Package: anon-proxy Version: 00.02.39-7 Severity: serious Tags: patch Hi,
I tried to rebuild anon-proxy on i386, it fails. Please find attached patch to fix that. Regards Petr
diff -ur anon-proxy-00.02.39/CACertificate.cpp anon-proxy.new/CACertificate.cpp --- anon-proxy-00.02.39/CACertificate.cpp 2003-11-05 17:47:09.000000000 +0000 +++ anon-proxy.new/CACertificate.cpp 2005-10-23 12:33:49.000000000 +0000 @@ -91,12 +91,12 @@ return NULL; } -CACertificate* CACertificate::decode(UINT8* buff,UINT32 bufflen,UINT32 type,char* passwd) +CACertificate* CACertificate::decode(const UINT8* buff,UINT32 bufflen,UINT32 type,char* passwd) { if(buff==NULL) return NULL; X509* tmpCert=NULL; - UINT8* tmp; + const UINT8* tmp; PKCS12* tmpPKCS12; switch(type) { diff -ur anon-proxy-00.02.39/CACertificate.hpp anon-proxy.new/CACertificate.hpp --- anon-proxy-00.02.39/CACertificate.hpp 2002-08-06 15:02:55.000000000 +0000 +++ anon-proxy.new/CACertificate.hpp 2005-10-23 12:34:03.000000000 +0000 @@ -43,7 +43,7 @@ return tmp; } - static CACertificate* decode(UINT8* buff,UINT32 bufflen,UINT32 type,char* passwd=NULL); + static CACertificate* decode(const UINT8* buff,UINT32 bufflen,UINT32 type,char* passwd=NULL); static CACertificate* decode(const DOM_Node&node,UINT32 type,char* passwd=NULL); SINT32 encode(UINT8* buff,UINT32* bufflen,UINT32 type); SINT32 encode(DOM_DocumentFragment& docFrag,DOM_Document& doc); diff -ur anon-proxy-00.02.39/CAIPList.cpp anon-proxy.new/CAIPList.cpp --- anon-proxy-00.02.39/CAIPList.cpp 2003-08-19 18:26:07.000000000 +0000 +++ anon-proxy.new/CAIPList.cpp 2005-10-23 12:36:37.000000000 +0000 @@ -29,6 +29,7 @@ #include "CAIPList.hpp" #include "CAMsg.hpp" #include "CAUtil.hpp" +#include <openssl/md5.h> /** Constructs an empty CAIPList. * The default number #MAXIP_CONNECTIONS of allowed insertions is used*/ CAIPList::CAIPList() diff -ur anon-proxy-00.02.39/CASignature.cpp anon-proxy.new/CASignature.cpp --- anon-proxy-00.02.39/CASignature.cpp 2003-12-01 17:15:43.000000000 +0000 +++ anon-proxy.new/CASignature.cpp 2005-10-23 12:37:23.000000000 +0000 @@ -114,7 +114,7 @@ return parseSignKeyXML(buff,len); case SIGKEY_PKCS12: - PKCS12* tmpPKCS12=d2i_PKCS12(NULL,(UINT8**)&buff,len); + PKCS12* tmpPKCS12=d2i_PKCS12(NULL,&buff,len); EVP_PKEY* key=NULL; // X509* cert=NULL; if(PKCS12_parse(tmpPKCS12,passwd,&key,NULL,NULL)!=1)