Your message dated Sat, 11 Apr 2026 20:26:17 +0000
with message-id <[email protected]>
and subject line Bug#1132626: fixed in rnp 0.18.1-1.1
has caused the Debian Bug report #1132626,
regarding rnp FTBFS with botan3/3.11.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1132626: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132626
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: rnp
Version: 0.18.1-1
Severity: normal
Tags: ftbfs
X-Debbugs-Cc: [email protected]

Hi,

Your package participates in the upcoming Botan 3 transition. It is
FTBFS due to a deprecated and replaced function. The exact error is:
/build/rnp-0.18.1/src/lib/crypto/eddsa.cpp: In function 'rnp_result_t
pgp::eddsa::generate(rnp::RNG&, pgp::ec::Key&)':
/build/rnp-0.18.1/src/lib/crypto/eddsa.cpp:103:42: warning: 'int
botan_privkey_ed25519_get_privkey(botan_privkey_t, uint8_t*)' is
deprecated: Use botan_privkey_view_raw [-Wdeprecated-declarations]
  103 |     if (botan_privkey_ed25519_get_privkey(eddsa.get(), key_bits)) {
      |         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~
In file included from /build/rnp-0.18.1/src/lib/crypto/eddsa.cpp:29:
/usr/include/botan-3/botan/ffi.h:1843:28: note: declared here
 1843 | BOTAN_FFI_EXPORT(2, 2) int
botan_privkey_ed25519_get_privkey(botan_privkey_t key, uint8_t
output[64]);

I've checked the repository of your upstream. It doesn't have a fix
yet, nor has anyone reported this issue. Please report it and/or
communicate with them.

Regards,
Laszlo/GCS

--- End Message ---
--- Begin Message ---
Source: rnp
Source-Version: 0.18.1-1.1
Done: Adrian Bunk <[email protected]>

We believe that the bug you reported is fixed in the latest version of
rnp, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk <[email protected]> (supplier of updated rnp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 09 Apr 2026 22:24:32 +0300
Source: rnp
Architecture: source
Version: 0.18.1-1.1
Distribution: unstable
Urgency: medium
Maintainer: Daniel Kahn Gillmor <[email protected]>
Changed-By: Adrian Bunk <[email protected]>
Closes: 1132626
Changes:
 rnp (0.18.1-1.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Fix FTBFS with Botan 3.11. (Closes: #1132626)
Checksums-Sha1:
 e623a2b588a96648a4ce530f9237ac658eed95c7 2157 rnp_0.18.1-1.1.dsc
 e17af268a5f63ff147410d1d6f335034779d3bc2 24560 rnp_0.18.1-1.1.debian.tar.xz
Checksums-Sha256:
 6efa5f238f8e63680bb47bb09e198330fada2d2d827e3f1e3f2240f3d3dd61ff 2157 
rnp_0.18.1-1.1.dsc
 5d4fc4cbe0ff8ca3823c4d185bd7b80664fc272e8e46cb29977643c0a8f5d511 24560 
rnp_0.18.1-1.1.debian.tar.xz
Files:
 7199339bf7575b7e5a87b78f2bcf4317 2157 utils optional rnp_0.18.1-1.1.dsc
 0b95706d5cd107e751ebed337b3e3807 24560 utils optional 
rnp_0.18.1-1.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=IJZ9
-----END PGP SIGNATURE-----

Attachment: pgpiyJ7fqPUAm.pgp
Description: PGP signature


--- End Message ---

Reply via email to