Bug#1064181: binutils: libgprofng0: new symbol name version number is an unintended value

2024-02-19 Thread Hiroyuki YAMAMORI
On 18 Feb 2024, at 23:41 +0100, Matthias Klose  wrote:
> hmm, all these were generated with the pkg-symbolshelper. so probably
> a bug report there would be the right thing to do?

I searched for `pkg-symbolshelper` but couldn't find it.
```
$ apt-cache search pkg-symbolshelper
$ apt-cache search symbolshelper
pkg-kde-tools - various packaging tools and scripts for KDE Applications
```
It seems that `pkgkde-symbolshelper` is included in `pkg-kde-tools` package,
is this it?
No matter what tools you use, maintainers are ultimately responsible for the
correctness of debian files.

"debian/rules" line: 1751
```
   -dpkg-gensymbols -P$(d_gpng) -p$(p_gpng) -l$(d_lib)
```
This is a specification to ignore even if the `dpkg-gensymbols` returns an
error. Until binutils version 2.40-2, there was no prefix '-' in the command
to specify that errors were to be ignored.
As of now, there are no problems with the package dependencies, so I'm not
saying you absolutely need to fix it, but you may not notice the problem if
it occurs in the future.

Thank you,
Hiroyuki YAMAMORI



Bug#1064181: binutils: libgprofng0: new symbol name version number is an unintended value

2024-02-17 Thread Hiroyuki YAMAMORI
Source: binutils
Version: 2.42-2
Severity: normal

Dear Maintainer,

Looking at libgprofng0's debian symbols file
"/var/lib/dpkg/info/libgprofng0\:amd64.symbols" line: 1170
 _ZN3Elf19get_funcname_in_pltEm@Base 2.42-2

As shown above, the version number should be 2.42, but it is 2.42-2.
When I tried to build the package, the following error message appeared.

```
dpkg-gensymbols -Pdebian/libgprofng0 -plibgprofng0 -ldebian/libbinutils
dpkg-gensymbols: warning: some new symbols appeared in the symbols file: see 
diff output below
dpkg-gensymbols: error: some symbols or patterns disappeared in the symbols 
file: see diff output below
dpkg-gensymbols: warning: debian/libgprofng0/DEBIAN/symbols doesn't match 
completely debian/libgprofng0.symbols
--- debian/libgprofng0.symbols (libgprofng0_2.42-2_amd64)
+++ dpkg-gensymbolsx29YlY   2024-02-17 11:53:21.237584672 +0900
@@ -1222,7 +1222,8 @@
  _ZN3Elf15get_bfd_symbolsEv@Base 2.41.50.20231202
  _ZN3Elf16elf_getancillaryEP8Elf_DatajP17S_Elf64_Ancillary@Base 2.41
  _ZN3Elf16get_related_fileEPKcS1_@Base 2.41
- (subst)_ZN3Elf19get_funcname_in_pltE{uint64_t}@Base 2.42
+ _ZN3Elf19get_funcname_in_pltEm@Base 2.42-2
+#MISSING: 2.42-2# (subst)_ZN3Elf19get_funcname_in_pltE{uint64_t}@Base 2.42
  _ZN3Elf20find_ancillary_filesEPc@Base 2.41
  _ZN3Elf4dumpEv@Base 2.41
  _ZN3Elf8elf_initEv@Base 2.41
@@ -1339,9 +1340,11 @@
  (arch=!i386 !x32)_ZN6Disasm12set_addr_endEm@Base 2.41
  (arch=i386 x32)_ZN6Disasm12set_addr_endEy@Base 2.41
  _ZN6Disasm12set_img_nameEPc@Base 2.41
- (subst)_ZN6Disasm14map_PC_to_funcE{uint64_t}@Base 2.42
+ _ZN6Disasm14map_PC_to_funcEm@Base 2.42-2
+#MISSING: 2.42-2# (subst)_ZN6Disasm14map_PC_to_funcE{uint64_t}@Base 2.42
  _ZN6Disasm18remove_disasm_hndlEPv@Base 2.41
- (subst)_ZN6Disasm19get_funcname_in_pltE{uint64_t}@Base 2.42
+ _ZN6Disasm19get_funcname_in_pltEm@Base 2.42-2
+#MISSING: 2.42-2# (subst)_ZN6Disasm19get_funcname_in_pltE{uint64_t}@Base 2.42
  _ZN6DisasmC1E10Platform_tP5Stabs@Base 2.41
  _ZN6DisasmC1EPc@Base 2.41
  _ZN6DisasmC2E10Platform_tP5Stabs@Base 2.41
make: [debian/rules:1625: binary-native] Error 1 (ignored)
```
```
Now running lintian binutils_2.42-2_amd64.changes ...
E: libgprofng0: symbols-file-contains-current-version-with-debian-revision on 
symbol _ZN3Elf19get_funcname_in_pltEm@Base and 2 others (libgprofng.so.0) 
[symbols]
```

As you can see from the above, there are some bad parts in
`debian/libgprofng0.symbols`.
`man 5 deb-src-symbols` does not find `subst` tag.
One fix way is to write the following using `regex` tag.
```
 (regex)"^_ZN3Elf19get_funcname_in_pltE[my]@Base$" 2.42
```
When a function has two or more arguments, for example,
replace `[my]` with `[lmxy]+`, or more simply `.*`.
Another fix way is to write the following using `arch-bits`tag.
```
 (arch-bits=64)_ZN3Elf19get_funcname_in_pltEm@Base 2.42
 (arch-bits=32)_ZN3Elf19get_funcname_in_pltEy@Base 2.42
```

As a suggestion, the following is written in `debian/libgprofng0.symbols`,
but it is ambiguous to list negative types in `arch` tag specification,
so I think it should be avoided.
```
 (arch=!i386 !x32)_Z13dbeGetSamplesiill@Base 2.41
```

Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-18-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages binutils depends on:
ii  binutils-common2.42-2
ii  binutils-x86-64-linux-gnu  2.42-2
ii  libbinutils2.42-2

binutils recommends no packages.

Versions of packages binutils suggests:
pn  binutils-doc  
pn  gprofng-gui   

-- no debconf information



Bug#1009844: debhelper: Build failed with dh_installalternatives: error: Alternative ...

2022-04-18 Thread Hiroyuki YAMAMORI
Package: debhelper
Version: 13.7
Severity: important
Tags: patch

Dear Maintainer,

When rebuilding rsh-redone, the following message is output and the build fails.

dh_installalternatives: error: Alternative "/usr/bin/rsh-redone-rsh" for "rsh" 
in debian/rsh-redone-client.alternatives does not exist in 
debian/rsh-redone-client or is a directory
make: *** [debian/rules:16: binary] Error 25
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2


Solved with the following patch.

--- a/usr/bin/dh_installalternatives
+++ b/usr/bin/dh_installalternatives
@@ -99,7 +99,7 @@ sub _parse_alternative_and_generate_main
if (index($link_name, '/') > -1) {
error(qq{Invalid link name "${link_name}" in 
"${alternatives_file}": Must not contain slash});
}
-   if ( ! -l "${tmpdir}/${impl_path}" or -d _) {
+   if ( ! -e "${tmpdir}/${impl_path}" or -d _ or ! -r _) {
error(qq{Alternative "${impl_path}" for "${link_name}" in 
${alternatives_file} does not exist in ${tmpdir} or is a directory});
}
if ($link_name eq $impl_path) {


Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 5.10.0-13-686-pae (SMP w/3 CPU threads)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages debhelper depends on:
ii  autotools-dev20220109.1
ii  dh-autoreconf20
ii  dh-strip-nondeterminism  1.13.0-1
ii  dpkg 1.21.7
ii  dpkg-dev 1.21.7
ii  dwz  0.14-1
ii  file 1:5.41-3
ii  libdebhelper-perl13.7
ii  libdpkg-perl 1.21.7
ii  man-db   2.10.2-1
ii  perl 5.34.0-4
ii  po-debconf   1.0.21+nmu1

debhelper recommends no packages.

Versions of packages debhelper suggests:
pn  dh-make  

-- no debconf information



Bug#1007808: openssl: can't check signature of orig tarball at build time

2022-03-17 Thread Hiroyuki YAMAMORI
Source: openssl
Version: 1.1.1n-1
Severity: minor
Tags: upstream

Dear Maintainer,

$ debuild -us -uc
   ...
 dpkg-source -b .
dpkg-source: info: using source format '3.0 (quilt)'
dpkg-source: info: building openssl using existing ./openssl_1.1.1n.orig.tar.gz
dpkg-source: info: building openssl using existing 
./openssl_1.1.1n.orig.tar.gz.asc
gpgv: Signature made Tue Mar 15 23:37:53 2022 JST
gpgv:using RSA key 8657ABB260F056B1E5190839D9C4D26D0E604491
gpgv: Note: signatures using the SHA1 algorithm are rejected
gpgv: Can't check signature: Bad public key
dpkg-source: warning: cannot verify signature ./openssl_1.1.1n.orig.tar.gz.asc
   ...

Thank you,
Hiroyuki YAMAMORI

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 5.10.0-12-686-pae (SMP w/3 CPU threads)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled



Bug#962013: fix is incomplete

2020-06-17 Thread Hiroyuki YAMAMORI
Dear Maintainer,

Additional Information:

--- json-c_0.13.1+dfsg-9/debian/json-c-doc.doc-base 2020-06-17 07:16:27 
+
+++ (buster 0.12.1+ds-2)/debian/libjson-c-doc.doc-base  2019-01-20 21:47:40 
+
@@ -1,4 +1,4 @@
-Document: json-c-doc
+Document: libjson-c-doc
 Title: JSON-C (libjson-c) manual
 Author: Metaparadigm Pte Ltd
 Abstract: This manual describe the JSON-C API.


Thank you,
Hiroyuki YAMAMORI



Bug#962013: fix is incomplete (libjson-c-doc: not follow changes about installation directory)

2020-06-17 Thread Hiroyuki YAMAMORI
Dear Maintainer,

The 'debian/json-c-doc.doc-base' file should be renamed to
'debian/libjson-c-doc.doc-base'.

Thank you,
Hiroyuki YAMAMORI



Bug#962013: libjson-c-doc: not follow changes about installation directory

2020-06-01 Thread Hiroyuki YAMAMORI
Package: libjson-c-doc
Version: 0.13.1+dfsg-7
Severity: normal

Dear Maintainer,

With latest debhelper, documentation files are installed in
/usr/share/doc/libjson-c-dev instead of /usr/share/doc/libjson-c-doc.

So there are some odd destination:
/usr/share/doc/libjson-c-doc/html/jquery.js
There is no libjson-c-doc's file in /usr/share/doc-base.

These have been fixed correctly in the buster version:
libjson-c-doc (0.12.1+ds-2).
Changes: debian/libjson-c-doc.links, debian/libjson-c-doc.doc-base


Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.6.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages libjson-c-doc depends on:
ii  libjs-jquery  3.5.1+dfsg-4

libjson-c-doc recommends no packages.

libjson-c-doc suggests no packages.

-- no debconf information



Bug#922177: ubuntu-keyring: invalid symlink if select two or more (postinst script loop loops only once (SC2066))

2019-02-19 Thread Hiroyuki YAMAMORI
Dear Maintainer,

Taking bug #922176 into account, it works well with the following code.

debian/ubuntu-keyring.postinst: line 5
```
case "$1" in
install|configure)

  TRUSTEDPARTS="/etc/apt/tusted.gpg.d/"
  eval "$(apt-config shell TRUSTEDPARTS Dir::Etc::trustedparts/d)"

  # purge old setting before package renaming
  # from ubuntu-archive-keyring to ubuntu-keyring
  if [ -d /usr/share/doc/ubuntu-archive-keyring ]; then
rm -f "${TRUSTEDPARTS}ubuntu-archive-keyring.gpg" \
  "${TRUSTEDPARTS}ubuntu-archive-removed-keys.gpg"
  fi

  . /usr/share/debconf/confmodule
  db_version 2.0
  db_get ubuntu-keyring/keyring

  rm -f "${TRUSTEDPARTS}ubuntu-keyring-2018-archive.gpg" \
"${TRUSTEDPARTS}ubuntu-keyring-2012-archive.gpg" \
"${TRUSTEDPARTS}ubuntu-archive-removed-keys.gpg"

  if [ -n "$RET" ]; then
selected=$(echo "$RET" | sed -e 's/, /\n/g')
echo "$selected" | while read keyring
do
      ln -sf "/usr/share/keyrings/${keyring}.gpg" "$TRUSTEDPARTS"
done
  fi
```

Thank you,
Hiroyuki YAMAMORI



Bug#920486: rsh-client: rcp has CVE-2018-20685 similar to scp

2019-01-28 Thread Hiroyuki YAMAMORI
From: Alberto Gonzalez Iniesta 
Date: Mon, 28 Jan 2019 16:46:21 +0100
> On Sat, Jan 26, 2019 at 02:20:06PM +0900, Hiroyuki YAMAMORI wrote:
>> Package: rsh-client
>> Version: 0.17-19
>> Severity: important
>> Tags: security
>> 
>> Refer Bug #919101
>> 
>> Dear Maintainer,
>> 
>> netkit-rcp also has CVE-2018-20685 and CVE-2019-6111 similar to scp.
> 
> Hi!
> 
> Thanks for noticing.
> 
> Attaching the patch so that others can check it.
> 
> Regards,
> 
> Alberto


I've tried.
Build OK.
There is no problem with the normal case.
I have not done a error case. However, since it is the same as openssh,
so I think it's OK.


Thank you,
Hiroyuki YAMAMORI



Bug#920486: rsh-client: rcp has CVE-2018-20685 similar to scp

2019-01-25 Thread Hiroyuki YAMAMORI
Package: rsh-client
Version: 0.17-19
Severity: important
Tags: security

Refer Bug #919101

Dear Maintainer,

netkit-rcp also has CVE-2018-20685 and CVE-2019-6111 similar to scp.
Source code of the problem below:

"netkit-rsh-0.17/rcp/rcp.c" line 750 (after debian patched)

while (isdigit(*cp))
size = size * 10 + (*cp++ - '0');
if (*cp++ != ' ')
SCREWUP("size not delimited");

if (targisdir) {
char *newbuf;
int need = strlen(targ) + strlen(cp) + 2;
if (need > cursize) {


Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages rsh-client depends on:
ii  libc6  2.28-5

rsh-client recommends no packages.

rsh-client suggests no packages.

