Package: openssl-blacklist Version: 0.5-3 Severity: normal openssl-vulnkey fails when applied to a file which is not x509, req or rsa. This breaks doing something like "openssl vulnkey *" in a keys directory, because it stops processing once it fails.
------------------------------------------------------------ $ openssl vulnkey * [...] Traceback (most recent call last): File "/usr/bin/openssl-vulnkey", line 182, in <module> "(not x509, req or rsa)" % (realname) TypeError: not all arguments converted during string formatting ------------------------------------------------------------ The reason is fairly obvious: ------------------------------------------------------------ if not options.quiet: print >> sys.stderr, "Skipped: '%s' is unsupported type " + \ "(not x509, req or rsa)" % (realname) ------------------------------------------------------------ The % operator is more strongly binding than +, therefore it is applied only to the string "(not x509, req or rsa)", not to the string with the '%s'. Sami -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.14.4 (SMP w/8 CPU cores; PREEMPT) Locale: LANG=en_US.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages openssl-blacklist depends on: ii dpkg 1.17.10 ii openssl 1.0.1h-3 ii python 2.7.6-2 openssl-blacklist recommends no packages. openssl-blacklist suggests no packages. -- no debconf information
signature.asc
Description: Digital signature