Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0

2016-10-28 Thread Andreas Tille
Hi Jeroen,

thanks a lot:  I'll create the package this evening and will let you know
in case of problem.

Kind regards

 Andreas.

On Fri, Oct 28, 2016 at 11:03:23AM +0200, Jeroen Ooms wrote:
> On Thu, Oct 27, 2016 at 3:59 PM, Andreas Tille  wrote:
> > It would be great if you could ping me once you have prepared a new
> > release.
> 
> I have published an upstream release of openssl_0.9.5.tar.gz that
> should fix the libssl1.1.0 problems:
> https://cran.r-project.org/web/packages/openssl/index.html
> 

-- 
http://fam-tille.de



Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0

2016-10-28 Thread Jeroen Ooms
On Thu, Oct 27, 2016 at 3:59 PM, Andreas Tille  wrote:
> It would be great if you could ping me once you have prepared a new
> release.

I have published an upstream release of openssl_0.9.5.tar.gz that
should fix the libssl1.1.0 problems:
https://cran.r-project.org/web/packages/openssl/index.html



Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0

2016-10-27 Thread Andreas Tille
Hi Jeroen,

thanks for your quick and helpful response.

On Thu, Oct 27, 2016 at 02:58:08PM +0200, Jeroen Ooms wrote:
> I had a first attempt at fixing everything for libssl 1.1.0:
> https://github.com/jeroenooms/openssl/commit/3066903e4e1d475616c1c784053e30bf290decd3
> 
> Things look good, but I need to test on more systems to make sure the
> package also still builds agains OpenSSL 1.0.0 and 1.0.1. Some of our
> users are on academic supercomputers which, for better or worse, run
> old versions of CentOS 5 or 6, that need to keep working as well.
> 
> If all goes well I hope to do an upstream release later this week.

It would be great if you could ping me once you have prepared a new
release.

Kind regards

Andreas.

-- 
http://fam-tille.de



Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0

2016-10-27 Thread Gert Wollny
Hello, 

Am Donnerstag, den 27.10.2016, 08:56 +0200 schrieb Andreas Tille:
> Hi,
> 
> I can confirm this problem when trying to build against openssl 1.1:
> 
> ...
> gcc -std=gnu99 -I/usr/share/R/include -DNDEBUG  -fpic  -g -O2
> -fdebug-prefix-map=/build/r-base-3.3.1.20161024=. -fstack-protector-
> strong -Wformat -Werror=format-security -Wdate-time
> -D_FORTIFY_SOURCE=2 -g  -c cert.c -o cert.o
> cert.c: In function 'R_cert_info':
> cert.c:45:37: error: dereferencing pointer to incomplete type 'X509
> {aka struct x509_st}'
>    OBJ_obj2txt(buf, sizeof(buf), cert->sig_alg->algorithm, 0);
>  ^~
> /usr/lib/R/etc/Makeconf:132: recipe for target 'cert.o' failed


The problem is, that with openssl 1.1.0 many of the structures are now
opaque and elements can only be accessed by specific functions. 

I did a transition for DCMTK some time ago and there it seemed rather
straight forward. I also helped out with qt4, but there the patch is
not tested at all, and some of the changes were not trivial, i.e. one
would need deeper knowledge of openssl to know exactly what is the
access function to be used. 

There is a page that gives some hits, but it is far from complete: 

https://wiki.openssl.org/index.php/1.1_API_Changes


Currently, I'm quite busy moving, but in two weeks or so I might be
able to give a hand in this. 

best, 
Gert 



Bug#828529: r-cran-openssl: FTBFS with openssl 1.1.0

2016-10-27 Thread Andreas Tille
Hi,

I can confirm this problem when trying to build against openssl 1.1:

...
gcc -std=gnu99 -I/usr/share/R/include -DNDEBUG  -fpic  -g -O2 
-fdebug-prefix-map=/build/r-base-3.3.1.20161024=. -fstack-protector-strong 
-Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -g  -c cert.c 
-o cert.o
cert.c: In function 'R_cert_info':
cert.c:45:37: error: dereferencing pointer to incomplete type 'X509 {aka struct 
x509_st}'
   OBJ_obj2txt(buf, sizeof(buf), cert->sig_alg->algorithm, 0);
 ^~
/usr/lib/R/etc/Makeconf:132: recipe for target 'cert.o' failed


Unfortunately I have no idea how to fix this.

Any hint?

Kind regards

 Andreas.

On Sun, Jun 26, 2016 at 12:23:57PM +0200, Kurt Roeckx wrote:
> Source: r-cran-openssl
> Version: 0.9.2-1
> Severity: important
> Control: block 827061 by -1
> 
> Hi,
> 
> OpenSSL 1.1.0 is about to released.  During a rebuild of all packages using
> OpenSSL this package fail to build.  A log of that build can be found at:
> https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/r-cran-openssl_0.9.2-1_amd64-20160529-1530
> 
> On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of 
> the
> reasons why it might fail.  There are also updated man pages at
> https://www.openssl.org/docs/manmaster/ that should contain useful 
> information.
> 
> There is a libssl-dev package available in experimental that contains a recent
> snapshot, I suggest you try building against that to see if everything works.
> 
> If you have problems making things work, feel free to contact us.
> 
> 
> Kurt
> 
> ___
> Debian-med-packaging mailing list
> debian-med-packag...@lists.alioth.debian.org
> http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/debian-med-packaging
> 

-- 
http://fam-tille.de