Your message dated Mon, 19 Sep 2005 04:32:05 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#287884: fixed in openswan 1:2.2.0-11
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 30 Dec 2004 19:24:30 +0000
>From [EMAIL PROTECTED] Thu Dec 30 11:24:30 2004
Return-path: <[EMAIL PROTECTED]>
Received: from d020125.adsl.hansenet.de (localhost.localdomain) [80.171.20.125] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Ck5uP-0001ab-00; Thu, 30 Dec 2004 11:24:29 -0800
Received: from aj by localhost.localdomain with local (Exim 4.34)
        id 1Ck5zg-0003dx-W2; Thu, 30 Dec 2004 20:29:57 +0100
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
From: Andreas Jochens <[EMAIL PROTECTED]>
Subject: openswan: FTBFS (amd64/gcc-4.0)
Message-Id: <[EMAIL PROTECTED]>
Date: Thu, 30 Dec 2004 20:29:56 +0100
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: openswan
Severity: normal
Tags: patch

When building 'openswan' on amd64 with gcc-4.0,
I get the following error:

Building openswan unstable main amd64...
Reading Package Lists...
Building Dependency Tree...
Package libopensc0-dev is not available, but is referred to by another package.
This may mean that the package is missing, has been obsoleted, or
is only available from another source
However the following packages replace it:
  libopensc1-dev
E: Package libopensc0-dev has no installation candidate
E: Failed to satisfy Build-Depends dependency for openswan: libopensc0-dev

After fixing this, I get a few other gcc-4.0 related error messages.

With the attached patch 'openswan' can be compiled
on amd64 using gcc-4.0.

Regards
Andreas Jochens

diff -urN ../tmp-orig/openswan-2.2.0/debian/control ./debian/control
--- ../tmp-orig/openswan-2.2.0/debian/control   2004-12-30 20:17:27.695960584 
+0100
+++ ./debian/control    2004-12-30 20:15:43.241840024 +0100
@@ -3,7 +3,7 @@
 Priority: optional
 Maintainer: Rene Mayrhofer <[EMAIL PROTECTED]>
 Standards-Version: 3.6.1.0
-Build-Depends: debhelper (>= 4.1.16), libgmp3-dev, libssl-dev, htmldoc, 
man2html, gawk, libcurl2-dev, libopensc0-dev, libldap2-dev, bison, flex
+Build-Depends: debhelper (>= 4.1.16), libgmp3-dev, libssl-dev, htmldoc, 
man2html, gawk, libcurl2-dev, libopensc1-dev, libldap2-dev, bison, flex
 
 Package: openswan
 Architecture: any
diff -urN ../tmp-orig/openswan-2.2.0/linux/lib/libfreeswan/pfkey_v2_build.c 
./linux/lib/libfreeswan/pfkey_v2_build.c
--- ../tmp-orig/openswan-2.2.0/linux/lib/libfreeswan/pfkey_v2_build.c   
2004-04-12 04:59:06.000000000 +0200
+++ ./linux/lib/libfreeswan/pfkey_v2_build.c    2004-12-30 18:09:34.000000000 
+0100
@@ -173,7 +173,7 @@
                SENDERR(EINVAL);
        }
 
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext = 
             pfkey_msg = (struct sadb_msg*)
             MALLOC(sizeof(struct sadb_msg)))) {
                DEBUGGING(PF_KEY_DEBUG_BUILD,
@@ -297,7 +297,7 @@
                SENDERR(EINVAL);
        }
        
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext =
             pfkey_sa = (struct sadb_sa*)
             MALLOC(sizeof(struct sadb_sa)))) {
                DEBUGGING(PF_KEY_DEBUG_BUILD,
@@ -374,7 +374,7 @@
                SENDERR(EINVAL);
        }
 
