Your message dated Thu, 12 May 2022 17:19:23 +0000
with message-id <e1npctd-000fao...@fasolo.debian.org>
and subject line Bug#1006588: fixed in tboot 1.10.5-1
has caused the Debian Bug report #1006588,
regarding tboot: FTBFS with OpenSSL 3.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1006588: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006588
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: tboot
Version: 1.10.2+dfsg.0-1
Severity: important
Tags: bookworm sid
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: ftbfs-3.0

Your package is failing to build using OpenSSL 3.0 with the
following error:

| cc -g -O2 -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wall -Wformat-security -Werror 
-Wstrict-prototypes -Wextra -Winit-self -Wswitch-default -Wunused-parameter 
-Wwrite-strings -Wlogical-op -Wno-missing-field-initializers 
-Wno-address-of-packed-member -fno-strict-aliasing -std=gnu99 -Wno-array-bounds 
-O2 -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -m64 
-I/<<PKGBUILDDIR>>/safestringlib/include -Wall -Wformat-security -Werror 
-Wstrict-prototypes -Wextra -Winit-self -Wswitch-default -Wunused-parameter 
-Wwrite-strings -Wlogical-op -Wno-missing-field-initializers 
-Wno-address-of-packed-member -fno-strict-aliasing -std=gnu99 -Wno-array-bounds 
-O2 -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -m64 
-I/<<PKGBUILDDIR>>/safestringlib/include -Wall -Wformat-security -Werror 
-Wstrict-prototypes -Wextra -Winit-self -Wswitch-default -Wunused-parameter 
-Wwrite-strings -Wlogical-op -Wno-missing-field-initializers 
-Wno-address-of-packed-member -fno-strict-aliasing -std=gnu99 -Wno-array-bounds 
-O2 -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -m64 
-I/<<PKGBUILDDIR>>/safestringlib/include -DNO_TBOOT_LOGLVL -c pollist2.c -o 
pollist2.o
| pollist2.c: In function ‘read_rsa_pubkey_file’:
| pollist2.c:825:5: error: ‘PEM_read_RSA_PUBKEY’ is deprecated: Since 
OpenSSL 3.0 [-Werror=deprecated-declarations]
|   825 |     RSA *pubkey = PEM_read_RSA_PUBKEY(fp, NULL, NULL, NULL);
|       |     ^~~
| In file included from /usr/include/openssl/ui.h:30,
|                  from /usr/include/openssl/engine.h:30,
|                  from pollist2.c:44:
| /usr/include/openssl/pem.h:449:1: note: declared here
|   449 | DECLARE_PEM_rw_attr(OSSL_DEPRECATEDIN_3_0, RSA_PUBKEY, RSA)
|       | ^~~~~~~~~~~~~~~~~~~
| pollist2.c:835:5: error: ‘RSA_size’ is deprecated: Since OpenSSL 3.0 
[-Werror=deprecated-declarations]
|   835 |     unsigned int keysize = RSA_size(pubkey);
|       |     ^~~~~~~~
| In file included from pollist2.c:43:
| /usr/include/openssl/rsa.h:204:27: note: declared here
|   204 | OSSL_DEPRECATEDIN_3_0 int RSA_size(const RSA *rsa);
|       |                           ^~~~~~~~
| pollist2.c:838:9: error: ‘RSA_free’ is deprecated: Since OpenSSL 3.0 
[-Werror=deprecated-declarations]
|   838 |         RSA_free(pubkey);
|       |         ^~~~~~~~
| In file included from pollist2.c:43:
| /usr/include/openssl/rsa.h:293:28: note: declared here
|   293 | OSSL_DEPRECATEDIN_3_0 void RSA_free(RSA *r);
|       |                            ^~~~~~~~
| pollist2.c:846:9: error: ‘RSA_free’ is deprecated: Since OpenSSL 3.0 
[-Werror=deprecated-declarations]
