Your message dated Sun, 12 Oct 2025 22:05:42 +0000
with message-id <[email protected]>
and subject line Bug#1117749: fixed in golang-go.crypto 1:0.43.0-1
has caused the Debian Bug report #1117749,
regarding golang-go.crypto: FTBFS: panic: invalid NewRequest arguments; parse
"http://[2602:d1:xxxx::c60a]:1234": invalid host:
ParseAddr("2602:d1:xxxx::c60a"): each colon-separated field must have at least
one digit (at "xxxx::c60a")
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1117749: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117749
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:golang-go.crypto
Version: 1:0.42.0-4
Severity: serious
Tags: ftbfs forky sid
Dear maintainer:
During a rebuild of all packages in unstable, this package failed to build.
Below you will find the last part of the build log (probably the most
relevant part, but not necessarily). If required, the full build log
is available here:
https://people.debian.org/~sanvila/build-logs/202510/
About the archive rebuild: The build was made on virtual machines from AWS,
using sbuild and a reduced chroot with only build-essential packages.
If you cannot reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.
If this is really a bug in one of the build-depends, please use
reassign and add an affects on src:golang-go.crypto, so that this is still
visible in the BTS web page for this package.
Thanks.
--------------------------------------------------------------------------------
[...]
debian/rules clean
dh clean --builddirectory=_build --buildsystem=golang
dh_auto_clean -O--builddirectory=_build -O--buildsystem=golang
dh_autoreconf_clean -O--builddirectory=_build -O--buildsystem=golang
dh_clean -O--builddirectory=_build -O--buildsystem=golang
debian/rules binary
dh binary --builddirectory=_build --buildsystem=golang
dh_update_autotools_config -O--builddirectory=_build -O--buildsystem=golang
dh_autoreconf -O--builddirectory=_build -O--buildsystem=golang
dh_auto_configure -O--builddirectory=_build -O--buildsystem=golang
debian/rules execute_after_dh_auto_configure
make[1]: Entering directory '/<<PKGBUILDDIR>>'
cp -av /<<PKGBUILDDIR>>/debian/go/src _build/src/golang.org/x/crypto/vendor
'/<<PKGBUILDDIR>>/debian/go/src' -> '_build/src/golang.org/x/crypto/vendor'
'/<<PKGBUILDDIR>>/debian/go/src/golang.org' ->
'_build/src/golang.org/x/crypto/vendor/golang.org'
[... snipped ...]
debug1: kex: server->client cipher: [email protected] MAC:
<implicit> compression: none [preauth]
debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth]
debug1: mm_answer_sign: hostkey ecdsa-sha2-nistp256 index 2
debug2: monitor_read: 6 used once, disabling now
debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 [preauth]
debug2: ssh_set_newkeys: mode 1 [preauth]
debug1: rekey out after 4294967296 blocks [preauth]
debug1: SSH2_MSG_NEWKEYS sent [preauth]
debug1: Sending SSH2_MSG_EXT_INFO [preauth]
debug1: expecting SSH2_MSG_NEWKEYS [preauth]
debug1: ssh_packet_read_poll2: resetting read seqnr 3 [preauth]
debug1: SSH2_MSG_NEWKEYS received [preauth]
debug2: ssh_set_newkeys: mode 0 [preauth]
debug1: rekey in after 4294967296 blocks [preauth]
debug2: KEX algorithms:
mlkem768x25519-sha256,sntrup761x25519-sha512,[email protected],curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,ext-info-s,[email protected]
[preauth]
debug2: host key algorithms:
rsa-sha2-512,rsa-sha2-256,[email protected],[email protected],ecdsa-sha2-nistp256