-- no debconf information



Bug#920477: gnutls-bin: gnutls-cli benchmark outputs wrong results in 32bit arch

2019-01-25 Thread Hiroyuki YAMAMORI
Package: gnutls-bin
Version: 3.6.5-2
Severity: normal

Dear Maintainer,

Some fast ciphers(suites) are strange results.

$ gnutls-cli --benchmark-ciphers
Checking AEAD ciphers, payload size: 16384
 AES-128-GCM 96.93 MB/sec
 AES-128-CCM 0.31 GB/sec
   CHACHA20-POLY1305 157.18 MB/sec
(snip)
NULL 177.63 MB/sec

$ gnutls-cli --benchmark-tls-ciphers
Testing throughput in cipher/MAC combinations (payload: 1400 bytes)
   AES-128-GCM - TLS1.2  45.26 MB/sec
   AES-128-GCM - TLS1.3  45.01 MB/sec
   AES-128-CCM - TLS1.2  129.46 MB/sec
(snip)

The following code is the cause.

"gnutls-3.6.5/src/benchmark.h" line 45

struct benchmark_st {
struct timespec start;
unsigned long size;  <== 32bit in i386 arch.
sighandler_t old_handler;
#if defined(_WIN32)
HANDLE wtimer;
HANDLE wthread;
LARGE_INTEGER alarm_timeout;
#endif
};

This size variable will overflow.

Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 4.19.0-1-686-pae (SMP w/2 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages gnutls-bin depends on:
ii  libc62.28-5
ii  libgmp10 2:6.1.2+dfsg-4
ii  libgnutls-dane0  3.6.5-2
ii  libgnutls30  3.6.5-2
ii  libhogweed4  3.4.1~rc1-1
ii  libidn2-02.0.5-1
ii  libnettle6   3.4.1~rc1-1
ii  libopts251:5.18.12-4
ii  libp11-kit0  0.23.14-2
ii  libtasn1-6   4.13-3
ii  libunistring20.9.10-1

gnutls-bin recommends no packages.

gnutls-bin suggests no packages.

-- no debconf information



Bug#888884: segfault for no obvious reason on rcp from remote host

2018-02-01 Thread Hiroyuki YAMAMORI
Dear Maintainer,

It will fix with the following patch.

--- netkit-rsh-0.17/rcp/rcp.c
+++ new/rcp/rcp.c
@@ -889,7 +889,11 @@
fprintf(fp, "%c", 0x01);
vfprintf(fp, fmt, ap);
fflush(fp);
-   if (!iamremote) vfprintf(stderr, fmt, ap);
+   if (!iamremote) {
+   va_end(ap);
+   va_start(ap, fmt);
+   vfprintf(stderr, fmt, ap);
+   }
 
va_end(ap);
 }

Bug#366535 will also be fixed with this patch.

Thank you,
Hiroyuki YAMAMORI



Bug#889029: rsh-client: rcp: memory leak

2018-02-01 Thread Hiroyuki YAMAMORI
Package: rsh-client
Version: 0.17-17+b1
Severity: normal
Tags: patch

Dear Maintainer,

The way to reproduce is as follows.

hostA$ mkdir /tmp/src30
hostA$ cd /tmp/src30
hostA$ seq 100 30 | xargs touch

hostB terminal-1: monitor memory use - e.g. top command.

hostB terminal-2: execute the rcp command as follows.

hostB$ mkdir /tmp/dest-0123456789abcdefghijklmnopqrstuvwxyz
hostB$ netkit-rcp -r hostA:/tmp/src30 
/tmp/dest-0123456789abcdefghijklmnopqrstuvwxyz


It will fix with the following patch.

--- netkit-rsh-0.17/rcp/rcp.c
+++ new/rcp/rcp.c
@@ -645,6 +645,8 @@
int ofd, setimes, targisdir;
off64_t size;
char *np, *vect[1], buf[BUFSIZ];
+   char *namebuf = NULL;
+   unsigned cursize = 0, nbase = 0;
 
 #defineatime   tv[0]
 #definemtime   tv[1]
@@ -666,8 +668,11 @@
targisdir = 1;
for (first = 1;; first = 0) {
cp = buf;
-   if (read(rem, cp, 1) <= 0)
+   if (read(rem, cp, 1) <= 0) {
+   if (namebuf)
+   free(namebuf);
return;
+   }
if (*cp++ == '\n')
SCREWUP("unexpected ");
do {
@@ -687,6 +692,8 @@
}
if (buf[0] == 'E') {
(void)write(rem, "", 1);
+   if (namebuf)
+   free(namebuf);
return;
}
 
@@ -741,17 +748,28 @@
if (*cp++ != ' ')
SCREWUP("size not delimited");
if (targisdir) {
-   static char *namebuf;
-   static int cursize;
-   int need;
-
-   need = strlen(targ) + strlen(cp) + 250;
+   char *newbuf;
+   int need = strlen(targ) + strlen(cp) + 2;
if (need > cursize) {
-   if (!(namebuf = malloc(need)))
+   need += 64;
+   if (!(newbuf = malloc(need))) {
error("out of memory\n");
+   exit(1);
+   }
+   if (namebuf) {
+   memcpy(newbuf, namebuf, nbase);
+   newbuf[nbase] = '\0';
+   free(namebuf);
+   } else {
+   strcpy(newbuf, targ);
+   if (*newbuf)
+   strcat(newbuf, "/");
+   nbase = strlen(newbuf);
+   }
+   namebuf = newbuf;
+   cursize = need;
}
-   (void)snprintf(namebuf, need, "%s%s%s", targ,
-   *targ ? "/" : "", cp);
+   strcpy(namebuf + nbase, cp);
    np = namebuf;
}
else

Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.14.0-3-amd64 (SMP w/8 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 
(charmap=UTF-8)

Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages rsh-client depends on:
ii  libc6  2.26-6

rsh-client recommends no packages.

rsh-client suggests no packages.

-- no debconf information



Bug#884042: rsh-redone-client: rsh: stderr is not displayed

2017-12-10 Thread Hiroyuki YAMAMORI
Package: rsh-redone-client
Version: 85-2+b1
Severity: normal
Tags: patch

Dear Maintainer,

For example,

$ rsh-redone-rsh remotehost dd if=/dev/zero count=1 of=/dev/null
$

To reference,

$ netkit-rsh remotehost dd if=/dev/zero count=1 of=/dev/null
1+0 records in
1+0 records out
512 bytes (512 B) copied, 6.5516e-05 s, 7.8 MB/s
$

Fix patch is below.

--- rsh-redone-85/rsh.c 2009-05-04 17:37:38.0 +
+++ rsh-redone-85.new/rsh.c
@@ -396,8 +396,6 @@
FD_SET(2, );
FD_CLR(esock, );
}
-   } else {
-   len[2] = 0;
}
 
if(FD_ISSET(2, )) {

Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.14.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968), LANGUAGE=C 
(charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages rsh-redone-client depends on:
ii  libc6  2.25-3

Versions of packages rsh-redone-client recommends:
ii  openssh-client [rsh-client]  1:7.6p1-2
ii  rsh-client   0.17-17+b1

rsh-redone-client suggests no packages.

-- no debconf information



Bug#864191: libssl-doc: Replaces and Breaks fields in debian/control

2017-06-04 Thread Hiroyuki YAMAMORI
Package: libssl-doc
Version: 1.1.0f-2
Severity: minor

Dear Maintainer,

In "debian/control"

Package: libssl-doc
Section: doc
Architecture: all
Multi-Arch: foreign
Replaces: libssl-dev (<< 1.0.0)
Breaks: libssl-dev (<< 1.0.0)

Should be libssl-dev (<< 1.1.0) ?

Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: 9.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: x32 (x86_64)

Kernel: Linux 4.9.0-3-amd64 (SMP w/3 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

-- no debconf information



Bug#845945: libssl1.0-dev: unnecessary Depends: zlib1g-dev

2016-11-27 Thread Hiroyuki YAMAMORI
Package: libssl1.0-dev
Version: 1.0.2j-4
Severity: minor

Dear Maintainer,

There is an unnecessary dependency same as #767207.

Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: arm64 (aarch64)

Kernel: Linux 3.10.104-pine64 (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages libssl1.0-dev depends on:
ii  libssl1.0.2  1.0.2j-4
ii  zlib1g-dev   1:1.2.8.dfsg-2+b3

Versions of packages libssl1.0-dev recommends:
pn  libssl-doc  

libssl1.0-dev suggests no packages.

-- no debconf information



Bug#813191: openssl: missing a patch filename in debian/patches/series

2016-01-30 Thread Hiroyuki YAMAMORI
Package: libssl-doc
Version: 1.0.2f-2
Severity: minor
Source: openssl

Dear Maintainer,

There is a patch file by the name of libdoc-manpgs-pod-spell.patch in
debian/patches/ directory.
But there is no filename of this in debian/patches/series.
This patch is effective.

Thank you,
Hiroyuki YAMAMORI

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: arm64, armhf

Kernel: Linux 4.3.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=, LC_CTYPE= (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

-- no debconf information



Bug#794218: [Pkg-openssl-devel] Bug#794218: openssl: no display built date

2015-08-01 Thread Hiroyuki YAMAMORI
On Fri, 31 Jul 2015 18:16:36 +0200, Kurt Roeckx wrote:
 This is an intentional change.  Why do you need the date it was
 build?

It's easy to know debian revision changed without using dpkg or apt
commands.
I think built date is a kind of ID.


Thank you.
--
Hiroyuki YAMAMORI


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#794326: openssl: use aarch64_asm in Configure on arm64

2015-08-01 Thread Hiroyuki YAMAMORI
Package: openssl
Version: 1.0.2d-1
Severity: normal
Usertag: arm64

Dear Maintainer,

In arm64 arch, no assembler source use with stretch build now.
On upstream, it's default using assembler sources.
To use assembler sources, modify debian-targets.patch.

debian/patches/debian-targets.patch line 24
+debian-arm64,gcc:-DL_ENDIAN 
${debian_cflags}::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK 
DES_INT DES_UNROLL 
BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR),

change  /${no_asm}/${aarch64_asm}:64/


Thank you.
--
Hiroyuki YAMAMORI


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: arm64 (aarch64)

Kernel: Linux 4.0.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: unable to detect

Versions of packages openssl depends on:
ii  libc62.19-19
ii  libssl1.0.0  1.0.2d-1

openssl recommends no packages.

Versions of packages openssl suggests:
pn  ca-certificates  none

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#774882: [Pkg-openssl-devel] Bug#774882: openssl: fail to verify some sites when 1024bit root CAs removed

2015-07-31 Thread Hiroyuki YAMAMORI
FYI: To disable 1024bit Root CAs

# dpkg-reconfigure ca-certificates

(uncheck disable items in dialog box.)


Thank you.
--
Hiroyuki YAMAMORI


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#794218: openssl: no display built date

2015-07-31 Thread Hiroyuki YAMAMORI
Package: openssl
Version: 1.0.2d-1
Severity: minor

Dear Maintainer,

(jessie - openssl 1.0.1k-3+deb8u1)
$ openssl version -v -b
OpenSSL 1.0.1k 8 Jan 2015
built on: Fri Jun 12 18:48:03 2015

(stretch)
$ openssl version -v -b
OpenSSL 1.0.2d 9 Jul 2015
built on: reproducible build, date unspecified

a fix patch:
--- a/crypto/cversion.c
+++ b/crypto/cversion.c
@@ -68,7 +68,7 @@
 return OPENSSL_VERSION_TEXT;
 if (t == SSLEAY_BUILT_ON) {
 #ifdef DATE
-# ifdef OPENSSL_USE_BUILD_DATE
+# if 1
 return (DATE);
 # else
 return (built on: reproducible build, date unspecified);

Thank you.
--
Hiroyuki YAMAMORI


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: arm64, armhf

Kernel: Linux 4.0.0-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=, LC_CTYPE= (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages openssl depends on:
ii  libc62.19-19
ii  libssl1.0.0  1.0.2d-1

openssl recommends no packages.

Versions of packages openssl suggests:
ii  ca-certificates  20150426

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#774882: openssl: fail to verify some sites when 1024bit root CAs removed

2015-01-08 Thread Hiroyuki YAMAMORI
Package: openssl
Version: 1.0.1j-1
Severity: normal

Dear Maintainer,

To avoid security weakness, when 1024-bit RSA root CAs removed,
verify error occurs in some sites with cross root CA. 

I've seen following,
https://bugzilla.mozilla.org/show_bug.cgi?id=986005#c4

And fixed patch is following,
http://rt.openssl.org/Ticket/Display.html?id=3637user=guestpass=guest
[PATCH] x509: skip certs if in alternative cert chain

I've test this patch. No issues were found.

My tests are following.
1) build openssl packages that applied the patch and install these.
2) remove root CAs in /usr/share/ca-certificates/mozilla/
 Equifax_Secure_*.crt
 GTE_CyberTrust_Global_Root.crt
 Thawte_*.crt
 Verisign_Class_3_Public_Primary_Certification_Authority.crt
 Verisign_Class_3_Public_Primary_Certification_Authority_2.crt
3) [strace] openssl s_client -CApath /etc/ssl/certs -showcerts -connect 
s3.amazonaws.com:443
 test other sites, e.g. www.debian.org, www.geotrust.co.jp, dinahosting.com


Thank you.
--
Hiroyuki YAMAMORI


-- System Information:
Debian Release: 8.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=, LC_CTYPE= (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages openssl depends on:
ii  libc62.19-13
ii  libssl1.0.0  1.0.1j-1+p1

openssl recommends no packages.

Versions of packages openssl suggests:
ii  ca-certificates  20141019

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#767207: libssl-dev: unnecessary Depends: zlib1g-dev

2014-10-29 Thread Hiroyuki YAMAMORI
Package: libssl-dev
Version: 1.0.1j-1
Severity: normal

Dear Maintainer,

in Bug#728055 drop zlib then zlib1g-dev is no longer required.
please remove it from debian/control.

Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: jessie/sid
  APT prefers testing-updates
  APT policy: (500, 'testing-updates'), (500, 'testing')
Architecture: armhf (armv7l)

Kernel: Linux 3.8.13.28p4 (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages libssl-dev depends on:
ii  libssl1.0.0  1.0.1j-1
ii  zlib1g-dev   1:1.2.8.dfsg-2

Versions of packages libssl-dev recommends:
pn  libssl-doc  none

libssl-dev suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#722216: openvpn: Add GCM, CTR and XTS modes patch

2013-09-09 Thread Hiroyuki YAMAMORI
Package: openvpn
Version: 2.3.2-4
Severity: wishlist
Tags: patch

Hello,

I tried following patch.
https://community.openvpn.net/openvpn/attachment/ticket/301
 [0001-Add-AEAD-cipher-modes.patch]

But there are some problems.

1) XTS mode is not AEAD cipher.
2) CCM mode does not work.
   Because EVP_aes_nnn_ccm() functions is not in OpenSSL_add_all_algorithms()
   and referring to following
   http://wiki.openssl.org/index.php/EVP_Authenticated_Encryption_and_Decryption

   CCM mode differ from other modes in a significant way of EVP functions
   calling.
3) In crypto.c: crypto_adjust_frame_parameters() function, size of
   authentication tag is unconsidered.
4) For a reason of packed-id is not encrypted, it makes security weaken.

Then I've made a new patch that was off CCM mode and add CTR mode.
In my case of performance test (with aesni cpu), GCM mode is about 10 % better
than CBC mode, CTR and XTS modes are a few % better than CBC mode.
Note that using GCM mode, specify auth none to config file.

Dear Maintainer,
Please try the patch and send it Upstream.

Thank you,
Hiroyuki YAMAMORI


-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.10-2-amd64 (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages openvpn depends on:
ii  debconf [debconf-2.0]  1.5.51
ii  initscripts2.88dsf-43
ii  iproute2   3.11.0-1
ii  libc6  2.17-92+b1
ii  liblzo2-2  2.06-1.2
ii  libpam0g   1.1.3-9
ii  libpkcs11-helper1  1.10-1
ii  libssl1.0.01.0.1e-3
ii  net-tools  1.60-25

Versions of packages openvpn recommends:
pn  easy-rsa  none

Versions of packages openvpn suggests:
ii  openssl 1.0.1e-3
pn  resolvconf  none

-- debconf information excluded
--- a/configure.ac	2013-05-31 21:00:25.0 +0900
+++ b/configure.ac	2013-09-08 19:19:13.678406806 +0900
@@ -61,6 +61,13 @@
 )
 
 AC_ARG_ENABLE(
+	[xtra-cipher-modes],
+	[AS_HELP_STRING([--disable-xtra-cipher-modes], [disable xtra cipher modes @:@default=yes@:@])],
+	,
+	[enable_xtra_cipher_modes=yes]
+)
+
+AC_ARG_ENABLE(
 	[ssl],
 	[AS_HELP_STRING([--disable-ssl], [disable SSL support for TLS-based key exchange @:@default=yes@:@])],
 	,
@@ -777,6 +784,17 @@
 		[have_openssl_engine=no; break]
 	)
 
+	have_openssl_xtra_cipher_modes=yes
+	AC_CHECK_FUNCS(
+		[ \
+			EVP_aes_256_gcm \
+			EVP_aes_256_ctr \
+			EVP_aes_256_xts \
+		],
+		,
+		[have_openssl_xtra_cipher_modes=no; break]
+	)
+
 	CFLAGS=${saved_CFLAGS}
 	LIBS=${saved_LIBS}
 fi
@@ -947,6 +965,10 @@
 		CRYPTO_SSL_LIBS=${OPENSSL_SSL_LIBS}
 		AC_DEFINE([ENABLE_CRYPTO_OPENSSL], [1], [Use OpenSSL library])
 		test ${have_openssl_engine} = yes  AC_DEFINE([HAVE_OPENSSL_ENGINE], [1], [Use crypto library])
+		if test ${enable_xtra_cipher_modes} = yes; then
+			test ${have_openssl_xtra_cipher_modes} = yes  AC_DEFINE([HAVE_XTRA_CIPHER_MODES], [1], [Use crypto library])
+			test ${have_openssl_xtra_cipher_modes} != yes  AC_MSG_ERROR([Xtra cipher modes required but missing])
+		fi
 		;;
 	polarssl)
 		have_crypto_crypto=${have_polarssl_crypto}
--- a/src/openvpn/crypto.c	2013-05-31 21:00:07.0 +0900
+++ b/src/openvpn/crypto.c	2013-09-09 01:23:49.215559844 +0900
@@ -94,16 +94,21 @@
   if (buf-len  0  opt-key_ctx_bi)
 {
   struct key_ctx *ctx = opt-key_ctx_bi-encrypt;
+  unsigned int mode = 0;
 
   /* Do Encrypt from buf - work */
   if (ctx-cipher)
 	{
 	  uint8_t iv_buf[OPENVPN_MAX_IV_LENGTH];
 	  const int iv_size = cipher_ctx_iv_length (ctx-cipher);
-	  const unsigned int mode = cipher_ctx_mode (ctx-cipher);
+	  int block_size = cipher_ctx_block_size (ctx-cipher);
+	  mode = cipher_ctx_mode (ctx-cipher);
 	  int outlen;
 
-	  if (mode == OPENVPN_MODE_CBC)
+	  if (all_xtra_mode (mode))
+	ASSERT (opt-flags  CO_USE_IV);	/* IV required */
+
+	  if (mode == OPENVPN_MODE_CBC || all_xtra_mode (mode))
 	{
 	  CLEAR (iv_buf);
 
@@ -132,7 +137,7 @@
 	  buf_set_write (b, iv_buf, iv_size);
 	  ASSERT (packet_id_write (pin, b, true, false));
 	}
-	  else /* We only support CBC, CFB, or OFB modes right now */
+	  else /* We only support CBC, CFB, OFB, GCM, CTR or XTS modes right now */
 	{
 	  ASSERT (0);
 	}
@@ -151,7 +156,7 @@
 	  ASSERT (cipher_ctx_reset(ctx-cipher, iv_buf));
 
 	  /* Buffer overflow check */
-	  if (!buf_safe (work, buf-len + cipher_ctx_block_size(ctx-cipher)))
+	  if (!buf_safe (work, buf-len + block_size))
 	{
 	  msg (D_CRYPT_ERRORS, ENCRYPT: buffer size error, bc=%d bo=%d bl=%d wc=%d wo=%d wl=%d cbs=%d,
 		   buf-capacity,
@@ -160,7 +165,7 @@
 		   work.capacity,
 		   work.offset,
 		   work.len,
-		   cipher_ctx_block_size (ctx-cipher));
+		   block_size);
 	  goto err;
 	}
 
@@ -171,7 +176,10 @@
 	  /* Flush the encryption buffer */
 	  ASSERT(cipher_ctx_final(ctx-cipher, BPTR

Bug#681197: grub2: grub-mklayout and at_keyboard.mod have problem with jp keyboard

2013-04-13 Thread Hiroyuki YAMAMORI
Hello,

There is an additional reference.
http://download.microsoft.com/download/1/6/1/161ba512-40e2-4cc9-843a-923143f345
6c/translate.pdf

It makes clear to add 'Keypad comma' code.

include/grub/keyboard_layouts.h:
GRUB_KEYBOARD_KEY_KPCOMMA = 0x85,

grub-core/term/at_keyboard.c:
/* 0x7e */ GRUB_KEYBOARD_KEY_KPCOMMA

util/grub-mklayout.c:
  /* 0x78 */ 0,  GRUB_KEYBOARD_KEY_KPCOMMA,

Thanks,
Hiroyuki YAMAMORI


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#681197: grub2: grub-mklayout and at_keyboard.mod have problem with jp keyboard

2013-04-13 Thread Hiroyuki YAMAMORI
Hello,

 Is it scancode 1 or scnacode 2? What is the value in the other scancode?

