Bug#828371: lastpass-cli: diff for NMU version 1.0.0-1.1

2016-12-06 Thread Sebastian Andrzej Siewior
against openssl 1.1.0 (Closes: #828371). + + -- Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Tue, 06 Dec 2016 21:10:47 +0100 + lastpass-cli (1.0.0-1) unstable; urgency=medium * New upstream 1.0.0 diff -Nru lastpass-cli-1.0.0/debian/patches/0001-cipher-support-

Bug#828564: sx: FTBFS with openssl 1.1.0

2016-12-06 Thread Sebastian Andrzej Siewior
On 2016-12-05 22:36:39 [+0100], László Böszörményi (GCS) wrote: > Hi Sebastian, Hi László, > On Mon, Dec 5, 2016 at 10:20 PM, Sebastian Andrzej Siewior > > Okay. What do we do here? Any idea Laszlo? > > I could try to cherry-pick the three patches into the currect 2.0 but I >

Bug#828564: sx: FTBFS with openssl 1.1.0

2016-12-05 Thread Sebastian Andrzej Siewior
On 2016-10-09 11:38:37 [+0300], Török Edwin wrote: > Dear Maintainer, > > Patches to build with both OpenSSL 1.0.x, and 1.1.0 are available in the > upstream git repository: > https://gitweb.skylable.com/gitweb/?p=sx.git;a=commitdiff;h=5acd940e97aa1f2bd1b3fdd41f4c98a5783fcb44 >

Bug#830482: [Pkg-clamav-devel] Bug#830482: clamav-freshclam: duplicate logging with systemd

2016-12-03 Thread Sebastian Andrzej Siewior
On 2016-07-08 14:39:26 [+0200], Marki wrote: > freshclam is configured to log to its logfile by itself (UpdateLogFile). > However systemd unit file (as shipped with jessie) runs freshclam in > foreground and redirects its stdout to syslog. > > LogSyslog false > Foreground false According to the

Bug#840331: [Pkg-clamav-devel] Bug#840331: clamav autoconfiguring a Proxy based on Apt settings

2016-12-03 Thread Sebastian Andrzej Siewior
On 2016-10-10 17:54:12 [+0100], T A F Thorne wrote: > If I check in /etc/clamav/freshclam.conf I can see: > # Check for new database 24 times a day > Checks 24 > DatabaseMirror db.local.clamav.net > DatabaseMirror database.clamav.net > # Proxy: http://warden.pt.local:3142/ > HTTPProxyServer

Bug#844066: [Pkg-clamav-devel] Bug#844066: clamav FTCBFS: build-depends on host architecture perl and python

2016-12-03 Thread Sebastian Andrzej Siewior
control: tags -1 pending On 2016-11-12 09:42:18 [+0100], Helmut Grohne wrote: > clamav fails to cross build from source, because it Build-Depends on the > host architecture perl and python, both of which are neither installable > nor executable. Indeed clamav only uses both interpreters as build

Bug#828258: canl-c/gridsite: FTBFS with openssl 1.1.0

2016-12-03 Thread Sebastian Andrzej Siewior
On 2016-12-03 12:14:38 [+0100], Stefan Fritsch wrote: > On Friday, 2 December 2016 00:16:24 CET Sebastian Andrzej Siewior wrote: > > is there a reason for gridsite not to go for 3.0 (or backport the > > change) and libssl-dev? Apache stays 1.0 but does not expose anything > >

Bug#846597: linux: please enable `perf data' support

2016-12-02 Thread Sebastian Andrzej Siewior
. Upstream disabled it by default until more distros ship a libbabeltrace with the requested functions (and Debian is the first one). All this can be found in the patch attached. Sebastian From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Fri, 2 Dec 2016 13:09:45 + Subject:

Bug#828371: lastpass-cli openssl 1.1.0 now has PR upstream

2016-12-01 Thread Sebastian Andrzej Siewior
On 2016-11-02 22:13:04 [+0100], Andreas Henriksson wrote: > Hello! Hi, > > I've sent a PR to upstream that fixes building against OpenSSL 1.1.0. > Same patch should apply cleanly to the packaged version. could you please address the review comments and update your pull request? > Regards, >

Bug#828330: canl-c/gridsite: FTBFS with openssl 1.1.0

2016-12-01 Thread Sebastian Andrzej Siewior
On 2016-11-15 20:22:10 [+0100], Stefan Fritsch wrote: > Hi again, Hi, > On Saturday, 12 November 2016 07:51:40 CET Stefan Fritsch wrote: > > If these two packages cannot transition to openssl 1.1.0 before apache2 > > does, I suggest that you build with openssl 1.0.2 explicitly and then > >

Bug#827061: transition: openssl

2016-12-01 Thread Sebastian Andrzej Siewior
On 2016-12-01 00:52:59 [+0200], Adrian Bunk wrote: > Wouldn't "depends on libssl1.0.2 and does not build-depend on libssl1.0-dev" > give a reasonably small superset of all packages that need a binNMU? Do you mean something like is_affected = .depends ~ /libssl1\.0\.2/ & ! .build-depends ~

Bug#845193: [Pkg-openssl-devel] Bug#845193: Bug#845193: dpkg: recent -specs PIE changes break openssl

2016-11-30 Thread Sebastian Andrzej Siewior
On 2016-11-30 21:22:38 [+], Thorsten Glaser wrote: > Kurt Roeckx dixit: > > >But the errors I've always been seeing is a segfault during the > >tests, and I have no idea what that is about. > > That didn't happen for me, but I found a wrong codegen bug in a > testsuite recently (probably not

Bug#846113: polygraph loses SSL support when compiled with OpenSSL 1.1

2016-11-30 Thread Sebastian Andrzej Siewior
e time writing this email than the patch. And I would like to avoid switching B-D now and looking at it again after the release. > cu > Adrian Sebastian >From dc21aa1a25fa59e3e667cff8487f971dd74a3d0a Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: W

Bug#827061: transition: openssl

2016-11-30 Thread Sebastian Andrzej Siewior
On 2016-11-05 21:59:27 [+0100], Sebastian Andrzej Siewior wrote: > I've been playing with ben. I tried a few things and this is the best I > was able to achieve [0]: > > title = "openssl 1.0"; > is_affected = .build-depends ~ /libssl1.0-dev/; > is_good = .depen

Bug#845729: libtspi-dev must not force OpenSSL 1.1 on packages that are not ready

2016-11-29 Thread Sebastian Andrzej Siewior
On 2016-11-26 11:31:49 [+0200], Adrian Bunk wrote: > Package: libtspi-dev > Version: 0.3.14+fixed1-1 > Severity: serious > Control: block 827061 by -1 > > libtspi-dev must not force OpenSSL 1.1 on packages that > are not ready for 1.1 > > At least opencryptoki (#828465) and tpm-tools (#828577) >

Bug#846113: polygraph loses SSL support when compiled with OpenSSL 1.1

2016-11-29 Thread Sebastian Andrzej Siewior
On 2016-11-28 16:49:35 [+0200], Adrian Bunk wrote: > Package: polygraph > Version: 4.3.2-4 > Severity: serious > Tags: patch > Control: block 827061 by -1 > > ... > checking for CRYPTO_lock in -lcrypto... no > checking for CRYPTO_add_lock in -lcrypto... no > ... > > Not a perfect solution but an

Bug#828351: inn2: FTBFS with openssl 1.1.0

2016-11-29 Thread Sebastian Andrzej Siewior
Should I NMU it? Sebastian From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Tue, 29 Nov 2016 21:10:31 +0100 Subject: [PATCH] cherry-pick patches for OpenSSL 1.1.0 support and TCP_NODELAY Signed-off-by: Sebastian Andrzej Siewior <sebast...@breakpoint.cc&g

Bug#828327: gnubiff: FTBFS due to missing #include

2016-11-28 Thread Sebastian Andrzej Siewior
On 2016-11-28 23:31:38 [+0200], Adrian Bunk wrote: > Control: retitle -1 gnubiff: FTBFS due to missing #include > Control: tags -1 patch fixed-upstream > Control: unblock 827061 by -1 > > I've confirmed that gnubiff builds fine with OpenSSL 1.1 > > The attached patch cherry-picks the missing

Bug#835811: closed by Dimitri John Ledkov <x...@ubuntu.com> (Bug#835811: fixed in libica 2.6.1-4)

2016-11-23 Thread Sebastian Andrzej Siewior
control: reopen -1 control: severity -1 important On 2016-11-22 17:06:05 [+], Debian Bug Tracking System wrote: >* Build-depend on libssl1.0-dev, upgrade to 1.1 requires v3.0 upstream > release. Closes: #835811 please keep this bug open and close once it builds against openssl

Bug#844031: [Pkg-nagios-devel] Bug#844031: [monitoring-plugins] Openssl 1.1 support missing

2016-11-20 Thread Sebastian Andrzej Siewior
On 2016-11-20 14:58:13 [+0100], Jan Wagner wrote: > Hi there, Hi, > So until openssl 1.1.0 support is added to the package I'll keep this > bug open. correct, thank you. Please keep the severity important high rather than normal for this bug (other bugs which moved explicit to 1.0 have the same

Bug#844031: [Pkg-nagios-devel] Bug#844031: [monitoring-plugins] Openssl 1.1 support missing

2016-11-20 Thread Sebastian Andrzej Siewior
On 2016-11-16 12:09:51 [+0100], Jan Wagner wrote: > Hi, Hi, > This was part of the issue fixed by postgresql-9.6 (9.6.1-2): is there still an issue with this package an openssl 1.1.0 or is this resovled? I am asking because it is not abvious from the bug report and it is severity normal and

Bug#844503: [Pkg-salt-team] Bug#844503: Acknowledgement (salt-call fails with libcrypto.so.1.1: undefined symbol: OPENSSL_no_config)

2016-11-18 Thread Sebastian Andrzej Siewior
On 2016-11-18 15:22:07 [+0100], Benjamin Drung wrote: > Instead of forcing salt to use OpenSSL 1.0, let's try to make it work > with OpenSSL 1.1. Adjusting the initialization to work with OpenSSL 1.1 > was quite easy. I forwarded the patch upstream to > https://github.com/saltstack/salt/pull/37772

Bug#828357: isync: FTBFS with openssl 1.1.0

2016-11-17 Thread Sebastian Andrzej Siewior
control: tags -1 patch fixed-upstream On 2016-07-24 12:01:29 [+0200], Oswald Buddenhagen wrote: > fixed in git on isync_1_2_branch. Upstream fixed it https://sourceforge.net/p/isync/isync/ci/41308e481466b91813f6765a0c92ad83fd9d1ab2/ In their 1.2 release branch which is available in

Bug#844503: Acknowledgement (salt-call fails with libcrypto.so.1.1: undefined symbol: OPENSSL_no_config)

2016-11-17 Thread Sebastian Andrzej Siewior
SSL_no_config the problem is that salt/rsax931.py loads the library manually and expects certain symbols which are no longer available in OpenSSL 1.1.0. And it loads the first libcrypto it finds plus has no dependency on openssl. Sebastian >From 67676f782796071a793ec1908de50c7b86e9fbee Mon Sep 17

Bug#828231: Building with OpenSSL 1.0.2 is sufficient for stretch

2016-11-16 Thread Sebastian Andrzej Siewior
Control: tags -1 - patch On 2016-11-10 12:31:00 [+0200], Adrian Bunk wrote: > > Not a perfect solution but sufficient for stretch is the following > change to use OpenSSL 1.0.2: > > --- debian/control.old2016-11-10 10:20:58.0 + > +++ debian/control2016-11-10

Bug#843988: stunnel4 segfaults (client mode)

2016-11-15 Thread Sebastian Andrzej Siewior
On 2016-11-14 22:43:16 [+0100], gregor herrmann wrote: > Yay, this looks good! So upstream came up with the patch attached after I forwaded mine. Can you please confirm whether this works or not? > Cheers, > gregor Sebastian diff --git a/src/prototypes.h b/src/prototypes.h index

Bug#827061: Processed (with 1 error): block 827061 with 828253 828367 828586 828309 828307 828513 812166 828412 828298 828277

2016-11-15 Thread Sebastian Andrzej Siewior
On 2016-11-15 12:39:25 [+0100], Apollon Oikonomopoulos wrote: > Hi Ian, Hi, > On 11:16 Tue 15 Nov , Ian Jackson wrote: > > 812166 is nothing to do with openssl AFAICT. > > I don't think Xen is involved with the openssl transition. > > > > Did you get the wrong bug ? > > I'm terribly sorry

Bug#843988: stunnel4 segfaults (client mode)

2016-11-14 Thread Sebastian Andrzej Siewior
On 2016-11-14 22:43:16 [+0100], gregor herrmann wrote: > Control: tag -1 + patch > > On Mon, 14 Nov 2016 22:07:12 +0100, Sebastian Andrzej Siewior wrote: > > > On 2016-11-14 00:17:31 [+0100], gregor herrmann wrote: > > > Thanks, but nope, still the same: > &

Bug#843988: stunnel4 segfaults (client mode)

2016-11-14 Thread Sebastian Andrzej Siewior
On 2016-11-14 00:17:31 [+0100], gregor herrmann wrote: > Thanks, but nope, still the same: What about this one? Sebastian >From b436cd6527a2a32bd94b67ff10363e45a2f52430 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Mon, 14 Nov 2016 21

Bug#843988: stunnel4 segfaults (client mode)

2016-11-13 Thread Sebastian Andrzej Siewior
On 2016-11-11 16:05:05 [+0100], gregor herrmann wrote: > As soon as fetchnews connects, stunnel4 segfaults. I tried your config against a http server and mail server with no luck. > The messages in the syslog: > Nov 11 15:53:55 jadzia stunnel: LOG2[2]: Double free attempt: > ptr=0x7f6340010430

Bug#844254: libesmtp: FTBFS with openssl 1.1.0

2016-11-13 Thread Sebastian Andrzej Siewior
Source: libesmtp Version: 1.0.6-4 Severity: serious Control: block 827061 by -1 OpenSSL 1.1.0 has been released. During a rebuild of all packages using OpenSSL this package succeeded to build but it should have failed. That is why this bug is coming so late. The build simply deactivated TLS

Bug#843960: [Pkg-openssl-devel] Bug#843960: Bug#843960: /test/recipes/90-test_srp.t: Keys mismatch during build tests

2016-11-12 Thread Sebastian Andrzej Siewior
On 2016-11-12 21:57:29 [+0100], Kurt Roeckx wrote: > > Yes, you are right. Maybe we shouldn't run the testsuite in parallel. > The test suite should not be running parallel? As far as I know > that's not supported, and we're not doing it. I think so. Looking at logs of armel, amd64, arm64 the

Bug#843960: [Pkg-openssl-devel] Bug#843960: Bug#843960: /test/recipes/90-test_srp.t: Keys mismatch during build tests

2016-11-12 Thread Sebastian Andrzej Siewior
On 2016-11-12 21:21:23 [+0100], Kurt Roeckx wrote: > On Sat, Nov 12, 2016 at 08:51:09PM +0100, Sebastian Andrzej Siewior wrote: > > Why did it say "Keys mismatch" then? I don#t see this in a normal built. > > I see it in all the logs? But it seems to be at a slighty

Bug#843960: [Pkg-openssl-devel] Bug#843960: Bug#843960: /test/recipes/90-test_srp.t: Keys mismatch during build tests

2016-11-12 Thread Sebastian Andrzej Siewior
On 2016-11-12 17:22:42 [+0100], Kurt Roeckx wrote: > On Fri, Nov 11, 2016 at 09:21:41AM +0100, jean-christophe manciot wrote: > > Package: openssl > > Version: 1.1.0c-1 > > > skipped: Test only supported in a shared build > > ../test/recipes/90-test_srp.t .. > > This test did not

Bug#843603: [Pkg-openssl-devel] Bug#843603: Bug#843603: openssl fails on sid version to handshake with tls_1.2 to postfix echos ssl_errors

2016-11-11 Thread Sebastian Andrzej Siewior
On 2016-11-11 19:21:26 [+0100], sternasky wrote: > Hello, Hi, > after some analysis i found infos about php security changes after > 5.6,7.0.12.2 > > Self Signed Certs like > > SSLCertificateFile/etc/ssl/certs/ssl-cert-snakeoil.pem > SSLCertificateKeyFile

Bug#843532: [Pkg-dns-devel] Bug#843532: dnssec-trigger: broken by OpenSSL 1.1.0

2016-11-10 Thread Sebastian Andrzej Siewior
On 2016-11-10 12:10:41 [+0100], Ondřej Surý wrote: > Sebastian, Hi Ondřej, > thanks for the patch. The 0.13~svn685-7 version in unstable includes > your patch, > and I would really appreciate if someone could test whether > dnssec-trigger now > works. I managed to get around to test it. So the

Bug#828556: sslscan: FTBFS with openssl 1.1.0

2016-11-10 Thread Sebastian Andrzej Siewior
On 2016-11-10 12:10:04 [+0200], Adrian Bunk wrote: > On Thu, Sep 01, 2016 at 09:55:46PM +0200, Sebastian Andrzej Siewior wrote: > > control: forwarded -1 https://github.com/rbsec/sslscan/issues/108 > > Sebastian, Marvin, what is the status regarding getting this patch that > wa

Bug#843532: dnssec-trigger: broken by OpenSSL 1.1.0

2016-11-07 Thread Sebastian Andrzej Siewior
rks? I am confident but don't time todo it myself just now. Sebastian >From 05cd529e19d317b8bcc69f7d883873a27195b904 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Mon, 7 Nov 2016 20:59:11 + Subject: [PATCH] dnssec-trigger: openssl 1.1.0 fixup

Bug#843064: [Pkg-openssl-devel] Bug#843064: Bug#843064: openssl: incompatibility for enc command between openssl 1.1.0b-2 and previous 1.0.x versions

2016-11-07 Thread Sebastian Andrzej Siewior
On 2016-11-03 22:15:50 [+0100], Marek Lukaszuk wrote: > Thanks, it works, I feel like an idiot for not finding this. it wasn't documented. how should you find it? I just figured it out myself. > > Let me see what upstream says… > > It is a bit of a surprise, normally I would argue for a bit more

Bug#827061: transition: openssl

2016-11-05 Thread Sebastian Andrzej Siewior
On 2016-10-26 10:55:19 [+0200], Emilio Pozuelo Monfort wrote: > So let's do this. Let's try to get it finished and only ship openssl 1.1. We > still have three months until the full freeze, and depending on how many > packages (and which ones, for risk management etc) are left to be fixed after >

Bug#828299: fetchmail: FTBFS with openssl 1.1.0

2016-11-03 Thread Sebastian Andrzej Siewior
On 2016-11-03 23:39:32 [+0100], László Böszörményi (GCS) wrote: > OK, it remained the same then. May you try the work in progress > update[1]? I'm off for sleeping. :-/ yup, worked. > Thanks, > Laszlo/GCS Sebastian

Bug#828299: fetchmail: FTBFS with openssl 1.1.0

2016-11-03 Thread Sebastian Andrzej Siewior
On 2016-11-03 22:02:23 [+0100], László Böszörményi (GCS) wrote: > On Thu, Nov 3, 2016 at 8:48 PM, Sebastian Andrzej Siewior > <sebast...@breakpoint.cc> wrote: > > On 2016-11-03 07:45:16 [+0100], Andreas Henriksson wrote: > > fetchmail builds against openssl 1.

Bug#843064: [Pkg-openssl-devel] Bug#843064: openssl: incompatibility for enc command between openssl 1.1.0b-2 and previous 1.0.x versions

2016-11-03 Thread Sebastian Andrzej Siewior
On 2016-11-03 15:59:25 [+0100], Marek Lukaszuk wrote: > passphrase I'm getting below error: > > > cat file_encrypted.dat | openssl enc -d -aes-256-cbc > enter aes-256-cbc decryption password: > bad decrypt > 139814539760704:error:06065064:digital envelope >

Bug#828299: fetchmail: FTBFS with openssl 1.1.0

2016-11-03 Thread Sebastian Andrzej Siewior
control: retitle: -1 fetchmail: FTBFS if building in parallel On 2016-11-03 07:45:16 [+0100], Andreas Henriksson wrote: > Hello Kurt Roeckx. Hi, > The failure in this build log didn't look like it was really openssl related. > I've tried rebuilding the package which succeded for me. > > Could

Bug#828440: moonshot-gss-eap: FTBFS with openssl 1.1.0

2016-11-03 Thread Sebastian Andrzej Siewior
On 2016-11-01 17:41:27 [-0400], Sam Hartman wrote: > Hi. Hi, > I'm sorry I didn't get a chance to respond to your other mail. > upstream has dealt with moonshot-gss-eap and moonshot-ui and I plan to > address the bugs there with a new upstream version. You could point that out in the relevant

Bug#828589: uw-imap: FTBFS with openssl 1.1.0

2016-11-02 Thread Sebastian Andrzej Siewior
and is using it. So far it seems only alpine does [0]. [0] http://sources.debian.net/src/alpine/2.20%2Bdfsg1-2/web/src/alpined.d/alpined.c/?hl=10831#L10831 > Kurt Sebastian >From b45c2495fffd431a4eee359c24a0b292c87bc33c Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@brea

Bug#828393: pull request applied upstream

2016-11-01 Thread Sebastian Andrzej Siewior
control: tags -1 fixed-upstream control: forwarded -1 https://github.com/libevent/libevent/pull/397 my understaning is that an updated version of this patch has been merged upstream. That is https://github.com/libevent/libevent/commit/3e9e0a0d46e4508e8782ec3787c6d86bab63046d Sebastian

