I generated this debdiff, hope it is helpful: diff -Nru grpc-1.3.2/debian/changelog grpc-1.3.2/debian/changelog --- grpc-1.3.2/debian/changelog 2017-08-14 12:44:38.000000000 +0200 +++ grpc-1.3.2/debian/changelog 2017-10-25 23:36:46.000000000 +0200 @@ -1,3 +1,9 @@ +grpc (1.3.2-1ubuntu1) bionic; urgency=medium + + * Revert patch openssl-1.1.0 (Closes: #1727528) + + -- Thomas Voß <tho...@airmap.com> Wed, 25 Oct 2017 23:36:46 +0200 + grpc (1.3.2-1) unstable; urgency=medium [ Pirate Praveen <prav...@onenetbeyond.org> ] diff -Nru grpc-1.3.2/debian/patches/openssl-1.1.0.diff grpc-1.3.2/debian/patches/openssl-1.1.0.diff --- grpc-1.3.2/debian/patches/openssl-1.1.0.diff 2017-04-26 20:21:19.000000000 +0200 +++ grpc-1.3.2/debian/patches/openssl-1.1.0.diff 1970-01-01 01:00:00.000000000 +0100 @@ -1,49 +0,0 @@ -Description: Fix compilation of gRPC with OpenSSL 1.1.0. -Author: Steinar H. Gunderson <se...@debian.org> - -Index: grpc-1.2.5/src/core/lib/security/credentials/jwt/jwt_verifier.c -=================================================================== ---- grpc-1.2.5.orig/src/core/lib/security/credentials/jwt/jwt_verifier.c -+++ grpc-1.2.5/src/core/lib/security/credentials/jwt/jwt_verifier.c -@@ -481,6 +481,7 @@ static EVP_PKEY *pkey_from_jwk(grpc_exec - const char *kty) { - const grpc_json *key_prop; - RSA *rsa = NULL; -+ BIGNUM *n = NULL, *e = NULL; - EVP_PKEY *result = NULL; - - GPR_ASSERT(kty != NULL && json != NULL); -@@ -495,24 +496,26 @@ static EVP_PKEY *pkey_from_jwk(grpc_exec - } - for (key_prop = json->child; key_prop != NULL; key_prop = key_prop->next) { - if (strcmp(key_prop->key, "n") == 0) { -- rsa->n = -- bignum_from_base64(exec_ctx, validate_string_field(key_prop, "n")); -- if (rsa->n == NULL) goto end; -+ n = bignum_from_base64(exec_ctx, validate_string_field(key_prop, "n")); -+ if (n == NULL) goto end; - } else if (strcmp(key_prop->key, "e") == 0) { -- rsa->e = -- bignum_from_base64(exec_ctx, validate_string_field(key_prop, "e")); -- if (rsa->e == NULL) goto end; -+ e = bignum_from_base64(exec_ctx, validate_string_field(key_prop, "e")); -+ if (e == NULL) goto end; - } - } -- if (rsa->e == NULL || rsa->n == NULL) { -+ if (e == NULL || n == NULL) { - gpr_log(GPR_ERROR, "Missing RSA public key field."); - goto end; - } -+ RSA_set0_key(rsa, n, e, NULL); -+ n = e = NULL; - result = EVP_PKEY_new(); - EVP_PKEY_set1_RSA(result, rsa); /* uprefs rsa. */ - - end: - if (rsa != NULL) RSA_free(rsa); -+ if (n != NULL) BN_free(n); -+ if (e != NULL) BN_free(e); - return result; - } - diff -Nru grpc-1.3.2/debian/patches/series grpc-1.3.2/debian/patches/series --- grpc-1.3.2/debian/patches/series 2017-08-14 12:44:38.000000000 +0200 +++ grpc-1.3.2/debian/patches/series 2017-10-25 23:31:41.000000000 +0200 @@ -1,4 +1,3 @@ -openssl-1.1.0.diff no-werror.diff unvendor-zlib.diff fix-libgrpc++-soname.diff
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1727528 Title: Linking against libgrpc.so fails To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grpc/+bug/1727528/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs