Bug#1064181: binutils: libgprofng0: new symbol name version number is an unintended value
On 18 Feb 2024, at 23:41 +0100, Matthias Klose wrote: > hmm, all these were generated with the pkg-symbolshelper. so probably > a bug report there would be the right thing to do? I searched for `pkg-symbolshelper` but couldn't find it. ``` $ apt-cache search pkg-symbolshelper $ apt-cache search symbolshelper pkg-kde-tools - various packaging tools and scripts for KDE Applications ``` It seems that `pkgkde-symbolshelper` is included in `pkg-kde-tools` package, is this it? No matter what tools you use, maintainers are ultimately responsible for the correctness of debian files. "debian/rules" line: 1751 ``` -dpkg-gensymbols -P$(d_gpng) -p$(p_gpng) -l$(d_lib) ``` This is a specification to ignore even if the `dpkg-gensymbols` returns an error. Until binutils version 2.40-2, there was no prefix '-' in the command to specify that errors were to be ignored. As of now, there are no problems with the package dependencies, so I'm not saying you absolutely need to fix it, but you may not notice the problem if it occurs in the future. Thank you, Hiroyuki YAMAMORI
Bug#1064181: binutils: libgprofng0: new symbol name version number is an unintended value
Source: binutils Version: 2.42-2 Severity: normal Dear Maintainer, Looking at libgprofng0's debian symbols file "/var/lib/dpkg/info/libgprofng0\:amd64.symbols" line: 1170 _ZN3Elf19get_funcname_in_pltEm@Base 2.42-2 As shown above, the version number should be 2.42, but it is 2.42-2. When I tried to build the package, the following error message appeared. ``` dpkg-gensymbols -Pdebian/libgprofng0 -plibgprofng0 -ldebian/libbinutils dpkg-gensymbols: warning: some new symbols appeared in the symbols file: see diff output below dpkg-gensymbols: error: some symbols or patterns disappeared in the symbols file: see diff output below dpkg-gensymbols: warning: debian/libgprofng0/DEBIAN/symbols doesn't match completely debian/libgprofng0.symbols --- debian/libgprofng0.symbols (libgprofng0_2.42-2_amd64) +++ dpkg-gensymbolsx29YlY 2024-02-17 11:53:21.237584672 +0900 @@ -1222,7 +1222,8 @@ _ZN3Elf15get_bfd_symbolsEv@Base 2.41.50.20231202 _ZN3Elf16elf_getancillaryEP8Elf_DatajP17S_Elf64_Ancillary@Base 2.41 _ZN3Elf16get_related_fileEPKcS1_@Base 2.41 - (subst)_ZN3Elf19get_funcname_in_pltE{uint64_t}@Base 2.42 + _ZN3Elf19get_funcname_in_pltEm@Base 2.42-2 +#MISSING: 2.42-2# (subst)_ZN3Elf19get_funcname_in_pltE{uint64_t}@Base 2.42 _ZN3Elf20find_ancillary_filesEPc@Base 2.41 _ZN3Elf4dumpEv@Base 2.41 _ZN3Elf8elf_initEv@Base 2.41 @@ -1339,9 +1340,11 @@ (arch=!i386 !x32)_ZN6Disasm12set_addr_endEm@Base 2.41 (arch=i386 x32)_ZN6Disasm12set_addr_endEy@Base 2.41 _ZN6Disasm12set_img_nameEPc@Base 2.41 - (subst)_ZN6Disasm14map_PC_to_funcE{uint64_t}@Base 2.42 + _ZN6Disasm14map_PC_to_funcEm@Base 2.42-2 +#MISSING: 2.42-2# (subst)_ZN6Disasm14map_PC_to_funcE{uint64_t}@Base 2.42 _ZN6Disasm18remove_disasm_hndlEPv@Base 2.41 - (subst)_ZN6Disasm19get_funcname_in_pltE{uint64_t}@Base 2.42 + _ZN6Disasm19get_funcname_in_pltEm@Base 2.42-2 +#MISSING: 2.42-2# (subst)_ZN6Disasm19get_funcname_in_pltE{uint64_t}@Base 2.42 _ZN6DisasmC1E10Platform_tP5Stabs@Base 2.41 _ZN6DisasmC1EPc@Base 2.41 _ZN6DisasmC2E10Platform_tP5Stabs@Base 2.41 make: [debian/rules:1625: binary-native] Error 1 (ignored) ``` ``` Now running lintian binutils_2.42-2_amd64.changes ... E: libgprofng0: symbols-file-contains-current-version-with-debian-revision on symbol _ZN3Elf19get_funcname_in_pltEm@Base and 2 others (libgprofng.so.0) [symbols] ``` As you can see from the above, there are some bad parts in `debian/libgprofng0.symbols`. `man 5 deb-src-symbols` does not find `subst` tag. One fix way is to write the following using `regex` tag. ``` (regex)"^_ZN3Elf19get_funcname_in_pltE[my]@Base$" 2.42 ``` When a function has two or more arguments, for example, replace `[my]` with `[lmxy]+`, or more simply `.*`. Another fix way is to write the following using `arch-bits`tag. ``` (arch-bits=64)_ZN3Elf19get_funcname_in_pltEm@Base 2.42 (arch-bits=32)_ZN3Elf19get_funcname_in_pltEy@Base 2.42 ``` As a suggestion, the following is written in `debian/libgprofng0.symbols`, but it is ambiguous to list negative types in `arch` tag specification, so I think it should be avoided. ``` (arch=!i386 !x32)_Z13dbeGetSamplesiill@Base 2.41 ``` Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 6.1.0-18-amd64 (SMP w/4 CPU threads; PREEMPT) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: sysvinit (via /sbin/init) Versions of packages binutils depends on: ii binutils-common2.42-2 ii binutils-x86-64-linux-gnu 2.42-2 ii libbinutils2.42-2 binutils recommends no packages. Versions of packages binutils suggests: pn binutils-doc pn gprofng-gui -- no debconf information
Bug#1009844: debhelper: Build failed with dh_installalternatives: error: Alternative ...