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext =
             pfkey_lifetime = (struct sadb_lifetime*)
             MALLOC(sizeof(struct sadb_lifetime)))) {
                DEBUGGING(PF_KEY_DEBUG_BUILD,
@@ -563,7 +563,7 @@
                SENDERR(EINVAL);
        }
 
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext =
             pfkey_key = (struct sadb_key*)
             MALLOC(sizeof(struct sadb_key) +
                                    DIVUP(key_bits, 64) * 
IPSEC_PFKEYv2_ALIGN))) {
@@ -644,7 +644,7 @@
        }
 #endif
            
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext =
             pfkey_ident = (struct sadb_ident*)
             MALLOC(ident_len * IPSEC_PFKEYv2_ALIGN))) {
                ERROR("pfkey_ident_build: "
@@ -696,7 +696,7 @@
                (*pfkey_ext)->sadb_ext_type);
        SENDERR(EINVAL); /* don't process these yet */
 
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext =
             pfkey_sens = (struct sadb_sens*)
             MALLOC(sizeof(struct sadb_sens) +
                    (sens_len + integ_len) * sizeof(uint64_t)))) {
@@ -753,7 +753,7 @@
                SENDERR(EINVAL);
        }
 
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext =
             pfkey_prop = (struct sadb_prop*)
             MALLOC(sizeof(struct sadb_prop) +
                    comb_num * sizeof(struct sadb_comb)))) {
@@ -833,7 +833,7 @@
                SENDERR(EINVAL);
        }
 
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext =
             pfkey_supported = (struct sadb_supported*)
             MALLOC(sizeof(struct sadb_supported) +
                                               alg_num *
@@ -914,7 +914,7 @@
                SENDERR(EEXIST);
        }
        
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext =
             pfkey_spirange = (struct sadb_spirange*)
             MALLOC(sizeof(struct sadb_spirange)))) {
                DEBUGGING(PF_KEY_DEBUG_BUILD,
@@ -958,7 +958,7 @@
                (*pfkey_ext)->sadb_ext_type);
        SENDERR(EINVAL); /* don't process these yet */
 
-       if(!(*pfkey_ext = (struct sadb_ext*)
+       if(!(*pfkey_ext =
             pfkey_x_kmprivate = (struct sadb_x_kmprivate*)
             MALLOC(sizeof(struct sadb_x_kmprivate)))) {
                DEBUGGING(PF_KEY_DEBUG_BUILD,
@@ -1009,7 +1009,7 @@
                SENDERR(EINVAL);
        }
 
-       if(!(*pfkey_ext = (struct sadb_ext*)pfkey_x_satype = (struct 
sadb_x_satype*)
+       if(!(*pfkey_ext = pfkey_x_satype = (struct sadb_x_satype*)
             MALLOC(sizeof(struct sadb_x_satype)))) {
                ERROR("pfkey_x_satype_build: "
                        "memory allocation failed\n");
@@ -1064,7 +1064,7 @@
                "tunnel=%x netlink=%x xform=%x eroute=%x spi=%x radij=%x esp=%x 
ah=%x rcv=%x pfkey=%x ipcomp=%x verbose=%x?\n",
                tunnel, netlink, xform, eroute, spi, radij, esp, ah, rcv, 
pfkey, ipcomp, verbose);
 
-       if(!(*pfkey_ext = (struct sadb_ext*)pfkey_x_debug = (struct 
sadb_x_debug*)
+       if(!(*pfkey_ext = pfkey_x_debug = (struct sadb_x_debug*)
             MALLOC(sizeof(struct sadb_x_debug)))) {
                ERROR("pfkey_x_debug_build: "
                        "memory allocation failed\n");
@@ -1122,7 +1122,7 @@
                "pfkey_x_nat_t_type_build: "
                "type=%d\n", type);
 
