Your message dated Tue, 14 Feb 2006 21:16:48 -0500
with message-id <[EMAIL PROTECTED]>
and subject line included in last upload
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: anon-proxy
Version: 00.02.39-7
Severity: serious
Tags: patch

Hi,

I tried to rebuild anon-proxy on i386, it fails.
Please find attached patch to fix that. 

Regards

        Petr


diff -ur anon-proxy-00.02.39/CACertificate.cpp anon-proxy.new/CACertificate.cpp
--- anon-proxy-00.02.39/CACertificate.cpp       2003-11-05 17:47:09.000000000 
+0000
+++ anon-proxy.new/CACertificate.cpp    2005-10-23 12:33:49.000000000 +0000
@@ -91,12 +91,12 @@
                return NULL;
        }
 
-CACertificate* CACertificate::decode(UINT8* buff,UINT32 bufflen,UINT32 
type,char* passwd)
+CACertificate* CACertificate::decode(const UINT8* buff,UINT32 bufflen,UINT32 
type,char* passwd)
        {
                if(buff==NULL)
                        return NULL;
                X509* tmpCert=NULL;
-               UINT8* tmp;
+               const UINT8* tmp;
                PKCS12* tmpPKCS12;
                switch(type)
                        {
diff -ur anon-proxy-00.02.39/CACertificate.hpp anon-proxy.new/CACertificate.hpp
--- anon-proxy-00.02.39/CACertificate.hpp       2002-08-06 15:02:55.000000000 
+0000
+++ anon-proxy.new/CACertificate.hpp    2005-10-23 12:34:03.000000000 +0000
@@ -43,7 +43,7 @@
                                        return tmp;
                                }
                        
-                       static CACertificate* decode(UINT8* buff,UINT32 
bufflen,UINT32 type,char* passwd=NULL);
+                       static CACertificate* decode(const UINT8* buff,UINT32 
bufflen,UINT32 type,char* passwd=NULL);
                        static CACertificate* decode(const DOM_Node&node,UINT32 
type,char* passwd=NULL);
                        SINT32 encode(UINT8* buff,UINT32* bufflen,UINT32 type);
                        SINT32 encode(DOM_DocumentFragment& 
docFrag,DOM_Document& doc);
diff -ur anon-proxy-00.02.39/CAIPList.cpp anon-proxy.new/CAIPList.cpp
--- anon-proxy-00.02.39/CAIPList.cpp    2003-08-19 18:26:07.000000000 +0000
+++ anon-proxy.new/CAIPList.cpp 2005-10-23 12:36:37.000000000 +0000
@@ -29,6 +29,7 @@
 #include "CAIPList.hpp"
 #include "CAMsg.hpp"
 #include "CAUtil.hpp"
+#include <openssl/md5.h>
 /** Constructs an empty CAIPList. 
        * The default number #MAXIP_CONNECTIONS of allowed insertions is used*/ 
 CAIPList::CAIPList()
diff -ur anon-proxy-00.02.39/CASignature.cpp anon-proxy.new/CASignature.cpp
--- anon-proxy-00.02.39/CASignature.cpp 2003-12-01 17:15:43.000000000 +0000
+++ anon-proxy.new/CASignature.cpp      2005-10-23 12:37:23.000000000 +0000
@@ -114,7 +114,7 @@
                                        return parseSignKeyXML(buff,len);
 
                                case SIGKEY_PKCS12:
-                                       PKCS12* 
tmpPKCS12=d2i_PKCS12(NULL,(UINT8**)&buff,len);  
+                                       PKCS12* 
tmpPKCS12=d2i_PKCS12(NULL,&buff,len);   
                                        EVP_PKEY* key=NULL;
 //                                     X509* cert=NULL;
                                        
if(PKCS12_parse(tmpPKCS12,passwd,&key,NULL,NULL)!=1)

--- End Message ---
--- Begin Message ---
Version: 00.02.39-8

Since these two bugs, fixed by my recent NMU, have now been
incorporated in the maintainer's upload of 00.02.39-8, I'm closing
these bugs rather than leaving them in the "fixed in NMU" state.

--- End Message ---

Reply via email to