Your message dated Thu, 20 Jun 2024 13:49:47 +0000
with message-id <e1skiad-00agwz...@fasolo.debian.org>
and subject line Bug#1066572: fixed in libpam-pwdfile 2.0-1
has caused the Debian Bug report #1066572,
regarding libpam-pwdfile: FTBFS: bigcrypt.c:62:25: error: implicit declaration
of function ‘crypt’; did you mean ‘bigcrypt’?
[-Werror=implicit-function-declaration]
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1066572: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066572
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libpam-pwdfile
Version: 1.0-1
Severity: serious
Justification: FTBFS
Tags: trixie sid ftbfs
User: lu...@debian.org
Usertags: ftbfs-20240313 ftbfs-trixie ftbfs-impfuncdef
Hi,
During a rebuild of all packages in sid, your package failed to build
on amd64.
This is most likely caused by a change in dpkg 1.22.6, that enabled
-Werror=implicit-function-declaration. For more information, see
https://wiki.debian.org/qa.debian.org/FTBFS#A2024-03-13_-Werror.3Dimplicit-function-declaration
Relevant part (hopefully):
> cc -g -O2 -Werror=implicit-function-declaration
> -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong
> -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection
> -fPIC -fvisibility=hidden -Wdate-time -D_FORTIFY_SOURCE=2 -DUSE_CRYPT_R -c
> -o bigcrypt.o bigcrypt.c
> bigcrypt.c: In function ‘bigcrypt’:
> bigcrypt.c:62:25: error: implicit declaration of function ‘crypt’; did you
> mean ‘bigcrypt’? [-Werror=implicit-function-declaration]
> 62 | strncpy(outptr, crypt(key, salt), SALT_SIZE + ESEGMENT_SIZE);
> | ^~~~~
> | bigcrypt
> bigcrypt.c:62:25: warning: passing argument 2 of ‘strncpy’ makes pointer from
> integer without a cast [-Wint-conversion]
> 62 | strncpy(outptr, crypt(key, salt), SALT_SIZE + ESEGMENT_SIZE);
> | ^~~~~~~~~~~~~~~~
> | |
> | int
> In file included from /usr/include/features.h:490,
> from /usr/include/unistd.h:25,
> from bigcrypt.c:28:
> /usr/include/x86_64-linux-gnu/bits/string_fortified.h:92:1: note: expected
> ‘const char * restrict’ but argument is of type ‘int’
> 92 | __NTH (strncpy (char *__restrict __dest, const char *__restrict __src,
> | ^~~~~
> bigcrypt.c:70:50: warning: passing argument 2 of ‘strncpy’ makes pointer from
> integer without a cast [-Wint-conversion]
> 70 | strncpy(outptr, crypt(key, salt) + SALT_SIZE,
> ESEGMENT_SIZE);
> | ^
> | |
> | int
> /usr/include/x86_64-linux-gnu/bits/string_fortified.h:92:1: note: expected
> ‘const char * restrict’ but argument is of type ‘int’
> 92 | __NTH (strncpy (char *__restrict __dest, const char *__restrict __src,
> | ^~~~~
> cc1: some warnings being treated as errors
> make[1]: *** [<builtin>: bigcrypt.o] Error 1
The full build log is available from:
http://qa-logs.debian.net/2024/03/13/libpam-pwdfile_1.0-1_unstable.log
All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20240313;users=lu...@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20240313&fusertaguser=lu...@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results
A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!
If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects
If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.
--- End Message ---
--- Begin Message ---
Source: libpam-pwdfile
Source-Version: 2.0-1
Done: Timo Weingärtner <t...@tiwe.de>
We believe that the bug you reported is fixed in the latest version of
libpam-pwdfile, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1066...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Timo Weingärtner <t...@tiwe.de> (supplier of updated libpam-pwdfile package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 20 Jun 2024 14:47:20 +0200
Source: libpam-pwdfile
Architecture: source
Version: 2.0-1
Distribution: unstable
Urgency: medium
Maintainer: Timo Weingärtner <t...@tiwe.de>
Changed-By: Timo Weingärtner <t...@tiwe.de>
Closes: 1061849 1066572 1073521
Changes:
libpam-pwdfile (2.0-1) unstable; urgency=medium
.
* New upstream release.
- enable large file support
- do away with legacy crypt types
- INSTALL: mention libxcrypt
* update upstream URLs
* adapt descriptions to upstream changes
* Install PAM module into /usr.
Thanks to Michael Biebl <bi...@debian.org> (Closes: #1061849)
* update to newer packaging standards
* remove trailing space in debian/changelog
* add Build-Depends: libcrypt-dev (Closes: #1066572)
* enable most dpkg-buildflags features
* make debian/copyright cover all files
Checksums-Sha1:
91428854270b24c90b46b4cd2cf94929d63fd753 1922 libpam-pwdfile_2.0-1.dsc
b8424d1fac78144b447790111b9f4926d6fd3143 8123 libpam-pwdfile_2.0.orig.tar.gz
8c42fcc61e3a0be40307baefae53aa6d61957f38 3952
libpam-pwdfile_2.0-1.debian.tar.xz
ea8b7d52508f81cc1e23352b5930254e2dad9e17 6180
libpam-pwdfile_2.0-1_amd64.buildinfo
Checksums-Sha256:
bb5238b87ed989773cac673d6e4c20b5c41ac699ed881c3f05496cfa8d1389f8 1922
libpam-pwdfile_2.0-1.dsc
d3ba8e4a31f0b503e82a8948bd86212a8fc72a64edb4018c476452945ce9a95e 8123
libpam-pwdfile_2.0.orig.tar.gz
a47b40f315bd579887b4d911907775c5bab6a63283cd4c7edcd957ccc7eae9f9 3952
libpam-pwdfile_2.0-1.debian.tar.xz
6e6e9192129c4a6a81c555b24679a264a0947552c3c706b6157ea11c706aa45d 6180
libpam-pwdfile_2.0-1_amd64.buildinfo
Files:
ab4007f05f3919b03e839643c59c078a 1922 admin optional libpam-pwdfile_2.0-1.dsc
9db7579bd55f4bc2dd7799b4ec5c6ab8 8123 admin optional
libpam-pwdfile_2.0.orig.tar.gz
967ef75831d67e6cadfab9210a8ed5dc 3952 admin optional
libpam-pwdfile_2.0-1.debian.tar.xz
db121597b5fe395e05e12aaa04899dcf 6180 admin optional
libpam-pwdfile_2.0-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=8YGT
-----END PGP SIGNATURE-----
pgp3Zkec5gvrE.pgp
Description: PGP signature
--- End Message ---