Your message dated Fri, 14 Oct 2016 18:42:37 +0200
with message-id <20161014164235.znuhynlo6xowg...@breakpoint.cc>
and subject line Re: Bug#828454: nmap: FTBFS with openssl 1.1.0
has caused the Debian Bug report #828454,
regarding nmap: FTBFS with openssl 1.1.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
828454: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828454
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: nmap
Version: 7.12-1
Severity: important
Control: block 827061 by -1

Hi,

OpenSSL 1.1.0 is about to released.  During a rebuild of all packages using
OpenSSL this package fail to build.  A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/nmap_7.12-1_amd64-20160529-1456

On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail.  There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.

There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.

If you have problems making things work, feel free to contact us.


Kurt

--- End Message ---
--- Begin Message ---
Source: 7.30-1

On 2016-09-01 13:37:59 [+0200], Sebastian Andrzej Siewior wrote:
> Seems to be fixed upstream
>       https://github.com/nmap/nmap/pull/460

This version has been build tested against the version experimental.

> > Kurt
> 
Sebastian

--- End Message ---

Reply via email to