Input buildinfo: https://buildinfos.debian.net/buildinfo-pool/n/node-trust-keyto/node-trust-keyto_0.3.7-1_all.buildinfo Use metasnap for getting required timestamps New buildinfo file: /tmp/node-trust-keyto-0.3.7-1x8dvvlan/node-trust-keyto_0.3.7-1_all.buildinfo Get source package info: node-trust-keyto=0.3.7-1 Source URL: http://snapshot.notset.fr/mr/package/node-trust-keyto/0.3.7-1/srcfiles?fileinfo=1 env -i PATH=/usr/sbin:/usr/bin:/sbin:/bin TMPDIR=/tmp mmdebstrap --arch=amd64 --include=autoconf=2.69-11 automake=1:1.16.1-4 autopoint=0.19.8.1-9 autotools-dev=20180224.1 base-files=11 base-passwd=3.5.46 bash=5.0-4 binutils=2.32.51.20190707-1 binutils-common=2.32.51.20190707-1 binutils-x86-64-linux-gnu=2.32.51.20190707-1 bsdmainutils=11.1.2+b1 bsdutils=1:2.33.1-0.1 build-essential=12.6 bzip2=1.0.6-9.2 chai=4.2.0+ds-3 coreutils=8.30-3 cpp=4:8.3.0-1 cpp-8=8.3.0-19 dash=0.5.10.2-5 debconf=1.5.72 debhelper=12.2 debianutils=4.8.6.2 dh-autoreconf=19 dh-strip-nondeterminism=1.2.0-2 diffutils=1:3.7-3 dpkg=1.19.7 dpkg-dev=1.19.7 dwz=0.12.20190711-1 fdisk=2.33.1-0.1 file=1:5.35-4 findutils=4.6.0+git+20190510-2 g++=4:8.3.0-1 g++-8=8.3.0-19 gcc=4:8.3.0-1 gcc-8=8.3.0-19 gcc-8-base=8.3.0-19 gcc-9-base=9.1.0-8 gettext=0.19.8.1-9 gettext-base=0.19.8.1-9 grep=3.3-1 groff-base=1.22.4-3 gzip=1.9-3 hicolor-icon-theme=0.17-2 hostname=3.21 init-system-helpers=1.57 intltool-debian=0.35.0+20060710.5 libacl1=2.2.53-4 libarchive-zip-perl=1.64-1 libasan5=9.1.0-8 libatomic1=9.1.0-8 libattr1=1:2.4.48-4 libaudit-common=1:2.8.5-1 libaudit1=1:2.8.5-1 libbinutils=2.32.51.20190707-1 libblkid1=2.33.1-0.1 libbsd0=0.9.1-2 libbz2-1.0=1.0.6-9.2 libc-ares2=1.14.0-1 libc-bin=2.28-10 libc-dev-bin=2.28-10 libc6=2.28-10 libc6-dev=2.28-10 libcap-ng0=0.7.9-2 libcc1-0=9.1.0-8 libcroco3=0.6.12-3 libdb5.3=5.3.28+dfsg1-0.6 libdebconfclient0=0.249 libdpkg-perl=1.19.7 libelf1=0.176-1.1 libfdisk1=2.33.1-0.1 libffi6=3.2.1-9 libfile-stripnondeterminism-perl=1.2.0-2 libgcc-8-dev=8.3.0-19 libgcc1=1:9.1.0-8 libgcrypt20=1.8.4-5 libgdbm-compat4=1.18.1-4 libgdbm6=1.18.1-4 libgdk-pixbuf2.0-0=2.38.1+dfsg-1 libgdk-pixbuf2.0-common=2.38.1+dfsg-1 libglib2.0-0=2.58.3-3 libgmp10=2:6.1.2+dfsg-4 libgomp1=9.1.0-8 libgpg-error0=1.36-3 libicu63=63.2-2 libisl19=0.20-2 libitm1=9.1.0-8 libjbig0=2.1-3.1+b2 libjpeg62-turbo=1:1.5.2-2+b1 libjs-chai=4.2.0+ds-3 libjs-inherits=2.0.3-1 libjs-util=0.10.3-2 liblsan0=9.1.0-8 liblua5.1-0=5.1.5-8.1+b3 liblz4-1=1.8.3-1 liblzma5=5.2.4-1 libmagic-mgc=1:5.35-4 libmagic1=1:5.35-4 libmonkey-patch-perl=0.03-2 libmount1=2.33.1-0.1 libmpc3=1.1.0-1 libmpfr6=4.0.2-1 libmpx2=8.3.0-19 libncurses6=6.1+20181013-2 libncursesw6=6.1+20181013-2 libnghttp2-14=1.37.0-1 libnode64=10.15.2~dfsg-2 libnotify-bin=0.7.7-4 libnotify4=0.7.7-4 libpam-modules=1.3.1-5 libpam-modules-bin=1.3.1-5 libpam-runtime=1.3.1-5 libpam0g=1.3.1-5 libpcre2-8-0=10.32-5 libpcre3=2:8.39-12 libperl5.28=5.28.1-6 libpipeline1=1.5.1-2 libpng16-16=1.6.37-1 libquadmath0=9.1.0-8 libseccomp2=2.3.3-4 libselinux1=2.9-2 libsigsegv2=2.12-2 libsmartcols1=2.33.1-0.1 libssl1.1=1.1.1c-1 libstdc++-8-dev=8.3.0-19 libstdc++6=9.1.0-8 libsub-delete-perl=1.00002-2 libsub-identify-perl=0.14-1+b1 libsuper-perl=1.20141117-1 libsystemd0=241-6+b1 libtiff5=4.0.10-4 libtinfo6=6.1+20181013-2 libtool=2.4.6-10 libtsan0=9.1.0-8 libubsan1=9.1.0-8 libuchardet0=0.0.6-3 libudev1=241-6+b1 libunistring2=0.9.10-2 libuuid1=2.33.1-0.1 libuv1=1.24.1-1 libwebp6=0.6.1-2 libx11-6=2:1.6.7-1 libx11-data=2:1.6.7-1 libxau6=1:1.0.8-1+b2 libxcb1=1.13.1-2 libxdmcp6=1:1.1.2-3 libxml2=2.9.4+dfsg1-7+b3 libyaml-0-2=0.2.1-1 libzstd1=1.3.8+dfsg-3 linux-libc-dev=4.19.37-5 login=1:4.7-1 