On 2018-11-03 18:12:07 [+0100], Christoph Biedl wrote:
> Subject: Build against openssl 1.1.
> Author: Chris West
> Bug: https://github.com/tobez/validns/pull/64
> Bug-Debian: https://bugs.debian.org/859784
> Last-Update: 2018-11-03
>
> --- a/dnskey.c
> +++ b/dnskey.c
> @@ -154,6 +154,7 @@
>
Sebastian Andrzej Siewior wrote...
> BN_bin2bn() and EVP_MD_CTX_new() which were introduced as part of this
> patch may return NULL. Not a single instance in the patch checks the
> return value. This is just sloppy.
As I'd still like to fix validns for Debian: Mind I ask you for review
of the upd
Control: tags 859784 -pending
Control: tags 897882 -pending
Sebastian Andrzej Siewior wrote...
> On 2018-10-27 18:36:12 [+0200], Christoph Biedl wrote:
> > +--- a/ipseckey.c
> > b/ipseckey.c
> > +@@ -111,8 +111,11 @@
> > + default:
> > + strcpy(gw, "??");
> > + }
> > ++#pragma
On 2018-10-27 18:36:12 [+0200], Christoph Biedl wrote:
> +--- a/ipseckey.c
> b/ipseckey.c
> +@@ -111,8 +111,11 @@
> + default:
> + strcpy(gw, "??");
> + }
> ++#pragma GCC diagnostic push
> ++#pragma GCC diagnostic ignored "-Wformat-truncation"
> + snprintf(s, 1024, "( %
4 matches
Mail list logo