Your message dated Tue, 10 Nov 2015 10:00:22 +0000
with message-id <e1zw5iw-0001r2...@franck.debian.org>
and subject line Bug#804609: fixed in netty-tcnative 1.1.33.Fork10-1
has caused the Debian Bug report #804609,
regarding netty-tcnative: FTBFS: error: implicit declaration of function 
'SSLv3_client_method'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
804609: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804609
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: netty-tcnative
Version: 1.1.33.Fork9-1
Severity: serious
Justification: fails to build from source
Tags: sid stretch
User: reproducible-bui...@lists.alioth.debian.org
Usertags: ftbfs
X-Debbugs-CC: reproducible-bui...@lists.alioth.debian.org

Dear Maintainer,

The package fails to build, probably because openssl have disabled sslv3:

src/sslcontext.c: In function 'Java_org_apache_tomcat_jni_SSLContext_make':
src/sslcontext.c:135:31: error: implicit declaration of function 
'SSLv3_client_method' [-Werror=implicit-function-declaration]
             ctx = SSL_CTX_new(SSLv3_client_method());
                               ^
src/sslcontext.c:135:31: error: passing argument 1 of 'SSL_CTX_new' makes 
pointer from integer without a cast [-Werror=int-conversion]
In file included from src/ssl_private.h:46:0,
                 from src/sslcontext.c:31:
/usr/include/openssl/ssl.h:2131:10: note: expected 'const SSL_METHOD * {aka 
const struct ssl_method_st *}' but argument is of type 'int'
 SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth);
          ^

Full build log:
https://reproducible.debian.net/rb-pkg/unstable/amd64/netty-tcnative.html

-- System Information:
Debian Release: stretch/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

--- End Message ---
--- Begin Message ---
Source: netty-tcnative
Source-Version: 1.1.33.Fork10-1

We believe that the bug you reported is fixed in the latest version of
netty-tcnative, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 804...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Emmanuel Bourg <ebo...@apache.org> (supplier of updated netty-tcnative package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 10 Nov 2015 09:44:53 +0100
Source: netty-tcnative
Binary: libnetty-tcnative-java libnetty-tcnative-jni
Architecture: source all amd64
Version: 1.1.33.Fork10-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Java Maintainers 
<pkg-java-maintainers@lists.alioth.debian.org>
Changed-By: Emmanuel Bourg <ebo...@apache.org>
Description:
 libnetty-tcnative-java - Tomcat native fork for Netty
 libnetty-tcnative-jni - Tomcat native fork for Netty (JNI library)
Closes: 804609
Changes:
 netty-tcnative (1.1.33.Fork10-1) unstable; urgency=medium
 .
   * New upstream release:
     - Supports OpenSSL without SSLv3 (Closes: #804609)
Checksums-Sha1:
 f53da872f65e1cde31620c93d118813ce819a925 2289 
netty-tcnative_1.1.33.Fork10-1.dsc
 6295cea338decd5be3b05ac15ef5cdb76be7d267 172451 
netty-tcnative_1.1.33.Fork10.orig.tar.gz
 0f67677061f070e4c50058bf9782f1fa5a8d6f8c 5288 
netty-tcnative_1.1.33.Fork10-1.debian.tar.xz
 818d2c8ab5303cf81fe863e3adfad2a67e81dfb4 64412 
libnetty-tcnative-java_1.1.33.Fork10-1_all.deb
 f5fc89bc74a7c97e0ad5fb74a648479ac57ad754 50914 
libnetty-tcnative-jni_1.1.33.Fork10-1_amd64.deb
Checksums-Sha256:
 af8d58621f7b9c5ffdd262068b3e5e92173378ef45ac871bfcd1c60b13be5687 2289 
netty-tcnative_1.1.33.Fork10-1.dsc
 c2ff078d2b2ae52ac00f479b2b5d40ee2d6fa2712429dcdcf1af49e40b8dc506 172451 
netty-tcnative_1.1.33.Fork10.orig.tar.gz
 780fc662a158c44354559509794583ba8fa05010cbc1e9f90344315f52e01af1 5288 
netty-tcnative_1.1.33.Fork10-1.debian.tar.xz
 10d41dad005a37ee7cff70fb3a08f9f300de0a9de390fbcad6f2cf00e9366581 64412 
libnetty-tcnative-java_1.1.33.Fork10-1_all.deb
 e850c73f717111821aab6a0b63c0e2a68a592005f4ef99a120734db48fdce30b 50914 
libnetty-tcnative-jni_1.1.33.Fork10-1_amd64.deb
Files:
 359a37aa1b91814e072788303d46306f 2289 java optional 
netty-tcnative_1.1.33.Fork10-1.dsc
 7eeebd5c241de50ada0277c573ccdfd2 172451 java optional 
netty-tcnative_1.1.33.Fork10.orig.tar.gz
 dbfaaf42aa1e573b0d64d476a9acf266 5288 java optional 
netty-tcnative_1.1.33.Fork10-1.debian.tar.xz
 56867b5370f52bc845eb91b04235a57f 64412 java optional 
libnetty-tcnative-java_1.1.33.Fork10-1_all.deb
 30b1329469f19f8b3c56205994990c8f 50914 java optional 
libnetty-tcnative-jni_1.1.33.Fork10-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=Aj1E
-----END PGP SIGNATURE-----

--- End Message ---
__
This is the maintainer address of Debian's Java team
<http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-java-maintainers>. 
Please use
debian-j...@lists.debian.org for discussions and questions.

Reply via email to