Package: debhelper Version: 13.7 Severity: important Tags: patch Dear Maintainer, When rebuilding rsh-redone, the following message is output and the build fails. dh_installalternatives: error: Alternative "/usr/bin/rsh-redone-rsh" for "rsh" in debian/rsh-redone-client.alternatives does not exist in debian/rsh-redone-client or is a directory make: *** [debian/rules:16: binary] Error 25 dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 Solved with the following patch. --- a/usr/bin/dh_installalternatives +++ b/usr/bin/dh_installalternatives @@ -99,7 +99,7 @@ sub _parse_alternative_and_generate_main if (index($link_name, '/') > -1) { error(qq{Invalid link name "${link_name}" in "${alternatives_file}": Must not contain slash}); } - if ( ! -l "${tmpdir}/${impl_path}" or -d _) { + if ( ! -e "${tmpdir}/${impl_path}" or -d _ or ! -r _) { error(qq{Alternative "${impl_path}" for "${link_name}" in ${alternatives_file} does not exist in ${tmpdir} or is a directory}); } if ($link_name eq $impl_path) { Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 5.10.0-13-686-pae (SMP w/3 CPU threads) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled Versions of packages debhelper depends on: ii autotools-dev20220109.1 ii dh-autoreconf20 ii dh-strip-nondeterminism 1.13.0-1 ii dpkg 1.21.7 ii dpkg-dev 1.21.7 ii dwz 0.14-1 ii file 1:5.41-3 ii libdebhelper-perl13.7 ii libdpkg-perl 1.21.7 ii man-db 2.10.2-1 ii perl 5.34.0-4 ii po-debconf 1.0.21+nmu1 debhelper recommends no packages. Versions of packages debhelper suggests: pn dh-make -- no debconf information
Bug#1007808: openssl: can't check signature of orig tarball at build time
Source: openssl Version: 1.1.1n-1 Severity: minor Tags: upstream Dear Maintainer, $ debuild -us -uc ... dpkg-source -b . dpkg-source: info: using source format '3.0 (quilt)' dpkg-source: info: building openssl using existing ./openssl_1.1.1n.orig.tar.gz dpkg-source: info: building openssl using existing ./openssl_1.1.1n.orig.tar.gz.asc gpgv: Signature made Tue Mar 15 23:37:53 2022 JST gpgv:using RSA key 8657ABB260F056B1E5190839D9C4D26D0E604491 gpgv: Note: signatures using the SHA1 algorithm are rejected gpgv: Can't check signature: Bad public key dpkg-source: warning: cannot verify signature ./openssl_1.1.1n.orig.tar.gz.asc ... Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 5.10.0-12-686-pae (SMP w/3 CPU threads) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled
Bug#962013: fix is incomplete
Dear Maintainer, Additional Information: --- json-c_0.13.1+dfsg-9/debian/json-c-doc.doc-base 2020-06-17 07:16:27 + +++ (buster 0.12.1+ds-2)/debian/libjson-c-doc.doc-base 2019-01-20 21:47:40 + @@ -1,4 +1,4 @@ -Document: json-c-doc +Document: libjson-c-doc Title: JSON-C (libjson-c) manual Author: Metaparadigm Pte Ltd Abstract: This manual describe the JSON-C API. Thank you, Hiroyuki YAMAMORI
Bug#962013: fix is incomplete (libjson-c-doc: not follow changes about installation directory)
Dear Maintainer, The 'debian/json-c-doc.doc-base' file should be renamed to 'debian/libjson-c-doc.doc-base'. Thank you, Hiroyuki YAMAMORI
Bug#962013: libjson-c-doc: not follow changes about installation directory
Package: libjson-c-doc Version: 0.13.1+dfsg-7 Severity: normal Dear Maintainer, With latest debhelper, documentation files are installed in /usr/share/doc/libjson-c-dev instead of /usr/share/doc/libjson-c-doc. So there are some odd destination: /usr/share/doc/libjson-c-doc/html/jquery.js There is no libjson-c-doc's file in /usr/share/doc-base. These have been fixed correctly in the buster version: libjson-c-doc (0.12.1+ds-2). Changes: debian/libjson-c-doc.links, debian/libjson-c-doc.doc-base Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 5.6.0-2-amd64 (SMP w/8 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled Versions of packages libjson-c-doc depends on: ii libjs-jquery 3.5.1+dfsg-4 libjson-c-doc recommends no packages. libjson-c-doc suggests no packages. -- no debconf information
Bug#922177: ubuntu-keyring: invalid symlink if select two or more (postinst script loop loops only once (SC2066))
Dear Maintainer, Taking bug #922176 into account, it works well with the following code. debian/ubuntu-keyring.postinst: line 5 ``` case "$1" in install|configure) TRUSTEDPARTS="/etc/apt/tusted.gpg.d/" eval "$(apt-config shell TRUSTEDPARTS Dir::Etc::trustedparts/d)" # purge old setting before package renaming # from ubuntu-archive-keyring to ubuntu-keyring if [ -d /usr/share/doc/ubuntu-archive-keyring ]; then rm -f "${TRUSTEDPARTS}ubuntu-archive-keyring.gpg" \ "${TRUSTEDPARTS}ubuntu-archive-removed-keys.gpg" fi . /usr/share/debconf/confmodule db_version 2.0 db_get ubuntu-keyring/keyring rm -f "${TRUSTEDPARTS}ubuntu-keyring-2018-archive.gpg" \ "${TRUSTEDPARTS}ubuntu-keyring-2012-archive.gpg" \ "${TRUSTEDPARTS}ubuntu-archive-removed-keys.gpg" if [ -n "$RET" ]; then selected=$(echo "$RET" | sed -e 's/, /\n/g') echo "$selected" | while read keyring do ln -sf "/usr/share/keyrings/${keyring}.gpg" "$TRUSTEDPARTS" done fi ``` Thank you, Hiroyuki YAMAMORI
Bug#920486: rsh-client: rcp has CVE-2018-20685 similar to scp
From: Alberto Gonzalez Iniesta Date: Mon, 28 Jan 2019 16:46:21 +0100 > On Sat, Jan 26, 2019 at 02:20:06PM +0900, Hiroyuki YAMAMORI wrote: >> Package: rsh-client >> Version: 0.17-19 >> Severity: important >> Tags: security >> >> Refer Bug #919101 >> >> Dear Maintainer, >> >> netkit-rcp also has CVE-2018-20685 and CVE-2019-6111 similar to scp. > > Hi! > > Thanks for noticing. > > Attaching the patch so that others can check it. > > Regards, > > Alberto I've tried. Build OK. There is no problem with the normal case. I have not done a error case. However, since it is the same as openssh, so I think it's OK. Thank you, Hiroyuki YAMAMORI
