Package: oath-toolkit
Version: 2.6.0-1
Severity: serious
Tags: sid + patch
User: [email protected]
Usertags: mips-patch
Hello,
Package oath-toolkit_2.6.0-1 FTBFS on 32bit archs:
https://buildd.debian.org/status/package.php?p=oath-toolkit&suite=sid
https://buildd.debian.org/status/fetch.php?pkg=oath-toolkit&arch=i386&ver=2.6.0-1&stamp=1432044152
https://buildd.debian.org/status/fetch.php?pkg=oath-toolkit&arch=mipsel&ver=2.6.0-1&stamp=1432045345
There is a solution for this issue upstream:
http://git.savannah.gnu.org/cgit/oath-toolkit.git/commit/?id=1cd97516756d3e9d71c4072164bda9070625f9ee
I have tried this patch on mipsel and amd64.
With this patch package builds successfully.
Please include this patch.
Thank you!
Regards,
Jurica
--- oath-toolkit-2.6.0.orig/liboath/tests/tst_totp_algo.c
+++ oath-toolkit-2.6.0/liboath/tests/tst_totp_algo.c
@@ -131,8 +131,8 @@ main (void)
if (strcmp (otp, tv[i].sha256otp) != 0)
{
printf ("otp[%ld] got %s expected2 %s\n", i, otp, tv[i].sha256otp);
- if (strcmp (otp, "82762030") == 0
- && strcmp (tv[i].sha256otp, "65353130") == 0)
+ if (strcmp (otp, "11281421") == 0
+ && strcmp (tv[i].sha256otp, "77737706") == 0)
printf ("Mismatch due to 32-bit time_t...\n");
else
return 1;
@@ -153,8 +153,8 @@ main (void)
if (strcmp (otp, tv[i].sha512otp) != 0)
{
printf ("otp[%ld] got %s expected2 %s\n", i, otp, tv[i].sha512otp);
- if (strcmp (otp, "82762030") == 0
- && strcmp (tv[i].sha512otp, "65353130") == 0)
+ if (strcmp (otp, "29833534") == 0
+ && strcmp (tv[i].sha512otp, "47863826") == 0)
printf ("Mismatch due to 32-bit time_t...\n");
else
return 1;