Your message dated Tue, 14 Jun 2022 22:14:16 +0000
with message-id <e1o1eng-000ij8...@fasolo.debian.org>
and subject line Bug#1005717: fixed in nzbget 21.0+dfsg-2.1
has caused the Debian Bug report #1005717,
regarding nzbget: FTBFS with OpenSSL 3.0
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1005717: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005717
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: nzbget
Version: 21.0+dfsg-2
Severity: important
Tags: bookworm sid
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: ftbfs-3.0
Your package is failing to build using OpenSSL 3.0 with the
following error:
| daemon/connect/TlsSocket.cpp: In static member function ‘static void
TlsSocket::Final()’:
| daemon/connect/TlsSocket.cpp:192:9: error: ‘FIPS_mode_set’ was not declared
in this scope
| 192 | FIPS_mode_set(0);
| | ^~~~~~~~~~~~~
| daemon/connect/TlsSocket.cpp: In member function ‘bool TlsSocket::Start()’:
| daemon/connect/TlsSocket.cpp:392:56: warning: ‘EC_KEY*
EC_KEY_new_by_curve_name(int)’ is deprecated: Since OpenSSL 3.0
[-Wdeprecated-declara tions]
| 392 | EC_KEY* ecdh =
EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
| |
~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~
| In file included from /usr/include/openssl/x509.h:33,
| from /usr/include/openssl/ssl.h:31,
| from ./daemon/main/nzbget.h:257,
| from daemon/connect/TlsSocket.cpp:21:
| /usr/include/openssl/ec.h:996:31: note: declared here
| 996 | OSSL_DEPRECATEDIN_3_0 EC_KEY *EC_KEY_new_by_curve_name(int nid);
| | ^~~~~~~~~~~~~~~~~~~~~~~~
| daemon/connect/TlsSocket.cpp:402:36: warning: ‘void EC_KEY_free(EC_KEY*)’ is
deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
| 402 | EC_KEY_free(ecdh);
| | ~~~~~~~~~~~^~~~~~
| In file included from /usr/include/openssl/x509.h:33,
| from /usr/include/openssl/ssl.h:31,
| from ./daemon/main/nzbget.h:257,
| from daemon/connect/TlsSocket.cpp:21:
| /usr/include/openssl/ec.h:1001:28: note: declared here
| 1001 | OSSL_DEPRECATEDIN_3_0 void EC_KEY_free(EC_KEY *key);
| | ^~~~~~~~~~~
| daemon/connect/TlsSocket.cpp:406:28: warning: ‘void EC_KEY_free(EC_KEY*)’ is
deprecated: Since OpenSSL 3.0 [-Wdeprecated-declarations]
| 406 | EC_KEY_free(ecdh);
| | ~~~~~~~~~~~^~~~~~
| In file included from /usr/include/openssl/x509.h:33,
| from /usr/include/openssl/ssl.h:31,
| from ./daemon/main/nzbget.h:257,
| from daemon/connect/TlsSocket.cpp:21:
| /usr/include/openssl/ec.h:1001:28: note: declared here
| 1001 | OSSL_DEPRECATEDIN_3_0 void EC_KEY_free(EC_KEY *key);
| | ^~~~~~~~~~~
| daemon/connect/Connection.cpp: In function ‘hostent*
android_read_hostent(FILE*, hostent*, char*, size_t)’:
| daemon/connect/Connection.cpp:1196:22: warning: ignoring return value of
‘size_t fread(void*, size_t, size_t, FILE*)’ declared with attribut e
‘warn_unused_result’ [-Wunused-result]
| 1196 | fread(&size, 1, sizeof(size), proxy);
| | ~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
| make[2]: *** [Makefile:1774: daemon/connect/TlsSocket.o] Error 1
For more information see:
https://www.openssl.org/docs/man3.0/man7/migration_guide.html
Sebastian
--- End Message ---
--- Begin Message ---
Source: nzbget
Source-Version: 21.0+dfsg-2.1
Done: Håvard F. Aasen <havard.f.aa...@pfft.no>
We believe that the bug you reported is fixed in the latest version of
nzbget, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1005...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Håvard F. Aasen <havard.f.aa...@pfft.no> (supplier of updated nzbget package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 07 Jun 2022 15:16:11 +0200
Source: nzbget
Architecture: source
Version: 21.0+dfsg-2.1
Distribution: unstable
Urgency: medium
Maintainer: Andreas Moog <andreas.m...@warperbbs.de>
Changed-By: Håvard F. Aasen <havard.f.aa...@pfft.no>
Closes: 974451 1005717 1007134
Changes:
nzbget (21.0+dfsg-2.1) unstable; urgency=medium
.
* Non-maintainer upload.
* d/p/fips_mode.patch: Fix build against OpenSSL 3.0 Closes: #1005717
Thanks to Ubuntu developers for patch.
* Mark autopkgtest as superficial. Closes: #974451
* d/p/armv7-only.patch: Don't use NEON, armv8 instructions on armhf.
Closes: #1007134
Thanks to Ubuntu developers for patch.
Checksums-Sha1:
37ab3887332fea87e91fd2a3a02bf5d9544bd1f0 1939 nzbget_21.0+dfsg-2.1.dsc
646ca4809fbc9bd4e1a3e599f9aafbfc95c8d993 28444
nzbget_21.0+dfsg-2.1.debian.tar.xz
98e61890364c0d27d386717cb77e85064f2cc290 7042
nzbget_21.0+dfsg-2.1_source.buildinfo
Checksums-Sha256:
3aa09f7cdf52789731cde614f5d466c25aac51b8d3bb968dbc57d2700022d802 1939
nzbget_21.0+dfsg-2.1.dsc
4aa940ca5058cf7b3f02cf98679829268ba16ec880f92448a7ce401da175998e 28444
nzbget_21.0+dfsg-2.1.debian.tar.xz
07942a62e429b3bafb1942a0546a086a81e88846a8617f327ac730529a5d7178 7042
nzbget_21.0+dfsg-2.1_source.buildinfo
Files:
0991ca7e0d4e03c063bd443a89683360 1939 net optional nzbget_21.0+dfsg-2.1.dsc
fd8b8529266de477816d91b108b4f168 28444 net optional
nzbget_21.0+dfsg-2.1.debian.tar.xz
83d7eec661fa6970312a76cd9a8bc6ca 7042 net optional
nzbget_21.0+dfsg-2.1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=ZeVZ
-----END PGP SIGNATURE-----
--- End Message ---