I think there is a problem related to the sizeof(int) != sizeof(size_t)
when compiling on Linux/AMD/EMT 64 systems, and was wondering if anybody
else already reported this (possibly with a fix) to the
bug tracker at rt.anarres.org, before producing a fix
and submitting a patch myself...
(The debian etch amd64 patches seems to have the same problem:
see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=392793)
Is there a way to actually read the bug reports without
a login name?
Alternatively could somebody else comment on whether
this issue is known/fixed already somewhere....
On AMD64/Linux
sizeof(int) = 4
sizeof(size_t) = 8
For an example see:
spf_interpret.c:44
int buflen; <----
int len;
....
buflen = SPF_SMTP_COMMENT_SIZE + 1;
buf = malloc(buflen);
memset(buf, '\0', buflen);
err = SPF_request_get_exp(spf_server, spf_request,
spf_response, spf_record, &buf, &buflen);
spf_get_exp.c:78
SPF_errcode_t
SPF_request_get_exp(SPF_server_t *spf_server,
SPF_request_t *spf_request,
SPF_response_t *spf_response,
SPF_record_t *spf_record,
char **bufp, size_t *buflenp) <---
-------
To unsubscribe, change your address, or temporarily deactivate your subscription,
please go to http://v2.listbox.com/member/?list_id=1007
when compiling on Linux/AMD/EMT 64 systems, and was wondering if anybody
else already reported this (possibly with a fix) to the
bug tracker at rt.anarres.org, before producing a fix
and submitting a patch myself...
(The debian etch amd64 patches seems to have the same problem:
see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=392793)
Is there a way to actually read the bug reports without
a login name?
Alternatively could somebody else comment on whether
this issue is known/fixed already somewhere....
On AMD64/Linux
sizeof(int) = 4
sizeof(size_t) = 8
For an example see:
spf_interpret.c:44
int buflen; <----
int len;
....
buflen = SPF_SMTP_COMMENT_SIZE + 1;
buf = malloc(buflen);
memset(buf, '\0', buflen);
err = SPF_request_get_exp(spf_server, spf_request,
spf_response, spf_record, &buf, &buflen);
spf_get_exp.c:78
SPF_errcode_t
SPF_request_get_exp(SPF_server_t *spf_server,
SPF_request_t *spf_request,
SPF_response_t *spf_response,
SPF_record_t *spf_record,
char **bufp, size_t *buflenp) <---
-------
To unsubscribe, change your address, or temporarily deactivate your subscription,
please go to http://v2.listbox.com/member/?list_id=1007