Bug#328372: [Fwd: Log for successful build of openssh_1:4.2p1-2 (dist=unstable)]
On Wed, Sep 14, 2005 at 04:40:47PM -0600, dann frazier wrote:
> Our automated buildd log filter[1] detected a problem that will cause
> your package to segfault on architectures where the size of a pointer is
> greater than the size of an integer, such as ia64.
>
> [1]http://people.debian.org/~dannf/check-implicit-pointer-functions
>
> diff -urN openssh-4.2p1.orig/ssh-gss.h openssh-4.2p1/ssh-gss.h
> --- openssh-4.2p1.orig/ssh-gss.h 2005-09-14 15:47:51.000000000 -0600
> +++ openssh-4.2p1/ssh-gss.h 2005-09-14 15:56:04.000000000 -0600
> @@ -135,6 +135,7 @@
> int ssh_gssapi_check_mechanism(gss_OID, void *);
> gss_OID ssh_gssapi_id_kex(Gssctxt *, char *);
>
> +char *ssh_gssapi_server_mechanisms();
Since this is C rather than C++, that prototype should be (void) rather
than just (), but otherwise quite right. I've notified the upstream
author of this patch and I'll fix it in 1:4.2p1-3.
Thanks,
--
Colin Watson [cjwatson@debian.org]
Reply to: