Bug#828287: dsniff: FTBFS with openssl 1.1.0

2016-12-20 Thread Gianfranco Costamagna
Hi, >And nobody in your team can to? Then use a RFS and >, >they are pretty fast, assuming the packaging is in a sane condition. sure, we just need somebody pinging us :p Sponsored in deferred/1 with some little additional changelog fixes, git pushed and tag

Bug#828287: dsniff: FTBFS with openssl 1.1.0

2016-12-20 Thread Christoph Biedl
Marcos Fouces wrote... > A new revision of the package is hosted at pkg-security team. I did some > improvements (i also add your patch) and the package is hopefully ready for > upload. Just need a sponsor. And nobody in your team can to? Then use a RFS and , they

Bug#828287: dsniff: FTBFS with openssl 1.1.0

2016-12-20 Thread Marcos Fouces
A new revision of the package is hosted at pkg-security team. I did some improvements (i also add your patch) and the package is hopefully ready for upload. Just need a sponsor. Check it here: https://anonscm.debian.org/cgit/pkg-security/dsniff.git/ Cheers, Marcos El 20/12/16 a las 15:37,

Bug#828287: dsniff: FTBFS with openssl 1.1.0

2016-12-20 Thread Christoph Biedl
Christoph Biedl wrote... > Adrian Bunk wrote... > > > Can you make an NMU with your patch > > (or by changing it to libssl1.0-dev)? > > Can even, even upon short notice. However, dsniff got a new maintainer > (#847505), included. This probably didn't work due to a local error, sorry. >

Bug#828287: dsniff: FTBFS with openssl 1.1.0

2016-12-19 Thread Adrian Bunk
On Mon, Nov 07, 2016 at 10:24:34PM +0100, Christoph Biedl wrote: > Sandro Tosi wrote... > > > Hello Dug, > > in Debian we started the transition to OpenSSL 1.1.0: do you have any > > plan to port dsniff to that version? > > Since I have some interest in keeping dsniff in Debian, I spent some >

Bug#828287: dsniff: FTBFS with openssl 1.1.0

2016-11-07 Thread Christoph Biedl
Christoph Biedl wrote... > The patch attached: Now really attached. diff --git a/ssh.c b/ssh.c index bb73ff3..ee6cb58 100644 --- a/ssh.c +++ b/ssh.c @@ -234,6 +234,8 @@ SSH_accept(SSH *ssh) u_char *p, cipher, cookie[8], msg[1024]; u_int32_t num; int i; + const BIGNUM *servkey_e,

Bug#828287: dsniff: FTBFS with openssl 1.1.0

2016-11-07 Thread Christoph Biedl
Sandro Tosi wrote... > Hello Dug, > in Debian we started the transition to OpenSSL 1.1.0: do you have any > plan to port dsniff to that version? Since I have some interest in keeping dsniff in Debian, I spent some time on that bug. The patch attached: - replaces the access to struct elements

Bug#828287: dsniff: FTBFS with openssl 1.1.0

2016-11-02 Thread Sandro Tosi
Hello Dug, in Debian we started the transition to OpenSSL 1.1.0: do you have any plan to port dsniff to that version? thanks! On Sun, 26 Jun 2016 12:21:31 +0200 Kurt Roeckx wrote: > Source: dsniff > Version: 2.4b1+debian-22.1 > Severity: important > Control: block 827061 by -1 >

Bug#828287: dsniff: FTBFS with openssl 1.1.0

2016-06-26 Thread Kurt Roeckx
Source: dsniff Version: 2.4b1+debian-22.1 Severity: important Control: block 827061 by -1 Hi, OpenSSL 1.1.0 is about to released. During a rebuild of all packages using OpenSSL this package fail to build. A log of that build can be found at: