Your message dated Tue, 20 Dec 2016 21:33:59 +0000
with message-id <[email protected]>
and subject line Bug#828601: fixed in wpa 2.6-2
has caused the Debian Bug report #828601,
regarding wpa: FTBFS with openssl 1.1.0
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
828601: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828601
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: wpa
Version: 2.3-2.3
Severity: important
Control: block 827061 by -1
Hi,
OpenSSL 1.1.0 is about to released. During a rebuild of all packages using
OpenSSL this package fail to build. A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/wpa_2.3-2.3_amd64-20160529-1552
On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail. There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.
There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.
If you have problems making things work, feel free to contact us.
Kurt
--- End Message ---
--- Begin Message ---
Source: wpa
Source-Version: 2.6-2
We believe that the bug you reported is fixed in the latest version of
wpa, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andrew Shadura <[email protected]> (supplier of updated wpa package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 20 Dec 2016 21:50:26 +0100
Source: wpa
Binary: hostapd wpagui wpasupplicant wpasupplicant-udeb
Architecture: source
Version: 2.6-2
Distribution: unstable
Urgency: medium
Maintainer: Debian wpasupplicant Maintainers
<[email protected]>
Changed-By: Andrew Shadura <[email protected]>
Description:
hostapd - IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
wpagui - graphical user interface for wpa_supplicant
wpasupplicant - client support for WPA and WPA2 (IEEE 802.11i)
wpasupplicant-udeb - Client support for WPA and WPA2 (IEEE 802.11i) (udeb)
Closes: 828601 832034
Launchpad-Bugs-Fixed: 1422143
Changes:
wpa (2.6-2) unstable; urgency=medium
.
* Upload to unstable.
* Restore the patch descriptions.
* Don't install debian/system-sleep/wpasupplicant (originally introduced
to fix LP: #1422143), it doesn't improve the state of the things,
introduces regressions in some cases, and at all isn't supposed to
work with how wpa-supplicant is started these days.
.
wpa (2.6-1) experimental; urgency=medium
.
[ Andrew Shadura ]
* New upstream version (Closes: #828601, #832034).
* Add gbp.conf.
.
[ Julian Wollrath ]
* Refresh patches.
Checksums-Sha1:
51230fb11518ecfdeea0eaec237aa988440a5da9 2166 wpa_2.6-2.dsc
6630ad56e0b8b55441a4e779e457356efd83d01b 73668 wpa_2.6-2.debian.tar.xz
Checksums-Sha256:
115b3252e93ba429cd5639025e31aa2c2979d37a46268ad7b0c276a142008c3c 2166
wpa_2.6-2.dsc
a15447ac62f2e71054bbc48753742bd2e5390be6e2e70df12617f9ff814c9b82 73668
wpa_2.6-2.debian.tar.xz
Files:
d828073dbec9223f9ab1dda0d3e4124e 2166 net optional wpa_2.6-2.dsc
90a19dd4a4f79d887d641815dd1a3590 73668 net optional wpa_2.6-2.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCAAGBQJYWZ5zAAoJEJ1bI/kYT6UU3OoH/0LpsSzpe53WI/p5Z+vSSap2
tLYnPg+kiIN3WnN3jNtmWD4tVpM7dF2MVFNGFPRB6iiBBa2N1ZmI+R4WMgqW78cv
qnEgbvdaRJS9D4XZdNNg3zN001TNWqSgSmwMThU2II065kpHnmvWPmQWYinHkZhI
cuxAhD3oM75Sg3weMJgO6YwguS+9wKyI5dnroEU11mo5T1e+CYBfG+sJTOyv472f
hMO75neF4keZFr/q4JOtUuETayf4doOCw9rqbqCf5csaEDVMZ0pNURrPkn1S2npI
NkvOIWixhkEE5kw9EZNifW7SEoYjbkLqAUgF7urzjCvITBr6v99jNOnNG9B8aD4=
=FPmh
-----END PGP SIGNATURE-----
--- End Message ---