuthAlgorithms/rsa (0.04s)
    --- PASS: TestClientAuthAlgorithms/ecdsa (0.04s)
    --- PASS: TestClientAuthAlgorithms/ed25519 (0.04s)
=== RUN   TestSSHCLIAuth
--- PASS: TestSSHCLIAuth (0.19s)
FAIL
FAIL    golang.org/x/crypto/ssh/test    2.679s
=== RUN   TestBlocksize
--- PASS: TestBlocksize (0.00s)
=== RUN   TestInvalidKeySize
--- PASS: TestInvalidKeySize (0.00s)
=== RUN   TestCipherEncrypt
--- PASS: TestCipherEncrypt (0.00s)
PASS
ok      golang.org/x/crypto/tea 0.002s
=== RUN   TestSbox
--- PASS: TestSbox (0.00s)
=== RUN   TestCipher
--- PASS: TestCipher (0.00s)
PASS
ok      golang.org/x/crypto/twofish     0.004s
=== RUN   TestParseCertData
=== RUN   TestParseCertData/valid_certs
=== RUN   TestParseCertData/cert_obj,_no_trust_obj
=== RUN   TestParseCertData/trust_obj,_no_cert_obj
=== RUN   TestParseCertData/missing_certificate_der
=== RUN   TestParseCertData/untrusted_cert_(cert)
=== RUN   TestParseCertData/untrusted_cert_(trust)
=== RUN   TestParseCertData/malformed_class
=== RUN   TestParseCertData/malformed_cert_octal
=== RUN   TestParseCertData/malformed_hash_octal
=== RUN   TestParseCertData/malformed_distrust_octal
--- PASS: TestParseCertData (0.00s)
    --- PASS: TestParseCertData/valid_certs (0.00s)
    --- PASS: TestParseCertData/cert_obj,_no_trust_obj (0.00s)
    --- PASS: TestParseCertData/trust_obj,_no_cert_obj (0.00s)
    --- PASS: TestParseCertData/missing_certificate_der (0.00s)
    --- PASS: TestParseCertData/untrusted_cert_(cert) (0.00s)
    --- PASS: TestParseCertData/untrusted_cert_(trust) (0.00s)
    --- PASS: TestParseCertData/malformed_class (0.00s)
    --- PASS: TestParseCertData/malformed_cert_octal (0.00s)
    --- PASS: TestParseCertData/malformed_hash_octal (0.00s)
    --- PASS: TestParseCertData/malformed_distrust_octal (0.00s)
PASS
ok      golang.org/x/crypto/x509roots/nss       0.004s
=== RUN   TestBlocksize
--- PASS: TestBlocksize (0.00s)
=== RUN   TestCipherInit
--- PASS: TestCipherInit (0.00s)
=== RUN   TestInvalidKeySize
--- PASS: TestInvalidKeySize (0.00s)
=== RUN   TestEncodeDecode
--- PASS: TestEncodeDecode (0.00s)
=== RUN   TestCipherEncrypt
--- PASS: TestCipherEncrypt (0.00s)
=== RUN   TestCipherDecrypt
--- PASS: TestCipherDecrypt (0.00s)
PASS
ok      golang.org/x/crypto/xtea        0.002s
=== RUN   TestXTS
--- PASS: TestXTS (0.00s)
=== RUN   TestShorterCiphertext
--- PASS: TestShorterCiphertext (0.00s)
PASS
ok      golang.org/x/crypto/xts 0.002s
FAIL
dh_auto_test: error: cd _build && go test -vet=off -v -p 2 
golang.org/x/crypto/acme golang.org/x/crypto/acme/autocert 
golang.org/x/crypto/acme/autocert/internal/acmetest 
golang.org/x/crypto/acme/internal/acmeprobe golang.org/x/crypto/argon2 
golang.org/x/crypto/bcrypt golang.org/x/crypto/blake2b golang.org/x/crypto/blake2s 
golang.org/x/crypto/blowfish golang.org/x/crypto/bn256 golang.org/x/crypto/cast5 
golang.org/x/crypto/chacha20 golang.org/x/crypto/chacha20poly1305 
golang.org/x/crypto/cryptobyte golang.org/x/crypto/cryptobyte/asn1 
golang.org/x/crypto/curve25519 golang.org/x/crypto/curve25519/internal/field 
golang.org/x/crypto/ed25519 golang.org/x/crypto/hkdf golang.org/x/crypto/internal/alias 
golang.org/x/crypto/internal/poly1305 golang.org/x/crypto/internal/testenv 
golang.org/x/crypto/internal/wycheproof 
golang.org/x/crypto/internal/wycheproof/internal/dsa golang.org/x/crypto/md4 
golang.org/x/crypto/nacl/auth golang.org/x/crypto/nacl/box 
golang.org/x/crypto/nacl/secretbox golang.org/x/crypto/nacl/sign 
golang.org/x/crypto/ocsp golang.org/x/crypto/openpgp golang.org/x/crypto/openpgp/armor 
golang.org/x/crypto/openpgp/clearsign golang.org/x/crypto/openpgp/elgamal 
golang.org/x/crypto/openpgp/errors golang.org/x/crypto/openpgp/packet 
golang.org/x/crypto/openpgp/s2k golang.org/x/crypto/otr golang.org/x/crypto/pbkdf2 
golang.org/x/crypto/pkcs12 golang.org/x/crypto/pkcs12/internal/rc2 
golang.org/x/crypto/poly1305 golang.org/x/crypto/ripemd160 golang.org/x/crypto/salsa20 
golang.org/x/crypto/salsa20/salsa golang.org/x/crypto/scrypt golang.org/x/crypto/sha3 
golang.org/x/crypto/ssh golang.org/x/crypto/ssh/agent 
golang.org/x/crypto/ssh/internal/bcrypt_pbkdf golang.org/x/crypto/ssh/knownhosts 
golang.org/x/crypto/ssh/terminal golang.org/x/crypto/ssh/test golang.org/x/crypto/tea 
golang.org/x/crypto/twofish golang.org/x/crypto/x509roots/fallback 
golang.org/x/crypto/x509roots/fallback/internal/goissue52287 
golang.org/x/crypto/x509roots/nss golang.org/x/crypto/xtea golang.org/x/crypto/xts 
returned exit code 1
make: *** [debian/rules:4: binary] Error 25
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------