m4=1.4.18-2 make=4.2.1-1.2 man-db=2.8.5-2 mawk=1.3.3-17+b3 mocha=4.1.0+ds3-5 ncurses-base=6.1+20181013-2 ncurses-bin=6.1+20181013-2 node-asn1.js=5.0.1-2 node-assert=1.4.1-1 node-assertion-error=1.0.2-1 node-balanced-match=0.4.2-1 node-base64url=3.0.1-2 node-bn.js=4.11.8-2 node-brace-expansion=1.1.8-1 node-brorand=1.1.0-2 node-browser-stdout=1.3.1-1 node-check-error=1.0.2-1 node-commander=2.12.2-3 node-concat-map=0.0.1-1 node-debug=3.1.0-2 node-deep-eql=4.0.0-1 node-diff=1.4.0~dfsg-1 node-elliptic=6.4.1~dfsg-1 node-escape-string-regexp=1.0.5-1 node-fs.realpath=1.0.0-1 node-get-func-name=2.0.0+dfsg-1 node-glob=7.1.3-2 node-growl=1.10.5-2 node-has-flag=2.0.0-1 node-hash.js=1.1.5-1 node-he=1.1.1-1 node-hmac-drbg=1.0.1-2 node-inflight=1.0.6-1 node-inherits=2.0.3-1 node-minimalistic-crypto-utils=1.0.1-2 node-minimatch=3.0.4-3 node-mkdirp=0.5.1-1 node-ms=2.1.1-1 node-once=1.4.0-3 node-path-is-absolute=1.0.0-1 node-pathval=1.1.0-3 node-supports-color=4.4.0-2 node-type-detect=4.0.0-1 node-util=0.10.3-2 node-wrappy=1.0.2-1 nodejs=10.15.2~dfsg-2 oxygen-icon-theme=5:5.54.0-1 pandoc=2.2.1-3+b2 pandoc-data=2.2.1-3 patch=2.7.6-4 perl=5.28.1-6 perl-base=5.28.1-6 perl-modules-5.28=5.28.1-6 po-debconf=1.0.21 sed=4.7-1 sensible-utils=0.0.12 shared-mime-info=1.10-1 sysvinit-utils=2.93-8 tar=1.30+dfsg-6 util-linux=2.33.1-0.1 xz-utils=5.2.4-1 zlib1g=1:1.2.11.dfsg-1 --variant=apt --aptopt=Acquire::Check-Valid-Until "false" --aptopt=Acquire::http::Dl-Limit "1000"; --aptopt=Acquire::https::Dl-Limit "1000"; --aptopt=Acquire::Retries "5"; --aptopt=APT::Get::allow-downgrades "true"; --keyring=/usr/share/keyrings/ --essential-hook=chroot "$1" sh -c "apt-get --yes install fakeroot util-linux" --essential-hook=copy-in /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-keyring.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg /usr/share/keyrings/debian-archive-stretch-automatic.gpg /usr/share/keyrings/debian-archive-stretch-security-automatic.gpg /usr/share/keyrings/debian-archive-stretch-stable.gpg /usr/share/keyrings/debian-ports-archive-keyring-removed.gpg /usr/share/keyrings/debian-ports-archive-keyring.gpg /usr/share/keyrings/debian-keyring.gpg /etc/apt/trusted.gpg.d/ --essential-hook=chroot "$1" sh -c "rm /etc/apt/sources.list && echo 'deb http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb-src http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb http://snapshot.notset.fr/archive/debian/20211008T205822Z/ unstable main deb http://snapshot.notset.fr/archive/debian/20190714T224154Z/ unstable main' >> /etc/apt/sources.list && apt-get update" --customize-hook=chroot "$1" useradd --no-create-home -d /nonexistent -p "" builduser -s /bin/bash --customize-hook=chroot "$1" env sh -c "apt-get source --only-source -d node-trust-keyto=0.3.7-1 && mkdir -p /build/node-trust-keyto-NSbwkh && dpkg-source --no-check -x /*.dsc /build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7 && chown -R builduser:builduser /build/node-trust-keyto-NSbwkh" --customize-hook=chroot "$1" env --unset=TMPDIR runuser builduser -c "cd /build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7 && env DEB_BUILD_OPTIONS="parallel=4" LANG="C.UTF-8" LC_ALL="C.UTF-8" SOURCE_DATE_EPOCH="1563154344" dpkg-buildpackage -uc -a amd64 --build=all" --customize-hook=sync-out /build/node-trust-keyto-NSbwkh /tmp/node-trust-keyto-0.3.7-1x8dvvlan bullseye /dev/null deb http://snapshot.notset.fr/archive/debian/20190714T224154Z unstable main I: automatically chosen mode: root I: chroot architecture amd64 is equal to the host's architecture I: automatically chosen format: tar I: using /tmp/mmdebstrap.KPKf_UhZo0 as tempdir I: running apt-get update... I: downloading packages with apt... I: extracting archives... I: installing essential packages... I: running --essential-hook in shell: sh -c 'chroot "$1" sh -c "apt-get --yes install fakeroot util-linux"' exec /tmp/mmdebstrap.KPKf_UhZo0 Reading package lists... Building dependency tree... util-linux is already the newest version (2.33.1-0.1). The following NEW packages will be installed: fakeroot libfakeroot 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. Need to get 132 kB of archives. After this operation, 373 kB of additional disk space will be used. Get:1 http://snapshot.notset.fr/archive/debian/20190714T224154Z unstable/main amd64 libfakeroot amd64 1.23-1 [45.9 kB] Get:2 http://snapshot.notset.fr/archive/debian/20190714T224154Z unstable/main amd64 fakeroot amd64 1.23-1 [85.8 kB] debconf: delaying package configuration, since apt-utils is not installed Fetched 132 kB in 0s (1166 kB/s) Selecting previously unselected package libfakeroot:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 4451 files and directories currently installed.) Preparing to unpack .../libfakeroot_1.23-1_amd64.deb ... Unpacking libfakeroot:amd64 (1.23-1) ... Selecting previously unselected package fakeroot. Preparing to unpack .../fakeroot_1.23-1_amd64.deb ... Unpacking fakeroot (1.23-1) ... Setting up libfakeroot:amd64 (1.23-1) ... Setting up fakeroot (1.23-1) ... update-alternatives: using /usr/bin/fakeroot-sysv to provide /usr/bin/fakeroot (fakeroot) in auto mode Processing triggers for libc-bin (2.28-10) ... I: running special hook: copy-in /usr/share/keyrings/debian-archive-bullseye-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-security-automatic.gpg /usr/share/keyrings/debian-archive-bullseye-stable.gpg /usr/share/keyrings/debian-archive-buster-automatic.gpg /usr/share/keyrings/debian-archive-buster-security-automatic.gpg /usr/share/keyrings/debian-archive-buster-stable.gpg /usr/share/keyrings/debian-archive-keyring.gpg /usr/share/keyrings/debian-archive-removed-keys.gpg /usr/share/keyrings/debian-archive-stretch-automatic.gpg /usr/share/keyrings/debian-archive-stretch-security-automatic.gpg /usr/share/keyrings/debian-archive-stretch-stable.gpg /usr/share/keyrings/debian-ports-archive-keyring-removed.gpg /usr/share/keyrings/debian-ports-archive-keyring.gpg /usr/share/keyrings/debian-keyring.gpg /etc/apt/trusted.gpg.d/ I: running --essential-hook in shell: sh -c 'chroot "$1" sh -c "rm /etc/apt/sources.list && echo 'deb http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb-src http://snapshot.notset.fr/archive/debian/20210814T212851Z/ bookworm main deb http://snapshot.notset.fr/archive/debian/20211008T205822Z/ unstable main deb http://snapshot.notset.fr/archive/debian/20190714T224154Z/ unstable main' >> /etc/apt/sources.list && apt-get update"' exec /tmp/mmdebstrap.KPKf_UhZo0 Get:1 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm InRelease [81.6 kB] Get:2 http://snapshot.notset.fr/archive/debian/20211008T205822Z unstable InRelease [165 kB] Hit:3 http://snapshot.notset.fr/archive/debian/20190714T224154Z unstable InRelease Ign:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources Ign:5 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages Ign:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources Ign:5 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages Ign:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources Ign:5 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages Get:4 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main Sources [11.4 