Bug#828440: moonshot-gss-eap: FTBFS with openssl 1.1.0

2016-11-01 Thread Sebastian Andrzej Siewior
Attempted/moonshot-gss-eap_0.9.5-1_amd64-20160529-1451 this builds now. Do you have anything to verify? > Kurt Sebastian >From 50b12a010649c57ca7080cc728c8088abf53f73e Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Tue, 1 Nov 2016 20:41:46

Bug#827061: Please commit to OpenSSL 1.0.2 in stretch now not constantly re-evaluateing

2016-11-01 Thread Sebastian Andrzej Siewior
On 2016-10-31 11:16:38 [-0400], Sam Hartman wrote: > At least one of the clusters of packages I'm involved in--shibboleth and > moonshot will require some real upstream porting effort. > That's under way in a time scale that will work for buster, but is very > unlikely to meet the stretch freeze

Bug#828579: trousers: FTBFS with openssl 1.1.0

2016-10-31 Thread Sebastian Andrzej Siewior
control: tags -1 patch On 2016-06-26 12:24:29 [+0200], Kurt Roeckx wrote: > OpenSSL 1.1.0 is about to released. During a rebuild of all packages using > OpenSSL this package fail to build. A log of that build can be found at: >

Bug#828506: pkcs11-helper: FTBFS with openssl 1.1.0

2016-10-31 Thread Sebastian Andrzej Siewior
control: forwarded -1 https://github.com/OpenSC/pkcs11-helper/pull/7 control: tags -1 patch On 2016-06-26 12:23:44 [+0200], Kurt Roeckx wrote: > OpenSSL 1.1.0 is about to released. During a rebuild of all packages using > OpenSSL this package fail to build. A log of that build can be found at:

Bug#828259: cargo: FTBFS with openssl 1.1.0

2016-10-31 Thread Sebastian Andrzej Siewior
On 2016-06-26 12:21:14 [+0200], Kurt Roeckx wrote: > Source: cargo > Version: 0.9.0-1 > Severity: important > Control: block 827061 by -1 > > Hi, > > OpenSSL 1.1.0 is about to released. During a rebuild of all packages using > OpenSSL this package fail to build. A log of that build can be

Bug#828521: Severity shouldn't be serious

2016-10-31 Thread Sebastian Andrzej Siewior
On 2016-10-28 22:54:58 [+0200], Thomas Goirand wrote: > Hi, Hi, > Until OpenSSL 1.1.0 is in Sid, there's no reason to have the bug > severity raised to serious. Currently, it's only in Experimental. See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827061#931 which says to set it serious. >

Bug#632585: bsdiff: make it a little less memory hungry

2016-10-31 Thread Sebastian Andrzej Siewior
control: reopen -1 On 2016-10-29 14:15:26 [+0200], Sebastian Andrzej Siewior wrote: > I moved away from bsdiff and don't need this anymore. This improvement help a > little the main reason for moving away is that the average file was getting > bigger to a point where bsdiff was still t

Bug#828552: spamassassin: FTBFS with openssl 1.1.0

2016-10-31 Thread Sebastian Andrzej Siewior
On 2016-10-29 14:15:30 [-0700], Noah Meyerhans wrote: > Control: tags -1 - patch + upstream > Control: forwarded -1 https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7361 > > Unfortunately, this patch breaks compatibility with OpenSSL < 1.1.0, as > the CRYPTO_zalloc function does not exist

Bug#828389: libcrypt-smime-perl: FTBFS with openssl 1.1.0

2016-10-27 Thread Sebastian Andrzej Siewior
control: tags -1 patch fixed-upstream control: forwarded -1 https://rt.cpan.org/Public/Bug/Display.html?id=118344 Crypt-SMIME-0.18 has the fix Sebastian

Bug#828466: opendkim: FTBFS with openssl 1.1.0

2016-10-27 Thread Sebastian Andrzej Siewior
Control: tags - patch builds. Further testing is welcome. Sebastian >From f6afa6be81eae0b149ad18a0642c67e75b148c69 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Thu, 27 Oct 2016 19:43:15 + Subject: [PATCH] opendkim: port to open

Bug#827061: transition: openssl

2016-10-26 Thread Sebastian Andrzej Siewior
On 2016-10-26 21:31:26 [+0200], Kurt Roeckx wrote: > > Is this situation > > supported or should we expect things to break? This can easily happen if an > > app > > links against a library libA which uses openssl 1.0, and against libB which > > uses > > openssl 1.1. > > When linking you

Bug#842074: [Pkg-clamav-devel] Bug#842074: clamav-daemon: unowned directory after purge: /etc/systemd/system/clamav-daemon.service.d/

2016-10-26 Thread Sebastian Andrzej Siewior
control: tags -1 pending On 2016-10-25 19:46:00 [+0200], Andreas Beckmann wrote: > 1m3.1s ERROR: FAIL: Package purging left files on system: > /etc/systemd/system/clamav-daemon.service.d/ not owned Interresting. So it is just a folder that remains after a purge of clamav-daemon.