The above is just how the build ends and not necessarily the most relevant part.
If required, the full build log is available here:

https://people.debian.org/~sanvila/build-logs/202408/

About the archive rebuild: The build was made on virtual machines
of type m6a.large and r6a.large from AWS, using sbuild and a
reduced chroot with only build-essential packages.

If you could not reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.

If this is really a bug in one of the build-depends, please use
reassign and affects, so that this is still visible in the BTS web
page for this package.

Thanks.

--- End Message ---
--- Begin Message ---
Source: golang-go.crypto
Source-Version: 1:0.24.0-2
Done: Anthony Fok <f...@debian.org>

We believe that the bug you reported is fixed in the latest version of
golang-go.crypto, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1078...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anthony Fok <f...@debian.org> (supplier of updated golang-go.crypto package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 10 Aug 2024 02:57:23 -0600
Source: golang-go.crypto
Architecture: source
Version: 1:0.24.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Go Packaging Team <team+pkg...@tracker.debian.org>
Changed-By: Anthony Fok <f...@debian.org>
Closes: 1078281
Changes:
 golang-go.crypto (1:0.24.0-2) unstable; urgency=medium
 .
   * Bump to golang-golang-x-text-dev (>= 0.16.0) as per go.mod
   * Apply patch "ssh: don't use dsa keys in integration tests"
     by Nicola Murino in commit bb80217080b0e04c6e73e5dcd9f3a9bb11fe23f6
     dated 2024-07-21: "DSA has been disabled by default since OpenSSH 9.8,
     so tests fail with newer versions of OpenSSH".  Fixes FTBFS:
     "client_test.go:149: insert(*dsa.PrivateKey): agent: failure".
     Thanks to Santiago Vila for bringing this to my attention!
     (Closes: #1078281)
Checksums-Sha1:
 7e9f8ef0e9e82cd1f9bff3c00ecbb9a37a4b0a8a 2377 golang-go.crypto_0.24.0-2.dsc
 a2546c5991e0c6f9f0cf3c07a5e216dd9060d495 91908 
golang-go.crypto_0.24.0-2.debian.tar.xz
 0fea4e16f41038c20ceac4e22429453941f4824d 6951 
golang-go.crypto_0.24.0-2_amd64.buildinfo
Checksums-Sha256:
 3eac1685f94a36ea3bba9838818fa37c580cfbef9cfd422c776d23481965c9a4 2377 
golang-go.crypto_0.24.0-2.dsc
 4ae1c3530a7d4011178fa8d295fc0aaea096923657bafec4f596a92afc73df10 91908 
golang-go.crypto_0.24.0-2.debian.tar.xz
 5673b3b885ada4139850d12ec0b0a7f94ac255144dac7aedc998ea0a4b58418b 6951 
golang-go.crypto_0.24.0-2_amd64.buildinfo
Files:
 9cb4985681835458325ce8c1304af6bc 2377 golang optional 
golang-go.crypto_0.24.0-2.dsc
 939bd91a5e712b480dfb17e84c68c94d 91908 golang optional 
golang-go.crypto_0.24.0-2.debian.tar.xz
 dbe99b45ec1a54ef8331bba849a5d294 6951 golang optional 
golang-go.crypto_0.24.0-2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=0qd7
-----END PGP SIGNATURE-----

Attachment: pgpvfRWXzSSg6.pgp
Description: PGP signature


--- End Message ---

Reply via email to