Your message dated Fri, 24 Feb 2017 16:03:43 +0000
with message-id <e1chilp-000fuy...@fasolo.debian.org>
and subject line Bug#828601: fixed in wpa 2:2.4-1
has caused the Debian Bug report #828601,
regarding wpa: FTBFS with openssl 1.1.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
828601: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828601
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: wpa
Version: 2.3-2.3
Severity: important
Control: block 827061 by -1

Hi,

OpenSSL 1.1.0 is about to released.  During a rebuild of all packages using
OpenSSL this package fail to build.  A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/wpa_2.3-2.3_amd64-20160529-1552

On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail.  There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.

There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.

If you have problems making things work, feel free to contact us.


Kurt

--- End Message ---
--- Begin Message ---
Source: wpa
Source-Version: 2:2.4-1

We believe that the bug you reported is fixed in the latest version of
wpa, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 828...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andrew Shadura <andre...@debian.org> (supplier of updated wpa package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 20 Feb 2017 11:55:11 +0100
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2:2.4-1
Distribution: unstable
Urgency: medium
Maintainer: Debian wpasupplicant Maintainers 
<pkg-wpa-de...@lists.alioth.debian.org>
Changed-By: Andrew Shadura <andre...@debian.org>
Description:
 hostapd    - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
 wpagui     - graphical user interface for wpa_supplicant
 wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
 wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Closes: 828601 835648 854719
Launchpad-Bugs-Fixed: 1422143
Changes:
 wpa (2:2.4-1) unstable; urgency=medium
 .
   [ Vincent Danjean ]
   * Build with libssl1.0-dev (Closes: #828601).
   * Add an upstream patch to fix hostapd in SMPS mode (Closes: #854719).
 .
   [ Andrew Shadura ]
   * Don't install debian/system-sleep/wpasupplicant (originally introduced
     to fix LP: #1422143), it doesn't improve the state of the things,
     introduces regressions in some cases, and at all isn't supposed to
     work with how wpa-supplicant is started these days (Closes: #835648).
   * Bump the epoch to 2:, so that we can set the upstream version to
     what we really mean. It also has to be higher than 2.6 in unstable
     and 1:2.6 (what hostapd binary package in unstable has).
   * Drop the binary package epoch override.
Checksums-Sha1:
 179ccc9b04d0a4a56f1fdecf28c7b3d50b905bfc 2233 wpa_2.4-1.dsc
 be9f0c01074cebe981a168eb747eab252eeff5f6 1834600 wpa_2.4.orig.tar.xz
 1d894f8ec73fbe754247228d8af911b7a2fda171 87216 wpa_2.4-1.debian.tar.xz
Checksums-Sha256:
 10226c35e6a43b556f7f20ffbbbe3d84a80069efa22ed4382a5cabd3349e586f 2233 
wpa_2.4-1.dsc
 a1e4eda50796b2234a6cd2f00748bbe09f38f3f621919187289162faeb50b6b8 1834600 
wpa_2.4.orig.tar.xz
 e76262448f47c205824b967a1a3c862eca91ecaf64486c773438d8144c459fff 87216 
wpa_2.4-1.debian.tar.xz
Files:
 6754370c694dd5027bc40fc24f9f97fa 2233 net optional wpa_2.4-1.dsc
 6a77b9fe6838b4fca9b92cb22e14de1d 1834600 net optional wpa_2.4.orig.tar.xz
 af22bdfd566d44914c6a74af6ce00a6a 87216 net optional wpa_2.4-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQEcBAEBCAAGBQJYsFOkAAoJEJ1bI/kYT6UU4n4H/0CGuWz9WMeA1gk3gaFYXYv+
XXMXbBG5Ok8Mn3o9VVq0cyB3NAGOFX1VzAiTChS9fzcAsYfr1Uhx3woSLFarQqzf
hYpt3OlLJrjzmUjidlYKAS35cNZm3XyOaLxZjupNchuluGEzDZil9P+ois7JvVS7
nrlPn4vpRp8Qqt+g1lk8jZzdNE8ADMbyaXJT+8GNapXpVH5PWSVPqDbCupZ3Mtxm
yjvulKWslk1zBfY/J4I3Va35ACZa3jBFRbL6AjCDlgtaApSefgOv1KNMXNhrh53T
W7MhoCwWra/5a7upQgfYWt0nReuORgQzaer+WzBc3IEbcNqYLAPV6wt2I4OFvAQ=
=s1gJ
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to