Bug#841886: Please upgrade babeltrace to the 1.5 series for Stretch

2016-10-24 Thread Sebastian Andrzej Siewior
On 2016-10-24 14:35:46 [-0400], Michael Jeanson wrote: > After discussing it with Jérémie the rc1 was officially released, I've > just pushed it to Debian, should be available in unstable tomorrow. So I tried to build the perf ctf I noticed that I need diff --git

Bug#841886: Please upgrade babeltrace to the 1.5 series for Stretch

2016-10-24 Thread Sebastian Andrzej Siewior
Package: babeltrace Version: 1.4.0-3 Severity: wishlist Could you please bump babeltrace to the 1.5 series which is prepared in https://github.com/jgalar/babeltrace/tree/stable-1.5-staging This is upstream kind answer to what is needed to get the `perf' command (from the linux-perf

Bug#841058: [Pkg-openssl-devel] Bug#841058: [debian jessie 8.6] apt-get upgrade (libssl1.0.0) Can't exec "/tmp/libssl1.0.0.config.FxylEJ": Permission denied at /usr/share/perl/5.20/IPC/Open3.pm line 1

2016-10-17 Thread Sebastian Andrzej Siewior
On 2016-10-17 11:08:12 [+0200], LACROIX Jean Marc wrote: > I am trying to replace systemd with sysvinit on a fresh Debian jessie 8.6 > It seems there is one problem when updating, because . > > root@cubietruck:~# apt-get upgrade … > Preconfiguring packages ... > Can't exec

Bug#828601: wpa: FTBFS with openssl 1.1.0

2016-10-14 Thread Sebastian Andrzej Siewior
On 2016-09-01 23:54:23 [+0200], Sebastian Andrzej Siewior wrote: > The latest build failed against 2.5-2+v2.4-2. I see that 2.5-3 is > prepared for experimental. Upstream's git seems to build against openssl > 1.1.0 (didn't test but the commits make it look like). 2.6 has been released a

Bug#828388: libcrypt-openssl-x509-perl: FTBFS with openssl 1.1.0

2016-10-12 Thread Sebastian Andrzej Siewior
at to see if everything works. please find attached. > > > Kurt Sebastian >From 669bf5ce0ccdac2b5d121cf693f65c4b1db81862 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Sat, 8 Oct 2016 22:21:32 + Subject: [PATCH] libcrypt-openssl

Bug#840063: xz-utils: diff for NMU version 5.2.2-1.2

2016-10-08 Thread Sebastian Andrzej Siewior
on kfreebsd-* (Closes: #840063) + + -- Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Sat, 08 Oct 2016 15:11:19 +0200 + xz-utils (5.2.2-1.1) unstable; urgency=medium * Non-maintainer upload. diff -Nru xz-utils-5.2.2/debian/control xz-utils-5.2.2/debian/control --- xz-utils-5.2.2/debian/c

Bug#840063: xz-utils: FTBFS on kfreebsd-*

2016-10-07 Thread Sebastian Andrzej Siewior
Package: xz-utils Version: 5.2.2-1.1 Severity: normal FTBFS on kfreebsd. This is to keep track. I will try to look into this. Sebastian

Bug#839850: [Pkg-clamav-devel] Bug#839850: clamav: FTBFS with LLVM 3.8

2016-10-05 Thread Sebastian Andrzej Siewior
On 2016-10-05 20:06:13 [+0200], Emilio Pozuelo Monfort wrote: > configure: Using external LLVM > checking for supported LLVM version... no (3.8.1) > configure: error: LLVM < 3.7 required, but "3.8.1"(381) found > configure: error: Failed to configure LLVM, and LLVM was explicitly requested it is

Bug#828384: libcrypt-openssl-dsa-perl: FTBFS with openssl 1.1.0

2016-10-03 Thread Sebastian Andrzej Siewior
; Kurt Sebastian >From 6efaaad1f6b5ed33b5079d2f116db8795a708d8c Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Mon, 3 Oct 2016 12:32:38 + Subject: [PATCH 1/2] libcrypt-openssl-dsa-perl: add openssl 1.1.0 support Signed-off-by: Sebastian Andrzej Siewior <s

Bug#828387: libcrypt-openssl-rsa-perl: FTBFS with openssl 1.1.0

2016-10-02 Thread Sebastian Andrzej Siewior
ian >From fdbda9585f5c99670912e5c0517dbc7a9d92c74b Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Sat, 1 Oct 2016 19:52:44 + Subject: [PATCH] libcrypt-openssl-rsa-perl: get it compiled with openssl 1.1.0 Signed-off-by: Sebastian Andrzej Siewior <se

Bug#828387: libcrypt-openssl-rsa-perl: FTBFS with openssl 1.1.0

2016-10-01 Thread Sebastian Andrzej Siewior
te_key(). > Kurt Sebastian >From 285baad51e3ce9609958a892d6b5246ed9dda9ce Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Sat, 1 Oct 2016 19:52:44 + Subject: [PATCH] libcrypt-openssl-rsa-perl: get it compiled with openssl 1.1.0 Signed

Bug#828554: spice-gtk: FTBFS with openssl 1.1.0

2016-09-30 Thread Sebastian Andrzej Siewior
control: tags -1 patch On 2016-09-21 22:59:56 [+0200], Sebastian Andrzej Siewior wrote: > The patch attached has been sent upstream. It is untested and I kindly > asked them to test it. I don't tag it patched until someone confirms > that this works. the patch attached was tested wi

Bug#828584: unbound: FTBFS with openssl 1.1.0

2016-09-29 Thread Sebastian Andrzej Siewior
control: tags -1 fixed-upstream On 2016-08-28 23:20:07 [+0200], Sebastian Andrzej Siewior wrote: > done. seems to be part of 1.5.10. > Kurt > Sebastian

Bug#828606: xmlsec1: FTBFS with openssl 1.1.0

2016-09-29 Thread Sebastian Andrzej Siewior
control: forwarded -1 https://github.com/lsh123/xmlsec/pull/40 control: tags -1 fixed-upstream On 2016-08-31 23:37:54 [+0200], Sebastian Andrzej Siewior wrote: > > 1.2.22 plus the patch attached and it builds again :) This https://github.com/lsh123/xmlsec/

Bug#828593: virtualbox: FTBFS with openssl 1.1.0

2016-09-29 Thread Sebastian Andrzej Siewior
On 2016-09-12 22:10:34 [+0200], Sebastian Andrzej Siewior wrote: > VirtualBox hackers! Could you please take a look at this? It should > compile against openssl 1.1.0 and 1.0.2h and work. It seems the patch is/was not perfect. According to [0] they applied parts of it to trunk and will ba

Bug#827061: transition: openssl

2016-09-29 Thread Sebastian Andrzej Siewior
On 2016-09-18 21:33:43 [+0200], Kurt Roeckx wrote: > > So OpenSSL 1.1.0 was released about 3 weeks ago. Since then we've now a month and a few days now. > been working on the key packages, to get them to build with > OpenSSL 1.1.0. You can see that status of that at: >

Bug#839019: gsoap: FTBFS with -j16

2016-09-27 Thread Sebastian Andrzej Siewior
Package: gsoap Version: 2.8.35-2 Severity: serious The package FTBFS with -j16: | make[5]: Entering directory '/<>/gsoap/src' | /bin/bash ../../ylwrap soapcpp2_yacc.y y.tab.c soapcpp2_yacc.c y.tab.h `echo soapcpp2_yacc.c | sed -e s/cc$/hh/ -e s/cpp$/hpp/ -e s/cxx$/hxx / -e s/c++$/h++/ -e

Bug#731634: Bug#838937: xz-utils: diff for NMU version 5.2.2-1.1

2016-09-26 Thread Sebastian Andrzej Siewior
On 2016-09-26 22:16:02 [+0200], Sebastian Andrzej Siewior wrote: > I've prepared an NMU for xz-utils (versioned as 5.2.2-1.1) and > uploaded it to DELAYED/10. Please feel free to tell me if I > should delay it longer. And this version is the debian/ folder only ignoring the main versi

Bug#828469: openipmi: FTBFS with openssl 1.1.0

2016-09-25 Thread Sebastian Andrzej Siewior
control: tags -1 patch On 2016-06-26 12:23:21 [+0200], Kurt Roeckx wrote: > There is a libssl-dev package available in experimental that contains a recent > snapshot, I suggest you try building against that to see if everything works. builds. > Kurt Sebastian From: Sebastian Andrze

Bug#828369: krb5: FTBFS with openssl 1.1.0

2016-09-23 Thread Sebastian Andrzej Siewior
control: tags -1 patch fixed-upstream On 2016-06-26 12:22:21 [+0200], Kurt Roeckx wrote: > There is a libssl-dev package available in experimental that contains a recent > snapshot, I suggest you try building against that to see if everything works. please find attached the upstream patches. >

Bug#828530: rdesktop: FTBFS with openssl 1.1.0

2016-09-23 Thread Sebastian Andrzej Siewior
control: tags -1 patch fixed-upstream On 2016-06-26 12:23:58 [+0200], Kurt Roeckx wrote: > There is a libssl-dev package available in experimental that contains a recent > snapshot, I suggest you try building against that to see if everything works. from

Bug#828552: spamassassin: FTBFS with openssl 1.1.0

2016-09-22 Thread Sebastian Andrzej Siewior
feel free to contact us. > > > Kurt Sebastian From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Thu, 22 Sep 2016 11:19:42 + Subject: [PATCH] spamassassin: get it compiled against openssl 1.1.0 CRYPTO_lock was part of the old locking API which got removed. I p

Bug#828554: spice-gtk: FTBFS with openssl 1.1.0

2016-09-21 Thread Sebastian Andrzej Siewior
rms that this works. > Kurt Sebastian >From 0bd3b308f964f52db02b20b5db3a6f9a45c35072 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Wed, 21 Sep 2016 19:54:04 + Subject: [PATCH] spice-gtk: get it compiled against openssl 1.1.0 and also 1.0

Bug#838497: [Pkg-clamav-devel] Bug#838497: libtfm1: Please add basic test coverage to build process

2016-09-21 Thread Sebastian Andrzej Siewior
On 2016-09-21 15:35:31 [+], Louis Bouchard wrote: > A very basic test is available : > make -f makefile.shared stest > > ./stest

Bug#828594: virtuoso-opensource: FTBFS with openssl 1.1.0

2016-09-20 Thread Sebastian Andrzej Siewior
t;entries,i); > > I think you're looking for: > for (i = 0; NULL != subj && i < X509_NAME_entry_count(subj); i++) > { > X509_NAME_ENTRY *ne = X509_NAME_get_entry(subj, i); > exactly. Thank you. The patch attached should contain the cha

Bug#838003: [Pkg-openssl-devel] Bug#838003: /usr/bin/openssl: unable to write 'random state'

2016-09-20 Thread Sebastian Andrzej Siewior
On 2016-09-16 11:53:07 [+0200], Ph. Marek wrote: > $ openssl rand -base64 3 > WTIu > unable to write 'random state' Thanks. I posted a patch https://mta.openssl.org/pipermail/openssl-dev/2016-September/008508.html let's see what upstream says. Sebastian

Bug#837960: spdylay: FTBFS with openssl 1.1.0

2016-09-19 Thread Sebastian Andrzej Siewior
control: tags -1 fixed-upstream On 2016-09-17 22:01:25 [+0900], Tatsuhiro Tsujikawa wrote: > > ​Thank you for the patch. It has been applied and merged into master > > branch. > > I've made another couple of commits​ to fix OpenSSL 1.1.0 deprecation > > warnings. That would be

Bug#837960: spdylay: FTBFS with openssl 1.1.0

2016-09-15 Thread Sebastian Andrzej Siewior
rom 9e74d00a28bf3294722d07a52646a8b1a5740237 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Thu, 15 Sep 2016 20:01:49 + Subject: [PATCH] spdylay: compile against openssl-1.1.0 It fails to compile against openssl 1.1.0 due to th

Bug#827049: libnet-ssleay-perl: FTBFS with OpenSSL 1.1 in experimental

2016-09-14 Thread Sebastian Andrzej Siewior
Hi, can you close this or merge it with #828401 (which is archived). Sebastian

Bug#828593: virtualbox: FTBFS with openssl 1.1.0

2016-09-12 Thread Sebastian Andrzej Siewior
blic key to the > function. I think I've found it a few lines above. VirtualBox hackers! Could you please take a look at this? It should compile against openssl 1.1.0 and 1.0.2h and work. > Kurt Sebastian >From 0e3d6cc69959fdf4f4fd56f65353b76897c0daad Mon Sep 17 00:00:00 2001

Bug#828540: sendmail: FTBFS with openssl 1.1.0

2016-09-12 Thread Sebastian Andrzej Siewior
hed. I could throw on a freebsd-* porter box first if you want me to. Sebastian >From 02edb8d94682fcf13a7e98618294e06f728e66e6 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Sat, 10 Sep 2016 19:27:17 + Subject: [PATCH] sendmail: compile agains

Bug#828589: uw-imap: FTBFS with openssl 1.1.0

2016-09-12 Thread Sebastian Andrzej Siewior
On 2016-09-10 16:36:35 [+0200], Kurt Roeckx wrote: > Looking at the certificate subject looks just wrong. It should > at least check the Subject Altnerative Name, if present, and it > should be present. And it really shouldn't convert it to a string > and hope there are no other field that

Bug#828540: sendmail: FTBFS with openssl 1.1.0

2016-09-12 Thread Sebastian Andrzej Siewior
ing sendmail in stretch! could you please try if the patch attached works? It compiles :) > Andreas Sebastian >From ac5e68745e050f8e86e435994eec866718128242 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Sat, 10 Sep 2016 19:27:17 + Subject: [

Bug#828499: php7.0: FTBFS with openssl 1.1.0

2016-09-08 Thread Sebastian Andrzej Siewior
control: forwarded -1 https://bugs.php.net/bug.php?id=72360 control: tags -1 fixed-upstream On 2016-06-26 12:23:40 [+0200], Kurt Roeckx wrote: > There is a libssl-dev package available in experimental that contains a recent > snapshot, I suggest you try building against that to see if everything

Bug#828593: virtualbox: FTBFS with openssl 1.1.0

2016-09-07 Thread Sebastian Andrzej Siewior
and I have no idea what it was and its purpose was. They don't even assign anything to it in 1.0.2h. > Kurt Sebastian >From 0e3d6cc69959fdf4f4fd56f65353b76897c0daad Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Wed, 7 Sep 2016 20:22:54

Bug#828139: cyrus-sasl2: FTBFS with openssl 1.1:

2016-09-06 Thread Sebastian Andrzej Siewior
control: tags -1 patch On 2016-06-25 12:57:24 [+0200], Kurt Roeckx wrote: > Your package is failing to build with openssl 1.1: > otp.c: In function 'otp_hash': > otp.c:121:16: error: storage size of 'mdctx' isn't known > EVP_MD_CTX mdctx; > > The struct has been made opaque and you now

Bug#835800: transmission: FTBFS with openssl 1.1.0

2016-09-06 Thread Sebastian Andrzej Siewior
On 2016-09-05 23:27:57 [+0100], Sandro Tosi wrote: > thanks for the patch, against which version is this based on? 2.92 > reached unstable after this bug was filed unstable. Sebastian

Bug#835800: transmission: FTBFS with openssl 1.1.0

2016-09-05 Thread Sebastian Andrzej Siewior
> Kurt Sebastian >From 9978fb6970420bcaab9f60c544b6a369c5638ce2 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Mon, 5 Sep 2016 21:49:07 + Subject: [PATCH] transmission: build against openssl 1.1.0 Signed-off-by: Sebastian Andrzej Siewior <se

Bug#828535: ruby2.3: FTBFS with openssl 1.1.0

2016-09-05 Thread Sebastian Andrzej Siewior
On 2016-06-28 16:40:09 [-0300], Antonio Terceiro wrote: > upstream already has support for OpenSSL 1.1.0 in trunk for Ruby 2.4; > see upstream bug linked above. given the current state of afairs, we > will need to either backport that for Ruby 2.3 ourselves, or disable the > openssl extension

Bug#828594: virtuoso-opensource: FTBFS with openssl 1.1.0

2016-09-05 Thread Sebastian Andrzej Siewior
pen in there. If HALP is turned into 0 then it compiles. > Kurt Sebastian >From 58fa4e5de620b90fca7c2366a130ec73d0aee0f0 Mon Sep 17 00:00:00 2001 From: Sebastian Andrzej Siewior <sebast...@breakpoint.cc> Date: Mon, 5 Sep 2016 10:49:54 + Subject: [PATCH] virtuoso-opensource: build agains

Bug#836611: chromium: crash after upgrade 52.0.2743.116-2 -> 53.0.2785.89-1

2016-09-05 Thread Sebastian Andrzej Siewior
On 2016-09-04 21:37:45 [+0300], Stefanos Sofroniou wrote: > Weird...I have the same problem with 52.0.2743.116-2 and it happened a few > minutes ago when I tried to open multiple tabs at once. > > I'm using Debian testing 64-bit, fully updated. Fully updated unstable and it works again after

<    8   9   10   11   12   13   14   15   16   17   >