Your message dated Tue, 09 Sep 2025 03:41:36 +0000
with message-id <[email protected]>
and subject line Bug#1097531: fixed in otpw 1.5-5
has caused the Debian Bug report #1097531,
regarding otpw: ftbfs with GCC-15
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1097531: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1097531
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:otpw
Version: 1.5-3
Severity: important
Tags: sid forky
User: [email protected]
Usertags: ftbfs-gcc-15

[This bug is NOT targeted to the upcoming trixie release]

Please keep this issue open in the bug tracker for the package it
was filed for.  If a fix in another package is required, please
file a bug for the other package (or clone), and add a block in this
package. Please keep the issue open until the package can be built in
a follow-up test rebuild.

The package fails to build in a test rebuild on at least amd64 with
gcc-15/g++-15, but succeeds to build with gcc-14/g++-14. The
severity of this report will be raised before the forky release.

The full build log can be found at:
http://qa-logs.debian.net/2025/02/16/amd64exp/otpw_1.5-3_unstable_gccexp.log.gz
The last lines of the build log are at the end of this report.

To build with GCC 15, either set CC=gcc-15 CXX=g++-15 explicitly,
or install the gcc, g++, gfortran, ... packages from experimental.

  apt-get -t=experimental install g++ 

GCC 15 now defaults to the C23/C++23 standards, exposing many FTBFS.
Other Common build failures are new warnings resulting in build failures
with -Werror turned on, or new/dropped symbols in Debian symbols files.
For other C/C++ related build failures see the porting guide at
http://gcc.gnu.org/gcc-15/porting_to.html

[...]
otpw-gen.c:263:31: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  263 |   "your","yous","yuan","yuri","yves","zach","zack","zapt","zeal","zero",
      |                               ^~~~~~
otpw-gen.c:263:38: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  263 |   "your","yous","yuan","yuri","yves","zach","zack","zapt","zeal","zero",
      |                                      ^~~~~~
otpw-gen.c:263:45: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  263 |   "your","yous","yuan","yuri","yves","zach","zack","zapt","zeal","zero",
      |                                             ^~~~~~
otpw-gen.c:263:52: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  263 |   "your","yous","yuan","yuri","yves","zach","zack","zapt","zeal","zero",
      |                                                    ^~~~~~
otpw-gen.c:263:59: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  263 |   "your","yous","yuan","yuri","yves","zach","zack","zapt","zeal","zero",
      |                                                           ^~~~~~
otpw-gen.c:263:66: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  263 |   "your","yous","yuan","yuri","yves","zach","zack","zapt","zeal","zero",
      |                                                                  ^~~~~~
otpw-gen.c:264:3: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  264 |   "zest","zeta","zeus","zinc","zone","zoom","zoos","zzap"
      |   ^~~~~~
otpw-gen.c:264:10: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  264 |   "zest","zeta","zeus","zinc","zone","zoom","zoos","zzap"
      |          ^~~~~~
otpw-gen.c:264:17: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  264 |   "zest","zeta","zeus","zinc","zone","zoom","zoos","zzap"
      |                 ^~~~~~
otpw-gen.c:264:24: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  264 |   "zest","zeta","zeus","zinc","zone","zoom","zoos","zzap"
      |                        ^~~~~~
otpw-gen.c:264:31: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  264 |   "zest","zeta","zeus","zinc","zone","zoom","zoos","zzap"
      |                               ^~~~~~
otpw-gen.c:264:38: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  264 |   "zest","zeta","zeus","zinc","zone","zoom","zoos","zzap"
      |                                      ^~~~~~
otpw-gen.c:264:45: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  264 |   "zest","zeta","zeus","zinc","zone","zoom","zoos","zzap"
      |                                             ^~~~~~
otpw-gen.c:264:52: warning: initializer-string for array of ‘char’ is too long 
[-Wunterminated-string-initialization]
  264 |   "zest","zeta","zeus","zinc","zone","zoom","zoos","zzap"
      |                                                    ^~~~~~
otpw-gen.c: In function ‘main’:
otpw-gen.c:924:5: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  924 |     fgets(password1, sizeof(password1), stdin);
      |     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
otpw-gen.c:927:5: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  927 |     fgets(password1, sizeof(password1), stdin);
      |     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
otpw-gen.c:929:5: warning: ignoring return value of ‘fgets’ declared with 
attribute ‘warn_unused_result’ [-Wunused-result]
  929 |     fgets(password2, sizeof(password2), stdin);
      |     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
gcc -fPIC -O -ggdb -W -Wall -g -O2 -Werror=implicit-function-declaration 
-ffile-prefix-map=/build/reproducible-path/otpw-1.5=. -fstack-protector-strong 
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection 
-Wdate-time -D_FORTIFY_SOURCE=2   -c -o rmd160.o rmd160.c
gcc -fPIC -O -ggdb -W -Wall -g -O2 -Werror=implicit-function-declaration 
-ffile-prefix-map=/build/reproducible-path/otpw-1.5=. -fstack-protector-strong 
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection 
-Wdate-time -D_FORTIFY_SOURCE=2   -c -o md.o md.c
gcc -fPIC -O -ggdb -W -Wall -g -O2 -Werror=implicit-function-declaration 
-ffile-prefix-map=/build/reproducible-path/otpw-1.5=. -fstack-protector-strong 
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection 
-Wdate-time -D_FORTIFY_SOURCE=2   -c -o otpw.o otpw.c
otpw.c:119:5: error: conflicting types for ‘otpw_set_pseudouser’; have 
‘int(struct otpw_pwdbuf **)’
  119 | int otpw_set_pseudouser(struct otpw_pwdbuf **pseudouser)
      |     ^~~~~~~~~~~~~~~~~~~
In file included from otpw.c:19:
otpw.h:101:5: note: previous declaration of ‘otpw_set_pseudouser’ with type 
‘int(void)’
  101 | int otpw_set_pseudouser();
      |     ^~~~~~~~~~~~~~~~~~~
otpw.c: In function ‘rbg_seed’:
otpw.c:157:5: warning: ignoring return value of ‘read’ declared with attribute 
‘warn_unused_result’ [-Wunused-result]
  157 |     read(devrandom, rbs, sizeof(rbs));
      |     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
make[1]: *** [<builtin>: otpw.o] Error 1
make[1]: Leaving directory '/build/reproducible-path/otpw-1.5'
make: *** [debian/rules:34: build-stamp] Error 2
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2

--- End Message ---
--- Begin Message ---
Source: otpw
Source-Version: 1.5-5
Done: Thorsten Alteholz <[email protected]>

We believe that the bug you reported is fixed in the latest version of
otpw, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thorsten Alteholz <[email protected]> (supplier of updated otpw package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 08 Sep 2025 10:22:19 +0200
Source: otpw
Architecture: source
Version: 1.5-5
Distribution: unstable
Urgency: medium
Maintainer: Thorsten Alteholz <[email protected]>
Changed-By: Thorsten Alteholz <[email protected]>
Closes: 1097531
Changes:
 otpw (1.5-5) unstable; urgency=medium
 .
   * add gcc15.patch (Closes: #1097531)
     (do really close this now)
Checksums-Sha1:
 7429dfb83fbf02f9413e6c6cd6da6bf40b65dfae 2066 otpw_1.5-5.dsc
 99bb4094514617ba5ea11aa26a89977390b6358d 45725 otpw_1.5.orig.tar.gz
 351feb3c84661a4564735ec9b102db3b01b54cb6 7632 otpw_1.5-5.debian.tar.xz
 393103eec36826a8781d1f42de460418c4624765 6982 otpw_1.5-5_amd64.buildinfo
Checksums-Sha256:
 feea87fcabf5dd3547a9d2d0c00f464bc7e4de078958c873ca2353f61341f50d 2066 
otpw_1.5-5.dsc
 98aca38a61c7713677b96f24426ca7053480c0fd077d91b1e99bc9f92ccb832a 45725 
otpw_1.5.orig.tar.gz
 3146935265b7244074687c47501353ddffe1e97ce35aac7c4a27a5c1cb22a9f3 7632 
otpw_1.5-5.debian.tar.xz
 d0c98cb5b7d13a7385dd677e87bdf19dee8ed991f845e3df3d8a67a49135617f 6982 
otpw_1.5-5_amd64.buildinfo
Files:
 435cdb76e3683548f851527e4a946546 2066 libs optional otpw_1.5-5.dsc
 d07a91bfc14d5ec4f5617a9dedd1ee93 45725 libs optional otpw_1.5.orig.tar.gz
 b40284750588d06a588be822638e31c9 7632 libs optional otpw_1.5-5.debian.tar.xz
 4a2f465ad03d4a6c126e4c7dd5d81f59 6982 libs optional otpw_1.5-5_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=SHlR
-----END PGP SIGNATURE-----

Attachment: pgpFACbK3XRya.pgp
Description: PGP signature


--- End Message ---

Reply via email to