[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1041643: marked as done (ITP: ktls-utils -- TLS handshake utilities for in-kernel TLS consumers)



Your message dated Wed, 26 Jul 2023 18:00:10 +0000
with message-id <E1qOiny-005aiz-8o@fasolo.debian.org>
and subject line Bug#1041643: fixed in ktls-utils 0.9-1
has caused the Debian Bug report #1041643,
regarding ITP: ktls-utils -- TLS handshake utilities for in-kernel TLS consumers
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1041643: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041643
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Ben Hutchings <ben@decadent.org.uk>
X-Debbugs-Cc: debian-devel@lists.debian.org, debian-kernel@lists.debian.org, Steve Dickson <steved@redhat.com>, Chuck Lever III <chuck.lever@oracle.com>

* Package name    : ktls-utils
  Version         : 0.9
  Upstream Contact: kernel-tls-handshake@lists.linux.dev
* URL             : https://github.com/oracle/ktls-utils
* License         : GPLv2
  Programming Lang: C
  Description     : TLS handshake utilities for in-kernel TLS consumers

In-kernel TLS consumers need a mechanism to perform TLS handshakes on
a connected socket to negotiate TLS session parameters that can then
be programmed into the kernel's TLS record protocol engine.

This package of software provides a TLS handshake user agent that
listens for kernel requests and then materializes a user space socket
endpoint on which to perform these handshakes. The resulting
negotiated session parameters are passed back to the kernel via
standard kTLS socket options.

This will be maintained by the kernel team.

--- End Message ---
--- Begin Message ---
Source: ktls-utils
Source-Version: 0.9-1
Done: Ben Hutchings <benh@debian.org>

We believe that the bug you reported is fixed in the latest version of
ktls-utils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1041643@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ben Hutchings <benh@debian.org> (supplier of updated ktls-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 24 Jul 2023 01:54:48 +0200
Binary: ktls-utils ktls-utils-dbgsym
Source: ktls-utils
Architecture: amd64 source
Version: 0.9-1
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Ben Hutchings <benh@debian.org>
Closes: 1041643
Description: 
 ktls-utils - TLS handshake support for NFS and other in-kernel TLS users
Changes:
 ktls-utils (0.9-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #1041643)
   * Cherry-pick fixes from upstream main:
     - tlshd: fix max config file size comparison
     - tlshd-conf.man: Fix man page header
     - Fix the --with-systemd command-line option
Checksums-Sha1: 
 5978daadd5051e42c246a867991661b4f1bc98f3 1979 ktls-utils_0.9-1.dsc
 66a82d9ee619de0e9d3ca930c56434721aa46431 36608 ktls-utils_0.9.orig.tar.xz
 4fd35014a7855d43a1d9c8ff183db545f569347b 7012 ktls-utils_0.9-1.debian.tar.xz
 904c85063f1060e53ac7b4c9a6c9d6b64505d4a9 7659 ktls-utils_0.9-1_amd64.buildinfo
 25b8e0f6967c3c722b2c90ce7b3ea4b2027f1c90 44016 ktls-utils-dbgsym_0.9-1_amd64.deb
 f06d2dbb4e58d8037068e7f12a02d54adceee51a 21100 ktls-utils_0.9-1_amd64.deb
Checksums-Sha256: 
 8e2cef916b671af47a44cbeec75cbf639268dc8bc112bc78e5a6a27eeb38fa96 1979 ktls-utils_0.9-1.dsc
 13edca58aeaff193b1c892ccee0a0e2a99a5dfdd9bd043ce77e6aa8639ab09b1 36608 ktls-utils_0.9.orig.tar.xz
 727c27ff3a5a40d3e71fd3148eb199522a72c1490b2a36960b20ed6c1ff80525 7012 ktls-utils_0.9-1.debian.tar.xz
 a0c76e074f1b05f8d24a73ae4159fee273b6e3ae74ffcb9e9d8a1c6e1760a2c3 7659 ktls-utils_0.9-1_amd64.buildinfo
 8c400f7e8bf89ddc1309a6cb00d33898a1c4c1a7a9ba15aae1a3f539e90ea908 44016 ktls-utils-dbgsym_0.9-1_amd64.deb
 6db64a5ef7f5e16e25bf939b8431b4c3649c60fe0ce12963ad664f468d841a03 21100 ktls-utils_0.9-1_amd64.deb
Files: 
 b11a95ae620582c280c2a23fb85ccc97 1979 net optional ktls-utils_0.9-1.dsc
 1525766cc343e364649c4be60c95a94d 36608 net optional ktls-utils_0.9.orig.tar.xz
 45b7835f063d1eda7c1f55c8515aa9f6 7012 net optional ktls-utils_0.9-1.debian.tar.xz
 9e8d9e9805b11d31ca62cbf75d8214b8 7659 net optional ktls-utils_0.9-1_amd64.buildinfo
 aef18aaff1acbf2f192bd05a539194e7 44016 debug optional ktls-utils-dbgsym_0.9-1_amd64.deb
 b2756d5c833cfcd586c32792911c166b 21100 net optional ktls-utils_0.9-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=OIDS
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: