Your message dated Mon, 19 Sep 2005 04:32:05 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#300399: fixed in openswan 1:2.2.0-11
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 19 Mar 2005 13:34:43 +0000
>From [EMAIL PROTECTED] Sat Mar 19 05:34:42 2005
Return-path: <[EMAIL PROTECTED]>
Received: from c223012.adsl.hansenet.de (localhost.localdomain) [213.39.223.12] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DCe6D-0008NB-00; Sat, 19 Mar 2005 05:34:42 -0800
Received: from aj by localhost.localdomain with local (Exim 4.44)
        id 1DCe6C-0000aC-M7; Sat, 19 Mar 2005 14:34:40 +0100
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
From: Andreas Jochens <[EMAIL PROTECTED]>
Subject: openswan: FTBFS (amd64/gcc-4.0): array type has incomplete element type
Message-Id: <[EMAIL PROTECTED]>
Date: Sat, 19 Mar 2005 14:34:40 +0100
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: openswan
Severity: normal
Tags: patch

When building 'openswan' on amd64 with gcc-4.0,
I get the following error:

cc  -I../../programs/pluto/linux26 -I../../include -I../../linux/include     
-DUSE_KEYRR   -DKERNEL26_SUPPORT -DKERNEL26_HAS_KAME_DUPLICATES  
-DX509_VERSION=\"X.509-1.5.4\"   -DPLUTO -DKLIPS -DDEBUG -DGCC_LINT -DIKE_ALG 
-DKERNEL_ALG -DDB_CONTEXT -DAGGRESSIVE -DXAUTH -DMODECFG  -DNAT_TRAVERSAL 
-DVIRTUAL_IP  -DI_KNOW_TRANSPORT_MODE_HAS_SECURITY_CONCERN_BUT_I_WANT_IT    
-DSHARED_SECRETS_FILE=\"/etc/ipsec.secrets\" 
-DPOLICYGROUPSDIR=\"/etc/ipsec.d/policies\" 
-DPERPEERLOGDIR=\"/var/log/pluto/peer\" -g -Wall -W -Wmissing-prototypes 
-Wpointer-arith -Wbad-function-cast -Wcast-qual -Wmissing-declarations 
-Wwrite-strings -Wstrict-prototypes  -c connections.c
In file included from connections.c:62:
../../include/kernel_alg.h:56: error: array type has incomplete element type
../../include/kernel_alg.h:57: error: array type has incomplete element type
connections.c: In function 'extract_end':
connections.c:959: warning: pointer targets in assignment differ in signedness
make[3]: *** [connections.o] Error 1
make[3]: Leaving directory `/openswan-2.3.0/programs/pluto'

With the attached patch 'openswan' can be compiled
on amd64 using gcc-4.0.

The attached patch contains parts which were already necessary with
previous versions of gcc.

Regards
Andreas Jochens

diff -urN ../tmp-orig/openswan-2.3.0/include/kernel_alg.h ./include/kernel_alg.h
--- ../tmp-orig/openswan-2.3.0/include/kernel_alg.h     2004-12-21 
22:02:46.000000000 +0100
+++ ./include/kernel_alg.h      2005-03-19 14:23:23.830193842 +0100
@@ -19,6 +19,7 @@
 #define _KERNEL_ALG_H
 
 struct sadb_msg; /* forward definition */
+#include "pfkeyv2.h"
 
 /* Registration messages from pluto */
 extern void kernel_alg_register_pfkey(const struct sadb_msg *msg, int buflen);
diff -urN ../tmp-orig/openswan-2.3.0/programs/ikeping/ikeping.c 
./programs/ikeping/ikeping.c
--- ../tmp-orig/openswan-2.3.0/programs/ikeping/ikeping.c       2004-10-18 
01:58:59.000000000 +0200
+++ ./programs/ikeping/ikeping.c        2005-03-19 14:18:55.769958865 +0100
@@ -196,7 +196,8 @@
        ip_address sender;
        struct isakmp_hdr ih;
        char   buf[64];
-       int n, rport, sendlen;
+       int n, rport;
+       socklen_t sendlen;
        const char *xchg_name;
        int xchg;
 
diff -urN ../tmp-orig/openswan-2.3.0/programs/starter/cmp.c 
./programs/starter/cmp.c
--- ../tmp-orig/openswan-2.3.0/programs/starter/cmp.c   2004-12-01 
08:33:14.000000000 +0100
+++ ./programs/starter/cmp.c    2005-03-19 14:18:55.769958865 +0100
@@ -24,7 +24,7 @@
 
