[From nobody Thu Mar  5 11:21:09 2026
Received: (at submit) by bugs.debian.org; 5 Sep 2025 02:21:17 +0000
X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
 (2024-03-25) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-15.0 required=4.0 tests=BAYES_00,
 BODY_INCLUDES_PACKAGE,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,
 DKIM_VALID_EF,HAS_PACKAGE,RCVD_IN_DNSWL_LOW,
 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED,
 RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham
 autolearn_force=no version=4.0.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 39; hammy, 117; neutral, 22; spammy,
 0. spammytokens: hammytokens:0.000-+--trixie, 0.000-+--Trixie,
 0.000-+--xwayland, 0.000-+--deb13amd64, 0.000-+--deb13-amd64
Return-path: &lt;bkw.2524721@150mpg.com&gt;
Received: from smtp.150mpg.com ([66.43.241.12]:39374)
 by buxtehude.debian.org with esmtps
 (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
 (Exim 4.96) (envelope-from &lt;bkw.2524721@150mpg.com&gt;)
 id 1uuM4j-00ArLE-1l for submit@bugs.debian.org;
 Fri, 05 Sep 2025 02:21:17 +0000
Received: from localhost (localhost [127.0.0.1])
 by smtp.150mpg.com (Postfix) with ESMTP id 0F533840D22
 for &lt;submit@bugs.debian.org&gt;; Thu,  4 Sep 2025 21:10:26 -0500 (CDT)
X-Virus-Scanned: Debian amavis at smtp.150mpg.com
Received: from smtp.150mpg.com ([127.0.0.1])
 by localhost (smtp.150mpg.com [127.0.0.1]) (amavis, port 10024) with ESMTP
 id eV8uta4wGQea for &lt;submit@bugs.debian.org&gt;;
 Thu,  4 Sep 2025 21:10:20 -0500 (CDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 smtp.150mpg.com 6B244840287
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=150mpg.com;
 s=1727791000; t=1757038220; x=1757643020;
 bh=jb1OatgmG6lg1FYUU7+Yiw8XMWMD/zUYJ2xCJkrHdjI=;
 h=Date:From:To:Subject:From;
 b=E0ZCY19dQ6MwmiXkOb5X3KZiNYqZtzcc/Qr+C04O2ESetpX5Z0cutobQi3DQ3WxNM
 tbqw7bp+2P8E5zPnb8mlN5i96YiO72ZzjPdDFYvmBBOe7zuRywVmlX/oylnjSRj+75
 GZgLTd2HN6H1ufYvmoEblOnIeEfARJ3Dw5NHxzSosvWlSgQV3w0GYoRJYbnlJ7Oo1W
 +woU28OevQUwp1tTwqhYanwtmoQPrfnBQNQxBWdXRtnXjqAI7y3lVs0MgUbYTzUgiJ
 T25fOfsKCGgGDIi2A88Zv7L/Ia2IXBrHdJWXInGxOlto3woRLVkjns0UvMOuNi4bOe
 4RxVxz/JGR3nQ==
Received: from www.150mpg.com (www.150mpg.com [192.168.0.6])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256)
 (No client certificate requested)
 by smtp.150mpg.com (Postfix) with ESMTPS id 6B244840287
 for &lt;submit@bugs.debian.org&gt;; Thu,  4 Sep 2025 21:10:20 -0500 (CDT)
Received: from www.150mpg.com (localhost [IPv6:::1])
 by www.150mpg.com (Postfix) with ESMTP id CE2425C13E2
 for &lt;submit@bugs.debian.org&gt;; Thu,  4 Sep 2025 21:10:19 -0500 (CDT)
MIME-Version: 1.0
Date: Thu, 04 Sep 2025 21:10:19 -0500
From: &quot;Bryan K. Walton&quot; &lt;bkw.2524721@150mpg.com&gt;
To: submit@bugs.debian.org
Subject: pinentry-fltk depends upon fltk-1.3
Message-ID: &lt;d6093d6a9aa954d3cd95a63e0938ee19@150mpg.com&gt;
X-Sender: bkw.2524721@150mpg.com
Content-Type: text/plain; charset=US-ASCII;
 format=flowed
Content-Transfer-Encoding: 7bit
X-Greylist: delayed 649 seconds by postgrey-1.37 at buxtehude;
 Fri, 05 Sep 2025 02:21:17 UTC
Delivered-To: submit@bugs.debian.org

Package: pinentry-fltk
Version: 1.3.1-2

I'm not sure if this is a bug or intentional, but while Fltk 1.4.3 
(which is both Wayland and X11 compatible) is present in trixie, 
pinentry-fltk appears to still require the older version 1.3 of Fltk.  
This prevents the pinentry-fltk package from being Wayland compatible.  
packages.debian.org reports that pinentry-fltk is dependent upon 
libfltk1.3t64.  I have confirmed that pinentry-fltk doesn't work in 
Wayland unless Xwayland is installed.  This dependency on the older 
version of the fltk library is present not only in Trixie, but also in 
testing and unstable.

If at all possible, I suggest that pinentry-fltk be compiled again fltk 
1.4.x.

I am using Debian GNU/Linux 13.0, kernel 6.12.41+deb13-amd64 and libc6 
2.41-12.
]