Your message dated Mon, 1 Feb 2010 00:00:17 +0100
with message-id <[email protected]>
and subject line Bug#524133: fixed in libdkim 1:1.0.19-4
has caused the Debian Bug report #524133,
regarding libdkim0d: compile warnings
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
524133: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524133
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libdkim0d
Version: 1:1.0.19-3
Severity: normal

Please apply the following patch to fix the compile warnings and to increase
the use of const.

diff -ru libdkim-1.0.19.bak/src/Makefile libdkim-1.0.19/src/Makefile
--- libdkim-1.0.19.bak/src/Makefile     2008-03-26 01:17:14.000000000 +1100
+++ libdkim-1.0.19/src/Makefile 2009-04-15 09:41:38.000000000 +1000
@@ -2,11 +2,11 @@
 #
 
 #ifdef LINUX
-CFLAGS  = -c
+CFLAGS  = -c -Wall -Werror
 LFLAGS  = 
 LIBS    = -lcrypto -lresolv
 #else
-CFLAGS  = -c
+CFLAGS  = -c -Wall -Werror
 LFLAGS  = 
 LIBS    = -lcrypto 
 #endif
diff -ru libdkim-1.0.19.bak/src/dkim.cpp libdkim-1.0.19/src/dkim.cpp
--- libdkim-1.0.19.bak/src/dkim.cpp     2008-05-12 20:07:32.000000000 +1000
+++ libdkim-1.0.19/src/dkim.cpp 2009-04-15 09:39:32.000000000 +1000
@@ -172,7 +172,7 @@
 }
 
 
-int DKIM_CALL DKIMVerifyProcess( DKIMContext* pVerifyContext, char* szBuffer, 
int nBufLength )
+int DKIM_CALL DKIMVerifyProcess( DKIMContext* pVerifyContext, const char* 
const szBuffer, int nBufLength )
 {
        CDKIMVerify* pVerify = (CDKIMVerify*)ValidateContext( pVerifyContext, 
false );
 
@@ -226,13 +226,13 @@
 }
 
 
-char* DKIM_CALL DKIMVersion()
+const char* DKIM_CALL DKIMVersion()
 {
        return VERSION_STRING;
 }
 
 
-static char* DKIMErrorStrings[-1-DKIM_MAX_ERROR] = {
+static const char* DKIMErrorStrings[-1-DKIM_MAX_ERROR] = {
        "DKIM_FAIL",
        "DKIM_BAD_SYNTAX",
        "DKIM_SIGNATURE_BAD",
@@ -254,7 +254,7 @@
 };
 
 
-char* DKIM_CALL DKIMGetErrorString( int ErrorCode )
+const char* DKIM_CALL DKIMGetErrorString( int ErrorCode )
 {
        if (ErrorCode >= 0 || ErrorCode <= DKIM_MAX_ERROR)
                return "Unknown";
diff -ru libdkim-1.0.19.bak/src/dkim.h libdkim-1.0.19/src/dkim.h
--- libdkim-1.0.19.bak/src/dkim.h       2008-05-12 20:07:04.000000000 +1000
+++ libdkim-1.0.19/src/dkim.h   2009-04-15 09:39:08.000000000 +1000
@@ -153,14 +153,14 @@
 void DKIM_CALL DKIMSignFree( DKIMContext* pSignContext );
 
 int DKIM_CALL DKIMVerifyInit( DKIMContext* pVerifyContext, DKIMVerifyOptions* 
pOptions );
-int DKIM_CALL DKIMVerifyProcess( DKIMContext* pVerifyContext, char* szBuffer, 
int nBufLength );
+int DKIM_CALL DKIMVerifyProcess( DKIMContext* pVerifyContext, const char* 
szBuffer, int nBufLength );
 int DKIM_CALL DKIMVerifyResults( DKIMContext* pVerifyContext );
 int DKIM_CALL DKIMVerifyGetDetails( DKIMContext* pVerifyContext, int* 
nSigCount, DKIMVerifyDetails** pDetails, char* szPractices );
 void DKIM_CALL DKIMVerifyFree( DKIMContext* pVerifyContext );
 
-char *DKIM_CALL DKIMVersion();
+const char *DKIM_CALL DKIMVersion();
 
-char *DKIM_CALL DKIMGetErrorString( int ErrorCode );
+const char *DKIM_CALL DKIMGetErrorString( int ErrorCode );
 
 #ifdef __cplusplus
 }
diff -ru libdkim-1.0.19.bak/src/dkimbase.cpp libdkim-1.0.19/src/dkimbase.cpp
--- libdkim-1.0.19.bak/src/dkimbase.cpp 2008-05-12 20:07:36.000000000 +1000
+++ libdkim-1.0.19/src/dkimbase.cpp     2009-04-15 10:00:21.000000000 +1000
@@ -118,10 +118,10 @@
 // Process - split buffers into lines without any CRs or LFs at the end.
 //
 
////////////////////////////////////////////////////////////////////////////////
-int CDKIMBase::Process( char* szBuffer, int nBufLength, bool bEOF )
+int CDKIMBase::Process( const char* szBuffer, int nBufLength, bool bEOF )
 {
-       char* p = szBuffer;
-       char* e = szBuffer + nBufLength;
+       const char* p = szBuffer;
+       const char* e = szBuffer + nBufLength;
 
        while( p < e )
        {
@@ -231,7 +231,7 @@
 // ProcessBody - process body line (to be implemented by derived class)
 //
 
////////////////////////////////////////////////////////////////////////////////
-int CDKIMBase::ProcessBody( char* szBuffer, int nBufLength, bool bEOF )
+int CDKIMBase::ProcessBody( const char* szBuffer, int nBufLength, bool bEOF )
 {
        return DKIM_SUCCESS;
 }
@@ -338,9 +338,9 @@
 
        CompressSWSP(sTemp);
 
-       unsigned cpos = sTemp.find(':');
+       string::size_type cpos = sTemp.find(':');
 
-       if (cpos == -1)
+       if (cpos == string::npos)
        {
                // no colon?!
        }
diff -ru libdkim-1.0.19.bak/src/dkimbase.h libdkim-1.0.19/src/dkimbase.h
--- libdkim-1.0.19.bak/src/dkimbase.h   2008-05-12 20:07:24.000000000 +1000
+++ libdkim-1.0.19/src/dkimbase.h       2009-04-15 09:40:41.000000000 +1000
@@ -41,7 +41,7 @@
 
        int Init(void);
 
-       int Process( char* szBuffer, int nBufLength, bool bEOF );
+       int Process( const char* szBuffer, int nBufLength, bool bEOF );
        int ProcessFinal(void);
 
        int Alloc( char*& szBuffer, int nRequiredSize );
@@ -58,7 +58,7 @@
        static string RelaxHeader( const string& sHeader );
 
        virtual int ProcessHeaders(void);
-       virtual int ProcessBody( char* szBuffer, int nBufLength, bool bEOF );
+       virtual int ProcessBody( const char* szBuffer, int nBufLength, bool 
bEOF );
 
 protected:
        char* m_From;
diff -ru libdkim-1.0.19.bak/src/dkimsign.cpp libdkim-1.0.19/src/dkimsign.cpp
--- libdkim-1.0.19.bak/src/dkimsign.cpp 2008-05-12 20:07:46.000000000 +1000
+++ libdkim-1.0.19/src/dkimsign.cpp     2009-04-15 10:17:45.000000000 +1000
@@ -144,7 +144,7 @@
 
        fwrite( szBuffer, 1, nBufLength, fpdebug );
 
-       /** END DEBUG CODE **/
+       ** END DEBUG CODE **/
 
        if( bAllmanOnly )
        {
@@ -555,7 +555,7 @@
 //               if bFold, fold at cbrk char
 //
 
////////////////////////////////////////////////////////////////////////////////
-void CDKIMSign::AddTagToSig( char* Tag, const string &sValue, char cbrk, bool 
bFold )
+void CDKIMSign::AddTagToSig( const char* const Tag, const string &sValue, char 
cbrk, bool bFold )
 {
        int nTagLen = strlen(Tag);
 
@@ -583,10 +583,10 @@
 // AddTagToSig - add tag and numeric value to signature folding if necessary
 //
 
////////////////////////////////////////////////////////////////////////////////
-void CDKIMSign::AddTagToSig( char* Tag, unsigned long nValue )
+void CDKIMSign::AddTagToSig( const char* const Tag, unsigned long nValue )
 {
        char szValue[64];
-       sprintf( szValue, "%u", nValue );
+       sprintf( szValue, "%lu", nValue );
        AddTagToSig( Tag, szValue, 0, false );
 }
 
@@ -686,7 +686,7 @@
 // GetSig - compute hash and return signature header in szSignature
 //
 
////////////////////////////////////////////////////////////////////////////////
-int CDKIMSign::GetSig( char* szPrivKey, char* szSignature, int nSigLength )
+int CDKIMSign::GetSig( char* szPrivKey, char* szSignature, unsigned nSigLength 
)
 {
        if( szPrivKey == NULL )
        {
@@ -794,7 +794,6 @@
        int size;
        int len;
        char* buf;
-       int pos = 0;
        
        // construct the DKIM-Signature: header and add to hash
        InitSig();
@@ -879,7 +878,7 @@
                }
                BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
                BIO_push(b64, bio);
-               if (BIO_write(b64, Hash, nHashLen) < nHashLen) 
+               if (BIO_write(b64, Hash, nHashLen) < (int)nHashLen) 
                {
                  BIO_free_all(b64);
                  return DKIM_OUT_OF_MEMORY;
@@ -993,7 +992,7 @@
     }
     BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
     BIO_push(b64, bio);
-    if (BIO_write(b64, sig, siglen) < siglen) 
+    if (BIO_write(b64, sig, siglen) < (int)siglen) 
        {
       OPENSSL_free(sig);
       BIO_free_all(b64);
diff -ru libdkim-1.0.19.bak/src/dkimsign.h libdkim-1.0.19/src/dkimsign.h
--- libdkim-1.0.19.bak/src/dkimsign.h   2008-05-12 20:07:58.000000000 +1000
+++ libdkim-1.0.19/src/dkimsign.h       2009-04-15 10:17:54.000000000 +1000
@@ -32,7 +32,7 @@
 
        int Init( DKIMSignOptions* pOptions );
 
-       int GetSig( char* szPrivKey, char* szSignature, int nSigLength );
+       int GetSig( char* szPrivKey, char* szSignature, unsigned nSigLength );
        int GetSig2( char* szPrivKey, char** pszSignature );
 
        virtual int ProcessHeaders(void);
@@ -50,8 +50,8 @@
        bool ParseFromAddress( void );
 
        void InitSig(void);
-       void AddTagToSig( char* Tag, const string &sValue, char cbrk, bool 
bFold );
-       void AddTagToSig( char* Tag, unsigned long nValue );
+       void AddTagToSig( const char* const Tag, const string &sValue, char 
cbrk, bool bFold );
+       void AddTagToSig( const char* const Tag, unsigned long nValue );
        void AddInterTagSpace( int nSizeOfNextTag );
        void AddFoldedValueToSig( const string &sValue, char cbrk );
 
diff -ru libdkim-1.0.19.bak/src/dkimverify.cpp libdkim-1.0.19/src/dkimverify.cpp
--- libdkim-1.0.19.bak/src/dkimverify.cpp       2008-05-12 20:08:06.000000000 
+1000
+++ libdkim-1.0.19/src/dkimverify.cpp   2009-04-15 10:15:49.000000000 +1000
@@ -440,7 +440,7 @@
 {
        ProcessFinal();
 
-       int SuccessCount=0;
+       unsigned int SuccessCount=0;
        int TestingFailures=0;
        int RealFailures=0;
 
@@ -646,7 +646,7 @@
        /** END DEBUG CODE **/
 #endif
 
-       if (IsBody && BodyLength != -1)
+       if (IsBody && BodyLength != (unsigned)-1)
        {
                VerifiedBodyCount += nBufLength;
                if (VerifiedBodyCount > BodyLength)
@@ -1019,7 +1019,7 @@
        // body count
        if (values[8] == NULL || !m_HonorBodyLengthTag)
        {
-               sig.BodyLength = -1;
+               sig.BodyLength = (unsigned)-1;
        }
        else
        {
@@ -1057,17 +1057,17 @@
        // expiration time
        if (values[11] == NULL)
        {
-               sig.ExpireTime = -1;
+               sig.ExpireTime = (unsigned)-1;
        }
        else
        {
                if (!ParseUnsigned(values[11], &sig.ExpireTime))
                        return DKIM_BAD_SYNTAX;
 
-               if (sig.ExpireTime != -1)
+               if (sig.ExpireTime != (unsigned)-1)
                {
                        // the value of x= MUST be greater than the value of t= 
if both are present
-                       if (SignedTime != -1 && sig.ExpireTime <= SignedTime)
+                       if (SignedTime != (unsigned)-1 && sig.ExpireTime <= 
SignedTime)
                                return DKIM_BAD_SYNTAX;
 
                        // todo: if possible, use the received date/time 
instead of the current time
@@ -1169,7 +1169,7 @@
 }
 
 
-SelectorInfo::SelectorInfo(const string &sSelector, const string &sDomain) : 
Selector(sSelector), Domain(sDomain)
+SelectorInfo::SelectorInfo(const string &sSelector, const string &sDomain) : 
Domain(sDomain), Selector(sSelector)
 {
        AllowSHA1 = true;
        AllowSHA256 = true;
@@ -1207,7 +1207,7 @@
                        return DKIM_SELECTOR_INVALID;           // todo: maybe 
create a new error code for unsupported selector version
 
                // make sure v= is the first tag in the response        // 
todo: maybe don't enforce this, it seems unnecessary
-               for (int j=1; j<sizeof(values)/sizeof(values[0]); j++)
+               for (unsigned j=1; j<sizeof(values)/sizeof(values[0]); j++)
                {
                        if (values[j] != NULL && values[j] < values[0])
                        {
@@ -1411,8 +1411,8 @@
                                return DKIM_POLICY_DNS_PERM_FAILURE;
                        }
 
-                       unsigned pos = sDomain.find('.');
-                       if (pos == -1 || sDomain.find('.', pos+1) == -1)
+                       string::size_type pos = sDomain.find('.');
+                       if (pos == string::npos || sDomain.find('.', pos+1) == 
string::npos)
                        {
                                // SSP not found but the domain exists, it's 
non-suspicious
                                iSSP = DKIM_SSP_UNKNOWN;
diff -ru libdkim-1.0.19.bak/src/libdkimtest.cpp 
libdkim-1.0.19/src/libdkimtest.cpp
--- libdkim-1.0.19.bak/src/libdkimtest.cpp      2008-05-12 20:08:54.000000000 
+1000
+++ libdkim-1.0.19/src/libdkimtest.cpp  2009-04-15 09:41:06.000000000 +1000
@@ -60,9 +60,9 @@
 int main(int argc, char* argv[])
 {
        int n;
-       char* PrivKeyFile = "test.pem";
-       char* MsgFile = "test.msg";
-       char* OutFile = "signed.msg";
+       const char* PrivKeyFile = "test.pem";
+       const char* MsgFile = "test.msg";
+       const char* OutFile = "signed.msg";
        int nPrivKeyLen;
        char PrivKey[2048];
        char Buffer[1024];

-- System Information:
Debian Release: 5.0.1
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=ANSI_X3.4-1968) 
(ignored: LC_ALL set to C)
Shell: /bin/sh linked to /bin/bash

Versions of packages libdkim0d depends on:
ii  libc6                   2.7-18           GNU C Library: Shared libraries
ii  libgcc1                 1:4.3.2-1.1      GCC support library
ii  libssl0.9.8             0.9.8g-15+lenny1 SSL shared libraries
ii  libstdc++6              4.3.2-1.1        The GNU Standard C++ Library v3

libdkim0d recommends no packages.

libdkim0d suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: libdkim
Source-Version: 1:1.0.19-4

(I'm re-sending this manually with the corrected bug number.)

We believe that the bug you reported is fixed in the latest version of
libdkim, which is due to be installed in the Debian FTP archive:

libdkim-dev_1.0.19-4_amd64.deb
  to pool/main/libd/libdkim/libdkim-dev_1.0.19-4_amd64.deb
libdkim0d-dbg_1.0.19-4_amd64.deb
  to pool/main/libd/libdkim/libdkim0d-dbg_1.0.19-4_amd64.deb
libdkim0d_1.0.19-4_amd64.deb
  to pool/main/libd/libdkim/libdkim0d_1.0.19-4_amd64.deb
libdkim_1.0.19-4.diff.gz
  to pool/main/libd/libdkim/libdkim_1.0.19-4.diff.gz
libdkim_1.0.19-4.dsc
  to pool/main/libd/libdkim/libdkim_1.0.19-4.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Magnus Holmgren <[email protected]> (supplier of updated libdkim package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 14 Sep 2009 22:34:21 +0200
Source: libdkim
Binary: libdkim0d libdkim-dev libdkim0d-dbg
Architecture: source amd64
Version: 1:1.0.19-4
Distribution: unstable
Urgency: low
Maintainer: Magnus Holmgren <[email protected]>
Changed-By: Magnus Holmgren <[email protected]>
Description: 
 libdkim-dev - cryptographically identify the sender of email
 libdkim0d  - cryptographically identify the sender of email
 libdkim0d-dbg - DomainKeys Identified Mail (DKIM) library - debug symbols
Closes: 524147 524147 532058 532740
Changes: 
 libdkim (1:1.0.19-4) unstable; urgency=low
 .
   * Add debug package (Closes: #532058).
   * Use strtok_r() instead of strtok() for thread safety (Closes:
     #532740). Patch by Russel Coker.
   * Include built libdkimtest (Closes: #524147).
   * Move examples from library to dev package.
   * Get rid of warnings through the use of const and more correct types
     (Closes: #524133). Patch by Russel Coker.
   * Upgrade package to Standards-Version 3.8.3:
     + Add README.source.
Checksums-Sha1: 
 2f0a30f8d9dca404ce13b73545dccb8232c95092 1067 libdkim_1.0.19-4.dsc
 d9682d1c7a58ecda8e2651b2fa46d4587e068f06 15048 libdkim_1.0.19-4.diff.gz
 e8d13ef953d2b637d0b204f85dec906246739cf3 39894 libdkim0d_1.0.19-4_amd64.deb
 d383eb44608481f062a2a86c8e44c84ccb5ecf21 50926 libdkim-dev_1.0.19-4_amd64.deb
 3f27b8d5ca7d144e8c3553c0d33e675bf3cdb0c0 139572 libdkim0d-
dbg_1.0.19-4_amd64.deb
Checksums-Sha256: 
 a2f4babeb4c98c6433f46a6698dd438640856ae1d2b27ef9a3a1d3059d2b275f 1067 
libdkim_1.0.19-4.dsc
 856f014afe38c4e77dcf82f7d679051da51147f57c629098da7e90b184e9b880 15048 
libdkim_1.0.19-4.diff.gz
 3c3240865939fd120de966a7cabb498aaf823a96353f687703708bb42e57a603 39894 
libdkim0d_1.0.19-4_amd64.deb
 3b52cca1b5f237c3b890cc1d25ddd149c85c64832174513fb784768fac682142 50926 
libdkim-dev_1.0.19-4_amd64.deb
 bb3e37bf5304f6a854430991beea83147a681b539503bb85601fc1f9a570b668 139572 
libdkim0d-dbg_1.0.19-4_amd64.deb
Files: 
 0e770dca1b1c2458e006030f594bb39b 1067 libs optional libdkim_1.0.19-4.dsc
 4410e506d26de879372614c11d370a6f 15048 libs optional libdkim_1.0.19-4.diff.gz
 77a9f3049bbd82c5d558aa37af2c67ba 39894 libs optional 
libdkim0d_1.0.19-4_amd64.deb
 58d486123b028875518a80ee545b6a98 50926 libdevel optional libdkim-
dev_1.0.19-4_amd64.deb
 c7ffb843db52254ce8d13a8532f04b6f 139572 debug extra libdkim0d-
dbg_1.0.19-4_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkquqTwACgkQk7mRNn1h4+YpwQCeLcAoZHUXWQOKPzjJxl7KL7gg
FeIAoL/unn7ffHiYEtqTyzzMkmmEWK24
=DoxE
-----END PGP SIGNATURE-----

-- 
Magnus Holmgren        [email protected]
Debian Developer 

Attachment: signature.asc
Description: This is a digitally signed message part.


--- End Message ---

Reply via email to