[preauth]
debug2: ciphers ctos:
[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr
[preauth]
debug2: ciphers stoc:
[email protected],[email protected],[email protected],aes128-ctr,aes192-ctr,aes256-ctr
[preauth]
debug2: MACs ctos:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
[preauth]
debug2: MACs stoc:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
[preauth]
debug2: compression ctos: none,[email protected] [preauth]
debug2: compression stoc: none,[email protected] [preauth]
debug2: languages ctos: [preauth]
debug2: languages stoc: [preauth]
debug2: first_kex_follows 0 [preauth]
debug2: reserved 0 [preauth]
debug1: KEX done [preauth]
debug1: userauth-request for user sbuild service ssh-connection method
none [preauth]
debug1: attempt 0 failures 0 [preauth]
debug2: parse_server_config_depth: config reprocess config len 1136
reprocess config line 16: Deprecated option RSAAuthentication
reprocess config line 21: Deprecated option RhostsRSAAuthentication
debug2: monitor_read: 8 used once, disabling now
debug2: input_userauth_request: setting up authctxt for sbuild [preauth]
debug2: monitor_read: 4 used once, disabling now
debug2: monitor_read: 10 used once, disabling now
debug1: userauth_send_banner: sent [preauth]
debug2: input_userauth_request: try method none [preauth]
debug1: userauth-request for user sbuild service ssh-connection method
publickey [preauth]
debug1: attempt 1 failures 0 [preauth]
debug2: input_userauth_request: try method publickey [preauth]
debug2: userauth_pubkey: valid user sbuild querying public key
rsa-sha2-256
AAAAB3NzaC1yc2EAAAADAQABAAABAQDBXVmDcypfbuchBA1Z3xXT0/irgXV/HsfbE0l0vdiDfL3UYUsn3b7QiIZXyfVUwYv/vU8+HPKoGlRhJOlaOJTYllJ8D6JODUYkFw5oQ4Dq+texO1dMdn/+Y5Ph2aW+4/j702p8IEsZc3tkmlP5qaQPwBVb1hb1A3eKljrVlbE9oChxWkN3ytWAlOTngq9o9ru3h105JANCrrVq5sgNHVnc/5eOQHimJY6xtyTcckv695MAvLXYLT20CHBSdlQBdL4OOHE4vGkNVyUX/JdiEC8G+yPDKT84Lf6cr0Xv32GlBmyPGZs/ug360bDPToFRwAqLu7tCy0Q2++TzlINnLWrV
[preauth]
debug1: userauth_pubkey: publickey test pkalg rsa-sha2-256 pkblob RSA
SHA256:SqYJgitz3EG8/9f1pMf1A2UV9Mlwix1byRaADkwFXb4 [preauth]
debug1: temporarily_use_uid: 999/999 (e=999/999)
debug1: restore_uid: (unprivileged)
debug1: temporarily_use_uid: 999/999 (e=999/999)
debug1: trying public key file /tmp/sshtest4034643696/authorized_keys
debug1: fd 8 clearing O_NONBLOCK
debug2: /tmp/sshtest4034643696/authorized_keys:1: check options:
'ecdsa-sha2-nistp256
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
'
debug2: /tmp/sshtest4034643696/authorized_keys:1: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFsvE8RnCB0YeVxqTuHRVXw43jWPlZILm0K3/3shSWR8QJ9Uiq2l1KiVI0yo9c+ttjsWLSeT+7PQnwBFbE8yws4=
'
debug2: /tmp/sshtest4034643696/authorized_keys:2: check options:
'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
'
debug2: /tmp/sshtest4034643696/authorized_keys:2: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADFuvLVUoaCDGHcw5uNfdRIsvaLKuWSpLsl48eWGZAwdNG432GDVKduO+pceuE+8XzcyJb+uMv+D2b11Q/LQUcHJwE6fqbm8m3EtDKPsoKs0u/XUJb0JsH4J8lkZzbUTjvGYamnFFlRjzoB3Oxu8UQgb+MWPedtH9XYBbg9biz4jJLkXQ==
'
debug2: /tmp/sshtest4034643696/authorized_keys:4: check options:
'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/
'
debug2: /tmp/sshtest4034643696/authorized_keys:4: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAID7d/uFLuDlRbBc4ZVOsx+GbHKuOrPtLHFvHsjWPwO+/
'
debug2: /tmp/sshtest4034643696/authorized_keys:7: check options:
'ssh-dss
