Bug#859784: NMU for validns

2018-11-05 Thread Sebastian Andrzej Siewior
On 2018-11-03 18:12:07 [+0100], Christoph Biedl wrote: > Subject: Build against openssl 1.1. > Author: Chris West > Bug: https://github.com/tobez/validns/pull/64 > Bug-Debian: https://bugs.debian.org/859784 > Last-Update: 2018-11-03 > > --- a/dnskey.c > +++ b/dnskey.c > @@ -154,6 +154,7 @@ >

Bug#859784: NMU for validns

2018-11-03 Thread Christoph Biedl
Sebastian Andrzej Siewior wrote... > BN_bin2bn() and EVP_MD_CTX_new() which were introduced as part of this > patch may return NULL. Not a single instance in the patch checks the > return value. This is just sloppy. As I'd still like to fix validns for Debian: Mind I ask you for review of the upd

Bug#859784: NMU for validns

2018-10-30 Thread Christoph Biedl
Control: tags 859784 -pending Control: tags 897882 -pending Sebastian Andrzej Siewior wrote... > On 2018-10-27 18:36:12 [+0200], Christoph Biedl wrote: > > +--- a/ipseckey.c > > b/ipseckey.c > > +@@ -111,8 +111,11 @@ > > + default: > > + strcpy(gw, "??"); > > + } > > ++#pragma

Bug#897882: Bug#859784: NMU for validns

2018-10-28 Thread Sebastian Andrzej Siewior
On 2018-10-27 18:36:12 [+0200], Christoph Biedl wrote: > +--- a/ipseckey.c > b/ipseckey.c > +@@ -111,8 +111,11 @@ > + default: > + strcpy(gw, "??"); > + } > ++#pragma GCC diagnostic push > ++#pragma GCC diagnostic ignored "-Wformat-truncation" > + snprintf(s, 1024, "( %