It's scancode set 1.
For your reference, I attached my patch.

Thanks,
Hiroyuki YAMAMORI
Index: b/grub-core/term/at_keyboard.c
===
--- a/grub-core/term/at_keyboard.c
+++ b/grub-core/term/at_keyboard.c
@@ -97,7 +97,18 @@
 /* OLPC keys. Just mapped to normal keys.  */
 /* 0x64 */ 0, GRUB_KEYBOARD_KEY_UP,
 /* 0x66 */ GRUB_KEYBOARD_KEY_DOWN,GRUB_KEYBOARD_KEY_LEFT,
-/* 0x68 */ GRUB_KEYBOARD_KEY_RIGHT
+/* 0x68 */ GRUB_KEYBOARD_KEY_RIGHT,   0,
+/* 0x6a */ 0, 0,
+/* 0x6c */ 0, 0,
+/* 0x6e */ 0, 0,
+/* 0x70 */ 0, 0,
+/* 0x72 */ 0, GRUB_KEYBOARD_KEY_INTERNATIONAL1,
+/* 0x74 */ 0, 0,
+/* 0x76 */ 0, 0,
+/* 0x78 */ 0, 0,
+/* 0x7a */ 0, 0,
+/* 0x7c */ 0, GRUB_KEYBOARD_KEY_INTERNATIONAL3,
+/* 0x7e */ GRUB_KEYBOARD_KEY_KPCOMMA
   };
 
 static const struct
Index: b/include/grub/keyboard_layouts.h
===
--- a/include/grub/keyboard_layouts.h
+++ b/include/grub/keyboard_layouts.h
@@ -129,6 +129,9 @@
 GRUB_KEYBOARD_KEY_NUM0 = 0x62,
 GRUB_KEYBOARD_KEY_NUMDOT = 0x63,
 GRUB_KEYBOARD_KEY_102ND = 0x64,
+GRUB_KEYBOARD_KEY_KPCOMMA = 0x85,
+GRUB_KEYBOARD_KEY_INTERNATIONAL1 = 0x87,
+GRUB_KEYBOARD_KEY_INTERNATIONAL3 = 0x89,
 GRUB_KEYBOARD_KEY_LEFT_CTRL = 0xe0,
 GRUB_KEYBOARD_KEY_LEFT_SHIFT = 0xe1,
 GRUB_KEYBOARD_KEY_LEFT_ALT = 0xe2,
Index: b/util/grub-mklayout.c
===
--- a/util/grub-mklayout.c
+++ b/util/grub-mklayout.c
@@ -242,7 +242,7 @@
   /* 0x52 */ GRUB_KEYBOARD_KEY_NUMDOT,  GRUB_KEYBOARD_KEY_NUMDOT, 
   /* 0x54 */ 0, 0, 
   /* 0x56 */ GRUB_KEYBOARD_KEY_102ND,   GRUB_KEYBOARD_KEY_F11, 
-  /* 0x58 */ GRUB_KEYBOARD_KEY_F12, 0,
+  /* 0x58 */ GRUB_KEYBOARD_KEY_F12, GRUB_KEYBOARD_KEY_INTERNATIONAL1,
   /* 0x5a */ 0, 0,
   /* 0x5c */ 0, 0,
   /* 0x5e */ 0, 0,
@@ -253,7 +253,14 @@
   /* 0x68 */ GRUB_KEYBOARD_KEY_PPAGE,   GRUB_KEYBOARD_KEY_LEFT,
   /* 0x6a */ GRUB_KEYBOARD_KEY_RIGHT,   GRUB_KEYBOARD_KEY_END,
   /* 0x6c */ GRUB_KEYBOARD_KEY_DOWN,GRUB_KEYBOARD_KEY_NPAGE, 
-  /* 0x6e */ GRUB_KEYBOARD_KEY_INSERT,  GRUB_KEYBOARD_KEY_DELETE
+  /* 0x6e */ GRUB_KEYBOARD_KEY_INSERT,  GRUB_KEYBOARD_KEY_DELETE,
+  /* 0x70 */ 0, 0,
+  /* 0x72 */ 0, 0,
+  /* 0x74 */ 0, 0,
+  /* 0x76 */ 0, 0,
+  /* 0x78 */ 0, GRUB_KEYBOARD_KEY_KPCOMMA,
+  /* 0x7a */ 0, 0,
+  /* 0x7c */ GRUB_KEYBOARD_KEY_INTERNATIONAL3
 }; 
 
 static void


Bug#299072: Grub cannot read ext2/3 on whole disk (fix patch)

2013-03-01 Thread Hiroyuki YAMAMORI
Hi,
I made a patch that solved the problem.
You, still using grub-legacy, try and enjoy it.

Thanks,
Hiroyuki YAMAMORI
--- 0.97-43/stage2/fsys_ext2fs.c	2008-07-25 14:36:15.0 +0200
+++ grub-0.97/stage2/fsys_ext2fs.c
@@ -307,7 +307,7 @@
 {
   int retval = 1;
 
-  if current_drive  0x80) || (current_slice != 0))
+  if (((current_slice != 0)
 (current_slice != PC_SLICE_TYPE_EXT2FS)
 (current_slice != PC_SLICE_TYPE_LINUX_RAID)
 (! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_EXT2FS))
--- orig/stage2/fsys_fat.c	2005-03-15 17:52:00.0 +0100
+++ grub-0.97/stage2/fsys_fat.c
@@ -70,7 +70,7 @@
   __u32 magic, first_fat;
   
   /* Check partition type for harddisk */
-  if (((current_drive  0x80) || (current_slice != 0))
+  if (current_slice != 0
! IS_PC_SLICE_TYPE_FAT (current_slice)
(! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_MSDOS)))
 return 0;
--- orig/stage2/fsys_ffs.c	2003-07-09 13:45:52.0 +0200
+++ grub-0.97/stage2/fsys_ffs.c
@@ -82,7 +82,7 @@
 {
   int retval = 1;
 
-  if current_drive  0x80) || (current_slice != 0))
+  if ((current_slice != 0
 ! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_BSDFFS))
   || part_length  (SBLOCK + (SBSIZE / DEV_BSIZE))
   || !devread (SBLOCK, 0, SBSIZE, (char *) SUPERBLOCK)
--- orig/stage2/fsys_minix.c	2003-07-09 13:45:53.0 +0200
+++ grub-0.97/stage2/fsys_minix.c
@@ -160,7 +160,7 @@
 int
 minix_mount (void)
 {
-  if (((current_drive  0x80) || current_slice != 0)
+  if (current_slice != 0
! IS_PC_SLICE_TYPE_MINIX (current_slice)
! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_OTHER))
 return 0;			/* The partition is not of MINIX type */
--- orig/stage2/fsys_ufs2.c	2004-06-19 14:17:52.0 +0200
+++ grub-0.97/stage2/fsys_ufs2.c
@@ -87,7 +87,7 @@
   sblockloc = -1;
   type = 0;
   
-  if (! (((current_drive  0x80) || (current_slice != 0))
+  if (! (current_slice != 0
 	  ! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_BSDFFS)))
 {
   for (i = 0; sblock_try[i] != -1; ++i)
--- orig/stage2/fsys_vstafs.c	2003-07-09 13:45:53.0 +0200
+++ grub-0.97/stage2/fsys_vstafs.c
@@ -47,7 +47,7 @@
 {
   int retval = 1;
   
-  if( (((current_drive  0x80) || (current_slice != 0))
+  if( (current_slice != 0
 current_slice != PC_SLICE_TYPE_VSTAFS)
   ||  ! devread (0, 0, BLOCK_SIZE, (char *) FSYS_BUF)
   ||  FIRST_SECTOR-fs_magic != 0xDEADFACE)


Bug#681197: grub2: grub-mklayout and at_keyboard.mod have problem with jp keyboard

2013-01-29 Thread Hiroyuki YAMAMORI
Hello,

Simply, I'd defined those values as unused.
Now, I've referred to below.
HID Usage Tables http://www.usb.org/developers/devclass_docs/Hut1_12v2.pdf
key code mapping http://source.android.com/tech/input/keyboard-devices.html
Linux kernel source linux-2.6.x/include/linux/input.h

Then, it's better to change to
 GRUB_KEYBOARD_KEY_INTERNATIONAL1 0x87,
 GRUB_KEYBOARD_KEY_INTERNATIONAL3 0x89,
 (Same KEY_INTERNATIONAL1 as KEY_RO)
 (Same KEY_INTERNATIONAL3 as KEY_YEN)
and it's better to add
 GRUB_KEYBOARD_KEY_KPCOMMA 0x85,
about grub-2.00/include/grub/keyboard_layouts.h.

Thanks,
Hiroyuki YAMAMORI

On Mon, 28 Jan 2013 09:27:01 +0100, phco...@gmail.com wrote:

  +GRUB_KEYBOARD_KEY_JPBACKSLASH = 0x70,
  +GRUB_KEYBOARD_KEY_JPYEN = 0x71,
 
 Where do these codes come from? According to USB specifications those
 codes are keyboard F21 and F22 respectively.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#681197: grub2: grub-mklayout and at_keyboard.mod have problem with jp keyboard

2012-07-11 Thread Hiroyuki YAMAMORI
Package: grub2
Version: 1.99-22.1
Severity: normal
Tags: patch

Hello,

I tried to setup japanese keyboard layout then some problem occuerd:

$ grub-kbdcomp jp
Unknown keycode 0x7c
Unknown keycode 0x59

# cp jp.gkb /boot/grub/

grub.cfg
insmod at_keyboard
insmod keylayouts
terminal_input at_keyboard
keymap /boot/grub/jp.gkb

grub (no echo at hit '\' keys: upper right side and lower right side)

So, I made patch. it modifies grub-mklayout and at_keyboard.mod.

Thanks,
Hiroyuki YAMAMORI
--- grub-1.99~2.00/grub-core/term/at_keyboard.c	2011-05-14 07:47:57.0 +0900
+++ new/grub-core/term/at_keyboard.c	2012-07-09 22:48:33.0 +0900
@@ -97,7 +97,17 @@
 /* OLPC keys. Just mapped to normal keys.  */
 /* 0x64 */ 0, GRUB_KEYBOARD_KEY_UP,
 /* 0x66 */ GRUB_KEYBOARD_KEY_DOWN,GRUB_KEYBOARD_KEY_LEFT,
-/* 0x68 */ GRUB_KEYBOARD_KEY_RIGHT
+/* 0x68 */ GRUB_KEYBOARD_KEY_RIGHT,   0,
+/* 0x6a */ 0, 0,
+/* 0x6c */ 0, 0,
+/* 0x6e */ 0, 0,
+/* 0x70 */ 0, 0,
+/* 0x72 */ 0, GRUB_KEYBOARD_KEY_JPBACKSLASH,
+/* 0x74 */ 0, 0,
+/* 0x76 */ 0, 0,
+/* 0x78 */ 0, 0,
+/* 0x7a */ 0, 0,
+/* 0x7c */ 0, GRUB_KEYBOARD_KEY_JPYEN
   };
 
 static const struct
--- grub-1.99~2.00/include/grub/keyboard_layouts.h	2010-12-01 23:45:43.0 +0900
+++ new/include/grub/keyboard_layouts.h	2012-07-09 22:30:35.0 +0900
@@ -129,6 +129,8 @@
 GRUB_KEYBOARD_KEY_NUM0 = 0x62,
 GRUB_KEYBOARD_KEY_NUMDOT = 0x63,
 GRUB_KEYBOARD_KEY_102ND = 0x64,
+GRUB_KEYBOARD_KEY_JPBACKSLASH = 0x70,
+GRUB_KEYBOARD_KEY_JPYEN = 0x71,
 GRUB_KEYBOARD_KEY_LEFT_CTRL = 0xe0,
 GRUB_KEYBOARD_KEY_LEFT_SHIFT = 0xe1,
 GRUB_KEYBOARD_KEY_LEFT_ALT = 0xe2,
--- grub-1.99~2.00/util/grub-mklayout.c	2011-01-12 04:41:07.0 +0900
+++ new/util/grub-mklayout.c	2012-07-09 22:37:13.0 +0900
@@ -242,7 +242,7 @@
   /* 0x52 */ GRUB_KEYBOARD_KEY_NUMDOT,  GRUB_KEYBOARD_KEY_NUMDOT, 
   /* 0x54 */ 0, 0, 
   /* 0x56 */ GRUB_KEYBOARD_KEY_102ND,   GRUB_KEYBOARD_KEY_F11, 
-  /* 0x58 */ GRUB_KEYBOARD_KEY_F12, 0,
+  /* 0x58 */ GRUB_KEYBOARD_KEY_F12, GRUB_KEYBOARD_KEY_JPBACKSLASH,
   /* 0x5a */ 0, 0,
   /* 0x5c */ 0, 0,
   /* 0x5e */ 0, 0,
@@ -253,7 +253,14 @@
   /* 0x68 */ GRUB_KEYBOARD_KEY_PPAGE,   GRUB_KEYBOARD_KEY_LEFT,
   /* 0x6a */ GRUB_KEYBOARD_KEY_RIGHT,   GRUB_KEYBOARD_KEY_END,
   /* 0x6c */ GRUB_KEYBOARD_KEY_DOWN,GRUB_KEYBOARD_KEY_NPAGE, 
-  /* 0x6e */ GRUB_KEYBOARD_KEY_INSERT,  GRUB_KEYBOARD_KEY_DELETE
+  /* 0x6e */ GRUB_KEYBOARD_KEY_INSERT,  GRUB_KEYBOARD_KEY_DELETE,
+  /* 0x70 */ 0, 0,
+  /* 0x72 */ 0, 0,
+  /* 0x74 */ 0, 0,
+  /* 0x76 */ 0, 0,
+  /* 0x78 */ 0, 0,
+  /* 0x7a */ 0, 0,
+  /* 0x7c */ GRUB_KEYBOARD_KEY_JPYEN
 }; 
 
 static void


Bug#468454: Debian finger client still doesn't support IPv6

2009-11-20 Thread Hiroyuki YAMAMORI
Hi

I've supported ipv6 and uploaded following place.

http://hyamamor.ddo.jp/ipv6/debian/squeeze-amd64/bsd-finger_0.17-13a~ipv6.diff.gz

and also packages are in the same directory.

note: debian/changelog must be modified.

Thank you.
--
Hiroyuki YAMAMORI



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#468454: Debian finger client still doesn't support IPv6

2009-11-20 Thread Hiroyuki YAMAMORI
Maybe ipv6 service is not available.
Are you check /etc/inetd.conf on the fingerd service machine?
For ipv4 and ipv6 services need 2 lines:

finger stream tcp4 nowait nobody /usr/sbin/tcpd /usr/sbin/in.fingerd
finger stream tcp6 nowait nobody /usr/sbin/tcpd /usr/sbin/in.fingerd

See man inetd.conf

Thank you.
--
Hiroyuki YAMAMORI


From: Jason White ja...@jasonjgw.net

 Thank you for working on this.
 
 I have installed your test package.
 
 When I try to connect to an IPv6-capable host with a finger service running I
 get:
 finger: cannot create socket / connect host
 
 Any suggestions?



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#522337: cvs ignores /etc/gai.conf and prefers ipv6 addresses

2009-05-03 Thread Hiroyuki YAMAMORI
Hi,

I believe it's getaddrinfo(3)'s problem.
I wrote the code same as EXAMPLE of man 3 getaddrinfo.

telnet has same problem:

$ telnet cvs.schmorp.de 2401
Trying 2002:58c6:438b::a00:13...


For the moment, use -4 option:
$ cvs -4 -d :pserver:...

Please forward BTS to libc6.

Thank you.
--
Hiroyuki YAMAMORI h-yam...@db3.so-net.ne.jp



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#489712: ntpdate-debian does not consider numeric IPv6 address.

2008-07-07 Thread Hiroyuki YAMAMORI
Package: ntpdate
Version: 1:4.2.4p4+dfsg-6
Severity: normal
Tags: patch


For example fd00::1, ntpdate-debian does not work.
To fix:
--- /usr/sbin/ntpdate-debian2008-06-16 19:58:12.0 +0900
+++ /usr/sbin/ntpdate-debian2008-07-07 19:02:03.0 +0900
@@ -14,7 +14,7 @@
fi
done
if [ -n $file ]; then
-   NTPSERVERS=$(sed -rne 's/^(servers?|peer) 
([-_.[:alnum:]]+).*$/\2/p' $file | grep -v '^127\.127\.') || [ $? -le 1 ]
+   NTPSERVERS=$(sed -rne 's/^(servers?|peer) 
([-_.:[:alnum:]]+).*$/\2/p' $file | grep -v '^127\.127\.') || [ $? -le 1 ]
fi
 elif [ -r /etc/default/ntpdate.dhcp ]; then
. /etc/default/ntpdate.dhcp

Thanks.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages ntpdate depends on:
ii  libc62.7-10  GNU C Library: Shared libraries
ii  libcap1  1:1.10-14   support for getting/setting POSIX.
ii  libssl0.9.8  0.9.8g-10.1 SSL shared libraries
ii  netbase  4.32Basic TCP/IP networking system

Versions of packages ntpdate recommends:
pn  lockfile-progsnone (no description available)

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#458826: jwm: Multibytes characters title cannot be displayed

2008-01-02 Thread Hiroyuki YAMAMORI
Package: jwm
Version: 2.0.1-1
Severity: normal
Tags: patch

Japanese characters cannot be displayed at title with some application,
e.g. openoffice.org.
The problem is that COMPOUND_TEXT handling is not good.

Following patch fixes it.

Thanks,
Hiroyuki YAMAMORI

diff -u jwm-2.0.1/src/hint.c new/src/hint.c
--- jwm-2.0.1/src/hint.c2007-09-16 19:11:09.0 +0900
+++ new/src/hint.c  2008-01-03 02:16:03.0 +0900
@@ -7,6 +7,7 @@
  *
  */
 
+#include X11/Xlibint.h
 #include jwm.h
 #include hint.h
 #include client.h
@@ -581,6 +582,9 @@
Atom realType;
int realFormat;
unsigned char *name;
+   XTextProperty tprop;
+   char **text_list;
+   int tcount;
 
Assert(np);
 
@@ -597,20 +601,29 @@
   np-name = (char*)name;
}
 
-   if(!np-name) {
-  if(JXFetchName(display, np-window, np-name) == 0) {
- np-name = NULL;
+   if (!np-name) {
+  status = JXGetWindowProperty(display, np-window,
+XA_WM_NAME, 0, 1024, False, atoms[ATOM_COMPOUND_TEXT],
+realType, realFormat, count, extra, name);
+  if (status == Success  realFormat == 8) {
+ tprop.value = name;
+ tprop.encoding = atoms[ATOM_COMPOUND_TEXT];
+ tprop.format = realFormat;
+ tprop.nitems = strlen((char *)name);
+ if (Xutf8TextPropertyToTextList(display, tprop, text_list, tcount)
+   == Success  tcount  0) {
+np-name = Xmalloc(strlen(text_list[0]) + 1);
+if (np-name)
+   strcpy(np-name, text_list[0]);
+XFreeStringList(text_list);
+ }
+ JXFree(name);
   }
}
 
if(!np-name) {
-  status = JXGetWindowProperty(display, np-window, XA_WM_NAME,
- 0, 1024, False, atoms[ATOM_COMPOUND_TEXT], realType,
- realFormat, count, extra, name);
-  if(status != Success) {
+  if(JXFetchName(display, np-window, np-name) == 0) {
  np-name = NULL;
-  } else {
- np-name = (char*)name;
   }
}
 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#375574: netkit-inetd: Please support IPv6 networking

2006-07-17 Thread Hiroyuki YAMAMORI
Hi,

I make IPv6 supported packages.
See below.

http://hyamamor.ddo.jp/ipv6/debian/sid/netkit-base_0.10-10.3.ipv6.r1.diff.gz
http://hyamamor.ddo.jp/ipv6/debian/sid/netkit-inetd_0.10-10.3.ipv6.r1_i386.deb

Thanks,
--
Hiroyuki YAMAMORI [EMAIL PROTECTED]
GnuPG FP: D9D2 F04D DD2D 720E E564  D1EC 4617 22C1 B881 226E


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#335200: tftpd: manpage differ with a new file

2005-10-22 Thread Hiroyuki YAMAMORI
Package: tftpd
Version: 0.17-15
Severity: normal

*** Please type your report below this line ***

`man tftpd' says Files may be written only if they already exist
and are publicly writable. but tftpd 0.17-15 made enable create
a new file.
IMO, tftpd is a traditional app, so it's not necesary that tftpd
create a new file.
If you want to create a new file, install tftpd-hpa.

Thanks,
--
Hiroyuki YAMAMORI [EMAIL PROTECTED]
GnuPG FP: D9D2 F04D DD2D 720E E564  D1EC 4617 22C1 B881 226E

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i586)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13.4
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages tftpd depends on:
ii  libc6 2.3.5-7GNU C Library: Shared libraries an
ii  netbase   4.22   Basic TCP/IP networking system

tftpd recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]