-       if(!(*pfkey_ext = (struct sadb_ext*)pfkey_x_nat_t_type = (struct 
sadb_x_nat_t_type*)
+       if(!(*pfkey_ext = pfkey_x_nat_t_type = (struct sadb_x_nat_t_type*)
             MALLOC(sizeof(struct sadb_x_nat_t_type)))) {
                DEBUGGING(PF_KEY_DEBUG_BUILD,
                        "pfkey_x_nat_t_type_build: "
@@ -1174,7 +1174,7 @@
                "pfkey_x_nat_t_port_build: "
                "ext=%d, port=%d\n", exttype, port);
 
-       if(!(*pfkey_ext = (struct sadb_ext*)pfkey_x_nat_t_port = (struct 
sadb_x_nat_t_port*)
+       if(!(*pfkey_ext = pfkey_x_nat_t_port = (struct sadb_x_nat_t_port*)
             MALLOC(sizeof(struct sadb_x_nat_t_port)))) {
                DEBUGGING(PF_KEY_DEBUG_BUILD,
                        "pfkey_x_nat_t_port_build: "
@@ -1328,7 +1328,7 @@
                        memcpy(pfkey_ext,
                               extensions[ext],
                               (extensions[ext])->sadb_ext_len * 
IPSEC_PFKEYv2_ALIGN);
-                       ((char*)pfkey_ext) += (extensions[ext])->sadb_ext_len * 
IPSEC_PFKEYv2_ALIGN;
+                       pfkey_ext = ((char*)pfkey_ext) + 
(extensions[ext])->sadb_ext_len * IPSEC_PFKEYv2_ALIGN;
                        /* Mark that we have seen this extension and remember 
the header location */
                        extensions_seen |= ( 1 << ext );
                }
diff -urN ../tmp-orig/openswan-2.2.0/programs/ikeping/ikeping.c 
./programs/ikeping/ikeping.c
--- ../tmp-orig/openswan-2.2.0/programs/ikeping/ikeping.c       2004-04-18 
05:05:10.000000000 +0200
+++ ./programs/ikeping/ikeping.c        2004-12-30 19:36:26.000000000 +0100
@@ -196,7 +196,8 @@
        ip_address sender;
        struct isakmp_hdr ih;
        char   buf[64];
-       int n, rport, sendlen;
+       int n, rport;
+       socklen_t sendlen;
        const char *xchg_name;
        int xchg;
 
diff -urN ../tmp-orig/openswan-2.2.0/programs/pluto/db_ops.c 
./programs/pluto/db_ops.c
--- ../tmp-orig/openswan-2.2.0/programs/pluto/db_ops.c  2004-06-04 
03:59:33.000000000 +0200
+++ ./programs/pluto/db_ops.c   2004-12-30 19:32:25.000000000 +0100
@@ -181,7 +181,7 @@
        ctx->trans0 = ctx->prop.trans = new_trans;
        /* update trans_cur (by offset) */
        offset = (char *)(new_trans) - (char *)(old_trans);
-       (char *)(ctx->trans_cur) += offset;
+       ctx->trans_cur = (char *)(ctx->trans_cur) + offset;
        /* update elem count */
        ctx->max_trans = max_trans;
        PFREE_ST(old_trans, db_trans_st);
@@ -213,11 +213,11 @@
        
        /* update attrs0 and attrs_cur (obviously) */
        offset = (char *)(new_attrs) - (char *)(old_attrs);
-       (char *)ctx->attrs0 += offset;
-       (char *)ctx->attrs_cur += offset;
+       ctx->attrs0 = (char *)ctx->attrs0 + offset;
+       ctx->attrs_cur = (char *)ctx->attrs_cur + offset;
        /* for each transform, rewrite attrs pointer by offsetting it */
        for (t=ctx->prop.trans, ti=0; ti < ctx->prop.trans_cnt; t++, ti++) {
-               (char *)(t->attrs) += offset;
+               t->attrs = (char *)(t->attrs) + offset;
        }
        /* update elem count */
        ctx->max_attrs = max_attrs;
diff -urN ../tmp-orig/openswan-2.2.0/programs/starter/cmp.c 
./programs/starter/cmp.c
--- ../tmp-orig/openswan-2.2.0/programs/starter/cmp.c   2004-04-10 
19:15:23.000000000 +0200
+++ ./programs/starter/cmp.c    2004-12-30 19:44:22.000000000 +0100
@@ -23,7 +23,7 @@
 
 #define streqn(a,b) (a)?((b)?(strcmp(a,b)):(-1)):(b!=NULL)
 
-#define STRCMP(obj) if (streqn(c1->obj,c2->obj)) return -1
+#define STRCMP(obj) if (streqn((char*)c1->obj,(char*)c2->obj)) return -1
 #define VARCMP(obj) if (c1->obj!=c2->obj) return -1
 #define MEMCMP(obj) if (memcmp(&c1->obj,&c2->obj,sizeof(c1->obj))) return -1
 #define ADDCMP(obj) if (addrcmp(&c1->obj,&c2->obj)) return -1
diff -urN ../tmp-orig/openswan-2.2.0/programs/starter/confread.c 
./programs/starter/confread.c
--- ../tmp-orig/openswan-2.2.0/programs/starter/confread.c      2004-04-11 
17:17:30.000000000 +0200
+++ ./programs/starter/confread.c       2004-12-30 19:39:22.000000000 +0100
@@ -347,14 +347,14 @@
        char *value = end->strings[KSCF_RSAKEY1];
 
        if (end->rsakey1) free(end->rsakey1);
-       end->rsakey1 = xstrdup(value);
+       end->rsakey1 = (unsigned char*)xstrdup(value);
     }
     if(end->strings[KSCF_RSAKEY2] != NULL)
     {
        char *value = end->strings[KSCF_RSAKEY2];
 
        if (end->rsakey2) free(end->rsakey2);
-       end->rsakey2 = xstrdup(value);
+       end->rsakey2 = (unsigned char*)xstrdup(value);
     }
 
     return err;
@@ -754,14 +754,15 @@
     memset(&conn->link, 0, sizeof(conn->link));
 
 #define CONN_STR(v) if (v) v=xstrdup(v)
+#define CONN_STRU(v) if (v) v=(unsigned char*)xstrdup((char*)v)
     CONN_STR(conn->left.iface);
     CONN_STR(conn->left.id);
-    CONN_STR(conn->left.rsakey1);
-    CONN_STR(conn->left.rsakey2);
+    CONN_STRU(conn->left.rsakey1);
+    CONN_STRU(conn->left.rsakey2);
     CONN_STR(conn->right.iface);
     CONN_STR(conn->right.id);
-    CONN_STR(conn->right.rsakey1);
-    CONN_STR(conn->right.rsakey2);
+    CONN_STRU(conn->right.rsakey1);
+    CONN_STRU(conn->right.rsakey2);
     
     for(i=0; i<KSCF_MAX; i++)
     {
diff -urN ../tmp-orig/openswan-2.2.0/programs/starter/interfaces.c 
./programs/starter/interfaces.c
--- ../tmp-orig/openswan-2.2.0/programs/starter/interfaces.c    2004-04-10 
18:37:37.000000000 +0200
+++ ./programs/starter/interfaces.c     2004-12-30 19:43:05.000000000 +0100
@@ -322,7 +322,7 @@
 int starter_ifaces_load (char **ifaces, unsigned int omtu, int nat_t)
 {
        char *tmp_phys, *phys;
-       int n;
+       unsigned n;
        char **i;
        int sock;
        int j, found;
diff -urN ../tmp-orig/openswan-2.2.0/programs/starter/keywords.c 
./programs/starter/keywords.c
--- ../tmp-orig/openswan-2.2.0/programs/starter/keywords.c      2004-04-18 
05:09:27.000000000 +0200
+++ ./programs/starter/keywords.c       2004-12-30 19:54:31.000000000 +0100
@@ -33,22 +33,22 @@
 #include "parserlast.h"
 
