Your message dated Wed, 17 Sep 2014 21:47:14 +0000
with message-id <[email protected]>
and subject line Bug#718651: fixed in wpa 2.2-1
has caused the Debian Bug report #718651,
regarding wpasupplicant: new upstream release 2.1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
718651: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718651
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: wpasupplicant
Version: 1.0-3+b2
Severity: normal
Are there plans to package the 2.0 version of this package?
There's also a diffrent auth mechanism in wpasupplicant, EAP-FAST. Are
there plans to support it?
-- System Information:
Debian Release: jessie/sid
APT prefers testing
APT policy: (990, 'testing'), (500, 'unstable'), (101, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 3.10-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages wpasupplicant depends on:
ii adduser 3.113+nmu3
ii initscripts 2.88dsf-43
ii libc6 2.17-7
ii libdbus-1-3 1.6.12-1
ii libncurses5 5.9+20130608-1
ii libnl-3-200 3.2.21-1
ii libnl-genl-3-200 3.2.21-1
ii libpcsclite1 1.8.8-3
ii libreadline5 5.2+dfsg-2
ii libssl1.0.0 1.0.1e-3
ii libtinfo5 5.9+20130608-1
ii lsb-base 4.1+Debian12
wpasupplicant recommends no packages.
Versions of packages wpasupplicant suggests:
pn libengine-pkcs11-openssl <none>
pn wpagui <none>
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: wpa
Source-Version: 2.2-1
We believe that the bug you reported is fixed in the latest version of
wpa, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Stefan Lippers-Hollmann <[email protected]> (supplier of updated wpa package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 17 Sep 2014 04:52:36 +0200
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian wpasupplicant Maintainers
<[email protected]>
Changed-By: Stefan Lippers-Hollmann <[email protected]>
Description:
hostapd - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
wpagui - graphical user interface for wpa_supplicant
wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Closes: 561081 608135 683636 718651 761922
Changes:
wpa (2.2-1) unstable; urgency=medium
.
* New upstream release:
- import suggested changes from Gerald Turner <[email protected]> (see
#718651 for details).
+ disable ACS for hostapd on kfreebsd-any (FTBS).
- fixed by the new upstream version:
+ wpa_supplicant: OpenSSL: tls_connection_handshake - Failed to read
(Closes: #561081).
+ wpasupplicant: new upstream release 2.2 (Closes: #718651).
+ wpasupplicant: -s option not documented in man page (Closes: #608135).
- refresh patches:
+ drop 13_human_readable_signal.patch, applied upstream.
+ drop hostapd_fix-WDS-VLAN-bridge-handling.patch, applied upstream.
+ drop fix-spelling-s-algorith-algorithm.patch, applied upstream.
- adapt build configs for hostapd/ wpa_supplicant 2.2:
+ sync with updated upstream defconfigs.
+ keep Hotspot 2.0 support disabled for the time being.
+ hostapd: keep sqlite3 support disabled for the time being.
- update debian/copyright manually, the wpa v2 branch was relicensed from
(BSD-3-clause || GPL-2) to BSD-3-clause only (for the most part). This
doesn't change the licensing state as the BSD-3-clause license is
compatible with GPL-2.
* drop pre-wheezy /lib/init/rw/sendsigs.omit.d/ migration support, invert the
versioned initscripts dependency to a versioned breaks relation.
* migrate from /var/run/ to /run/.
* adapt get-orig-source for wpa 2.2.
* drop version qualifiers for libnl3 build dependencies, as they're
fullfilled by wheezy.
* drop version qualifiers for the lsb-base build dependency, as they're
fullfilled by squeeze.
* shorten short description for hostapd.
* sort debian/control entries.
* make lintian happy (invalid-short-name-in-dep5-copyright bsd) and call it
BSD-3-clause.
* enable DEBUG_SYSLOG and set DEBUG_SYSLOG_FACILITY=LOG_DAEMON, as requested
by Cyril Brulebois <[email protected]> to improve logging options for d-i and
netcfg (Closes: #761922).
* fix various typos around "existence", thanks to A. Costa <[email protected]>,
(Closes: #683636).
* ap_config.c: fix typo for "capabilities".
* remove no longer required lintian override (spelling-error-in-binary for
the).
Checksums-Sha1:
b15fd23e3f2bd5d1dfaad8da7344a46ed646de27 2483 wpa_2.2-1.dsc
6d2e42ff162c70cd4c77661f29e1b3fba1338dab 1724720 wpa_2.2.orig.tar.xz
49250e12bf31014cca489347daca31477d8d6b95 74252 wpa_2.2-1.debian.tar.xz
Checksums-Sha256:
b84aad3de5dc0d05c12134caf042a53d81fce889a45eeb37dd0c394782fe3581 2483
wpa_2.2-1.dsc
ed27e9db9e65dd0c31dcf9801c5f144a370213ec6ea31b24564ebf443edfc169 1724720
wpa_2.2.orig.tar.xz
9e2837b8afd6f8a7c790a9a709250b8ee866539ac5ef039b5bfb29cdd55ebea6 74252
wpa_2.2-1.debian.tar.xz
Files:
dd72d7ec40693659432f757ccbeade5a 2483 net optional wpa_2.2-1.dsc
e95163755c70b87ea785ca7a01e60e98 1724720 net optional wpa_2.2.orig.tar.xz
0bda870563d2e9b895994461c52b9379 74252 net optional wpa_2.2-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=asas
-----END PGP SIGNATURE-----
--- End Message ---