MB] Get:5 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main amd64 Packages [11.1 MB] Ign:6 http://snapshot.notset.fr/archive/debian/20211008T205822Z unstable/main amd64 Packages Ign:6 http://snapshot.notset.fr/archive/debian/20211008T205822Z unstable/main amd64 Packages Ign:6 http://snapshot.notset.fr/archive/debian/20211008T205822Z unstable/main amd64 Packages Get:6 http://snapshot.notset.fr/archive/debian/20211008T205822Z unstable/main amd64 Packages [11.9 MB] Fetched 34.6 MB in 30s (1162 kB/s) Reading package lists... I: installing remaining packages inside the chroot... I: running --customize-hook in shell: sh -c 'chroot "$1" useradd --no-create-home -d /nonexistent -p "" builduser -s /bin/bash' exec /tmp/mmdebstrap.KPKf_UhZo0 I: running --customize-hook in shell: sh -c 'chroot "$1" env sh -c "apt-get source --only-source -d node-trust-keyto=0.3.7-1 && mkdir -p /build/node-trust-keyto-NSbwkh && dpkg-source --no-check -x /*.dsc /build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7 && chown -R builduser:builduser /build/node-trust-keyto-NSbwkh"' exec /tmp/mmdebstrap.KPKf_UhZo0 Reading package lists... NOTICE: 'node-trust-keyto' packaging is maintained in the 'Git' version control system at: https://salsa.debian.org/js-team/node-trust-keyto.git Please use: git clone https://salsa.debian.org/js-team/node-trust-keyto.git to retrieve the latest (possibly unreleased) updates to the package. Need to get 41.7 kB of source archives. Get:1 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main node-trust-keyto 0.3.7-1 (dsc) [2165 B] Get:2 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main node-trust-keyto 0.3.7-1 (tar) [35.2 kB] Get:3 http://snapshot.notset.fr/archive/debian/20210814T212851Z bookworm/main node-trust-keyto 0.3.7-1 (diff) [4336 B] Fetched 41.7 kB in 0s (923 kB/s) Download complete and in download only mode W: Download is performed unsandboxed as root as file 'node-trust-keyto_0.3.7-1.dsc' couldn't be accessed by user '_apt'. - pkgAcquire::Run (13: Permission denied) dpkg-source: info: extracting node-trust-keyto in /build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7 dpkg-source: info: unpacking node-trust-keyto_0.3.7.orig.tar.gz dpkg-source: info: unpacking node-trust-keyto_0.3.7-1.debian.tar.xz dpkg-source: info: using patch list from debian/patches/series dpkg-source: info: applying 2001_privacy.patch I: running --customize-hook in shell: sh -c 'chroot "$1" env --unset=TMPDIR runuser builduser -c "cd /build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7 && env DEB_BUILD_OPTIONS="parallel=4" LANG="C.UTF-8" LC_ALL="C.UTF-8" SOURCE_DATE_EPOCH="1563154344" dpkg-buildpackage -uc -a amd64 --build=all"' exec /tmp/mmdebstrap.KPKf_UhZo0 dpkg-buildpackage: info: source package node-trust-keyto dpkg-buildpackage: info: source version 0.3.7-1 dpkg-buildpackage: info: source distribution unstable dpkg-buildpackage: info: source changed by Jonas Smedegaard dpkg-source --before-build . debian/rules clean dh clean dh_clean debian/rules binary-indep dh binary-indep dh_update_autotools_config -i debian/rules override_dh_auto_build make[1]: Entering directory '/build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7' pandoc --from gfm-raw_html --to html --standalone --output README.html README.md [WARNING] This document format requires a nonempty element. Please specify either 'title' or 'pagetitle' in the metadata. Falling back to 'README' pandoc --from gfm-raw_html --to plain --output README.txt README.md dh override_dh_auto_build make[1]: Leaving directory '/build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7' debian/rules override_dh_auto_test make[1]: Entering directory '/build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7' NODE_ENV=test prove --verbose \ --exec "mocha --reporter=tap" \ test/*.js test/*/*.js test/*/*/*.js test/LibSpec.js ..................... 