strongswan/strongswan-4.6.4-fmt-warnings.patch
Marius Tomaschewski 2645720915 - Updated to strongSwan 4.6.4 release:
- Fixed a security vulnerability in the gmp plugin. If this
    plugin was used for RSA signature verification an empty or
    zeroed signature was handled as a legitimate one
    (bnc#761325, CVE-2012-2388).
  - Fixed several issues with reauthentication and address updates.

OBS-URL: https://build.opensuse.org/package/show/network:vpn/strongswan?expand=0&rev=46
2012-05-31 16:11:42 +00:00

32 lines
1.1 KiB
Diff

--- src/checksum/checksum_builder.c
+++ src/checksum/checksum_builder.c 2012/02/15 13:08:35
@@ -64,9 +64,9 @@ static void build_checksum(char *path, c
fprintf(stderr, "dlopen failed: %s\n", dlerror());
}
}
- printf("\t{\"%-25s%7u, 0x%08x, %6u, 0x%08x},\n",
+ printf("\t{\"%-25s%7zu, 0x%08x, %6zu, 0x%08x},\n",
name, fsize, fsum, ssize, ssum);
- fprintf(stderr, "\"%-25s%7u / 0x%08x %6u / 0x%08x\n",
+ fprintf(stderr, "\"%-25s%7zu / 0x%08x %6zu / 0x%08x\n",
name, fsize, fsum, ssize, ssum);
}
@@ -106,14 +106,14 @@ static void build_binary_checksum(char *
pos = strrchr(binary, '.');
if (pos && streq(pos, ".so"))
{
- snprintf(name, sizeof(name), "%.*s\",", pos - binary, binary);
+ snprintf(name, sizeof(name), "%.*s\",", (int)(pos - binary), binary);
if (streq(name, "libstrongswan\","))
{
snprintf(sname, sizeof(sname), "%s", "library_init");
}
else
{
- snprintf(sname, sizeof(sname), "%.*s_init", pos - binary, binary);
+ snprintf(sname, sizeof(sname), "%.*s_init", (int)(pos - binary), binary);
}
build_checksum(path, name, sname);
}