Your message dated Fri, 21 Dec 2012 19:02:34 +0000
with message-id <e1tm7re-0003se...@franck.debian.org>
and subject line Bug#694804: fixed in ykclient 2.8-2
has caused the Debian Bug report #694804,
regarding ykclient: FTBFS: ykclient_set_client_hex (105): Error decoding hex 
string
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
694804: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694804
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ykclient
Version: 2.8-1
Tags: patch
Severity: serious
Justification: fails to build from source

ykclient FTBFS on architectures that have "char" unsigned (arm*, powerpc, s390*):
| Test ../../tests/selftest.c:146 (main): invalid client_id set(a), correct 
client_key, expect HEX_DECODE_ERROR
| ykclient_set_client_hex (105): Error decoding hex string
|
| Test ../../tests/selftest.c:151 (main): invalid client_id set(xx), correct 
client_key, expect HEX_DECODE_ERROR
| ykclient_set_client_hex (105): Error decoding hex string
|
| Test ../../tests/selftest.c:156 (main): hex client_id set, correct 
client_key, expect OK
| ykclient_set_client_hex (0): Success
|
| Test ../../tests/selftest.c:162 (main): validation request, expect 
REPLAYED_OTP
| ykclient_request (2): Yubikey OTP was replayed (REPLAYED_OTP)
| used url: 
http://api.yubico.com/wsapi/2.0/verify?id=1851&nonce=lhzubwgskfxlabuofqiacaxwvtuixywi&otp=dteffujehknhfjbrjnlnldnhcujvddbikngjrtgh&h=fHYKL35B0y7kqG6%2Br3H05r1h1lM%3D
|
| Test ../../tests/selftest.c:171 (main): set deadbeef client_id, expect OK
| ykclient_set_client_hex (0): Success
|
| Test ../../tests/selftest.c:177 (main): validation request, expect 
BAD_SIGNATURE
| ykclient_request (3): Request signature was invalid (BAD_SIGNATURE)
| used url: 
http://api5.yubico.com/wsapi/2.0/verify?id=1851&nonce=fxwrdrtljbstjcirudqhufidchjhdsok&otp=dteffujehknhfjbrjnlnldnhcujvddbikngjrtgh&h=y%2BagFIxlRkO8PxklcmKl3VpCiPU%3D
|
| Test ../../tests/selftest.c:186 (main): b64 set deadbeef client_id, expect OK
| ykclient_set_client_b64 (0): Success
|
| Test ../../tests/selftest.c:196 (main): validation request, expect 
BAD_SERVER_SIGNATURE
| ykclient_request (106): Server response signature was invalid 
(BAD_SERVER_SIGNATURE)
| used url: 
http://api5.yubico.com/wsapi/2.0/verify?id=1851&nonce=qijyqyuxpcunudbyeilsxwzfanraxpxn&otp=dteffujehknhfjbrjnlnldnhcujvddbikngjrtgh&h=haGYbmYaG78McoTstt%2FFgvK14IU%3D
|
| Test ../../tests/selftest.c:210 (main): validation request, expect 
BAD_SIGNATURE
| ykclient_request (3): Request signature was invalid (BAD_SIGNATURE)
| used url: 
http://api5.yubico.com/wsapi/2.0/verify?id=1851&nonce=kbugwnngcvkkjypxyjpowekgbkscyukj&otp=dteffujehknhfjbrjnlnldnhcujvddbikngjrtgh&h=XTOiRnKbNKmpUoYWVEriNpcnRCs%3D
|
| Test ../../tests/selftest.c:220 (main): b64 set client_b64key, expect OK
| ykclient_set_client_b64 (0): Success
|
| Test ../../tests/selftest.c:226 (main): validation request, expect 
REPLAYED_OTP
| ykclient_request (106): Server response signature was invalid 
(BAD_SERVER_SIGNATURE)
| used url: 
http://api5.yubico.com/wsapi/2.0/verify?id=1851&nonce=birkpjutyfkxlayvfcrxdcmzoeeqqtwt&otp=dteffujehknhfjbrjnlnldnhcujvddbikngjrtgh&h=%2BIH11rdoY4o7lXf1%2FugRwAZ6y1o%3D
| /bin/bash: line 5: 21179 Aborted                 ${dir}$tst
| FAIL: selftest

Full build logs:
https://buildd.debian.org/status/fetch.php?pkg=ykclient&arch=armel&ver=2.8-1&stamp=1340955748
https://buildd.debian.org/status/fetch.php?pkg=ykclient&arch=armhf&ver=2.8-1&stamp=1340952606
https://buildd.debian.org/status/fetch.php?pkg=ykclient&arch=powerpc&ver=2.8-1&stamp=1340952559
https://buildd.debian.org/status/fetch.php?pkg=ykclient&arch=s390&ver=2.8-1&stamp=1340993933
https://buildd.debian.org/status/fetch.php?pkg=ykclient&arch=s390x&ver=2.8-1&stamp=1346194901

I believe this is because libb64 decode is broken on these architectures. See the upstream bug:
http://sourceforge.net/tracker/?func=detail&aid=3591129&group_id=152942&atid=785907
Indeed, applying the attached patch fixed FTBFS at least on s390.

Once libb64 is packaged separately in Debian (#694724) you might want use it instead of the embedded copy. It will have this bug fixed, of course. :)

I see that the buggy code is also present in wheezy and squeeze versions which have been built successfully on unsigned-char architectures. Does it mean these versions are unusable the architectures in question?