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
'
debug2: /tmp/sshtest4034643696/authorized_keys:7: advance:
'AAAAB3NzaC1kc3MAAACBAPo8NITJeIj2N82z3ta4zjoxIMJiU6pbDzRqM3XoCiG0GdyzVgGUeT/91A68Jg6xhoT6A2LHaO2hGPBeEOxzbn8ipBtTVqFvuYHz+uxogtEYhsDlYfcSAW0mZcWi8PPeJ/oXpPO+EWkeAlGYthVHxyqx7MveERk6++zaIfsyiuTHAAAAFQCRw5w/NvpcYdn2+DzLCIml7nQLAQAAAIBBF/tD+Jo9Gfjdmq5SF3pbC+KupSP62Qi7p5XadlZiZcuWoVAoTLhN6OXtaTLOvY5Ji9tcvOjtM3EsqhaivqKmzSmFg88zJeV3XiuO6FPbgKuE7O4syEN24wOLTfbAMhkbhj4rsSVTw65+fxKPlaB7yvoA2aZWCYV/KesWF1gKeAAAAIEA3ucGJ93/Mx4q4eKRDxcWD3QzWyqpbRVRRV1Vmih9Ha/qC994nJFzDQIdjxDIT2Rk2AGzMqFEB68Zc3O+Wcsmz5eWWzEwFxaTwOGWTyDqsDRLm3fD+QYjnOwuxb0Kce+gWI8voWcqC9cyRm09jGzu2Ab3Bhtpg8JJ8L7gS3MRZK4=
'
debug2: /tmp/sshtest4034643696/authorized_keys:8: check options:
'ecdsa-sha2-nistp256
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
'
debug2: /tmp/sshtest4034643696/authorized_keys:8: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIvR3cOir2XFsX4NiA4QO1JKQ7c87emaiV0rBXS3fiseEt0seHFTvuv2Tl0Zz5jQJS1Ko0oVLFAQZ4BtLtn6hKg=
'
debug2: /tmp/sshtest4034643696/authorized_keys:9: check options:
'ecdsa-sha2-nistp384
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
'
debug2: /tmp/sshtest4034643696/authorized_keys:9: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBBZoMwB3QdR3xmJcJfuZgMOcLniDAf+cbjdWEJQRiYXscxmb8H1ifcaMWTepgQMS+4X/nb429QoEopotuHfYBbEy/SJtyhtrhzOEv36FZiFQP1chSXMxaJnbLp4ET091Eg==
'
debug2: /tmp/sshtest4034643696/authorized_keys:11: check options:
'ecdsa-sha2-nistp256
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
'
debug2: /tmp/sshtest4034643696/authorized_keys:11: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBI3kt38MXLwskrTKtaD5HKGrj+J8evJDIJB5PhRdIH5QZ1Fy3uRYDSEBFtNpIKH7xT8azk74iQM2hMpWyDEpQxA=
'
debug2: /tmp/sshtest4034643696/authorized_keys:12: check options:
'ecdsa-sha2-nistp384
AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
'
debug2: /tmp/sshtest4034643696/authorized_keys:12: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBNlvZXMQ+zY03+LWod10pNV/CgirdN895D+RxYG+4JUl8jKC+mb0x66xrAQ+4tIRfCI0N7D5gdn3Eci8WMKZmwu4Q7O6H230qi3Aznsf7s35EMXOEzaPyEBo65PlcMsp9Q==
'
debug2: /tmp/sshtest4034643696/authorized_keys:13: check options:
'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
'
debug2: /tmp/sshtest4034643696/authorized_keys:13: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAErMjdBKnVrZ7XMy6VmXW4UXVjYOe8tIjAS7zfuE5XV6lgSA294CEY2bntO4Gpi2dl5V93anNrPsIpfo3gHfc3VcAFDk2COLuUXZ1RuaE2omgyHjeKgixA0FoF6eGZGlg/p/mTw//slkwiwuGQmTaHKRvyZpJn4Hc9jA8w0F1K8/7SwdA==
'
debug2: /tmp/sshtest4034643696/authorized_keys:14: check options:
'ecdsa-sha2-nistp256
AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
'
debug2: /tmp/sshtest4034643696/authorized_keys:14: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGHDtsTSokVGDixBzO1WAKeexzcimznWLRw/N2eIczT1QuLTOZnRgzyy/CBML2LtsKvpaV3xkJzTG82H/YLKRtM=
'
debug2: auth_check_authkeys_file:
/tmp/sshtest4034643696/authorized_keys: processed 14/14 lines
debug1: restore_uid: (unprivileged)
Failed publickey for sbuild from UNKNOWN port 65535 ssh2: RSA
SHA256:SqYJgitz3EG8/9f1pMf1A2UV9Mlwix1byRaADkwFXb4
debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-256 [preauth]
maximum authentication attempts exceeded for sbuild from UNKNOWN port
65535 ssh2 [preauth]
Disconnecting authenticating user sbuild UNKNOWN port 65535: Too many
authentication failures [preauth]
debug2: sshpkt_disconnect: sending SSH2_MSG_DISCONNECT: Too many
