Your message dated Wed, 30 Oct 2024 05:35:29 +0000
with message-id <[email protected]>
and subject line Bug#1086250: fixed in pkcs11-provider 0.5-2
has caused the Debian Bug report #1086250,
regarding pkcs11-provider FTBFS on 32-bit with gcc 14
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1086250: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086250
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: pkcs11-provider
Version: 0.5-1
Severity: serious
Tags: ftbfs

https://buildd.debian.org/status/logs.php?pkg=pkcs11-provider&ver=0.5-1%2Bb1

...
../src/asymmetric_cipher.c: In function ‘p11prov_rsaenc_decrypt’:
../src/asymmetric_cipher.c:422:58: error: passing argument 4 of 
‘p11prov_tls_constant_time_depadding’ from incompatible pointer type 
[-Wincompatible-pointer-types]
  422 |                                                          &out_size, 
&tls_cond);
      |                                                          ^~~~~~~~~
      |                                                          |
      |                                                          CK_ULONG * 
{aka long unsigned int *}
../src/asymmetric_cipher.c:254:45: note: expected ‘size_t *’ {aka ‘unsigned int 
*’} but argument is of type ‘CK_ULONG *’ {aka ‘long unsigned int *’}
  254 |                                     size_t *out_size, CK_ULONG 
*ret_cond)
      |                                     ~~~~~~~~^~~~~~~~
...

--- End Message ---
--- Begin Message ---
Source: pkcs11-provider
Source-Version: 0.5-2
Done: Luca Boccassi <[email protected]>

We believe that the bug you reported is fixed in the latest version of
pkcs11-provider, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luca Boccassi <[email protected]> (supplier of updated pkcs11-provider package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 29 Oct 2024 18:41:42 +0000
Source: pkcs11-provider
Architecture: source
Version: 0.5-2
Distribution: unstable
Urgency: medium
Maintainer: Luca Boccassi <[email protected]>
Changed-By: Luca Boccassi <[email protected]>
Closes: 1086250
Changes:
 pkcs11-provider (0.5-2) unstable; urgency=medium
 .
   * Backport patch to fix build on 32bit architectures (Closes: #1086250)
Checksums-Sha1:
 8953a483fac7996b39eed842e2e12c1588dacdc6 2212 pkcs11-provider_0.5-2.dsc
 e4295eeceb451bdd7860647e302067b1cc47163f 2952 
pkcs11-provider_0.5-2.debian.tar.xz
 08782e4c5e41558e33e1cf59a695aebf87755685 7696 
pkcs11-provider_0.5-2_source.buildinfo
Checksums-Sha256:
 ffdd2c26f4c1003c77e8d14dc33f8114fa4d2c2c195002acf4047afa3cacf2a6 2212 
pkcs11-provider_0.5-2.dsc
 a5e7b44d6ad740617cb5ed8e6e932154e04a7fed4690a00c3d6f21db8230ff94 2952 
pkcs11-provider_0.5-2.debian.tar.xz
 b96d5190aa004598875cce60d9368adefd0feb7e57bd31c18e0de80ef985ed0a 7696 
pkcs11-provider_0.5-2_source.buildinfo
Files:
 9170ed5f0f088659757165d253ba2cf8 2212 libs optional pkcs11-provider_0.5-2.dsc
 7e2c07a8fd1ef5a0b80af757188ac7bb 2952 libs optional 
pkcs11-provider_0.5-2.debian.tar.xz
 3df0b9d1d6326a83089c77e317804201 7696 libs optional 
pkcs11-provider_0.5-2_source.buildinfo
-----BEGIN PGP SIGNATURE-----
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=NGzP
-----END PGP SIGNATURE-----

Attachment: pgpsVUVJLS7Xq.pgp
Description: PGP signature


--- End Message ---

Reply via email to