On Wed, Sep 14, 2005 at 04:40:47PM -0600, dann frazier wrote: > Our automated buildd log filter[1] detected a problem that will cause > your package to segfault on architectures where the size of a pointer is > greater than the size of an integer, such as ia64. > > [1]http://people.debian.org/~dannf/check-implicit-pointer-functions > > diff -urN openssh-4.2p1.orig/ssh-gss.h openssh-4.2p1/ssh-gss.h > --- openssh-4.2p1.orig/ssh-gss.h 2005-09-14 15:47:51.000000000 -0600 > +++ openssh-4.2p1/ssh-gss.h 2005-09-14 15:56:04.000000000 -0600 > @@ -135,6 +135,7 @@ > int ssh_gssapi_check_mechanism(gss_OID, void *); > gss_OID ssh_gssapi_id_kex(Gssctxt *, char *); > > +char *ssh_gssapi_server_mechanisms();
Since this is C rather than C++, that prototype should be (void) rather than just (), but otherwise quite right. I've notified the upstream author of this patch and I'll fix it in 1:4.2p1-3. Thanks, -- Colin Watson [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]