Your message dated Sat, 12 Aug 2023 16:21:43 +0000
with message-id <e1qurn1-00e4ob...@fasolo.debian.org>
and subject line Bug#1006386: fixed in libcrypt-openssl-pkcs12-perl 1.9-2
has caused the Debian Bug report #1006386,
regarding libcrypt-openssl-pkcs12-perl: FTBFS with OpenSSL 3.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1006386: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006386
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libcrypt-openssl-pkcs12-perl
Version: 1.9-1
Severity: important
Tags: bookworm sid
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: ftbfs-3.0

Your package is failing to build using OpenSSL 3.0 with the
following error:

|    dh_auto_test
|       make -j1 test TEST_VERBOSE=1
| make[1]: Entering directory '/<<PKGBUILDDIR>>'
| "/usr/bin/perl" "-Iinc" -MExtUtils::Command::MM -e 'cp_nonempty' -- PKCS12.bs 
blib/arch/auto/Crypt/OpenSSL/PKCS12/PKCS12.bs 644
| PERL_DL_NONLAZY=1 "/usr/bin/perl" "-MExtUtils::Command::MM" "-MTest::Harness" 
"-e" "undef *Test::Harness::Switches; test_harness(1, 'inc', 'blib/lib', 
'blib/arch')" t/pkcs12-string.t t/pkcs12.t t/pod-coverage.t t/pod.t
| # Attempting to read certificate string from file certs/test.p12
| 
| #   Failed test 'PEM certificate created'
| #   at t/pkcs12-string.t line 86.
| # 
| 
| #   Failed test 'Asserting PEM key'
| #   at t/pkcs12-string.t line 90.
| # 
| PKCS12_newpass: testing foo
| 409751B0547F0000:error:0308010C:digital envelope 
routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:349:Global
 default library context, Algorithm (RC2-40-CBC : 0), Properties ()
| 409751B0547F0000:error:0308010C:digital envelope 
routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:349:Global
 default library context, Algorithm (RC2-40-CBC : 0), Properties ()
| 409751B0547F0000:error:0308010C:digital envelope 
routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:349:Global
 default library context, Algorithm (RC2-40-CBC : 0), Properties ()
| 409751B0547F0000:error:11800072:PKCS12 routines:PKCS12_newpass:parse 
error:../crypto/pkcs12/p12_npas.c:49:
| 
| #   Failed test 'Changing password'
| #   at t/pkcs12-string.t line 97.
| # 
| PKCS12_verify_mac: 
| # Looks like your test exited with 2 just after 23.
| # 
| t/pkcs12-string.t .. 
| 1..29
| ok 1 - use Crypt::OpenSSL::PKCS12;
| ok 2
| ok 3
| ok 4 - utf8 string refused new_from_string()
| ok 5
| ok 6 - utf8 string refused in new_from_string()
| ok 7
| ok 8
| ok 9
| ok 10
| ok 11
| ok 12
| ok 13
| ok 14
| ok 15
| ok 16
| ok 17
| ok 18 - PKCS object created
| not ok 19 - PEM certificate created
| not ok 20 - Asserting PEM key
| ok 21 - Asserting mac
| ok 22 - Asserting PKCS12 as string
| not ok 23 - Changing password
| Dubious, test returned 2 (wstat 512, 0x200)
| Failed 9/29 subtests 
| # Attempting to read certificate from certs/test.p12
| 
| #   Failed test 'PEM certificate created'
| #   at t/pkcs12.t line 24.
| 
| #   Failed test 'Asserting PEM key'
| #   at t/pkcs12.t line 28.
| PKCS12_newpass: testing foo
| 409770A45D7F0000:error:0308010C:digital envelope 
routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:349:Global
 default library context, Algorithm (RC2-40-CBC : 0), Properties ()
| 409770A45D7F0000:error:0308010C:digital envelope 
routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:349:Global
 default library context, Algorithm (RC2-40-CBC : 0), Properties ()
| 409770A45D7F0000:error:0308010C:digital envelope 
routines:inner_evp_generic_fetch:unsupported:../crypto/evp/evp_fetch.c:349:Global
 default library context, Algorithm (RC2-40-CBC : 0), Properties ()
| 409770A45D7F0000:error:11800072:PKCS12 routines:PKCS12_newpass:parse 
error:../crypto/pkcs12/p12_npas.c:49:
| 
| #   Failed test 'Changing password'
| #   at t/pkcs12.t line 35.
| PKCS12_verify_mac: 
| # Looks like your test exited with 2 just after 7.
| t/pkcs12.t ......... 
| 1..16
| ok 1 - use Crypt::OpenSSL::PKCS12;
| ok 2 - PKCS object created
| not ok 3 - PEM certificate created
| not ok 4 - Asserting PEM key
| ok 5 - Asserting mac
| ok 6 - Asserting PKCS12 as string
| not ok 7 - Changing password
| Dubious, test returned 2 (wstat 512, 0x200)
| Failed 12/16 subtests 
| t/pod-coverage.t ... 
| 1..1
| ok 1 - Crypt::OpenSSL::PKCS12 is covered
| ok
| t/pod.t ............ 
| 1..1
| ok 1 - POD test for blib/lib/Crypt/OpenSSL/PKCS12.pm
| ok
| 
| Test Summary Report
| -------------------
| t/pkcs12-string.t (Wstat: 512 Tests: 23 Failed: 3)
|   Failed tests:  19-20, 23
|   Non-zero exit status: 2
|   Parse errors: Bad plan.  You planned 29 tests but ran 23.
| t/pkcs12.t       (Wstat: 512 Tests: 7 Failed: 3)
|   Failed tests:  3-4, 7
|   Non-zero exit status: 2
|   Parse errors: Bad plan.  You planned 16 tests but ran 7.
| Files=4, Tests=32,  1 wallclock secs ( 0.02 usr  0.00 sys +  0.27 cusr  0.07 
csys =  0.36 CPU)
| Result: FAIL
| Failed 2/4 test programs. 6/32 subtests failed.
| make[1]: *** [Makefile:947: test_dynamic] Error 255

I tried with perl-openssl-defaults, libcrypt-openssl-bignum-perl,
libcrypt-openssl-random-perl, libcrypt-openssl-rsa-perl which were built
against openssl 3.0 but the build still failed.
 
For more information see:
https://www.openssl.org/docs/man3.0/man7/migration_guide.html

Sebastian

--- End Message ---
--- Begin Message ---
Source: libcrypt-openssl-pkcs12-perl
Source-Version: 1.9-2
Done: gregor herrmann <gre...@debian.org>

We believe that the bug you reported is fixed in the latest version of
libcrypt-openssl-pkcs12-perl, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1006...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
gregor herrmann <gre...@debian.org> (supplier of updated 
libcrypt-openssl-pkcs12-perl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 12 Aug 2023 17:49:54 +0200
Source: libcrypt-openssl-pkcs12-perl
Architecture: source
Version: 1.9-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <pkg-perl-maintain...@lists.alioth.debian.org>
Changed-By: gregor herrmann <gre...@debian.org>
Closes: 1006386
Changes:
 libcrypt-openssl-pkcs12-perl (1.9-2) unstable; urgency=medium
 .
   * Team upload.
   * Add patch from upstream pull request to fix tests with OpenSSL 3.
     (Closes: #1006386)
   * Handle the changed binary file for the tests from the pull request
     which can't be included in a quilt patch.
   * Add new test dependency libcrypt-openssl-guess-perl for the patched
     tests.
   * Use changed certs/test.p12 in autopkgtests as well.
   * Declare compliance with Debian Policy 4.6.2.
Checksums-Sha1:
 2ed2f16e8e0e25636b322f66d6924e23419ae048 2710 
libcrypt-openssl-pkcs12-perl_1.9-2.dsc
 85068d0c74661bda71dfaf5cea1ad8629dd8d290 7152 
libcrypt-openssl-pkcs12-perl_1.9-2.debian.tar.xz
Checksums-Sha256:
 d80f0b3424da2bf8fdf5f872a8fb0150b62388e4162d4257ed7a6c1002d131ac 2710 
libcrypt-openssl-pkcs12-perl_1.9-2.dsc
 d79197b5338a795c8800eeb74f124dd6e5bf68233c209e3c7df4a799f642078d 7152 
libcrypt-openssl-pkcs12-perl_1.9-2.debian.tar.xz
Files:
 93d384b9b76daa600f5feb07d90662b4 2710 perl optional 
libcrypt-openssl-pkcs12-perl_1.9-2.dsc
 fb1dfad49bb634585c1a81b86c278fa6 7152 perl optional 
libcrypt-openssl-pkcs12-perl_1.9-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEE0eExbpOnYKgQTYX6uzpoAYZJqgYFAmTXqp5fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEQx
RTEzMTZFOTNBNzYwQTgxMDREODVGQUJCM0E2ODAxODY0OUFBMDYACgkQuzpoAYZJ
qgZhdw/7B+tPd8x3EYuNI6/v0P5W7dWPAlzuPlOtBAJKhVf2hXlb8CWsm6cceMCl
c1WzrkhdTpd1Tug6xQbj4JKxF8iLbCi2xxchkI02GOpN+Phv2oZ0s+G9L4XPUI0Q
+3BkPW5TBKw/EPDbsn7Dg8NNkSVFlrdlOejRMUHf6t029wgRlaq+KNB7CEKH/tLS
Vog5fjccy8eVsjjUBghg0n5g7wH8pG2EMXWflQEzIXCNKelFK63cSwqJoopCV7e4
YlHCTWP7hMK4quI9tJXpei+cy2QndGOgpuoobFNDTs5Wxin8+BUoPXDAv24Jr3uk
HLflhgVJs7wXMCyyPE4RiUU0F0S3wN1NAmzvjsczQz5C7hck9ZRpHnPHMnOp4wDO
v1sLw9vFWSo79AzmL+jcTxc6joHD8eaE7IHKGYs+brO6b5rFi5dus5chVXiPcUS2
kteKLarc258jrr10XiYlHTRXzvHsFQk2Jl+BWCffVQp5Pj0Hmf1EHThnhicAZKJm
+RXMQNZ0C75INqQsp633J/j7+7vNt+8mpEyDurFNX/jx0Ldk2TAka8aBfdizQCHb
DKZwQZPxkQITf2qLCUgdG7bVACFYVlyfsA4ghCFsy8xI5D8EJhPJYJ2i/lRX9Ay0
PlCB7BHS4Tao9jQVoqtt5NxJyQd9ZFw79/ivjqs9MWsG7m6JeC8=
=oc3d
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to