Bug#920486: rsh-client: rcp has CVE-2018-20685 similar to scp
Package: rsh-client Version: 0.17-19 Severity: important Tags: security Refer Bug #919101 Dear Maintainer, netkit-rcp also has CVE-2018-20685 and CVE-2019-6111 similar to scp. Source code of the problem below: "netkit-rsh-0.17/rcp/rcp.c" line 750 (after debian patched) while (isdigit(*cp)) size = size * 10 + (*cp++ - '0'); if (*cp++ != ' ') SCREWUP("size not delimited"); if (targisdir) { char *newbuf; int need = strlen(targ) + strlen(cp) + 2; if (need > cursize) { Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: buster/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-2-amd64 (SMP w/8 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled Versions of packages rsh-client depends on: ii libc6 2.28-5 rsh-client recommends no packages. rsh-client suggests no packages. -- no debconf information
Bug#920477: gnutls-bin: gnutls-cli benchmark outputs wrong results in 32bit arch
Package: gnutls-bin Version: 3.6.5-2 Severity: normal Dear Maintainer, Some fast ciphers(suites) are strange results. $ gnutls-cli --benchmark-ciphers Checking AEAD ciphers, payload size: 16384 AES-128-GCM 96.93 MB/sec AES-128-CCM 0.31 GB/sec CHACHA20-POLY1305 157.18 MB/sec (snip) NULL 177.63 MB/sec $ gnutls-cli --benchmark-tls-ciphers Testing throughput in cipher/MAC combinations (payload: 1400 bytes) AES-128-GCM - TLS1.2 45.26 MB/sec AES-128-GCM - TLS1.3 45.01 MB/sec AES-128-CCM - TLS1.2 129.46 MB/sec (snip) The following code is the cause. "gnutls-3.6.5/src/benchmark.h" line 45 struct benchmark_st { struct timespec start; unsigned long size; <== 32bit in i386 arch. sighandler_t old_handler; #if defined(_WIN32) HANDLE wtimer; HANDLE wthread; LARGE_INTEGER alarm_timeout; #endif }; This size variable will overflow. Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 4.19.0-1-686-pae (SMP w/2 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages gnutls-bin depends on: ii libc62.28-5 ii libgmp10 2:6.1.2+dfsg-4 ii libgnutls-dane0 3.6.5-2 ii libgnutls30 3.6.5-2 ii libhogweed4 3.4.1~rc1-1 ii libidn2-02.0.5-1 ii libnettle6 3.4.1~rc1-1 ii libopts251:5.18.12-4 ii libp11-kit0 0.23.14-2 ii libtasn1-6 4.13-3 ii libunistring20.9.10-1 gnutls-bin recommends no packages. gnutls-bin suggests no packages. -- no debconf information
Bug#888884: segfault for no obvious reason on rcp from remote host
Dear Maintainer, It will fix with the following patch. --- netkit-rsh-0.17/rcp/rcp.c +++ new/rcp/rcp.c @@ -889,7 +889,11 @@ fprintf(fp, "%c", 0x01); vfprintf(fp, fmt, ap); fflush(fp); - if (!iamremote) vfprintf(stderr, fmt, ap); + if (!iamremote) { + va_end(ap); + va_start(ap, fmt); + vfprintf(stderr, fmt, ap); + } va_end(ap); } Bug#366535 will also be fixed with this patch. Thank you, Hiroyuki YAMAMORI
Bug#889029: rsh-client: rcp: memory leak
Package: rsh-client Version: 0.17-17+b1 Severity: normal Tags: patch Dear Maintainer, The way to reproduce is as follows. hostA$ mkdir /tmp/src30 hostA$ cd /tmp/src30 hostA$ seq 100 30 | xargs touch hostB terminal-1: monitor memory use - e.g. top command. hostB terminal-2: execute the rcp command as follows. hostB$ mkdir /tmp/dest-0123456789abcdefghijklmnopqrstuvwxyz hostB$ netkit-rcp -r hostA:/tmp/src30 /tmp/dest-0123456789abcdefghijklmnopqrstuvwxyz It will fix with the following patch. --- netkit-rsh-0.17/rcp/rcp.c +++ new/rcp/rcp.c @@ -645,6 +645,8 @@ int ofd, setimes, targisdir; off64_t size; char *np, *vect[1], buf[BUFSIZ]; + char *namebuf = NULL; + unsigned cursize = 0, nbase = 0; #defineatime tv[0] #definemtime tv[1] @@ -666,8 +668,11 @@ targisdir = 1; for (first = 1;; first = 0) { cp = buf; - if (read(rem, cp, 1) <= 0) + if (read(rem, cp, 1) <= 0) { + if (namebuf) + free(namebuf); return; + } if (*cp++ == '\n') SCREWUP("unexpected "); do { @@ -687,6 +692,8 @@ } if (buf[0] == 'E') { (void)write(rem, "", 1); + if (namebuf) + free(namebuf); return; } @@ -741,17 +748,28 @@ if (*cp++ != ' ') SCREWUP("size not delimited"); if (targisdir) { - static char *namebuf; - static int cursize; - int need; - - need = strlen(targ) + strlen(cp) + 250; + char *newbuf; + int need = strlen(targ) + strlen(cp) + 2; if (need > cursize) { - if (!(namebuf = malloc(need))) + need += 64; + if (!(newbuf = malloc(need))) { error("out of memory\n"); + exit(1); + } + if (namebuf) { + memcpy(newbuf, namebuf, nbase); + newbuf[nbase] = '\0'; + free(namebuf); + } else { + strcpy(newbuf, targ); + if (*newbuf) + strcat(newbuf, "/"); + nbase = strlen(newbuf); + } + namebuf = newbuf; + cursize = need; } - (void)snprintf(namebuf, need, "%s%s%s", targ, - *targ ? "/" : "", cp); + strcpy(namebuf + nbase, cp); np = namebuf; } else Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: buster/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.14.0-3-amd64 (SMP w/8 CPU cores) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages rsh-client depends on: ii libc6 2.26-6 rsh-client recommends no packages. rsh-client suggests no packages. -- no debconf information
Bug#884042: rsh-redone-client: rsh: stderr is not displayed
