Your message dated Sat, 12 Aug 2017 23:51:47 +0000
with message-id <e1dggc3-000aau...@fasolo.debian.org>
and subject line Bug#859685: fixed in sqlcipher 3.4.1-1
has caused the Debian Bug report #859685,
regarding sqlcipher: Enable use of usleep in platforms that support it
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
859685: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859685
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: sqlcipher
Version: 3.2.0-2
Severity: normal

SQLCipher inherits from SQLite a compile time option called HAVE_USLEEP
that enables the use of the usleep() system call. If it is not set,
sqlite3_sleep() will have a minimum wait interval of 1 second,
regardless of its argument (see: https://sqlite.org/compile.html).

In the case of concurrent access to a database, the internal sqlcipher
retry strategy is affected. Instead of sleeping for something between 1
and 100 milliseconds, sqlcipher will always sleep for one whole second
before trying to gain write access again. This is a waste of resources
as threads might be sleeping much more than needed, and also affects
applications in which the configured timeout is less than one second.
Also, retry strategies implemented on top of sqlcipher are more
difficult to succeed and be tuned.

To fix this, the HAVE_USLEEP compile time option has to be enabled for
the platforms that support it.

--- End Message ---
--- Begin Message ---
Source: sqlcipher
Source-Version: 3.4.1-1

We believe that the bug you reported is fixed in the latest version of
sqlcipher, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 859...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Micah Anderson <mi...@debian.org> (supplier of updated sqlcipher package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 12 Aug 2017 15:43:34 -0400
Source: sqlcipher
Binary: sqlcipher libsqlcipher0 libsqlcipher-dev
Architecture: source
Version: 3.4.1-1
Distribution: unstable
Urgency: medium
Maintainer: Hans-Christoph Steiner <h...@eds.org>
Changed-By: Micah Anderson <mi...@debian.org>
Description:
 libsqlcipher-dev - SQLCipher development files
 libsqlcipher0 - SQLCipher shared library
 sqlcipher  - Command line interface for SQLCipher
Closes: 850421 859685
Changes:
 sqlcipher (3.4.1-1) unstable; urgency=medium
 .
   [ Andre Bianchi ]
   * cleanup debian/rules. Thanks Joost van Baal-Ilić, Thomas Goirand and Micah
     Anderson for teaching me a lot of stuff.
   * use debhelper 10
   * use latest debian policy version (4.0.1)
   * remove redundant and empty configure options
 .
   [ Simon Fondrie-Teitler ]
   * update to latest upstream: v3.4.1 (Closes: #850421)
   * update Standards-Version to 3.9.8 - no changes required
 .
   [ Ben Carillo ]
   * add -DHAVE_USLEEP=1 to build options (Closes: #859685)
Checksums-Sha1:
 35ee589936ff1c9c0da302761550f2aa3e58537c 2335 sqlcipher_3.4.1-1.dsc
 969b996b3c7249778c353d02362bb08ebe5a993e 13873645 sqlcipher_3.4.1.orig.tar.gz
 a170473ee9c5782c9aff9e4f9ffaa0f9adf64d81 14408 sqlcipher_3.4.1-1.debian.tar.xz
 334bf5a357d43ecfd07e0867c52cd00a6ce2ab69 5794 
sqlcipher_3.4.1-1_source.buildinfo
Checksums-Sha256:
 c1ac068ae0657076ac56f8be1ff02514aa8a12ad28e7228856a823699e7580e9 2335 
sqlcipher_3.4.1-1.dsc
 4172cc6e5a79d36e178d36bd5cc467a938e08368952659bcd95eccbaf0fa4ad4 13873645 
sqlcipher_3.4.1.orig.tar.gz
 4e931aeade93d8211217fa2ca9d69fcf217103307a3b70f8a8ad152419b75f98 14408 
sqlcipher_3.4.1-1.debian.tar.xz
 701ddc5e238384b1883603cc8bc230df99e6785b008aa6be2c02b204ebc79ee4 5794 
sqlcipher_3.4.1-1_source.buildinfo
Files:
 c83c03793d9b581c35e188455a5d58e0 2335 devel optional sqlcipher_3.4.1-1.dsc
 edd1c57129c21a22ab2c2fd7f47d4ccd 13873645 devel optional 
sqlcipher_3.4.1.orig.tar.gz
 fad3b12e4c647d60f437e11156e7258c 14408 devel optional 
sqlcipher_3.4.1-1.debian.tar.xz
 2a1a883c75ee5f861f7c62f47c75285a 5794 devel optional 
sqlcipher_3.4.1-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=A1mm
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to