 struct keyword_enum_value kw_klipsdebug_values[]={
-    { "all",      LRANGE(KDF_XMIT, KDF_COMP) },
-    { "none",     0 },
-    { "verbose",  LELEM(KDF_VERBOSE) },
-    { "xmit",     LELEM(KDF_XMIT) },
-    { "tunnel-xmit", LELEM(KDF_XMIT) },
-    { "netlink",  LELEM(KDF_NETLINK) },
-    { "xform",    LELEM(KDF_XFORM) },
-    { "eroute",   LELEM(KDF_EROUTE) },
-    { "spi",      LELEM(KDF_SPI) },
-    { "radij",    LELEM(KDF_RADIJ) },
-    { "esp",      LELEM(KDF_ESP) },
-    { "ah",       LELEM(KDF_AH) },
-    { "rcv",      LELEM(KDF_RCV) },
-    { "tunnel",   LELEM(KDF_TUNNEL) },
-    { "pfkey",    LELEM(KDF_PFKEY) },
-    { "comp",     LELEM(KDF_COMP) },
+    { (unsigned char*)"all",      LRANGE(KDF_XMIT, KDF_COMP) },
+    { (unsigned char*)"none",     0 },
+    { (unsigned char*)"verbose",  LELEM(KDF_VERBOSE) },
+    { (unsigned char*)"xmit",     LELEM(KDF_XMIT) },
+    { (unsigned char*)"tunnel-xmit", LELEM(KDF_XMIT) },
+    { (unsigned char*)"netlink",  LELEM(KDF_NETLINK) },
+    { (unsigned char*)"xform",    LELEM(KDF_XFORM) },
+    { (unsigned char*)"eroute",   LELEM(KDF_EROUTE) },
+    { (unsigned char*)"spi",      LELEM(KDF_SPI) },
+    { (unsigned char*)"radij",    LELEM(KDF_RADIJ) },
+    { (unsigned char*)"esp",      LELEM(KDF_ESP) },
+    { (unsigned char*)"ah",       LELEM(KDF_AH) },
+    { (unsigned char*)"rcv",      LELEM(KDF_RCV) },
+    { (unsigned char*)"tunnel",   LELEM(KDF_TUNNEL) },
+    { (unsigned char*)"pfkey",    LELEM(KDF_PFKEY) },
+    { (unsigned char*)"comp",     LELEM(KDF_COMP) },
 };
 
 struct keyword_enum_values kw_klipsdebug_list=
@@ -56,24 +56,24 @@
     
 
 struct keyword_enum_value kw_plutodebug_values[]={
-    { "none",     DBG_NONE },
-    { "all",      DBG_ALL },
-    { "raw",      DBG_RAW },
-    { "crypt",    DBG_CRYPT },
-    { "parsing",  DBG_PARSING },
-    { "emitting", DBG_EMITTING },
-    { "control",  DBG_CONTROL },
-    { "lifecycle", DBG_LIFECYCLE },
-    { "klips",    DBG_KLIPS },
-    { "dns",      DBG_DNS },
-    { "oppo",     DBG_OPPO },
-    { "controlmore", DBG_CONTROLMORE },
-    { "private",  DBG_PRIVATE },
-
-    { "impair-delay-adns-key-answer", IMPAIR_DELAY_ADNS_KEY_ANSWER },
-    { "impair-delay-adns-txt-answer", IMPAIR_DELAY_ADNS_TXT_ANSWER },
-    { "impair-bust-mi2", IMPAIR_BUST_MI2 },
-    { "impair-bust-mr2", IMPAIR_BUST_MR2 },
+    { (unsigned char*)"none",     DBG_NONE },
+    { (unsigned char*)"all",      DBG_ALL },
+    { (unsigned char*)"raw",      DBG_RAW },
+    { (unsigned char*)"crypt",    DBG_CRYPT },
+    { (unsigned char*)"parsing",  DBG_PARSING },
+    { (unsigned char*)"emitting", DBG_EMITTING },
+    { (unsigned char*)"control",  DBG_CONTROL },
+    { (unsigned char*)"lifecycle", DBG_LIFECYCLE },
+    { (unsigned char*)"klips",    DBG_KLIPS },
+    { (unsigned char*)"dns",      DBG_DNS },
+    { (unsigned char*)"oppo",     DBG_OPPO },
+    { (unsigned char*)"controlmore", DBG_CONTROLMORE },
+    { (unsigned char*)"private",  DBG_PRIVATE },
+
+    { (unsigned char*)"impair-delay-adns-key-answer", 
IMPAIR_DELAY_ADNS_KEY_ANSWER },
+    { (unsigned char*)"impair-delay-adns-txt-answer", 
IMPAIR_DELAY_ADNS_TXT_ANSWER },
+    { (unsigned char*)"impair-bust-mi2", IMPAIR_BUST_MI2 },
+    { (unsigned char*)"impair-bust-mr2", IMPAIR_BUST_MR2 },
 };
 
 
@@ -89,7 +89,7 @@
  * Values for keyexchange=
  */
 struct keyword_enum_value kw_keyexchange_values[]={
-    { "ike",  KH_IKE },
+    { (unsigned char*)"ike",  KH_IKE },
 };
 
 struct keyword_enum_values kw_keyexchange_list=
@@ -99,10 +99,10 @@
  * Values for auth={add,start,route,ignore}
  */
 struct keyword_enum_value kw_auto_values[]={
-    { "ignore", STARTUP_NO },
-    { "add",    STARTUP_ADD },
-    { "route",  STARTUP_ROUTE },
-    { "start",  STARTUP_START },
+    { (unsigned char*)"ignore", STARTUP_NO },
+    { (unsigned char*)"add",    STARTUP_ADD },
+    { (unsigned char*)"route",  STARTUP_ROUTE },
+    { (unsigned char*)"start",  STARTUP_START },
 };
 
 struct keyword_enum_values kw_auto_list=
@@ -112,14 +112,14 @@
  * Values for type={tunnel,transport,udpencap}
  */
 struct keyword_enum_value kw_type_values[]={
-    { "tunnel",    KS_TUNNEL },
-    { "transport", KS_TRANSPORT },
-    { "udpencap",  KS_UDPENCAP },
-    { "passthrough", KS_PASSTHROUGH },
-    { "udp",       KS_UDPENCAP },
-    { "pass",      KS_PASSTHROUGH },
-    { "reject",    KS_REJECT },
-    { "drop",      KS_DROP },
+    { (unsigned char*)"tunnel",    KS_TUNNEL },
+    { (unsigned char*)"transport", KS_TRANSPORT },
+    { (unsigned char*)"udpencap",  KS_UDPENCAP },
+    { (unsigned char*)"passthrough", KS_PASSTHROUGH },
+    { (unsigned char*)"udp",       KS_UDPENCAP },
+    { (unsigned char*)"pass",      KS_PASSTHROUGH },
+    { (unsigned char*)"reject",    KS_REJECT },
+    { (unsigned char*)"drop",      KS_DROP },
 };
 
 struct keyword_enum_values kw_type_list=
@@ -129,8 +129,8 @@
  * Values for authby={rsasig, secret}
  */
 struct keyword_enum_value kw_authby_values[]={
-    { "rsasig",    POLICY_RSASIG},
-    { "secret",    POLICY_PSK},
+    { (unsigned char*)"rsasig",    POLICY_RSASIG},
+    { (unsigned char*)"secret",    POLICY_PSK},
 };
 
 struct keyword_enum_values kw_authby_list=
@@ -140,10 +140,10 @@
  * Values for failureshunt={passthrough, drop, reject, none}
  */
 struct keyword_enum_value kw_failureshunt_values[]={
-    { "none",        POLICY_FAIL_NONE },
-    { "passthrough", POLICY_FAIL_PASS },
-    { "drop",        POLICY_FAIL_DROP },
-    { "reject",      POLICY_FAIL_REJECT },
+    { (unsigned char*)"none",        POLICY_FAIL_NONE },
+    { (unsigned char*)"passthrough", POLICY_FAIL_PASS },
+    { (unsigned char*)"drop",        POLICY_FAIL_DROP },
+    { (unsigned char*)"reject",      POLICY_FAIL_REJECT },
 };
 
 struct keyword_enum_values kw_failureshunt_list=
@@ -153,9 +153,9 @@
  * Values for rsasigkey={%dnsondemand, %dns, literal }
  */
 struct keyword_enum_value kw_rsasigkey_values[]={
-    { "",             PUBKEY_PREEXCHANGED },
-    { "%dns",         PUBKEY_DNS },
-    { "%dnsondemand", PUBKEY_DNSONDEMAND },
+    { (unsigned char*)"",             PUBKEY_PREEXCHANGED },
+    { (unsigned char*)"%dns",         PUBKEY_DNS },
+    { (unsigned char*)"%dnsondemand", PUBKEY_DNSONDEMAND },
 };
 
 struct keyword_enum_values kw_rsasigkey_list=
@@ -327,7 +327,7 @@
 
        assert(kd->validenum != NULL);
        for(kevcount = kd->validenum->valuesize, kev = kd->validenum->values;
-           kevcount > 0 && strcasecmp(piece, kev->name)!=0;
+           kevcount > 0 && strcasecmp(piece, (const char*)kev->name)!=0;
            kev++, kevcount--);
 
        /* if we found something */
@@ -393,7 +393,7 @@
     assert(kd->validenum != NULL && kd->validenum->values != NULL);
 
     for(kevcount = kd->validenum->valuesize, kev = kd->validenum->values;
-       kevcount > 0 && strcasecmp(s, kev->name)!=0;
+       kevcount > 0 && strcasecmp(s, (const char*)kev->name)!=0;
        kev++, kevcount--);
 
     /* if we found something */
diff -urN ../tmp-orig/openswan-2.2.0/programs/starter/starterwhack.c 
./programs/starter/starterwhack.c
--- ../tmp-orig/openswan-2.2.0/programs/starter/starterwhack.c  2004-04-10 
19:15:23.000000000 +0200
+++ ./programs/starter/starterwhack.c   2004-12-30 19:41:19.000000000 +0100
@@ -152,7 +152,7 @@
        msg.pubkey_alg = PUBKEY_ALG_RSA;
        if (end->id && end->rsakey1) {
                msg.keyid = end->id;
-               err = atobytes(end->rsakey1, 0, keyspace, sizeof(keyspace),
+               err = atobytes((char*)end->rsakey1, 0, keyspace, 
sizeof(keyspace),
                        &msg.keyval.len);
                if (err) {
                        starter_log(LOG_LEVEL_ERR, "conn %s/%s: rsakey 
malformed [%s]",
@@ -160,13 +160,13 @@
                        return 1;
                }
                else {
-                       msg.keyval.ptr = keyspace;
+                       msg.keyval.ptr = (unsigned char*)keyspace;
                        return send_whack_msg(&msg);
                }
        }
        if (end->id && end->rsakey2) {
                msg.keyid = end->id;
-               err = atobytes(end->rsakey2, 0, keyspace, sizeof(keyspace),
+               err = atobytes((char*)end->rsakey2, 0, keyspace, 
sizeof(keyspace),
                        &msg.keyval.len);
                if (err) {
                        starter_log(LOG_LEVEL_ERR, "conn %s/%s: rsakey 
malformed [%s]",
@@ -174,7 +174,7 @@
                        return 1;
                }
                else {
-                       msg.keyval.ptr = keyspace;
+                       msg.keyval.ptr = (unsigned char*)keyspace;
                        return send_whack_msg(&msg);
                }
        }

