Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0
Hi Jeroen, thanks a lot: I'll create the package this evening and will let you know in case of problem. Kind regards Andreas. On Fri, Oct 28, 2016 at 11:03:23AM +0200, Jeroen Ooms wrote: > On Thu, Oct 27, 2016 at 3:59 PM, Andreas Tillewrote: > > It would be great if you could ping me once you have prepared a new > > release. > > I have published an upstream release of openssl_0.9.5.tar.gz that > should fix the libssl1.1.0 problems: > https://cran.r-project.org/web/packages/openssl/index.html > -- http://fam-tille.de
Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0
On Thu, Oct 27, 2016 at 3:59 PM, Andreas Tillewrote: > It would be great if you could ping me once you have prepared a new > release. I have published an upstream release of openssl_0.9.5.tar.gz that should fix the libssl1.1.0 problems: https://cran.r-project.org/web/packages/openssl/index.html
Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0
Hi Jeroen, thanks for your quick and helpful response. On Thu, Oct 27, 2016 at 02:58:08PM +0200, Jeroen Ooms wrote: > I had a first attempt at fixing everything for libssl 1.1.0: > https://github.com/jeroenooms/openssl/commit/3066903e4e1d475616c1c784053e30bf290decd3 > > Things look good, but I need to test on more systems to make sure the > package also still builds agains OpenSSL 1.0.0 and 1.0.1. Some of our > users are on academic supercomputers which, for better or worse, run > old versions of CentOS 5 or 6, that need to keep working as well. > > If all goes well I hope to do an upstream release later this week. It would be great if you could ping me once you have prepared a new release. Kind regards Andreas. -- http://fam-tille.de
Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0
Hello, Am Donnerstag, den 27.10.2016, 08:56 +0200 schrieb Andreas Tille: > Hi, > > I can confirm this problem when trying to build against openssl 1.1: > > ... > gcc -std=gnu99 -I/usr/share/R/include -DNDEBUG -fpic -g -O2 > -fdebug-prefix-map=/build/r-base-3.3.1.20161024=. -fstack-protector- > strong -Wformat -Werror=format-security -Wdate-time > -D_FORTIFY_SOURCE=2 -g -c cert.c -o cert.o > cert.c: In function 'R_cert_info': > cert.c:45:37: error: dereferencing pointer to incomplete type 'X509 > {aka struct x509_st}' > OBJ_obj2txt(buf, sizeof(buf), cert->sig_alg->algorithm, 0); > ^~ > /usr/lib/R/etc/Makeconf:132: recipe for target 'cert.o' failed The problem is, that with openssl 1.1.0 many of the structures are now opaque and elements can only be accessed by specific functions. I did a transition for DCMTK some time ago and there it seemed rather straight forward. I also helped out with qt4, but there the patch is not tested at all, and some of the changes were not trivial, i.e. one would need deeper knowledge of openssl to know exactly what is the access function to be used. There is a page that gives some hits, but it is far from complete: https://wiki.openssl.org/index.php/1.1_API_Changes Currently, I'm quite busy moving, but in two weeks or so I might be able to give a hand in this. best, Gert
Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0
Hi, I can confirm this problem when trying to build against openssl 1.1: ... gcc -std=gnu99 -I/usr/share/R/include -DNDEBUG -fpic -g -O2 -fdebug-prefix-map=/build/r-base-3.3.1.20161024=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -g -c cert.c -o cert.o cert.c: In function 'R_cert_info': cert.c:45:37: error: dereferencing pointer to incomplete type 'X509 {aka struct x509_st}' OBJ_obj2txt(buf, sizeof(buf), cert->sig_alg->algorithm, 0); ^~ /usr/lib/R/etc/Makeconf:132: recipe for target 'cert.o' failed Unfortunately I have no idea how to fix this. Any hint? Kind regards Andreas. On Sun, Jun 26, 2016 at 12:23:57PM +0200, Kurt Roeckx wrote: > Source: r-cran-openssl > Version: 0.9.2-1 > Severity: important > Control: block 827061 by -1 > > Hi, > > OpenSSL 1.1.0 is about to released. During a rebuild of all packages using > OpenSSL this package fail to build. A log of that build can be found at: > https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/r-cran-openssl_0.9.2-1_amd64-20160529-1530 > > On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of > the > reasons why it might fail. There are also updated man pages at > https://www.openssl.org/docs/manmaster/ that should contain useful > information. > > There is a libssl-dev package available in experimental that contains a recent > snapshot, I suggest you try building against that to see if everything works. > > If you have problems making things work, feel free to contact us. > > > Kurt > > ___ > Debian-med-packaging mailing list > debian-med-packag...@lists.alioth.debian.org > http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/debian-med-packaging > -- http://fam-tille.de