1..176 ok 1 keyto RSA publicPKCS8 should convert to publicPKCS1 ok 2 keyto RSA publicPKCS8 should convert to publicPKCS8 ok 3 keyto RSA publicPKCS8 should convert to publicJwk ok 4 keyto RSA publicPKCS8 should not convert to privatePKCS1 ok 5 keyto RSA publicPKCS8 should not convert to privatePKCS8 ok 6 keyto RSA publicPKCS8 should not convert to privateJwk ok 7 keyto RSA publicJwk should convert to publicPKCS1 ok 8 keyto RSA publicJwk should convert to publicPKCS8 ok 9 keyto RSA publicJwk should convert to publicJwk ok 10 keyto RSA publicJwk should not convert to privatePKCS1 ok 11 keyto RSA publicJwk should not convert to privatePKCS8 ok 12 keyto RSA publicJwk should not convert to privateJwk ok 13 keyto RSA privatePKCS1 should convert to publicPKCS1 ok 14 keyto RSA privatePKCS1 should convert to publicPKCS8 ok 15 keyto RSA privatePKCS1 should convert to publicJwk ok 16 keyto RSA privatePKCS1 should convert to privatePKCS1 ok 17 keyto RSA privatePKCS1 should convert to privatePKCS8 ok 18 keyto RSA privatePKCS1 should convert to privateJwk ok 19 keyto RSA privatePKCS8 should convert to publicPKCS1 ok 20 keyto RSA privatePKCS8 should convert to publicPKCS8 ok 21 keyto RSA privatePKCS8 should convert to publicJwk ok 22 keyto RSA privatePKCS8 should convert to privatePKCS1 ok 23 keyto RSA privatePKCS8 should convert to privatePKCS8 ok 24 keyto RSA privatePKCS8 should convert to privateJwk ok 25 keyto RSA privateJwk should convert to publicPKCS1 ok 26 keyto RSA privateJwk should convert to publicPKCS8 ok 27 keyto RSA privateJwk should convert to publicJwk ok 28 keyto RSA privateJwk should convert to privatePKCS1 ok 29 keyto RSA privateJwk should convert to privatePKCS8 ok 30 keyto RSA privateJwk should convert to privateJwk ok 31 keyto ECDSA secp256k1 publicPKCS8 should convert to publicPKCS1 ok 32 keyto ECDSA secp256k1 publicPKCS8 should convert to publicPKCS8 ok 33 keyto ECDSA secp256k1 publicPKCS8 should convert to publicJwk ok 34 keyto ECDSA secp256k1 publicPKCS8 should convert to publicHex ok 35 keyto ECDSA secp256k1 publicPKCS8 should not convert to privatePKCS1 ok 36 keyto ECDSA secp256k1 publicPKCS8 should not convert to privatePKCS8 ok 37 keyto ECDSA secp256k1 publicPKCS8 should not convert to privateJwk ok 38 keyto ECDSA secp256k1 publicPKCS8 should not convert to privateHex ok 39 keyto ECDSA secp256k1 publicJwk should convert to publicPKCS1 ok 40 keyto ECDSA secp256k1 publicJwk should convert to publicPKCS8 ok 41 keyto ECDSA secp256k1 publicJwk should convert to publicJwk ok 42 keyto ECDSA secp256k1 publicJwk should convert to publicHex ok 43 keyto ECDSA secp256k1 publicJwk should not convert to privatePKCS1 ok 44 keyto ECDSA secp256k1 publicJwk should not convert to privatePKCS8 ok 45 keyto ECDSA secp256k1 publicJwk should not convert to privateJwk ok 46 keyto ECDSA secp256k1 publicJwk should not convert to privateHex ok 47 keyto ECDSA secp256k1 publicHex should convert to publicPKCS1 ok 48 keyto ECDSA secp256k1 publicHex should convert to publicPKCS8 ok 49 keyto ECDSA secp256k1 publicHex should convert to publicJwk ok 50 keyto ECDSA secp256k1 publicHex should convert to publicHex ok 51 keyto ECDSA secp256k1 publicHex should not convert to privatePKCS1 ok 52 keyto ECDSA secp256k1 publicHex should not convert to privatePKCS8 ok 53 keyto ECDSA secp256k1 publicHex