--
Jakub Wilk
--- ykclient-2.8.orig/b64/cdecode.c
+++ ykclient-2.8/b64/cdecode.c
@@ -9,10 +9,11 @@
 
 int base64_decode_value(char value_in)
 {
-	static const char decoding[] = {62,-1,-1,-1,63,52,53,54,55,56,57,58,59,60,61,-1,-1,-1,-2,-1,-1,-1,0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,-1,-1,-1,-1,-1,-1,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51};
+	static const signed char decoding[] = {62,-1,-1,-1,63,52,53,54,55,56,57,58,59,60,61,-1,-1,-1,-2,-1,-1,-1,0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,-1,-1,-1,-1,-1,-1,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51};
 	static const char decoding_size = sizeof(decoding);
+	if (value_in < 43) return -1;
 	value_in -= 43;
-	if (value_in < 0 || value_in > decoding_size) return -1;
+	if (value_in > decoding_size) return -1;
 	return decoding[(int)value_in];
 }
 
@@ -26,7 +27,7 @@
 {
 	const char* codechar = code_in;
 	char* plainchar = plaintext_out;
-	char fragment;
+	int fragment;
 	
 	*plainchar = state_in->plainchar;
 	
@@ -42,7 +43,7 @@
 					state_in->plainchar = *plainchar;
 					return plainchar - plaintext_out;
 				}
-				fragment = (char)base64_decode_value(*codechar++);
+				fragment = base64_decode_value(*codechar++);
 			} while (fragment < 0);
 			*plainchar    = (fragment & 0x03f) << 2;
 	case step_b:
@@ -53,7 +54,7 @@
 					state_in->plainchar = *plainchar;
 					return plainchar - plaintext_out;
 				}
-				fragment = (char)base64_decode_value(*codechar++);
+				fragment = base64_decode_value(*codechar++);
 			} while (fragment < 0);
 			*plainchar++ |= (fragment & 0x030) >> 4;
 			*plainchar    = (fragment & 0x00f) << 4;
@@ -65,7 +66,7 @@
 					state_in->plainchar = *plainchar;
 					return plainchar - plaintext_out;
 				}
-				fragment = (char)base64_decode_value(*codechar++);
+				fragment = base64_decode_value(*codechar++);
 			} while (fragment < 0);
 			*plainchar++ |= (fragment & 0x03c) >> 2;
 			*plainchar    = (fragment & 0x003) << 6;
@@ -77,7 +78,7 @@
 					state_in->plainchar = *plainchar;
 					return plainchar - plaintext_out;
 				}
-				fragment = (char)base64_decode_value(*codechar++);
+				fragment = base64_decode_value(*codechar++);
 			} while (fragment < 0);
 			*plainchar++   |= (fragment & 0x03f);
 		}

--- End Message ---
--- Begin Message ---
Source: ykclient
Source-Version: 2.8-2

We believe that the bug you reported is fixed in the latest version of
ykclient, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 694...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Tollef Fog Heen <tfh...@debian.org> (supplier of updated ykclient package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 21 Dec 2012 19:48:28 +0100
Source: ykclient
Binary: libykclient3 libykclient-dev
Architecture: source amd64
Version: 2.8-2
Distribution: unstable
Urgency: low
Maintainer: Tollef Fog Heen <tfh...@debian.org>
Changed-By: Tollef Fog Heen <tfh...@debian.org>
Description: 
 libykclient-dev - Yubikey client library development files
 libykclient3 - Yubikey client library runtime
Closes: 682873 694804
Changes: 
 ykclient (2.8-2) unstable; urgency=low
 .
   * Fix FTBFS on signed-char architectures.  Thanks to Jakub Wilk for the
     patch.  Closes: #694804.
   * Apply patch from Ubuntu to disable network for tests.  Thanks to
     Michael Terry for the patch.  Closes: #682873
Checksums-Sha1: 
 475b924f4ebefeeb6c3145dc7ef950047c69598b 1914 ykclient_2.8-2.dsc
 5b7b223ef0f51128d53b23f56525cf2bde11d82d 3452 ykclient_2.8-2.diff.gz
 f4c84053b538a69116abff56dc46be2ffd0b25d1 26808 libykclient3_2.8-2_amd64.deb
 9f9b8fd655341dee0e9fff9663ced2ed3ab532b8 29374 libykclient-dev_2.8-2_amd64.deb
Checksums-Sha256: 
 bd6ff96badfed3092dfb15e613d3c7bdc5a91058582089e3f8d4467a716393f8 1914 
ykclient_2.8-2.dsc
 dbece9109546c502d6acc9d35583f42b6ac7063a6c55b8e18af53eaf509686d1 3452 
ykclient_2.8-2.diff.gz
 a8fbe2b493115d5073aa8eddaf0d39e1cd042c3e14e84993b8fffc430f5b50c2 26808 
libykclient3_2.8-2_amd64.deb
 3712c81ced135ab9ca2c7df460b508476ef604c12d514ebf2ca162d46b402df6 29374 
libykclient-dev_2.8-2_amd64.deb
Files: 
 48e446bfcdd30d6ff563ce834bf793cc 1914 libs optional ykclient_2.8-2.dsc
 63be26df41e0c28bd310f8158d59c378 3452 libs optional ykclient_2.8-2.diff.gz
 cfb0acb8dc78b0eef74733be14ee3755 26808 libs optional 
libykclient3_2.8-2_amd64.deb
 d58c128f0c7560949594e80965ffb736 29374 libdevel optional 
libykclient-dev_2.8-2_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=GXc8
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to