Your message dated Tue, 10 Mar 2026 08:36:10 +0000
with message-id <[email protected]>
and subject line Bug#1091274: fixed in jss 5.9.0~beta3-4
has caused the Debian Bug report #1091274,
regarding jss: FTBFS on armhf: JSSOAEPParameterSpec.c:63:56: error: passing 
argument 4 of ‘JSS_FromByteArray’ from incompatible pointer type 
[-Wincompatible-pointer-types]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1091274: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091274
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: jss
Version: 5.5.0-1
Severity: serious
Justification: FTBFS
Tags: trixie sid ftbfs
User: [email protected]
Usertags: ftbfs-20241223 ftbfs-trixie

Hi,

During a rebuild of all packages in sid, this package failed to build
on armhf.

This package currently has binary packages on armhf, so this is a regression.
Also, there are no known issues on amd64 or arm64 according to recent (a couple
days ago) rebuilds.

The rebuild was done using an armhf chroot on an AWS "m6g" instance (Graviton2
CPU).

Relevant part (hopefully):
> cd /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/crypto && 
> /usr/bin/cc -fPIC -D_FORTIFY_SOURCE=2 -Wdate-time -D_TIME_BITS=64 
> -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -Werror=format-security -Wformat 
> -fstack-clash-protection -fstack-protector-strong 
> -ffile-prefix-map=/<<PKGBUILDDIR>>=. -Werror=implicit-function-declaration 
> -O2 -g -O2 -Wall -std=gnu99 -Wno-cast-function-type -Wno-unused-parameter 
> -Wno-unknown-warning-option -Wno-unused-but-set-variable 
> -Werror-implicit-function-declaration -Wno-switch 
> -I/<<PKGBUILDDIR>>/build/include/jss -I/usr/lib/jvm/default-java/include 
> -I/usr/lib/jvm/default-java/include/linux -I/usr/lib/jvm/default-java/include 
> -I/usr/include/nspr -I/usr/include/nss -L/usr/lib/arm-linux-gnueabihf 
> -L/usr/lib/arm-linux-gnueabihf -o 
> /<<PKGBUILDDIR>>/build/lib/JSSOAEPParameterSpec.o -c 
> /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c
> /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c:
>  In function ‘oaep_GetSpecifiedSourceData’:
> /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c:63:56:
>  error: passing argument 4 of ‘JSS_FromByteArray’ from incompatible pointer 
> type [-Wincompatible-pointer-types]
>    63 |     if (!JSS_FromByteArray(env, data, (uint8_t **)ret, ret_len)) {
>       |                                                        ^~~~~~~
>       |                                                        |
>       |                                                        CK_ULONG * 
> {aka long unsigned int *}
> In file included from 
> /<<PKGBUILDDIR>>/native/src/main/native/org/mozilla/jss/crypto/JSSOAEPParameterSpec.c:9:
> /<<PKGBUILDDIR>>/build/include/jss/jssutil.h:350:13: note: expected ‘size_t 
> *’ {aka ‘unsigned int *’} but argument is of type ‘CK_ULONG *’ {aka ‘long 
> unsigned int *’}
>   350 |     size_t *length);
>       |     ~~~~~~~~^~~~~~
> At top level:
> cc1: note: unrecognized command-line option ‘-Wno-unknown-warning-option’ may 
> have been intended to silence earlier diagnostics
> make[4]: *** [CMakeFiles/generate_c.dir/build.make:163: 
> lib/JSSOAEPParameterSpec.o] Error 1


The full build log is available from:
http://qa-logs.debian.net/2024/12/23/jss_5.5.0-1_unstable-armhf.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20241223;[email protected]
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20241223&[email protected]&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.

--- End Message ---
--- Begin Message ---
Source: jss
Source-Version: 5.9.0~beta3-4
Done: Timo Aaltonen <[email protected]>

We believe that the bug you reported is fixed in the latest version of
jss, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Timo Aaltonen <[email protected]> (supplier of updated jss package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 10 Mar 2026 10:13:41 +0200
Source: jss
Built-For-Profiles: noudeb
Architecture: source
Version: 5.9.0~beta3-4
Distribution: unstable
Urgency: medium
Maintainer: Debian FreeIPA Team <[email protected]>
Changed-By: Timo Aaltonen <[email protected]>
Closes: 1091274
Changes:
 jss (5.9.0~beta3-4) unstable; urgency=medium
 .
   [ Vladimir Petko ]
   * d/p/0001-fix-use-size_t-in-call-to-JSS_FromByteArray.patch: use
     size_t in calls to JSS_FromByteArray. This resolves the incompatible
     pointer types warning (Closes: #1091274).
Checksums-Sha1:
 a2c138a3ae272bbca21fc41123a1e374bcea5323 2122 jss_5.9.0~beta3-4.dsc
 3ee99ab0885dab0c97ff85676777d5e5eac39509 15312 jss_5.9.0~beta3-4.debian.tar.xz
 0830c0ece2dd4a352716cb5bd530ccb8105eaa9f 9209 
jss_5.9.0~beta3-4_source.buildinfo
Checksums-Sha256:
 976295ea30247278f6d84a2c76396e67b0d0929342b9c5721a90f0a28c87baed 2122 
jss_5.9.0~beta3-4.dsc
 9736fbd5da3aed5a3548971be19b77d1ea6b53389db16455452bdb9dd436716a 15312 
jss_5.9.0~beta3-4.debian.tar.xz
 a028c84a1554e1a72d14518fa77381b55068bf695a892b641da34c9b3795cced 9209 
jss_5.9.0~beta3-4_source.buildinfo
Files:
 9ad4baade509313afb41455e5bcc4d22 2122 java optional jss_5.9.0~beta3-4.dsc
 b2993950b568e2ebcf1387ccd4179a83 15312 java optional 
jss_5.9.0~beta3-4.debian.tar.xz
 bc992638839f9180a9b93f99f61df8c8 9209 java optional 
jss_5.9.0~beta3-4_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=6TyU
-----END PGP SIGNATURE-----

Attachment: pgpArrmfdfjtR.pgp
Description: PGP signature


--- End Message ---

Reply via email to