should not convert to privateJwk ok 54 keyto ECDSA secp256k1 publicHex should not convert to privateHex ok 55 keyto ECDSA secp256k1 privatePKCS1 should convert to publicPKCS1 ok 56 keyto ECDSA secp256k1 privatePKCS1 should convert to publicPKCS8 ok 57 keyto ECDSA secp256k1 privatePKCS1 should convert to publicJwk ok 58 keyto ECDSA secp256k1 privatePKCS1 should convert to publicHex ok 59 keyto ECDSA secp256k1 privatePKCS1 should convert to privatePKCS1 ok 60 keyto ECDSA secp256k1 privatePKCS1 should convert to privatePKCS8 ok 61 keyto ECDSA secp256k1 privatePKCS1 should convert to privateJwk ok 62 keyto ECDSA secp256k1 privatePKCS1 should convert to privateHex ok 63 keyto ECDSA secp256k1 privatePKCS8 should convert to publicPKCS1 ok 64 keyto ECDSA secp256k1 privatePKCS8 should convert to publicPKCS8 ok 65 keyto ECDSA secp256k1 privatePKCS8 should convert to publicJwk ok 66 keyto ECDSA secp256k1 privatePKCS8 should convert to publicHex ok 67 keyto ECDSA secp256k1 privatePKCS8 should convert to privatePKCS1 ok 68 keyto ECDSA secp256k1 privatePKCS8 should convert to privatePKCS8 ok 69 keyto ECDSA secp256k1 privatePKCS8 should convert to privateJwk ok 70 keyto ECDSA secp256k1 privatePKCS8 should convert to privateHex ok 71 keyto ECDSA secp256k1 privateJwk should convert to publicPKCS1 ok 72 keyto ECDSA secp256k1 privateJwk should convert to publicPKCS8 ok 73 keyto ECDSA secp256k1 privateJwk should convert to publicJwk ok 74 keyto ECDSA secp256k1 privateJwk should convert to publicHex ok 75 keyto ECDSA secp256k1 privateJwk should convert to privatePKCS1 ok 76 keyto ECDSA secp256k1 privateJwk should convert to privatePKCS8 ok 77 keyto ECDSA secp256k1 privateJwk should convert to privateJwk ok 78 keyto ECDSA secp256k1 privateJwk should convert to privateHex ok 79 keyto ECDSA secp256k1 privateHex should convert to publicPKCS1 ok 80 keyto ECDSA secp256k1 privateHex should convert to publicPKCS8 ok 81 keyto ECDSA secp256k1 privateHex should convert to publicJwk ok 82 keyto ECDSA secp256k1 privateHex should convert to publicHex ok 83 keyto ECDSA secp256k1 privateHex should convert to privatePKCS1 ok 84 keyto ECDSA secp256k1 privateHex should convert to privatePKCS8 ok 85 keyto ECDSA secp256k1 privateHex should convert to privateJwk ok 86 keyto ECDSA secp256k1 privateHex should convert to privateHex ok 87 keyto ECDSA prime256v1 publicPKCS8 should convert to publicPKCS1 ok 88 keyto ECDSA prime256v1 publicPKCS8 should convert to publicPKCS8 ok 89 keyto ECDSA prime256v1 publicPKCS8 should convert to publicJwk ok 90 keyto ECDSA prime256v1 publicPKCS8 should not convert to privatePKCS1 ok 91 keyto ECDSA prime256v1 publicPKCS8 should not convert to privatePKCS8 ok 92 keyto ECDSA prime256v1 publicPKCS8 should not convert to privateJwk ok 93 keyto ECDSA prime256v1 publicJwk should convert to publicPKCS1 ok 94 keyto ECDSA prime256v1 publicJwk should convert to publicPKCS8 ok 95 keyto ECDSA prime256v1 publicJwk should convert to publicJwk ok 96 keyto ECDSA prime256v1 publicJwk should not convert to privatePKCS1 ok 97 keyto ECDSA prime256v1 publicJwk should not convert to privatePKCS8 ok 98 keyto ECDSA prime256v1 publicJwk should not convert to privateJwk ok 99 keyto ECDSA prime256v1 privatePKCS1 should convert to publicPKCS1 ok 100 keyto ECDSA prime256v1 privatePKCS1 should convert to publicPKCS8 ok 101 keyto ECDSA prime256v1 privatePKCS1 should convert to publicJwk ok 102 keyto ECDSA prime256v1 privatePKCS1 should convert to privatePKCS1 ok 103 keyto ECDSA prime256v1 privatePKCS1 should convert to privatePKCS8 ok 104 keyto ECDSA prime256v1 privatePKCS1 should