Your message dated Thu, 15 Dec 2016 16:06:41 +0000
with message-id <[email protected]>
and subject line Bug#836419: fixed in vde2 2.3.2+r586-2.1
has caused the Debian Bug report #836419,
regarding vde2: FTBFS with openssl 1.1.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
836419: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836419
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: vde2
Version: 2.3.2+r586-2
Severity: important
Tags: patch
Control: block 827061 by -1

OpenSSL 1.1.0 is about to released.  During a rebuild of all packages using
OpenSSL this package fail to build.  A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-08-26/failed/vde2_2.3.2%2Br586-2_amd64-2016-08-26T19%3A57%3A29Z

I made a patch to fix this problem. Your package seems also to fail to build in
parallel (-j2+). I didn't look into this.

On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail.  There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.

There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.

If you have problems making things work, feel free to contact us.

Kurt
>From 5f2c4c7b67617991af65798a4d177ada90f7e463 Mon Sep 17 00:00:00 2001
From: Sebastian Andrzej Siewior <[email protected]>
Date: Fri, 2 Sep 2016 19:52:49 +0000
Subject: [PATCH] vde_cryptcab: compile against openssl 1.1.0

Signed-off-by: Sebastian Andrzej Siewior <[email protected]>
---
 src/vde_cryptcab/cryptcab.c | 30 +++++++++++++++++++-----------
 1 file changed, 19 insertions(+), 11 deletions(-)

diff --git a/src/vde_cryptcab/cryptcab.c b/src/vde_cryptcab/cryptcab.c
index c5b4474..a2780f1 100644
--- a/src/vde_cryptcab/cryptcab.c
+++ b/src/vde_cryptcab/cryptcab.c
@@ -22,7 +22,7 @@ static void Usage(char *programname)
 	exit(1);
 }
 	
-static EVP_CIPHER_CTX ctx;
+static EVP_CIPHER_CTX *ctx;
 static int ctx_initialized = 0;
 static int encryption_disabled = 0;
 static int nfd;
@@ -30,6 +30,10 @@ static unsigned long long mycounter=1;
 static struct vde_open_args open_args={.port=0,.group=NULL,.mode=0700};
 static int verbose = 0;
 
+#if OPENSSL_VERSION_NUMBER < 0x10100000
+#define EVP_CIPHER_CTX_reset(x)	EVP_CIPHER_CTX_cleanup(x)
+#endif
+
 void vc_printlog(int priority, const char *format, ...)
 {
 	va_list arg;
@@ -105,19 +109,21 @@ int data_encrypt(unsigned char *src, unsigned char *dst, int len, struct peer *p
 	}
 
 	if (!ctx_initialized) {
-		EVP_CIPHER_CTX_init (&ctx);
+		ctx = EVP_CIPHER_CTX_new ();
+		if (!ctx)
+			return -1;
 		ctx_initialized = 1;
 	}
 	
-	EVP_EncryptInit (&ctx, EVP_bf_cbc (), p->key, p->iv);
-	if (EVP_EncryptUpdate (&ctx, dst, &olen, src, len) != 1)
+	EVP_EncryptInit (ctx, EVP_bf_cbc (), p->key, p->iv);
+	if (EVP_EncryptUpdate (ctx, dst, &olen, src, len) != 1)
 	{
 		fprintf (stderr,"error in encrypt update\n");
 		olen = -1;
 		goto cleanup;
 	}
 
-	if (EVP_EncryptFinal (&ctx, dst + ulen, &tlen) != 1)
+	if (EVP_EncryptFinal (ctx, dst + ulen, &tlen) != 1)
 	{
 		fprintf (stderr,"error in encrypt final\n");
 		olen = -1;
@@ -126,7 +132,7 @@ int data_encrypt(unsigned char *src, unsigned char *dst, int len, struct peer *p
 	olen += tlen;
 
 cleanup:
-	EVP_CIPHER_CTX_cleanup(&ctx);	
+	EVP_CIPHER_CTX_reset(ctx);
 	return olen;
 }
 
@@ -142,19 +148,21 @@ int data_decrypt(unsigned char *src, unsigned char *dst, int len, struct peer *p
 	}
 	
 	if (!ctx_initialized) {
-		EVP_CIPHER_CTX_init (&ctx);
+		ctx = EVP_CIPHER_CTX_new ();
+		if (!ctx)
+			return -1;
 		ctx_initialized = 1;
 	}
 
-	EVP_DecryptInit (&ctx, EVP_bf_cbc (), p->key, p->iv);
-	if (EVP_DecryptUpdate (&ctx, dst, &olen, src, ulen) != 1)
+	EVP_DecryptInit (ctx, EVP_bf_cbc (), p->key, p->iv);
+	if (EVP_DecryptUpdate (ctx, dst, &olen, src, ulen) != 1)
 	{
 		fprintf (stderr,"error in decrypt update\n");
 		olen = -1;
 		goto cleanup;
 	}
 
-	if (EVP_DecryptFinal (&ctx, dst + ulen, &tlen) != 1)
+	if (EVP_DecryptFinal (ctx, dst + ulen, &tlen) != 1)
 	{
 		fprintf (stderr,"error in decrypt final, ulen = %d, tlen = %d\n", ulen, tlen);
 		olen = -1;
@@ -163,7 +171,7 @@ int data_decrypt(unsigned char *src, unsigned char *dst, int len, struct peer *p
 	olen += tlen;
 
 cleanup:
-	EVP_CIPHER_CTX_cleanup(&ctx);	
+	EVP_CIPHER_CTX_reset (ctx);
 	return olen;
 }
 
-- 
2.9.3


--- End Message ---
--- Begin Message ---
Source: vde2
Source-Version: 2.3.2+r586-2.1

We believe that the bug you reported is fixed in the latest version of
vde2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andrey Rahmatullin <[email protected]> (supplier of updated vde2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 10 Dec 2016 20:23:13 +0500
Source: vde2
Binary: vde2 vde2-cryptcab libvdeplug-dev libvdeplug2 libvde-dev libvde0
Architecture: source
Version: 2.3.2+r586-2.1
Distribution: unstable
Urgency: medium
Maintainer: Debian VSquare Team <[email protected]>
Changed-By: Andrey Rahmatullin <[email protected]>
Description:
 libvde-dev - Virtual Distributed Ethernet - support libraries development file
 libvde0    - Virtual Distributed Ethernet - support libraries
 libvdeplug-dev - Virtual Distributed Ethernet - Plug development files
 libvdeplug2 - Virtual Distributed Ethernet - Plug library
 vde2       - Virtual Distributed Ethernet
 vde2-cryptcab - Virtual Distributed Ethernet - CryptCab
Closes: 836419
Changes:
 vde2 (2.3.2+r586-2.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Fix FTBFS with OpenSSL 1.1, patch by Sebastian Andrzej Siewior (Closes:
     #836419).
   * Add explicit debian/source/format.
Checksums-Sha1:
 4f708d89169f01b221d85fa6295f4471e7743d7e 2323 vde2_2.3.2+r586-2.1.dsc
 4d2666c6fb99309d0a1efd5077ad567e0a9fff43 16389 vde2_2.3.2+r586-2.1.diff.gz
Checksums-Sha256:
 355ffc4c88e1d9dcaa661d0e951e910142f3734de746e557efe1f1b0d198466c 2323 
vde2_2.3.2+r586-2.1.dsc
 7e4a15786dcc37536e3bd23ba17c60bf98f29ad3165583cc348dd038b6cb9fb3 16389 
vde2_2.3.2+r586-2.1.diff.gz
Files:
 ff7a59a0fa3b91f965fd7435c00f2951 2323 net optional vde2_2.3.2+r586-2.1.dsc
 9b3c6daad33a38d3dc41c8ca76f8b8ea 16389 net optional vde2_2.3.2+r586-2.1.diff.gz

-----BEGIN PGP SIGNATURE-----
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=0B2L
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to