Your message dated Sun, 06 Mar 2011 19:17:09 +0000
with message-id <[email protected]>
and subject line Bug#605842: fixed in ekeyd 1.1.3-3.1
has caused the Debian Bug report #605842,
regarding ekeyd: Please add armhf support
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
605842: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605842
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: ekeyd
Severity: wishlist
Tags: patch

Hi,

The armhf port has reached a very good state (at 87%) at debian-ports.org,
and I'm now mass-filing bug reports to packages for armhf support.
Most packages just have to add armhf in the architecture field. The complete
list is in http://wiki.debian.org/ArmHardFloatTodo

The package builds fine using the attached patch. Mind you, we do not target
squeeze, so there is no rush. But please consider adding armhf support. :)

Regards

Konstantinos


-- System Information:
Debian Release: squeeze/sid
Architecture: armhf (armv7l)

Kernel: Linux 2.6.31.14-efikamx (PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff -ruN ekeyd-1.1.3/debian/control ekeyd-1.1.3.armhf//debian/control
--- ekeyd-1.1.3/debian/control	2010-12-03 23:04:55.000000000 +0000
+++ ekeyd-1.1.3.armhf//debian/control	2010-12-03 23:03:12.249766369 +0000
@@ -31,7 +31,7 @@
  or similarly unstable kernel versions.
 
 Package: ekeyd-egd-linux
-Architecture: alpha amd64 arm armel hppa i386 ia64 mips mipsel powerpc s390 sparc sh4 sparc64
+Architecture: alpha amd64 arm armel armhf hppa i386 ia64 mips mipsel powerpc s390 sparc sh4 sparc64
 Depends: ${shlibs:Depends}, ${misc:Depends}
 Suggests: ekeyd
 Description: Transfers entropy from an EGD to the Linux kernel pool

--- End Message ---
--- Begin Message ---
Source: ekeyd
Source-Version: 1.1.3-3.1

We believe that the bug you reported is fixed in the latest version of
ekeyd, which is due to be installed in the Debian FTP archive:

ekeyd-egd-linux_1.1.3-3.1_amd64.deb
  to main/e/ekeyd/ekeyd-egd-linux_1.1.3-3.1_amd64.deb
ekeyd-uds_1.1.3-3.1_amd64.deb
  to main/e/ekeyd/ekeyd-uds_1.1.3-3.1_amd64.deb
ekeyd_1.1.3-3.1.diff.gz
  to main/e/ekeyd/ekeyd_1.1.3-3.1.diff.gz
ekeyd_1.1.3-3.1.dsc
  to main/e/ekeyd/ekeyd_1.1.3-3.1.dsc
ekeyd_1.1.3-3.1_amd64.deb
  to main/e/ekeyd/ekeyd_1.1.3-3.1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Konstantinos Margaritis <[email protected]> (supplier of updated ekeyd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 24 Feb 2011 13:46:15 +0000
Source: ekeyd
Binary: ekeyd ekeyd-uds ekeyd-egd-linux
Architecture: source amd64
Version: 1.1.3-3.1
Distribution: unstable
Urgency: low
Maintainer: Simtec Electronics <[email protected]>
Changed-By: Konstantinos Margaritis <[email protected]>
Description: 
 ekeyd      - Simtec Electronics UDEKEY01 Entropy Key Daemon
 ekeyd-egd-linux - Transfers entropy from an EGD to the Linux kernel pool
 ekeyd-uds  - Simtec Electronics UDEKEY01 Entropy Key Daemon (UDS variant)
Closes: 605842
Changes: 
 ekeyd (1.1.3-3.1) unstable; urgency=low
 .
   * NMU, added armhf support. (Closes: #605842)
Checksums-Sha1: 
 314807a4fd6318fa21f7913c554e17f20f6101af 1835 ekeyd_1.1.3-3.1.dsc
 ff2872a5c460c6675565078153f4902fe6f62b3d 6629 ekeyd_1.1.3-3.1.diff.gz
 0755bc7552f35d06015eb3cc854c1ec18464023a 90374 ekeyd_1.1.3-3.1_amd64.deb
 597152d3e41fc2ab33fe4fc198403f277a84105c 14222 ekeyd-uds_1.1.3-3.1_amd64.deb
 81d7a75afed5d34d24b15684ed723d2084978e98 16452 
ekeyd-egd-linux_1.1.3-3.1_amd64.deb
Checksums-Sha256: 
 13d680b90a43db2d624a41587822ccc1772bb81b0f8866761f5adb13b18dab73 1835 
ekeyd_1.1.3-3.1.dsc
 506aebb9315c7976a1a1159507b66fd86cab307f0afb4cbd272b8e6cbfe6bdad 6629 
ekeyd_1.1.3-3.1.diff.gz
 fdfd39de34f557ac424c95e273226893963b8fe709e6f21c82f5d4ee274c0331 90374 
ekeyd_1.1.3-3.1_amd64.deb
 e64be78ae4f055d25e4bf6b393403fa2a2a04c0e3ead6e580e72599e47e3e8f6 14222 
ekeyd-uds_1.1.3-3.1_amd64.deb
 fe0c9178aa1e86b952dec1e27fcdec805a8fe440dfb3b4cce7f644ce8851870a 16452 
ekeyd-egd-linux_1.1.3-3.1_amd64.deb
Files: 
 5c648ab11286b82c163e401cfe59e079 1835 utils optional ekeyd_1.1.3-3.1.dsc
 3358711a24838d194e24940583fa258c 6629 utils optional ekeyd_1.1.3-3.1.diff.gz
 0cea15421c675529a1ca76e9130eef7a 90374 utils optional ekeyd_1.1.3-3.1_amd64.deb
 9894f5d006ef70057ca98c9bba70a1af 14222 utils optional 
ekeyd-uds_1.1.3-3.1_amd64.deb
 f559c9c6a0651650d3a58eb82da272fb 16452 utils optional 
ekeyd-egd-linux_1.1.3-3.1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=kYYx
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to