convert to privateJwk ok 105 keyto ECDSA prime256v1 privatePKCS8 should convert to publicPKCS1 ok 106 keyto ECDSA prime256v1 privatePKCS8 should convert to publicPKCS8 ok 107 keyto ECDSA prime256v1 privatePKCS8 should convert to publicJwk ok 108 keyto ECDSA prime256v1 privatePKCS8 should convert to privatePKCS1 ok 109 keyto ECDSA prime256v1 privatePKCS8 should convert to privatePKCS8 ok 110 keyto ECDSA prime256v1 privatePKCS8 should convert to privateJwk ok 111 keyto ECDSA prime256v1 privateJwk should convert to publicPKCS1 ok 112 keyto ECDSA prime256v1 privateJwk should convert to publicPKCS8 ok 113 keyto ECDSA prime256v1 privateJwk should convert to publicJwk ok 114 keyto ECDSA prime256v1 privateJwk should convert to privatePKCS1 ok 115 keyto ECDSA prime256v1 privateJwk should convert to privatePKCS8 ok 116 keyto ECDSA prime256v1 privateJwk should convert to privateJwk ok 117 keyto ECDSA secp384r1 publicPKCS8 should convert to publicPKCS1 ok 118 keyto ECDSA secp384r1 publicPKCS8 should convert to publicPKCS8 ok 119 keyto ECDSA secp384r1 publicPKCS8 should convert to publicJwk ok 120 keyto ECDSA secp384r1 publicPKCS8 should not convert to privatePKCS1 ok 121 keyto ECDSA secp384r1 publicPKCS8 should not convert to privatePKCS8 ok 122 keyto ECDSA secp384r1 publicPKCS8 should not convert to privateJwk ok 123 keyto ECDSA secp384r1 publicJwk should convert to publicPKCS1 ok 124 keyto ECDSA secp384r1 publicJwk should convert to publicPKCS8 ok 125 keyto ECDSA secp384r1 publicJwk should convert to publicJwk ok 126 keyto ECDSA secp384r1 publicJwk should not convert to privatePKCS1 ok 127 keyto ECDSA secp384r1 publicJwk should not convert to privatePKCS8 ok 128 keyto ECDSA secp384r1 publicJwk should not convert to privateJwk ok 129 keyto ECDSA secp384r1 privatePKCS1 should convert to publicPKCS1 ok 130 keyto ECDSA secp384r1 privatePKCS1 should convert to publicPKCS8 ok 131 keyto ECDSA secp384r1 privatePKCS1 should convert to publicJwk ok 132 keyto ECDSA secp384r1 privatePKCS1 should convert to privatePKCS1 ok 133 keyto ECDSA secp384r1 privatePKCS1 should convert to privatePKCS8 ok 134 keyto ECDSA secp384r1 privatePKCS1 should convert to privateJwk ok 135 keyto ECDSA secp384r1 privatePKCS8 should convert to publicPKCS1 ok 136 keyto ECDSA secp384r1 privatePKCS8 should convert to publicPKCS8 ok 137 keyto ECDSA secp384r1 privatePKCS8 should convert to publicJwk ok 138 keyto ECDSA secp384r1 privatePKCS8 should convert to privatePKCS1 ok 139 keyto ECDSA secp384r1 privatePKCS8 should convert to privatePKCS8 ok 140 keyto ECDSA secp384r1 privatePKCS8 should convert to privateJwk ok 141 keyto ECDSA secp384r1 privateJwk should convert to publicPKCS1 ok 142 keyto ECDSA secp384r1 privateJwk should convert to publicPKCS8 ok 143 keyto ECDSA secp384r1 privateJwk should convert to publicJwk ok 144 keyto ECDSA secp384r1 privateJwk should convert to privatePKCS1 ok 145 keyto ECDSA secp384r1 privateJwk should convert to privatePKCS8 ok 146 keyto ECDSA secp384r1 privateJwk should convert to privateJwk ok 147 keyto ECDSA secp521r1 publicPKCS8 should convert to publicPKCS1 ok 148 keyto ECDSA secp521r1 publicPKCS8 should convert to publicPKCS8 ok 149 keyto ECDSA secp521r1 publicPKCS8 should convert to publicJwk ok 150 keyto ECDSA secp521r1 publicPKCS8 should not convert to privatePKCS1 ok 151 keyto ECDSA secp521r1 publicPKCS8 should not convert to privatePKCS8 ok 152 keyto ECDSA secp521r1 publicPKCS8 should not convert to privateJwk ok 153 keyto ECDSA secp521r1 publicJwk should convert to publicPKCS1 ok 154 keyto ECDSA secp521r1 publicJwk should convert to publicPKCS8 ok 