|   846 |         RSA_free(pubkey);
|       |         ^~~~~~~~
| In file included from pollist2.c:43:
| /usr/include/openssl/rsa.h:293:28: note: declared here
|   293 | OSSL_DEPRECATEDIN_3_0 void RSA_free(RSA *r);
|       |                            ^~~~~~~~
| pollist2.c:857:9: error: ‘RSA_get0_key’ is deprecated: Since OpenSSL 3.0 
[-Werror=deprecated-declarations]
|   857 |         RSA_get0_key(pubkey, &modulus, NULL, NULL);
|       |         ^~~~~~~~~~~~
| In file included from pollist2.c:43:
| /usr/include/openssl/rsa.h:217:28: note: declared here
|   217 | OSSL_DEPRECATEDIN_3_0 void RSA_get0_key(const RSA *r,
|       |                            ^~~~~~~~~~~~
| pollist2.c:875:5: error: ‘RSA_free’ is deprecated: Since OpenSSL 3.0 
[-Werror=deprecated-declarations]
|   875 |     RSA_free(pubkey);
|       |     ^~~~~~~~
| In file included from pollist2.c:43:
| /usr/include/openssl/rsa.h:293:28: note: declared here
|   293 | OSSL_DEPRECATEDIN_3_0 void RSA_free(RSA *r);
|       |                            ^~~~~~~~
| pollist2.c: In function ‘read_ecdsa_pubkey’:
| pollist2.c:903:5: error: ‘PEM_read_EC_PUBKEY’ is deprecated: Since 
OpenSSL 3.0 [-Werror=deprecated-declarations]
|   903 |     pubkey = PEM_read_EC_PUBKEY(fp, NULL, NULL, NULL);
|       |     ^~~~~~
| In file included from /usr/include/openssl/ui.h:30,
|                  from /usr/include/openssl/engine.h:30,
|                  from pollist2.c:44:
| /usr/include/openssl/pem.h:463:1: note: declared here
|   463 | DECLARE_PEM_rw_attr(OSSL_DEPRECATEDIN_3_0, EC_PUBKEY, EC_KEY)
|       | ^~~~~~~~~~~~~~~~~~~
| pollist2.c:911:5: error: ‘EC_KEY_get0_public_key’ is deprecated: Since 
OpenSSL 3.0 [-Werror=deprecated-declarations]
|   911 |     pubpoint = EC_KEY_get0_public_key(pubkey);
|       |     ^~~~~~~~
| In file included from /usr/include/openssl/engine.h:28,
|                  from pollist2.c:44:
| /usr/include/openssl/ec.h:1060:39: note: declared here
|  1060 | OSSL_DEPRECATEDIN_3_0 const EC_POINT *EC_KEY_get0_public_key(const 
EC_KEY *key);
|       |                                       ^~~~~~~~~~~~~~~~~~~~~~
| pollist2.c:915:5: error: ‘EC_KEY_get0_group’ is deprecated: Since OpenSSL 
3.0 [-Werror=deprecated-declarations]
|   915 |     pubgroup = EC_KEY_get0_group(pubkey);
|       |     ^~~~~~~~
| In file included from /usr/include/openssl/engine.h:28,
|                  from pollist2.c:44:
| /usr/include/openssl/ec.h:1032:39: note: declared here
|  1032 | OSSL_DEPRECATEDIN_3_0 const EC_GROUP *EC_KEY_get0_group(const EC_KEY 
*key);
|       |                                       ^~~~~~~~~~~~~~~~~
| pollist2.c:926:5: error: ‘EC_POINT_get_affine_coordinates_GFp’ is 
deprecated: Since OpenSSL 3.0 [-Werror=deprecated-declarations]
|   926 |     result = EC_POINT_get_affine_coordinates_GFp(pubgroup, pubpoint, 
x, y, ctx);
|       |     ^~~~~~
| In file included from /usr/include/openssl/engine.h:28,
|                  from pollist2.c:44:
| /usr/include/openssl/ec.h:657:27: note: declared here
|   657 | OSSL_DEPRECATEDIN_3_0 int EC_POINT_get_affine_coordinates_GFp
|       |                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
| cc1: all warnings being treated as errors
| make[3]: *** [Makefile:96: pollist2.o] Error 1

For more information see:
https://www.openssl.org/docs/man3.0/man7/migration_guide.html

Sebastian

--- End Message ---
--- Begin Message ---
Source: tboot
Source-Version: 1.10.5-1
Done: Timo Lindfors <timo.lindf...@iki.fi>

We believe that the bug you reported is fixed in the latest version of
tboot, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1006...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Timo Lindfors <timo.lindf...@iki.fi> (supplier of updated tboot package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 09 Mar 2022 16:35:55 +0200
Source: tboot
Binary: tboot tboot-dbgsym
Architecture: source amd64
Version: 1.10.5-1
Distribution: unstable
Urgency: medium
Maintainer: Timo Lindfors <timo.lindf...@iki.fi>
Changed-By: Timo Lindfors <timo.lindf...@iki.fi>
Description:
 tboot      - module for a measured and verified launch of an OS kernel/VMM
Closes: 1006588
Changes:
 tboot (1.10.5-1) unstable; urgency=medium
 .
   * New upstream version (Closes: #1006588)
Checksums-Sha1:
 2bceec20e3697386004e0f4ba362b8e604a5fabc 2109 tboot_1.10.5-1.dsc
 687bb5c0453b0256d64c8b1aa538a49703f9737a 907657 tboot_1.10.5.orig.tar.gz
 9e0f68332a43ad80d4c64b44ca83887d22351519 652 tboot_1.10.5.orig.tar.gz.asc
 61a4da2155ef02ed9cbb6317febe90470130fffa 12172 tboot_1.10.5-1.debian.tar.xz
 fb810285d11e9cbb1c4beac6fb4374c07adc7353 441912 tboot-dbgsym_1.10.5-1_amd64.deb
 443e2cda8328020b1eddbfc50d6186b5a0d6aeac 5148 tboot_1.10.5-1_amd64.buildinfo
 06be5ac1b24d1eb2254eded581bb0adc8726e286 278108 tboot_1.10.5-1_amd64.deb
Checksums-Sha256:
 4d8479978bdf3127e0141cc48b490c76a8bd1ede6319379f3aaf94abea001a96 2109 
tboot_1.10.5-1.dsc
 3b4be16c03cbc25071ef1d4bda0b4fd550eed86dac6c7f7efdf02423c551b393 907657 
tboot_1.10.5.orig.tar.gz
 790bbb2824a1ccdcba9c9fab33f4418544a692340cf4647de66226fdb3cbd986 652 
tboot_1.10.5.orig.tar.gz.asc
 b80a20f6cb4e218ed874c7a9fb250a7e72e89bc3fe1ca28db5d30d0188a66725 12172 
tboot_1.10.5-1.debian.tar.xz
 410e2419530b8f6184a0187628b9b07ac49d417c58556f8b11583688517afb03 441912 
tboot-dbgsym_1.10.5-1_amd64.deb
 11326c6dda075e3900ce296cbdcd26329ac8da22bdd312e98d9401ab358784c6 5148 
tboot_1.10.5-1_amd64.buildinfo
 78c50bb35d69f11cf0606434441a14fed740af64fd06a74fdbb9d0fd0fa2c2d8 278108 
tboot_1.10.5-1_amd64.deb
Files:
 4e7d6232969c11cf913703f0492c4843 2109 admin optional tboot_1.10.5-1.dsc
 5fa3c6d99f56f2a18a81ee1146436187 907657 admin optional tboot_1.10.5.orig.tar.gz
 657de42198ff67a88640d7eb4c1128e6 652 admin optional 
tboot_1.10.5.orig.tar.gz.asc
 f542d72a2e425af93be4ccf80255a987 12172 admin optional 
tboot_1.10.5-1.debian.tar.xz
 dcc6a9093ee50a34d2ac0468b3cf1bd4 441912 debug optional 
tboot-dbgsym_1.10.5-1_amd64.deb
 4a1cd376efddc5b773d0452aff585273 5148 admin optional 
tboot_1.10.5-1_amd64.buildinfo
 c193fe1b3c858ce7287bedadc8d53139 278108 admin optional tboot_1.10.5-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=qISz
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to