authentication failures [preauth]
debug1: monitor_read_log: child log fd closed
debug1: mm_reap: child exited with status 255
debug1: do_cleanup
debug1: Killing privsep child 4873
debug1: audit_event: unhandled event 12
--- PASS: TestClientAuthDisconnect (0.27s)
=== RUN TestSSHCLIAuth
--- PASS: TestSSHCLIAuth (0.89s)
=== RUN TestSSHCLIKeyExchanges
=== RUN TestSSHCLIKeyExchanges/mlkem768x25519-sha256
=== RUN TestSSHCLIKeyExchanges/curve25519-sha256
=== RUN TestSSHCLIKeyExchanges/ecdh-sha2-nistp256
=== RUN TestSSHCLIKeyExchanges/ecdh-sha2-nistp384
=== RUN TestSSHCLIKeyExchanges/ecdh-sha2-nistp521
=== RUN TestSSHCLIKeyExchanges/diffie-hellman-group14-sha256
=== RUN TestSSHCLIKeyExchanges/diffie-hellman-group16-sha512
=== RUN TestSSHCLIKeyExchanges/diffie-hellman-group-exchange-sha256
=== RUN TestSSHCLIKeyExchanges/diffie-hellman-group14-sha1
=== RUN TestSSHCLIKeyExchanges/diffie-hellman-group1-sha1
=== RUN TestSSHCLIKeyExchanges/diffie-hellman-group-exchange-sha1
--- PASS: TestSSHCLIKeyExchanges (5.05s)
--- PASS: TestSSHCLIKeyExchanges/mlkem768x25519-sha256 (0.36s)
--- PASS: TestSSHCLIKeyExchanges/curve25519-sha256 (0.36s)
--- PASS: TestSSHCLIKeyExchanges/ecdh-sha2-nistp256 (0.42s)
--- PASS: TestSSHCLIKeyExchanges/ecdh-sha2-nistp384 (0.42s)
--- PASS: TestSSHCLIKeyExchanges/ecdh-sha2-nistp521 (0.48s)
--- PASS: TestSSHCLIKeyExchanges/diffie-hellman-group14-sha256 (0.48s)
--- PASS: TestSSHCLIKeyExchanges/diffie-hellman-group16-sha512 (0.61s)
--- PASS: TestSSHCLIKeyExchanges/diffie-hellman-group-exchange-sha256
(0.51s)
--- PASS: TestSSHCLIKeyExchanges/diffie-hellman-group14-sha1 (0.38s)
--- PASS: TestSSHCLIKeyExchanges/diffie-hellman-group1-sha1 (0.42s)
--- PASS: TestSSHCLIKeyExchanges/diffie-hellman-group-exchange-sha1 (0.60s)
FAIL
FAIL golang.org/x/crypto/ssh/test 15.170s
=== RUN TestBlocksize
--- PASS: TestBlocksize (0.00s)
=== RUN TestInvalidKeySize
--- PASS: TestInvalidKeySize (0.00s)
=== RUN TestCipherEncrypt
--- PASS: TestCipherEncrypt (0.00s)
PASS
ok golang.org/x/crypto/tea 0.003s
=== RUN TestSbox
--- PASS: TestSbox (0.00s)
=== RUN TestCipher
--- PASS: TestCipher (0.00s)
PASS
ok golang.org/x/crypto/twofish 0.003s
=== RUN TestBundle
--- PASS: TestBundle (0.00s)
PASS
ok golang.org/x/crypto/x509roots/fallback 0.009s
=== RUN TestParseCertData
=== RUN TestParseCertData/valid_certs
=== RUN TestParseCertData/cert_obj,_no_trust_obj
=== RUN TestParseCertData/trust_obj,_no_cert_obj
=== RUN TestParseCertData/missing_certificate_der
=== RUN TestParseCertData/untrusted_cert_(cert)
=== RUN TestParseCertData/untrusted_cert_(trust)
=== RUN TestParseCertData/malformed_class
=== RUN TestParseCertData/malformed_cert_octal
=== RUN TestParseCertData/malformed_hash_octal
=== RUN TestParseCertData/malformed_distrust_octal
--- PASS: TestParseCertData (0.00s)
--- PASS: TestParseCertData/valid_certs (0.00s)
--- PASS: TestParseCertData/cert_obj,_no_trust_obj (0.00s)
--- PASS: TestParseCertData/trust_obj,_no_cert_obj (0.00s)
--- PASS: TestParseCertData/missing_certificate_der (0.00s)
--- PASS: TestParseCertData/untrusted_cert_(cert) (0.00s)
--- PASS: TestParseCertData/untrusted_cert_(trust) (0.00s)
--- PASS: TestParseCertData/malformed_class (0.00s)
--- PASS: TestParseCertData/malformed_cert_octal (0.00s)
--- PASS: TestParseCertData/malformed_hash_octal (0.00s)
--- PASS: TestParseCertData/malformed_distrust_octal (0.00s)
PASS
ok golang.org/x/crypto/x509roots/nss 0.002s
=== RUN TestBlocksize
--- PASS: TestBlocksize (0.00s)
=== RUN TestCipherInit
--- PASS: TestCipherInit (0.00s)
=== RUN TestInvalidKeySize
--- PASS: TestInvalidKeySize (0.00s)
=== RUN TestEncodeDecode
--- PASS: TestEncodeDecode (0.00s)
=== RUN TestCipherEncrypt
--- PASS: TestCipherEncrypt (0.00s)
=== RUN TestCipherDecrypt
--- PASS: TestCipherDecrypt (0.00s)
PASS
ok golang.org/x/crypto/xtea 0.004s
=== RUN TestXTS
--- PASS: TestXTS (0.00s)
=== RUN TestShorterCiphertext
--- PASS: TestShorterCiphertext (0.00s)
PASS
ok golang.org/x/crypto/xts 0.005s
FAIL
dh_auto_test: error: cd _build && go test -vet=off -v -p 2 g
[too-long-redacted] crypto/xts returned exit code 1
make: *** [debian/rules:6: binary] Error 25
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------
--- End Message ---
--- Begin Message ---
Source: golang-go.crypto
Source-Version: 1:0.43.0-1
Done: Simon Josefsson <[email protected]>
We believe that the bug you reported is fixed in the latest version of
golang-go.crypto, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Simon Josefsson <[email protected]> (supplier of updated golang-go.crypto
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 12 Oct 2025 22:28:44 +0200
Source: golang-go.crypto
Architecture: source
Version: 1:0.43.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Go Packaging Team <[email protected]>
Changed-By: Simon Josefsson <[email protected]>
Closes: 1117749
Changes:
golang-go.crypto (1:0.43.0-1) unstable; urgency=medium
.
* Team upload.
* New upstream version 0.43.0. Closes: #1117749.
* Use new path to bundle.der.
* For self-tests, use ssh-agent -T.
* Skip TestAgentForward that fails with modern OpenSSH.
Checksums-Sha1:
91305a2fd683aff897084e1be16f2d9066af7262 2645 golang-go.crypto_0.43.0-1.dsc
48e3959cd6d8e78fe7a80d7f08ef79b568994a3e 1854072
golang-go.crypto_0.43.0.orig.tar.xz
0415cc19ab0d41fbd17dfceafc7278dc43aebcbb 93436
golang-go.crypto_0.43.0-1.debian.tar.xz
d27a63e996cb4cbf133a8c97d78c4e99cba70f3a 3330084
golang-go.crypto_0.43.0-1.git.tar.xz
aa2e7689bc71f0142754e8e0be6a9b2056ee13b7 18260
golang-go.crypto_0.43.0-1_source.buildinfo
Checksums-Sha256:
61ded51f1390c2330ab285149c769486f6cb2af3a8ac40600e50203c690d96de 2645
golang-go.crypto_0.43.0-1.dsc
dbdd91414f395b0063fdff3542ff9d9ce398a1246471df7918f6906e05a33c8e 1854072
golang-go.crypto_0.43.0.orig.tar.xz
2c467cecdf34710e923d3789e0f0e33048865123669425320536214994b4d6d1 93436
golang-go.crypto_0.43.0-1.debian.tar.xz
20dd7205f23b5136337eca6797804e7abe712635c9acf5d8f6ee6c2da551a6a1 3330084
golang-go.crypto_0.43.0-1.git.tar.xz
d533d71091f438afc7bc68401c434c1baa3ff2ac9d830ef09b19bc40c37b43c3 18260
golang-go.crypto_0.43.0-1_source.buildinfo
Files:
38873ee87e49b09e4ecc616b094dc484 2645 golang optional
golang-go.crypto_0.43.0-1.dsc
490094ac0f596dd3e866e7c94328781f 1854072 golang optional
golang-go.crypto_0.43.0.orig.tar.xz
daaeeba2cd5e20d74105f8b67544b8aa 93436 golang optional
golang-go.crypto_0.43.0-1.debian.tar.xz
b4aec0424c8e39a1889e152e519d5f5d 3330084 golang optional
golang-go.crypto_0.43.0-1.git.tar.xz
9d9620dc021d6328dc221b1a3f3f071b 18260 golang optional
golang-go.crypto_0.43.0-1_source.buildinfo
Git-Tag-Info: tag=de0f315948d8dccd3d8680b755ac70a063e64f87
fp=a3cc9c870b9d310abad4cf2f51722b08fe4745a2
Git-Tag-Tagger: Simon Josefsson <[email protected]>
-----BEGIN PGP SIGNATURE-----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=8ThY
-----END PGP SIGNATURE-----
pgpMpFA6wlWMS.pgp
Description: PGP signature
--- End Message ---