Bug 1383652 - perl-Crypt-OpenSSL-ECDSA-0.08-1.fc26 FTBFS: unknown type name 'ECDSA_METHOD'
Summary: perl-Crypt-OpenSSL-ECDSA-0.08-1.fc26 FTBFS: unknown type name 'ECDSA_METHOD'
Keywords:
Status: CLOSED RAWHIDE
Alias: None
Product: Fedora
Classification: Fedora
Component: perl-Crypt-OpenSSL-ECDSA
Version: rawhide
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Petr Pisar
QA Contact: Fedora Extras Quality Assurance
URL: https://apps.fedoraproject.org/kosche...
Whiteboard:
Depends On:
Blocks: 1383740
TreeView+ depends on / blocked
 
Reported: 2016-10-11 11:23 UTC by Petr Pisar
Modified: 2016-10-12 08:25 UTC (History)
3 users (show)

Fixed In Version: perl-Crypt-OpenSSL-ECDSA-0.08-2.fc26
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-10-12 08:25:14 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
CPAN 118330 0 None None None 2016-10-11 11:36:42 UTC

Description Petr Pisar 2016-10-11 11:23:42 UTC
perl-Crypt-OpenSSL-ECDSA-0.08-1.fc26 fails to build in F26:

gcc -c  -I. -I/usr/include -D_REENTRANT -D_GNU_SOURCE -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=generic -fwrapv -fno-strict-aliasing -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -m64 -mtune=generic   -DVERSION=\"0.08\" -DXS_VERSION=\"0.08\" -fPIC "-I/usr/lib64/perl5/CORE"  -DPERL5 -DOPENSSL_NO_KRB5 ECDSA.c
ECDSA.c: In function 'XS_Crypt__OpenSSL__ECDSA_ECDSA_OpenSSL':
ECDSA.c:399:8: error: unknown type name 'ECDSA_METHOD'
  const ECDSA_METHOD * RETVAL;
        ^~~~~~~~~~~~

This is caused by upgrading openssl from 1:1.0.2j-1.fc26 to 1:1.1.0b-1.fc26.


Note You need to log in before you can comment on or make changes to this bug.