Your message dated Fri, 15 Jul 2005 11:09:19 +0100 with message-id <[EMAIL PROTECTED]> has caused the Debian Bug report #287960, regarding putty: FTBFS (amd64/gcc-4.0): pointer targets in passing argument 2 of 'hmacmd5_key' differ in signedness to be marked as having been forwarded to the upstream software author(s) [EMAIL PROTECTED]
(NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --------------------------------------- Received: (at 287960-forwarded) by bugs.debian.org; 15 Jul 2005 10:09:22 +0000 >From [EMAIL PROTECTED] Fri Jul 15 03:09:22 2005 Return-path: <[EMAIL PROTECTED]> Received: from mail.metronet.co.uk [213.162.97.75] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DtN8E-0005de-00; Fri, 15 Jul 2005 03:09:22 -0700 Received: from riva.pelham.vpn.ucam.org (83-216-156-196.colinw664.adsl.metronet.co.uk [83.216.156.196]) by smtp.metronet.co.uk (MetroNet Mail) with ESMTP id 873A740C08A; Fri, 15 Jul 2005 11:09:14 +0100 (BST) Received: from cjwatson by riva.pelham.vpn.ucam.org with local (Exim 3.36 #1 (Debian)) id 1DtN8B-0008AU-00; Fri, 15 Jul 2005 11:09:19 +0100 Date: Fri, 15 Jul 2005 11:09:19 +0100 From: Colin Watson <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Cc: Andreas Jochens <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Subject: Re: Bug#287960: putty: FTBFS (amd64/gcc-4.0): pointer targets in passing argument 2 of 'hmacmd5_key' differ in signedness Message-ID: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="mP3DRpeJDSE+ciuQ" Content-Disposition: inline In-Reply-To: <[EMAIL PROTECTED]> User-Agent: Mutt/1.5.9i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: --mP3DRpeJDSE+ciuQ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Sun, Apr 10, 2005 at 12:38:34PM +0100, Colin Watson wrote: > On Mon, Feb 07, 2005 at 11:30:41AM +0000, Jacob Nevins wrote: > > Some similar changes have been made in the upstream CVS code to keep the > > Mac compiler happy. I haven't checked them against your proposals. > > 0.58 still fails with the gcc-4.0 package in Ubuntu 5.04. Removing > -Werror, I get a successful build and the following warnings: The attached patch fixes all warnings with gcc-4.0 on Debian/powerpc unstable. I'm applying a similar patch to the Debian package, since we're now switching to gcc-4.0 as the default compiler. Cheers, -- Colin Watson [EMAIL PROTECTED] --mP3DRpeJDSE+ciuQ Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="gcc-4.0.patch" Index: sshzlib.c =================================================================== --- sshzlib.c (revision 6094) +++ sshzlib.c (working copy) @@ -224,6 +224,7 @@ } st->npending -= i; + defermatch.distance = 0; /* appease compiler */ defermatch.len = 0; deferchr = '\0'; while (len > 0) { Index: ssh.c =================================================================== --- ssh.c (revision 6094) +++ ssh.c (working copy) @@ -1497,7 +1497,7 @@ break; case PKT_STR: argp = va_arg(ap, unsigned char *); - ssh_pkt_addstring(pkt, argp); + ssh_pkt_addstring(pkt, (char *)argp); break; case PKT_BIGNUM: bn = va_arg(ap, Bignum); @@ -1643,7 +1643,7 @@ static void ssh1_pkt_addmp(struct Packet *pkt, Bignum b) { int len = ssh1_bignum_length(b); - unsigned char *data = snewn(len, char); + unsigned char *data = snewn(len, unsigned char); (void) ssh1_write_bignum(data, b); ssh_pkt_adddata(pkt, data, len); sfree(data); @@ -6944,11 +6944,8 @@ * First, offer the public blob to see if the server is * willing to accept it. */ - pub_blob = - (unsigned char *)ssh2_userkey_loadpub(&ssh->cfg.keyfile, - &algorithm, - &pub_blob_len, - NULL); + pub_blob = ssh2_userkey_loadpub(&ssh->cfg.keyfile, &algorithm, + &pub_blob_len, NULL); if (pub_blob) { s->pktout = ssh2_pkt_init(SSH2_MSG_USERAUTH_REQUEST); ssh2_pkt_addstring(s->pktout, s->username); Index: ssh.h =================================================================== --- ssh.h (revision 6094) +++ ssh.h (working copy) @@ -371,8 +371,8 @@ int ssh2_userkey_encrypted(const Filename *filename, char **comment); struct ssh2_userkey *ssh2_load_userkey(const Filename *filename, char *passphrase, const char **errorstr); -char *ssh2_userkey_loadpub(const Filename *filename, char **algorithm, - int *pub_blob_len, const char **errorstr); +unsigned char *ssh2_userkey_loadpub(const Filename *filename, char **algorithm, + int *pub_blob_len, const char **errorstr); int ssh2_save_userkey(const Filename *filename, struct ssh2_userkey *key, char *passphrase); const struct ssh_signkey *find_pubkey_alg(const char *name); Index: unix/gtkwin.c =================================================================== --- unix/gtkwin.c (revision 6094) +++ unix/gtkwin.c (working copy) @@ -1435,22 +1435,23 @@ */ void init_cutbuffers() { + unsigned char empty[] = ""; XChangeProperty(GDK_DISPLAY(), GDK_ROOT_WINDOW(), - XA_CUT_BUFFER0, XA_STRING, 8, PropModeAppend, "", 0); + XA_CUT_BUFFER0, XA_STRING, 8, PropModeAppend, empty, 0); XChangeProperty(GDK_DISPLAY(), GDK_ROOT_WINDOW(), - XA_CUT_BUFFER1, XA_STRING, 8, PropModeAppend, "", 0); + XA_CUT_BUFFER1, XA_STRING, 8, PropModeAppend, empty, 0); XChangeProperty(GDK_DISPLAY(), GDK_ROOT_WINDOW(), - XA_CUT_BUFFER2, XA_STRING, 8, PropModeAppend, "", 0); + XA_CUT_BUFFER2, XA_STRING, 8, PropModeAppend, empty, 0); XChangeProperty(GDK_DISPLAY(), GDK_ROOT_WINDOW(), - XA_CUT_BUFFER3, XA_STRING, 8, PropModeAppend, "", 0); + XA_CUT_BUFFER3, XA_STRING, 8, PropModeAppend, empty, 0); XChangeProperty(GDK_DISPLAY(), GDK_ROOT_WINDOW(), - XA_CUT_BUFFER4, XA_STRING, 8, PropModeAppend, "", 0); + XA_CUT_BUFFER4, XA_STRING, 8, PropModeAppend, empty, 0); XChangeProperty(GDK_DISPLAY(), GDK_ROOT_WINDOW(), - XA_CUT_BUFFER5, XA_STRING, 8, PropModeAppend, "", 0); + XA_CUT_BUFFER5, XA_STRING, 8, PropModeAppend, empty, 0); XChangeProperty(GDK_DISPLAY(), GDK_ROOT_WINDOW(), - XA_CUT_BUFFER6, XA_STRING, 8, PropModeAppend, "", 0); + XA_CUT_BUFFER6, XA_STRING, 8, PropModeAppend, empty, 0); XChangeProperty(GDK_DISPLAY(), GDK_ROOT_WINDOW(), - XA_CUT_BUFFER7, XA_STRING, 8, PropModeAppend, "", 0); + XA_CUT_BUFFER7, XA_STRING, 8, PropModeAppend, empty, 0); } /* Store the data in a cut-buffer. */ @@ -1570,15 +1571,16 @@ struct gui_data *inst = (struct gui_data *)data; if (seldata->target == utf8_string_atom) gtk_selection_data_set(seldata, seldata->target, 8, - inst->pasteout_data_utf8, + (unsigned char *)inst->pasteout_data_utf8, inst->pasteout_data_utf8_len); else if (seldata->target == compound_text_atom) gtk_selection_data_set(seldata, seldata->target, 8, - inst->pasteout_data_ctext, + (unsigned char *)inst->pasteout_data_ctext, inst->pasteout_data_ctext_len); else gtk_selection_data_set(seldata, seldata->target, 8, - inst->pasteout_data, inst->pasteout_data_len); + (unsigned char *)inst->pasteout_data, + inst->pasteout_data_len); } gint selection_clear(GtkWidget *widget, GdkEventSelection *seldata, @@ -2451,15 +2453,16 @@ cfg->line_codepage[sizeof(cfg->line_codepage)-1] = '\0'; } else if (!strcmp(p, "-geometry")) { - int flags, x, y, w, h; + int flags, x, y; + unsigned int w, h; EXPECTS_ARG; SECOND_PASS_ONLY; flags = XParseGeometry(val, &x, &y, &w, &h); if (flags & WidthValue) - cfg->width = w; + cfg->width = (int)w; if (flags & HeightValue) - cfg->height = h; + cfg->height = (int)h; if (flags & (XValue | YValue)) { inst->xpos = x; Index: unix/gtkdlg.c =================================================================== --- unix/gtkdlg.c (revision 6094) +++ unix/gtkdlg.c (working copy) @@ -2605,7 +2605,7 @@ struct eventlog_stuff *es = (struct eventlog_stuff *)data; gtk_selection_data_set(seldata, seldata->target, 8, - es->seldata, es->sellen); + (unsigned char *)es->seldata, es->sellen); } gint eventlog_selection_clear(GtkWidget *widget, GdkEventSelection *seldata, Index: tree234.c =================================================================== --- tree234.c (revision 6094) +++ tree234.c (working copy) @@ -136,6 +136,7 @@ return orig_e; } + n = NULL; np = &t->root; while (*np) { int childnum; Index: sshpubk.c =================================================================== --- sshpubk.c (revision 6094) +++ sshpubk.c (working copy) @@ -865,8 +865,8 @@ return ret; } -char *ssh2_userkey_loadpub(const Filename *filename, char **algorithm, - int *pub_blob_len, const char **errorstr) +unsigned char *ssh2_userkey_loadpub(const Filename *filename, char **algorithm, + int *pub_blob_len, const char **errorstr) { FILE *fp; char header[40], *b; @@ -931,7 +931,7 @@ *pub_blob_len = public_blob_len; if (algorithm) *algorithm = alg->name; - return (char *)public_blob; + return public_blob; /* * Error processing. Index: cmdgen.c =================================================================== --- cmdgen.c (revision 6094) +++ cmdgen.c (working copy) @@ -224,7 +224,7 @@ return TRUE; } -static char *blobfp(char *alg, int bits, char *blob, int bloblen) +static char *blobfp(char *alg, int bits, unsigned char *blob, int bloblen) { char buffer[128]; unsigned char digest[16]; @@ -261,7 +261,8 @@ int sshver = 0; struct ssh2_userkey *ssh2key = NULL; struct RSAKey *ssh1key = NULL; - char *ssh2blob = NULL, *ssh2alg = NULL; + unsigned char *ssh2blob = NULL; + char *ssh2alg = NULL; const struct ssh_signkey *ssh2algf = NULL; int ssh2bloblen; char *passphrase = NULL; @@ -687,11 +688,11 @@ ssh1key = snew(struct RSAKey); if (!load_encrypted) { void *vblob; - char *blob; + unsigned char *blob; int n, l, bloblen; ret = rsakey_pubblob(&infilename, &vblob, &bloblen, &error); - blob = (char *)vblob; + blob = (unsigned char *)vblob; n = 4; /* skip modulus bits */ --mP3DRpeJDSE+ciuQ-- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]