---------------------------------------
Received: (at 287884-close) by bugs.debian.org; 19 Sep 2005 11:39:03 +0000
>From [EMAIL PROTECTED] Mon Sep 19 04:39:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1EHJsT-0005pQ-00; Mon, 19 Sep 2005 04:32:05 -0700
From: Rene Mayrhofer <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#287884: fixed in openswan 1:2.2.0-11
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 19 Sep 2005 04:32:05 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: openswan
Source-Version: 1:2.2.0-11

We believe that the bug you reported is fixed in the latest version of
openswan, which is due to be installed in the Debian FTP archive:

kernel-patch-openswan_2.2.0-11_all.deb
  to pool/main/o/openswan/kernel-patch-openswan_2.2.0-11_all.deb
openswan-modules-source_2.2.0-11_all.deb
  to pool/main/o/openswan/openswan-modules-source_2.2.0-11_all.deb
openswan_2.2.0-11.diff.gz
  to pool/main/o/openswan/openswan_2.2.0-11.diff.gz
openswan_2.2.0-11.dsc
  to pool/main/o/openswan/openswan_2.2.0-11.dsc
openswan_2.2.0-11_i386.deb
  to pool/main/o/openswan/openswan_2.2.0-11_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Rene Mayrhofer <[EMAIL PROTECTED]> (supplier of updated openswan package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 13 Sep 2005 09:28:03 +0100
Source: openswan
Binary: openswan-modules-source kernel-patch-openswan openswan
Architecture: source all i386
Version: 1:2.2.0-11
Distribution: unstable
Urgency: low
Maintainer: Rene Mayrhofer <[EMAIL PROTECTED]>
Changed-By: Rene Mayrhofer <[EMAIL PROTECTED]>
Description: 
 kernel-patch-openswan - IPSEC kernel support for Openswan
 openswan   - IPSEC utilities for Openswan
 openswan-modules-source - IPSEC kernel modules source for Openswan
Closes: 287884 300399 320724
Changes: 
 openswan (1:2.2.0-11) unstable; urgency=low
 .
   * Transition upload: depend on libgmp3c2 instead of libgmp3 now (no changes
     to source package at all, only recompiled).
     Closes: #320724: openswan: does not install due to bad libgmp3 dependency
   * Fixed signedness issues and other source code quirks to make it compile
     with gcc 4.0. Thanks to Andreas Jochens for the patch (included it in a
     modified form and extended it at some places). However, there are many
     more cases where the current gcc from unstable comes up with warnings in
     this source code. Therefore enabled the -Werror flag when compiling for
     this transitional upload (define WERROR to be empty in debian/rules).
     Closes: #287884: openswan: FTBFS (amd64/gcc-4.0): pointer targets in
             passing argument 6 of 'recvfrom' differ in signedness
     Closes: #300399: openswan: FTBFS (amd64/gcc-4.0): array type has
             incomplete element type
Files: 
 4b75068056933ae52f890865553860db 751 net optional openswan_2.2.0-11.dsc
 cc3d819903d45adf087533df790f999b 223196 net optional openswan_2.2.0-11.diff.gz
 049a3cce1e8176957c8fe5e8e1714ab1 491848 net optional 
openswan-modules-source_2.2.0-11_all.deb
 edb55b207c786b6147a7a0aadb0e6cdd 492580 net optional 
kernel-patch-openswan_2.2.0-11_all.deb
 33b7e5a4fccf091db2d230b08132f4d4 4923710 net optional 
openswan_2.2.0-11_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDLpoZq7SPDcPCS94RAm5IAKC1I5rbrgyZ3XaNSxUr3XvIX/wEzgCgh2+P
jyQpkz5V+M8px/Ibn5LVPPo=
=8wus
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to