Package: rsh-redone-client Version: 85-2+b1 Severity: normal Tags: patch Dear Maintainer, For example, $ rsh-redone-rsh remotehost dd if=/dev/zero count=1 of=/dev/null $ To reference, $ netkit-rsh remotehost dd if=/dev/zero count=1 of=/dev/null 1+0 records in 1+0 records out 512 bytes (512 B) copied, 6.5516e-05 s, 7.8 MB/s $ Fix patch is below. --- rsh-redone-85/rsh.c 2009-05-04 17:37:38.0 + +++ rsh-redone-85.new/rsh.c @@ -396,8 +396,6 @@ FD_SET(2, ); FD_CLR(esock, ); } - } else { - len[2] = 0; } if(FD_ISSET(2, )) { Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: buster/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.14.0-1-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968), LANGUAGE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages rsh-redone-client depends on: ii libc6 2.25-3 Versions of packages rsh-redone-client recommends: ii openssh-client [rsh-client] 1:7.6p1-2 ii rsh-client 0.17-17+b1 rsh-redone-client suggests no packages. -- no debconf information
Bug#864191: libssl-doc: Replaces and Breaks fields in debian/control
Package: libssl-doc Version: 1.1.0f-2 Severity: minor Dear Maintainer, In "debian/control" Package: libssl-doc Section: doc Architecture: all Multi-Arch: foreign Replaces: libssl-dev (<< 1.0.0) Breaks: libssl-dev (<< 1.0.0) Should be libssl-dev (<< 1.1.0) ? Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: 9.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Kernel: Linux 4.9.0-3-amd64 (SMP w/3 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) -- no debconf information
Bug#845945: libssl1.0-dev: unnecessary Depends: zlib1g-dev
Package: libssl1.0-dev Version: 1.0.2j-4 Severity: minor Dear Maintainer, There is an unnecessary dependency same as #767207. Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: arm64 (aarch64) Kernel: Linux 3.10.104-pine64 (SMP w/4 CPU cores; PREEMPT) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages libssl1.0-dev depends on: ii libssl1.0.2 1.0.2j-4 ii zlib1g-dev 1:1.2.8.dfsg-2+b3 Versions of packages libssl1.0-dev recommends: pn libssl-doc libssl1.0-dev suggests no packages. -- no debconf information
Bug#813191: openssl: missing a patch filename in debian/patches/series
Package: libssl-doc Version: 1.0.2f-2 Severity: minor Source: openssl Dear Maintainer, There is a patch file by the name of libdoc-manpgs-pod-spell.patch in debian/patches/ directory. But there is no filename of this in debian/patches/series. This patch is effective. Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: arm64, armhf Kernel: Linux 4.3.0-1-amd64 (SMP w/8 CPU cores) Locale: LANG=, LC_CTYPE= (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) -- no debconf information
Bug#794218: [Pkg-openssl-devel] Bug#794218: openssl: no display built date
On Fri, 31 Jul 2015 18:16:36 +0200, Kurt Roeckx wrote: This is an intentional change. Why do you need the date it was build? It's easy to know debian revision changed without using dpkg or apt commands. I think built date is a kind of ID. Thank you. -- Hiroyuki YAMAMORI -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#794326: openssl: use aarch64_asm in Configure on arm64
Package: openssl Version: 1.0.2d-1 Severity: normal Usertag: arm64 Dear Maintainer, In arm64 arch, no assembler source use with stretch build now. On upstream, it's default using assembler sources. To use assembler sources, modify debian-targets.patch. debian/patches/debian-targets.patch line 24 +debian-arm64,gcc:-DL_ENDIAN ${debian_cflags}::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR), change /${no_asm}/${aarch64_asm}:64/ Thank you. -- Hiroyuki YAMAMORI -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: arm64 (aarch64) Kernel: Linux 4.0.0-2-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Init: unable to detect Versions of packages openssl depends on: ii libc62.19-19 ii libssl1.0.0 1.0.2d-1 openssl recommends no packages. Versions of packages openssl suggests: pn ca-certificates none -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#774882: [Pkg-openssl-devel] Bug#774882: openssl: fail to verify some sites when 1024bit root CAs removed
FYI: To disable 1024bit Root CAs # dpkg-reconfigure ca-certificates (uncheck disable items in dialog box.) Thank you. -- Hiroyuki YAMAMORI -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#794218: openssl: no display built date
Package: openssl Version: 1.0.2d-1 Severity: minor Dear Maintainer, (jessie - openssl 1.0.1k-3+deb8u1) $ openssl version -v -b OpenSSL 1.0.1k 8 Jan 2015 built on: Fri Jun 12 18:48:03 2015 (stretch) $ openssl version -v -b OpenSSL 1.0.2d 9 Jul 2015 built on: reproducible build, date unspecified a fix patch: --- a/crypto/cversion.c +++ b/crypto/cversion.c @@ -68,7 +68,7 @@ return OPENSSL_VERSION_TEXT; if (t == SSLEAY_BUILT_ON) { #ifdef DATE -# ifdef OPENSSL_USE_BUILD_DATE +# if 1 return (DATE); # else return (built on: reproducible build, date unspecified); Thank you. -- Hiroyuki YAMAMORI -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: arm64, armhf Kernel: Linux 4.0.0-2-amd64 (SMP w/8 CPU cores) Locale: LANG=, LC_CTYPE= (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openssl depends on: ii libc62.19-19 ii libssl1.0.0 1.0.2d-1 openssl recommends no packages. Versions of packages openssl suggests: ii ca-certificates 20150426 -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#774882: openssl: fail to verify some sites when 1024bit root CAs removed
Package: openssl Version: 1.0.1j-1 Severity: normal Dear Maintainer, To avoid security weakness, when 1024-bit RSA root CAs removed, verify error occurs in some sites with cross root CA. I've seen following, https://bugzilla.mozilla.org/show_bug.cgi?id=986005#c4 And fixed patch is following, http://rt.openssl.org/Ticket/Display.html?id=3637user=guestpass=guest [PATCH] x509: skip certs if in alternative cert chain I've test this patch. No issues were found. My tests are following. 1) build openssl packages that applied the patch and install these. 2) remove root CAs in /usr/share/ca-certificates/mozilla/ Equifax_Secure_*.crt GTE_CyberTrust_Global_Root.crt Thawte_*.crt Verisign_Class_3_Public_Primary_Certification_Authority.crt Verisign_Class_3_Public_Primary_Certification_Authority_2.crt 3) [strace] openssl s_client -CApath /etc/ssl/certs -showcerts -connect s3.amazonaws.com:443 test other sites, e.g. www.debian.org, www.geotrust.co.jp, dinahosting.com Thank you. -- Hiroyuki YAMAMORI -- System Information: Debian Release: 8.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/8 CPU cores) Locale: LANG=, LC_CTYPE= (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openssl depends on: ii libc62.19-13 ii libssl1.0.0 1.0.1j-1+p1 openssl recommends no packages. Versions of packages openssl suggests: ii ca-certificates 20141019 -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#767207: libssl-dev: unnecessary Depends: zlib1g-dev
Package: libssl-dev Version: 1.0.1j-1 Severity: normal Dear Maintainer, in Bug#728055 drop zlib then zlib1g-dev is no longer required. please remove it from debian/control. Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: jessie/sid APT prefers testing-updates APT policy: (500, 'testing-updates'), (500, 'testing') Architecture: armhf (armv7l) Kernel: Linux 3.8.13.28p4 (SMP w/4 CPU cores; PREEMPT) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages libssl-dev depends on: ii libssl1.0.0 1.0.1j-1 ii zlib1g-dev 1:1.2.8.dfsg-2 Versions of packages libssl-dev recommends: pn libssl-doc none libssl-dev suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#722216: openvpn: Add GCM, CTR and XTS modes patch
Package: openvpn Version: 2.3.2-4 Severity: wishlist Tags: patch Hello, I tried following patch. https://community.openvpn.net/openvpn/attachment/ticket/301 [0001-Add-AEAD-cipher-modes.patch] But there are some problems. 1) XTS mode is not AEAD cipher. 2) CCM mode does not work. Because EVP_aes_nnn_ccm() functions is not in OpenSSL_add_all_algorithms() and referring to following http://wiki.openssl.org/index.php/EVP_Authenticated_Encryption_and_Decryption CCM mode differ from other modes in a significant way of EVP functions calling. 3) In crypto.c: crypto_adjust_frame_parameters() function, size of authentication tag is unconsidered. 4) For a reason of packed-id is not encrypted, it makes security weaken. Then I've made a new patch that was off CCM mode and add CTR mode. In my case of performance test (with aesni cpu), GCM mode is about 10 % better than CBC mode, CTR and XTS modes are a few % better than CBC mode. Note that using GCM mode, specify auth none to config file. Dear Maintainer, Please try the patch and send it Upstream. Thank you, Hiroyuki YAMAMORI -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 3.10-2-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages openvpn depends on: ii debconf [debconf-2.0] 1.5.51 ii initscripts2.88dsf-43 ii iproute2 3.11.0-1 ii libc6 2.17-92+b1 ii liblzo2-2 2.06-1.2 ii libpam0g 1.1.3-9 ii libpkcs11-helper1 1.10-1 ii libssl1.0.01.0.1e-3 ii net-tools 1.60-25 Versions of packages openvpn recommends: pn easy-rsa none Versions of packages openvpn suggests: ii openssl 1.0.1e-3 pn resolvconf none -- debconf information excluded --- a/configure.ac 2013-05-31 21:00:25.0 +0900 +++ b/configure.ac 2013-09-08 19:19:13.678406806 +0900 @@ -61,6 +61,13 @@ ) AC_ARG_ENABLE( + [xtra-cipher-modes], + [AS_HELP_STRING([--disable-xtra-cipher-modes], [disable xtra cipher modes @:@default=yes@:@])], + , + [enable_xtra_cipher_modes=yes] +) + +AC_ARG_ENABLE( [ssl], [AS_HELP_STRING([--disable-ssl], [disable SSL support for TLS-based key exchange @:@default=yes@:@])], , @@ -777,6 +784,17 @@ [have_openssl_engine=no; break] ) + have_openssl_xtra_cipher_modes=yes + AC_CHECK_FUNCS( + [ \ + EVP_aes_256_gcm \ + EVP_aes_256_ctr \ + EVP_aes_256_xts \ + ], + , + [have_openssl_xtra_cipher_modes=no; break] + ) + CFLAGS=${saved_CFLAGS} LIBS=${saved_LIBS} fi @@ -947,6 +965,10 @@ CRYPTO_SSL_LIBS=${OPENSSL_SSL_LIBS} AC_DEFINE([ENABLE_CRYPTO_OPENSSL], [1], [Use OpenSSL library]) test ${have_openssl_engine} = yes AC_DEFINE([HAVE_OPENSSL_ENGINE], [1], [Use crypto library]) + if test ${enable_xtra_cipher_modes} = yes; then + test ${have_openssl_xtra_cipher_modes} = yes AC_DEFINE([HAVE_XTRA_CIPHER_MODES], [1], [Use crypto library]) + test ${have_openssl_xtra_cipher_modes} != yes AC_MSG_ERROR([Xtra cipher modes required but missing]) + fi ;; polarssl) have_crypto_crypto=${have_polarssl_crypto} --- a/src/openvpn/crypto.c 2013-05-31 21:00:07.0 +0900 +++ b/src/openvpn/crypto.c 2013-09-09 01:23:49.215559844 +0900 @@ -94,16 +94,21 @@ if (buf-len 0 opt-key_ctx_bi) { struct key_ctx *ctx = opt-key_ctx_bi-encrypt; + unsigned int mode = 0; /* Do Encrypt from buf - work */ if (ctx-cipher) { uint8_t iv_buf[OPENVPN_MAX_IV_LENGTH]; const int iv_size = cipher_ctx_iv_length (ctx-cipher); - const unsigned int mode = cipher_ctx_mode (ctx-cipher); + int block_size = cipher_ctx_block_size (ctx-cipher); + mode = cipher_ctx_mode (ctx-cipher); int outlen; - if (mode == OPENVPN_MODE_CBC) + if (all_xtra_mode (mode)) + ASSERT (opt-flags CO_USE_IV); /* IV required */ + + if (mode == OPENVPN_MODE_CBC || all_xtra_mode (mode)) { CLEAR (iv_buf); @@ -132,7 +137,7 @@ buf_set_write (b, iv_buf, iv_size); ASSERT (packet_id_write (pin, b, true, false)); } - else /* We only support CBC, CFB, or OFB modes right now */ + else /* We only support CBC, CFB, OFB, GCM, CTR or XTS modes right now */ { ASSERT (0); } @@ -151,7 +156,7 @@ ASSERT (cipher_ctx_reset(ctx-cipher, iv_buf)); /* Buffer overflow check */ - if (!buf_safe (work, buf-len + cipher_ctx_block_size(ctx-cipher))) + if (!buf_safe (work, buf-len + block_size)) { msg (D_CRYPT_ERRORS, ENCRYPT: buffer size error, bc=%d bo=%d bl=%d wc=%d wo=%d wl=%d cbs=%d, buf-capacity, @@ -160,7 +165,7 @@ work.capacity, work.offset, work.len, - cipher_ctx_block_size (ctx-cipher)); + block_size); goto err; } @@ -171,7 +176,10 @@ /* Flush the encryption buffer */ ASSERT(cipher_ctx_final(ctx-cipher, BPTR
Bug#681197: grub2: grub-mklayout and at_keyboard.mod have problem with jp keyboard
Hello, There is an additional reference. http://download.microsoft.com/download/1/6/1/161ba512-40e2-4cc9-843a-923143f345 6c/translate.pdf It makes clear to add 'Keypad comma' code. include/grub/keyboard_layouts.h: GRUB_KEYBOARD_KEY_KPCOMMA = 0x85, grub-core/term/at_keyboard.c: /* 0x7e */ GRUB_KEYBOARD_KEY_KPCOMMA util/grub-mklayout.c: /* 0x78 */ 0, GRUB_KEYBOARD_KEY_KPCOMMA, Thanks, Hiroyuki YAMAMORI -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#681197: grub2: grub-mklayout and at_keyboard.mod have problem with jp keyboard
Hello, Is it scancode 1 or scnacode 2? What is the value in the other scancode? It's scancode set 1. For your reference, I attached my patch. Thanks, Hiroyuki YAMAMORI Index: b/grub-core/term/at_keyboard.c === --- a/grub-core/term/at_keyboard.c +++ b/grub-core/term/at_keyboard.c @@ -97,7 +97,18 @@ /* OLPC keys. Just mapped to normal keys. */ /* 0x64 */ 0, GRUB_KEYBOARD_KEY_UP, /* 0x66 */ GRUB_KEYBOARD_KEY_DOWN,GRUB_KEYBOARD_KEY_LEFT, -/* 0x68 */ GRUB_KEYBOARD_KEY_RIGHT +/* 0x68 */ GRUB_KEYBOARD_KEY_RIGHT, 0, +/* 0x6a */ 0, 0, +/* 0x6c */ 0, 0, +/* 0x6e */ 0, 0, +/* 0x70 */ 0, 0, +/* 0x72 */ 0, GRUB_KEYBOARD_KEY_INTERNATIONAL1, +/* 0x74 */ 0, 0, +/* 0x76 */ 0, 0, +/* 0x78 */ 0, 0, +/* 0x7a */ 0, 0, +/* 0x7c */ 0, GRUB_KEYBOARD_KEY_INTERNATIONAL3, +/* 0x7e */ GRUB_KEYBOARD_KEY_KPCOMMA }; static const struct Index: b/include/grub/keyboard_layouts.h === --- a/include/grub/keyboard_layouts.h +++ b/include/grub/keyboard_layouts.h @@ -129,6 +129,9 @@ GRUB_KEYBOARD_KEY_NUM0 = 0x62, GRUB_KEYBOARD_KEY_NUMDOT = 0x63, GRUB_KEYBOARD_KEY_102ND = 0x64, +GRUB_KEYBOARD_KEY_KPCOMMA = 0x85, +GRUB_KEYBOARD_KEY_INTERNATIONAL1 = 0x87, +GRUB_KEYBOARD_KEY_INTERNATIONAL3 = 0x89, GRUB_KEYBOARD_KEY_LEFT_CTRL = 0xe0, GRUB_KEYBOARD_KEY_LEFT_SHIFT = 0xe1, GRUB_KEYBOARD_KEY_LEFT_ALT = 0xe2, Index: b/util/grub-mklayout.c === --- a/util/grub-mklayout.c +++ b/util/grub-mklayout.c @@ -242,7 +242,7 @@ /* 0x52 */ GRUB_KEYBOARD_KEY_NUMDOT, GRUB_KEYBOARD_KEY_NUMDOT, /* 0x54 */ 0, 0, /* 0x56 */ GRUB_KEYBOARD_KEY_102ND, GRUB_KEYBOARD_KEY_F11, - /* 0x58 */ GRUB_KEYBOARD_KEY_F12, 0, + /* 0x58 */ GRUB_KEYBOARD_KEY_F12, GRUB_KEYBOARD_KEY_INTERNATIONAL1, /* 0x5a */ 0, 0, /* 0x5c */ 0, 0, /* 0x5e */ 0, 0, @@ -253,7 +253,14 @@ /* 0x68 */ GRUB_KEYBOARD_KEY_PPAGE, GRUB_KEYBOARD_KEY_LEFT, /* 0x6a */ GRUB_KEYBOARD_KEY_RIGHT, GRUB_KEYBOARD_KEY_END, /* 0x6c */ GRUB_KEYBOARD_KEY_DOWN,GRUB_KEYBOARD_KEY_NPAGE, - /* 0x6e */ GRUB_KEYBOARD_KEY_INSERT, GRUB_KEYBOARD_KEY_DELETE + /* 0x6e */ GRUB_KEYBOARD_KEY_INSERT, GRUB_KEYBOARD_KEY_DELETE, + /* 0x70 */ 0, 0, + /* 0x72 */ 0, 0, + /* 0x74 */ 0, 0, + /* 0x76 */ 0, 0, + /* 0x78 */ 0, GRUB_KEYBOARD_KEY_KPCOMMA, + /* 0x7a */ 0, 0, + /* 0x7c */ GRUB_KEYBOARD_KEY_INTERNATIONAL3 }; static void
Bug#299072: Grub cannot read ext2/3 on whole disk (fix patch)
Hi, I made a patch that solved the problem. You, still using grub-legacy, try and enjoy it. Thanks, Hiroyuki YAMAMORI --- 0.97-43/stage2/fsys_ext2fs.c 2008-07-25 14:36:15.0 +0200 +++ grub-0.97/stage2/fsys_ext2fs.c @@ -307,7 +307,7 @@ { int retval = 1; - if current_drive 0x80) || (current_slice != 0)) + if (((current_slice != 0) (current_slice != PC_SLICE_TYPE_EXT2FS) (current_slice != PC_SLICE_TYPE_LINUX_RAID) (! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_EXT2FS)) --- orig/stage2/fsys_fat.c 2005-03-15 17:52:00.0 +0100 +++ grub-0.97/stage2/fsys_fat.c @@ -70,7 +70,7 @@ __u32 magic, first_fat; /* Check partition type for harddisk */ - if (((current_drive 0x80) || (current_slice != 0)) + if (current_slice != 0 ! IS_PC_SLICE_TYPE_FAT (current_slice) (! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_MSDOS))) return 0; --- orig/stage2/fsys_ffs.c 2003-07-09 13:45:52.0 +0200 +++ grub-0.97/stage2/fsys_ffs.c @@ -82,7 +82,7 @@ { int retval = 1; - if current_drive 0x80) || (current_slice != 0)) + if ((current_slice != 0 ! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_BSDFFS)) || part_length (SBLOCK + (SBSIZE / DEV_BSIZE)) || !devread (SBLOCK, 0, SBSIZE, (char *) SUPERBLOCK) --- orig/stage2/fsys_minix.c 2003-07-09 13:45:53.0 +0200 +++ grub-0.97/stage2/fsys_minix.c @@ -160,7 +160,7 @@ int minix_mount (void) { - if (((current_drive 0x80) || current_slice != 0) + if (current_slice != 0 ! IS_PC_SLICE_TYPE_MINIX (current_slice) ! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_OTHER)) return 0; /* The partition is not of MINIX type */ --- orig/stage2/fsys_ufs2.c 2004-06-19 14:17:52.0 +0200 +++ grub-0.97/stage2/fsys_ufs2.c @@ -87,7 +87,7 @@ sblockloc = -1; type = 0; - if (! (((current_drive 0x80) || (current_slice != 0)) + if (! (current_slice != 0 ! IS_PC_SLICE_TYPE_BSD_WITH_FS (current_slice, FS_BSDFFS))) { for (i = 0; sblock_try[i] != -1; ++i) --- orig/stage2/fsys_vstafs.c 2003-07-09 13:45:53.0 +0200 +++ grub-0.97/stage2/fsys_vstafs.c @@ -47,7 +47,7 @@ { int retval = 1; - if( (((current_drive 0x80) || (current_slice != 0)) + if( (current_slice != 0 current_slice != PC_SLICE_TYPE_VSTAFS) || ! devread (0, 0, BLOCK_SIZE, (char *) FSYS_BUF) || FIRST_SECTOR-fs_magic != 0xDEADFACE)
Bug#681197: grub2: grub-mklayout and at_keyboard.mod have problem with jp keyboard
Hello, Simply, I'd defined those values as unused. Now, I've referred to below. HID Usage Tables http://www.usb.org/developers/devclass_docs/Hut1_12v2.pdf key code mapping http://source.android.com/tech/input/keyboard-devices.html Linux kernel source linux-2.6.x/include/linux/input.h Then, it's better to change to GRUB_KEYBOARD_KEY_INTERNATIONAL1 0x87, GRUB_KEYBOARD_KEY_INTERNATIONAL3 0x89, (Same KEY_INTERNATIONAL1 as KEY_RO) (Same KEY_INTERNATIONAL3 as KEY_YEN) and it's better to add GRUB_KEYBOARD_KEY_KPCOMMA 0x85, about grub-2.00/include/grub/keyboard_layouts.h. Thanks, Hiroyuki YAMAMORI On Mon, 28 Jan 2013 09:27:01 +0100, phco...@gmail.com wrote: +GRUB_KEYBOARD_KEY_JPBACKSLASH = 0x70, +GRUB_KEYBOARD_KEY_JPYEN = 0x71, Where do these codes come from? According to USB specifications those codes are keyboard F21 and F22 respectively. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#681197: grub2: grub-mklayout and at_keyboard.mod have problem with jp keyboard
Package: grub2 Version: 1.99-22.1 Severity: normal Tags: patch Hello, I tried to setup japanese keyboard layout then some problem occuerd: $ grub-kbdcomp jp Unknown keycode 0x7c Unknown keycode 0x59 # cp jp.gkb /boot/grub/ grub.cfg insmod at_keyboard insmod keylayouts terminal_input at_keyboard keymap /boot/grub/jp.gkb grub (no echo at hit '\' keys: upper right side and lower right side) So, I made patch. it modifies grub-mklayout and at_keyboard.mod. Thanks, Hiroyuki YAMAMORI --- grub-1.99~2.00/grub-core/term/at_keyboard.c 2011-05-14 07:47:57.0 +0900 +++ new/grub-core/term/at_keyboard.c 2012-07-09 22:48:33.0 +0900 @@ -97,7 +97,17 @@ /* OLPC keys. Just mapped to normal keys. */ /* 0x64 */ 0, GRUB_KEYBOARD_KEY_UP, /* 0x66 */ GRUB_KEYBOARD_KEY_DOWN,GRUB_KEYBOARD_KEY_LEFT, -/* 0x68 */ GRUB_KEYBOARD_KEY_RIGHT +/* 0x68 */ GRUB_KEYBOARD_KEY_RIGHT, 0, +/* 0x6a */ 0, 0, +/* 0x6c */ 0, 0, +/* 0x6e */ 0, 0, +/* 0x70 */ 0, 0, +/* 0x72 */ 0, GRUB_KEYBOARD_KEY_JPBACKSLASH, +/* 0x74 */ 0, 0, +/* 0x76 */ 0, 0, +/* 0x78 */ 0, 0, +/* 0x7a */ 0, 0, +/* 0x7c */ 0, GRUB_KEYBOARD_KEY_JPYEN }; static const struct --- grub-1.99~2.00/include/grub/keyboard_layouts.h 2010-12-01 23:45:43.0 +0900 +++ new/include/grub/keyboard_layouts.h 2012-07-09 22:30:35.0 +0900 @@ -129,6 +129,8 @@ GRUB_KEYBOARD_KEY_NUM0 = 0x62, GRUB_KEYBOARD_KEY_NUMDOT = 0x63, GRUB_KEYBOARD_KEY_102ND = 0x64, +GRUB_KEYBOARD_KEY_JPBACKSLASH = 0x70, +GRUB_KEYBOARD_KEY_JPYEN = 0x71, GRUB_KEYBOARD_KEY_LEFT_CTRL = 0xe0, GRUB_KEYBOARD_KEY_LEFT_SHIFT = 0xe1, GRUB_KEYBOARD_KEY_LEFT_ALT = 0xe2, --- grub-1.99~2.00/util/grub-mklayout.c 2011-01-12 04:41:07.0 +0900 +++ new/util/grub-mklayout.c 2012-07-09 22:37:13.0 +0900 @@ -242,7 +242,7 @@ /* 0x52 */ GRUB_KEYBOARD_KEY_NUMDOT, GRUB_KEYBOARD_KEY_NUMDOT, /* 0x54 */ 0, 0, /* 0x56 */ GRUB_KEYBOARD_KEY_102ND, GRUB_KEYBOARD_KEY_F11, - /* 0x58 */ GRUB_KEYBOARD_KEY_F12, 0, + /* 0x58 */ GRUB_KEYBOARD_KEY_F12, GRUB_KEYBOARD_KEY_JPBACKSLASH, /* 0x5a */ 0, 0, /* 0x5c */ 0, 0, /* 0x5e */ 0, 0, @@ -253,7 +253,14 @@ /* 0x68 */ GRUB_KEYBOARD_KEY_PPAGE, GRUB_KEYBOARD_KEY_LEFT, /* 0x6a */ GRUB_KEYBOARD_KEY_RIGHT, GRUB_KEYBOARD_KEY_END, /* 0x6c */ GRUB_KEYBOARD_KEY_DOWN,GRUB_KEYBOARD_KEY_NPAGE, - /* 0x6e */ GRUB_KEYBOARD_KEY_INSERT, GRUB_KEYBOARD_KEY_DELETE + /* 0x6e */ GRUB_KEYBOARD_KEY_INSERT, GRUB_KEYBOARD_KEY_DELETE, + /* 0x70 */ 0, 0, + /* 0x72 */ 0, 0, + /* 0x74 */ 0, 0, + /* 0x76 */ 0, 0, + /* 0x78 */ 0, 0, + /* 0x7a */ 0, 0, + /* 0x7c */ GRUB_KEYBOARD_KEY_JPYEN }; static void
Bug#468454: Debian finger client still doesn't support IPv6
Hi I've supported ipv6 and uploaded following place. http://hyamamor.ddo.jp/ipv6/debian/squeeze-amd64/bsd-finger_0.17-13a~ipv6.diff.gz and also packages are in the same directory. note: debian/changelog must be modified. Thank you. -- Hiroyuki YAMAMORI -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#468454: Debian finger client still doesn't support IPv6
Maybe ipv6 service is not available. Are you check /etc/inetd.conf on the fingerd service machine? For ipv4 and ipv6 services need 2 lines: finger stream tcp4 nowait nobody /usr/sbin/tcpd /usr/sbin/in.fingerd finger stream tcp6 nowait nobody /usr/sbin/tcpd /usr/sbin/in.fingerd See man inetd.conf Thank you. -- Hiroyuki YAMAMORI From: Jason White ja...@jasonjgw.net Thank you for working on this. I have installed your test package. When I try to connect to an IPv6-capable host with a finger service running I get: finger: cannot create socket / connect host Any suggestions? -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#522337: cvs ignores /etc/gai.conf and prefers ipv6 addresses
Hi, I believe it's getaddrinfo(3)'s problem. I wrote the code same as EXAMPLE of man 3 getaddrinfo. telnet has same problem: $ telnet cvs.schmorp.de 2401 Trying 2002:58c6:438b::a00:13... For the moment, use -4 option: $ cvs -4 -d :pserver:... Please forward BTS to libc6. Thank you. -- Hiroyuki YAMAMORI h-yam...@db3.so-net.ne.jp -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#489712: ntpdate-debian does not consider numeric IPv6 address.
Package: ntpdate Version: 1:4.2.4p4+dfsg-6 Severity: normal Tags: patch For example fd00::1, ntpdate-debian does not work. To fix: --- /usr/sbin/ntpdate-debian2008-06-16 19:58:12.0 +0900 +++ /usr/sbin/ntpdate-debian2008-07-07 19:02:03.0 +0900 @@ -14,7 +14,7 @@ fi done if [ -n $file ]; then - NTPSERVERS=$(sed -rne 's/^(servers?|peer) ([-_.[:alnum:]]+).*$/\2/p' $file | grep -v '^127\.127\.') || [ $? -le 1 ] + NTPSERVERS=$(sed -rne 's/^(servers?|peer) ([-_.:[:alnum:]]+).*$/\2/p' $file | grep -v '^127\.127\.') || [ $? -le 1 ] fi elif [ -r /etc/default/ntpdate.dhcp ]; then . /etc/default/ntpdate.dhcp Thanks. -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages ntpdate depends on: ii libc62.7-10 GNU C Library: Shared libraries ii libcap1 1:1.10-14 support for getting/setting POSIX. ii libssl0.9.8 0.9.8g-10.1 SSL shared libraries ii netbase 4.32Basic TCP/IP networking system Versions of packages ntpdate recommends: pn lockfile-progsnone (no description available) -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#458826: jwm: Multibytes characters title cannot be displayed
Package: jwm Version: 2.0.1-1 Severity: normal Tags: patch Japanese characters cannot be displayed at title with some application, e.g. openoffice.org. The problem is that COMPOUND_TEXT handling is not good. Following patch fixes it. Thanks, Hiroyuki YAMAMORI diff -u jwm-2.0.1/src/hint.c new/src/hint.c --- jwm-2.0.1/src/hint.c2007-09-16 19:11:09.0 +0900 +++ new/src/hint.c 2008-01-03 02:16:03.0 +0900 @@ -7,6 +7,7 @@ * */ +#include X11/Xlibint.h #include jwm.h #include hint.h #include client.h @@ -581,6 +582,9 @@ Atom realType; int realFormat; unsigned char *name; + XTextProperty tprop; + char **text_list; + int tcount; Assert(np); @@ -597,20 +601,29 @@ np-name = (char*)name; } - if(!np-name) { - if(JXFetchName(display, np-window, np-name) == 0) { - np-name = NULL; + if (!np-name) { + status = JXGetWindowProperty(display, np-window, +XA_WM_NAME, 0, 1024, False, atoms[ATOM_COMPOUND_TEXT], +realType, realFormat, count, extra, name); + if (status == Success realFormat == 8) { + tprop.value = name; + tprop.encoding = atoms[ATOM_COMPOUND_TEXT]; + tprop.format = realFormat; + tprop.nitems = strlen((char *)name); + if (Xutf8TextPropertyToTextList(display, tprop, text_list, tcount) + == Success tcount 0) { +np-name = Xmalloc(strlen(text_list[0]) + 1); +if (np-name) + strcpy(np-name, text_list[0]); +XFreeStringList(text_list); + } + JXFree(name); } } if(!np-name) { - status = JXGetWindowProperty(display, np-window, XA_WM_NAME, - 0, 1024, False, atoms[ATOM_COMPOUND_TEXT], realType, - realFormat, count, extra, name); - if(status != Success) { + if(JXFetchName(display, np-window, np-name) == 0) { np-name = NULL; - } else { - np-name = (char*)name; } } -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#375574: netkit-inetd: Please support IPv6 networking
Hi, I make IPv6 supported packages. See below. http://hyamamor.ddo.jp/ipv6/debian/sid/netkit-base_0.10-10.3.ipv6.r1.diff.gz http://hyamamor.ddo.jp/ipv6/debian/sid/netkit-inetd_0.10-10.3.ipv6.r1_i386.deb Thanks, -- Hiroyuki YAMAMORI [EMAIL PROTECTED] GnuPG FP: D9D2 F04D DD2D 720E E564 D1EC 4617 22C1 B881 226E -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#335200: tftpd: manpage differ with a new file
Package: tftpd Version: 0.17-15 Severity: normal *** Please type your report below this line *** `man tftpd' says Files may be written only if they already exist and are publicly writable. but tftpd 0.17-15 made enable create a new file. IMO, tftpd is a traditional app, so it's not necesary that tftpd create a new file. If you want to create a new file, install tftpd-hpa. Thanks, -- Hiroyuki YAMAMORI [EMAIL PROTECTED] GnuPG FP: D9D2 F04D DD2D 720E E564 D1EC 4617 22C1 B881 226E -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i586) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.13.4 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages tftpd depends on: ii libc6 2.3.5-7GNU C Library: Shared libraries an ii netbase 4.22 Basic TCP/IP networking system tftpd recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]