155 keyto ECDSA secp521r1 publicJwk should convert to publicJwk ok 156 keyto ECDSA secp521r1 publicJwk should not convert to privatePKCS1 ok 157 keyto ECDSA secp521r1 publicJwk should not convert to privatePKCS8 ok 158 keyto ECDSA secp521r1 publicJwk should not convert to privateJwk ok 159 keyto ECDSA secp521r1 privatePKCS1 should convert to publicPKCS1 ok 160 keyto ECDSA secp521r1 privatePKCS1 should convert to publicPKCS8 ok 161 keyto ECDSA secp521r1 privatePKCS1 should convert to publicJwk ok 162 keyto ECDSA secp521r1 privatePKCS1 should convert to privatePKCS1 ok 163 keyto ECDSA secp521r1 privatePKCS1 should convert to privatePKCS8 ok 164 keyto ECDSA secp521r1 privatePKCS1 should convert to privateJwk ok 165 keyto ECDSA secp521r1 privatePKCS8 should convert to publicPKCS1 ok 166 keyto ECDSA secp521r1 privatePKCS8 should convert to publicPKCS8 ok 167 keyto ECDSA secp521r1 privatePKCS8 should convert to publicJwk ok 168 keyto ECDSA secp521r1 privatePKCS8 should convert to privatePKCS1 ok 169 keyto ECDSA secp521r1 privatePKCS8 should convert to privatePKCS8 ok 170 keyto ECDSA secp521r1 privatePKCS8 should convert to privateJwk ok 171 keyto ECDSA secp521r1 privateJwk should convert to publicPKCS1 ok 172 keyto ECDSA secp521r1 privateJwk should convert to publicPKCS8 ok 173 keyto ECDSA secp521r1 privateJwk should convert to publicJwk ok 174 keyto ECDSA secp521r1 privateJwk should convert to privatePKCS1 ok 175 keyto ECDSA secp521r1 privateJwk should convert to privatePKCS8 ok 176 keyto ECDSA secp521r1 privateJwk should convert to privateJwk # tests 176 # pass 176 # fail 0 ok test/asn1/SupportedAsnTypesSpec.js .. skipped: (no reason given) test/keys/index.js .................. skipped: (no reason given) test/types/RSASpec.js ............... skipped: (no reason given) test/keys/ECDSA/K256.js ............. skipped: (no reason given) test/keys/ECDSA/P256.js ............. skipped: (no reason given) test/keys/ECDSA/P384.js ............. skipped: (no reason given) test/keys/ECDSA/P521.js ............. skipped: (no reason given) test/keys/RSA/RS256.js .............. skipped: (no reason given) All tests successful. Files=9, Tests=176, 24 wallclock secs ( 0.09 usr 0.01 sys + 17.05 cusr 1.11 csys = 18.26 CPU) Result: PASS make[1]: Leaving directory '/build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7' dh_testroot -i dh_prep -i dh_install -i debian/rules override_dh_installdocs make[1]: Entering directory '/build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7' dh_installdocs --all -- README.html README.txt make[1]: Leaving directory '/build/node-trust-keyto-NSbwkh/node-trust-keyto-0.3.7' dh_installchangelogs -i dh_perl -i dh_link -i dh_strip_nondeterminism -i dh_compress -i dh_fixperms -i dh_missing -i dh_installdeb -i dh_gencontrol -i dh_md5sums -i dh_builddeb -i dpkg-deb: building package 'node-trust-keyto' in '../node-trust-keyto_0.3.7-1_all.deb'. dpkg-genbuildinfo --build=all dpkg-genchanges --build=all >../node-trust-keyto_0.3.7-1_all.changes dpkg-genchanges: info: binary-only arch-indep upload (source code and arch-specific packages not included) dpkg-source --after-build . dpkg-buildpackage: info: binary-only upload (no source included) I: running special hook: sync-out /build/node-trust-keyto-NSbwkh /tmp/node-trust-keyto-0.3.7-1x8dvvlan I: cleaning package lists and apt cache... I: creating tarball... I: done I: removing tempdir /tmp/mmdebstrap.KPKf_UhZo0... I: success in 379.8891 seconds md5: node-trust-keyto_0.3.7-1_all.deb: OK sha1: node-trust-keyto_0.3.7-1_all.deb: OK sha256: node-trust-keyto_0.3.7-1_all.deb: OK Checksums: OK