 #define streqn(a,b) (a)?((b)?(strcmp(a,b)):(-1)):(b!=NULL)
 
-#define STRCMP(obj) if (streqn(c1->obj,c2->obj)) return -1
+#define STRCMP(obj) if (streqn((char*)c1->obj,(char*)c2->obj)) return -1
 #define VARCMP(obj) if (c1->obj!=c2->obj) return -1
 #define MEMCMP(obj) if (memcmp(&c1->obj,&c2->obj,sizeof(c1->obj))) return -1
 #define ADDCMP(obj) if (addrcmp(&c1->obj,&c2->obj)) return -1
diff -urN ../tmp-orig/openswan-2.3.0/programs/starter/confread.c 
./programs/starter/confread.c
--- ../tmp-orig/openswan-2.3.0/programs/starter/confread.c      2004-04-11 
17:17:30.000000000 +0200
+++ ./programs/starter/confread.c       2005-03-19 14:18:55.770958671 +0100
@@ -347,14 +347,14 @@
        char *value = end->strings[KSCF_RSAKEY1];
 
        if (end->rsakey1) free(end->rsakey1);
-       end->rsakey1 = xstrdup(value);
+       end->rsakey1 = (unsigned char*)xstrdup(value);
     }
     if(end->strings[KSCF_RSAKEY2] != NULL)
     {
        char *value = end->strings[KSCF_RSAKEY2];
 
        if (end->rsakey2) free(end->rsakey2);
-       end->rsakey2 = xstrdup(value);
+       end->rsakey2 = (unsigned char*)xstrdup(value);
     }
 
     return err;
@@ -754,14 +754,15 @@
     memset(&conn->link, 0, sizeof(conn->link));
 
 #define CONN_STR(v) if (v) v=xstrdup(v)
+#define CONN_STRU(v) if (v) v=(unsigned char*)xstrdup((char*)v)
     CONN_STR(conn->left.iface);
     CONN_STR(conn->left.id);
-    CONN_STR(conn->left.rsakey1);
-    CONN_STR(conn->left.rsakey2);
+    CONN_STRU(conn->left.rsakey1);
+    CONN_STRU(conn->left.rsakey2);
     CONN_STR(conn->right.iface);
     CONN_STR(conn->right.id);
-    CONN_STR(conn->right.rsakey1);
-    CONN_STR(conn->right.rsakey2);
+    CONN_STRU(conn->right.rsakey1);
+    CONN_STRU(conn->right.rsakey2);
     
     for(i=0; i<KSCF_MAX; i++)
     {
diff -urN ../tmp-orig/openswan-2.3.0/programs/starter/interfaces.c 
./programs/starter/interfaces.c
--- ../tmp-orig/openswan-2.3.0/programs/starter/interfaces.c    2004-04-10 
18:37:37.000000000 +0200
+++ ./programs/starter/interfaces.c     2005-03-19 14:18:55.770958671 +0100
@@ -322,7 +322,7 @@
 int starter_ifaces_load (char **ifaces, unsigned int omtu, int nat_t)
 {
        char *tmp_phys, *phys;
-       int n;
+       unsigned n;
        char **i;
        int sock;
        int j, found;
diff -urN ../tmp-orig/openswan-2.3.0/programs/starter/keywords.c 
./programs/starter/keywords.c
--- ../tmp-orig/openswan-2.3.0/programs/starter/keywords.c      2004-12-02 
17:26:02.000000000 +0100
+++ ./programs/starter/keywords.c       2005-03-19 14:18:55.770958671 +0100
@@ -165,22 +165,22 @@
 
 
 struct keyword_enum_value kw_klipsdebug_values[]={
-    { "all",      LRANGE(KDF_XMIT, KDF_COMP) },
-    { "none",     0 },
-    { "verbose",  LELEM(KDF_VERBOSE) },
-    { "xmit",     LELEM(KDF_XMIT) },
-    { "tunnel-xmit", LELEM(KDF_XMIT) },
-    { "netlink",  LELEM(KDF_NETLINK) },
-    { "xform",    LELEM(KDF_XFORM) },
-    { "eroute",   LELEM(KDF_EROUTE) },
-    { "spi",      LELEM(KDF_SPI) },
-    { "radij",    LELEM(KDF_RADIJ) },
-    { "esp",      LELEM(KDF_ESP) },
-    { "ah",       LELEM(KDF_AH) },
-    { "rcv",      LELEM(KDF_RCV) },
-    { "tunnel",   LELEM(KDF_TUNNEL) },
-    { "pfkey",    LELEM(KDF_PFKEY) },
-    { "comp",     LELEM(KDF_COMP) },
+    { (unsigned char*)"all",      LRANGE(KDF_XMIT, KDF_COMP) },
+    { (unsigned char*)"none",     0 },
+    { (unsigned char*)"verbose",  LELEM(KDF_VERBOSE) },
+    { (unsigned char*)"xmit",     LELEM(KDF_XMIT) },
+    { (unsigned char*)"tunnel-xmit", LELEM(KDF_XMIT) },
+    { (unsigned char*)"netlink",  LELEM(KDF_NETLINK) },
+    { (unsigned char*)"xform",    LELEM(KDF_XFORM) },
+    { (unsigned char*)"eroute",   LELEM(KDF_EROUTE) },
+    { (unsigned char*)"spi",      LELEM(KDF_SPI) },
+    { (unsigned char*)"radij",    LELEM(KDF_RADIJ) },
+    { (unsigned char*)"esp",      LELEM(KDF_ESP) },
+    { (unsigned char*)"ah",       LELEM(KDF_AH) },
+    { (unsigned char*)"rcv",      LELEM(KDF_RCV) },
+    { (unsigned char*)"tunnel",   LELEM(KDF_TUNNEL) },
+    { (unsigned char*)"pfkey",    LELEM(KDF_PFKEY) },
+    { (unsigned char*)"comp",     LELEM(KDF_COMP) },
 };
 
 
@@ -379,7 +379,7 @@
 
        assert(kd->validenum != NULL);
        for(kevcount = kd->validenum->valuesize, kev = kd->validenum->values;
-           kevcount > 0 && strcasecmp(piece, kev->name)!=0;
+           kevcount > 0 && strcasecmp(piece, (const char*)kev->name)!=0;
            kev++, kevcount--);
 
        /* if we found something */
@@ -445,7 +445,7 @@
     assert(kd->validenum != NULL && kd->validenum->values != NULL);
 
     for(kevcount = kd->validenum->valuesize, kev = kd->validenum->values;
-       kevcount > 0 && strcasecmp(s, kev->name)!=0;
+       kevcount > 0 && strcasecmp(s, (const char*)kev->name)!=0;
        kev++, kevcount--);
 
     /* if we found something */
diff -urN ../tmp-orig/openswan-2.3.0/programs/starter/starterwhack.c 
./programs/starter/starterwhack.c
--- ../tmp-orig/openswan-2.3.0/programs/starter/starterwhack.c  2004-12-01 
08:33:14.000000000 +0100
+++ ./programs/starter/starterwhack.c   2005-03-19 14:18:55.771958476 +0100
@@ -152,7 +152,7 @@
        msg.pubkey_alg = PUBKEY_ALG_RSA;
        if (end->id && end->rsakey1) {
                msg.keyid = end->id;
-               err = atobytes(end->rsakey1, 0, keyspace, sizeof(keyspace),
+               err = atobytes((char*)end->rsakey1, 0, keyspace, 
sizeof(keyspace),
                        &msg.keyval.len);
                if (err) {
                        starter_log(LOG_LEVEL_ERR, "conn %s/%s: rsakey 
malformed [%s]",
@@ -160,13 +160,13 @@
                        return 1;
                }
                else {
-                       msg.keyval.ptr = keyspace;
+                       msg.keyval.ptr = (unsigned char*)keyspace;
                        return send_whack_msg(&msg);
                }
        }
        if (end->id && end->rsakey2) {
                msg.keyid = end->id;
-               err = atobytes(end->rsakey2, 0, keyspace, sizeof(keyspace),
+               err = atobytes((char*)end->rsakey2, 0, keyspace, 
sizeof(keyspace),
                        &msg.keyval.len);
                if (err) {
                        starter_log(LOG_LEVEL_ERR, "conn %s/%s: rsakey 
malformed [%s]",
@@ -174,7 +174,7 @@
                        return 1;
                }
                else {
-                       msg.keyval.ptr = keyspace;
+                       msg.keyval.ptr = (unsigned char*)keyspace;
                        return send_whack_msg(&msg);
                }
        }

---------------------------------------
Received: (at 300399-close) by bugs.debian.org; 19 Sep 2005 11:39:10 +0000
>From [EMAIL PROTECTED] Mon Sep 19 04:39:10 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1EHJsT-0005pS-00; Mon, 19 Sep 2005 04:32:05 -0700
From: Rene Mayrhofer <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#300399: fixed in openswan 1:2.2.0-11
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 19 Sep 2005 04:32:05 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: openswan
Source-Version: 1:2.2.0-11

We believe that the bug you reported is fixed in the latest version of
openswan, which is due to be installed in the Debian FTP archive:

kernel-patch-openswan_2.2.0-11_all.deb
  to pool/main/o/openswan/kernel-patch-openswan_2.2.0-11_all.deb
openswan-modules-source_2.2.0-11_all.deb
  to pool/main/o/openswan/openswan-modules-source_2.2.0-11_all.deb
openswan_2.2.0-11.diff.gz
  to pool/main/o/openswan/openswan_2.2.0-11.diff.gz
openswan_2.2.0-11.dsc
  to pool/main/o/openswan/openswan_2.2.0-11.dsc
openswan_2.2.0-11_i386.deb
  to pool/main/o/openswan/openswan_2.2.0-11_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Rene Mayrhofer <[EMAIL PROTECTED]> (supplier of updated openswan package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 13 Sep 2005 09:28:03 +0100
Source: openswan
Binary: openswan-modules-source kernel-patch-openswan openswan
Architecture: source all i386
Version: 1:2.2.0-11
Distribution: unstable
Urgency: low
Maintainer: Rene Mayrhofer <[EMAIL PROTECTED]>
Changed-By: Rene Mayrhofer <[EMAIL PROTECTED]>
Description: 
 kernel-patch-openswan - IPSEC kernel support for Openswan
 openswan   - IPSEC utilities for Openswan
 openswan-modules-source - IPSEC kernel modules source for Openswan
Closes: 287884 300399 320724
Changes: 
 openswan (1:2.2.0-11) unstable; urgency=low
 .
   * Transition upload: depend on libgmp3c2 instead of libgmp3 now (no changes
     to source package at all, only recompiled).
     Closes: #320724: openswan: does not install due to bad libgmp3 dependency
   * Fixed signedness issues and other source code quirks to make it compile
     with gcc 4.0. Thanks to Andreas Jochens for the patch (included it in a
     modified form and extended it at some places). However, there are many
     more cases where the current gcc from unstable comes up with warnings in
     this source code. Therefore enabled the -Werror flag when compiling for
     this transitional upload (define WERROR to be empty in debian/rules).
     Closes: #287884: openswan: FTBFS (amd64/gcc-4.0): pointer targets in
             passing argument 6 of 'recvfrom' differ in signedness
     Closes: #300399: openswan: FTBFS (amd64/gcc-4.0): array type has
             incomplete element type
Files: 
 4b75068056933ae52f890865553860db 751 net optional openswan_2.2.0-11.dsc
 cc3d819903d45adf087533df790f999b 223196 net optional openswan_2.2.0-11.diff.gz
 049a3cce1e8176957c8fe5e8e1714ab1 491848 net optional 
openswan-modules-source_2.2.0-11_all.deb
 edb55b207c786b6147a7a0aadb0e6cdd 492580 net optional 
kernel-patch-openswan_2.2.0-11_all.deb
 33b7e5a4fccf091db2d230b08132f4d4 4923710 net optional 
openswan_2.2.0-11_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDLpoZq7SPDcPCS94RAm5IAKC1I5rbrgyZ3XaNSxUr3XvIX/wEzgCgh2+P
jyQpkz5V+M8px/Ibn5LVPPo=
=8wus
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to