From owner-svn-ports-all@freebsd.org Thu Sep 24 15:59:20 2015 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DCB30A0831E; Thu, 24 Sep 2015 15:59:20 +0000 (UTC) (envelope-from mi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BE7291A40; Thu, 24 Sep 2015 15:59:20 +0000 (UTC) (envelope-from mi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.70]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id t8OFxK9I006153; Thu, 24 Sep 2015 15:59:20 GMT (envelope-from mi@FreeBSD.org) Received: (from mi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id t8OFxK5S006151; Thu, 24 Sep 2015 15:59:20 GMT (envelope-from mi@FreeBSD.org) Message-Id: <201509241559.t8OFxK5S006151@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: mi set sender to mi@FreeBSD.org using -f From: Mikhail Teterin Date: Thu, 24 Sep 2015 15:59:20 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r397695 - head/devel/tcltls/files X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 Sep 2015 15:59:21 -0000 Author: mi Date: Thu Sep 24 15:59:19 2015 New Revision: 397695 URL: https://svnweb.freebsd.org/changeset/ports/397695 Log: Fix up so it builds on all our platforms -- certain compilers weren't happy before causing build-failures. Tested with clang (base on 10.x), gcc-4.9 and gcc-4.2.1. The bundled self-tests continue to NOT work -- upstream maintainer confirms a problem and promises to try to test them... Modified: head/devel/tcltls/files/patch-protocols head/devel/tcltls/files/patch-warnings Modified: head/devel/tcltls/files/patch-protocols ============================================================================== --- head/devel/tcltls/files/patch-protocols Thu Sep 24 15:57:52 2015 (r397694) +++ head/devel/tcltls/files/patch-protocols Thu Sep 24 15:59:19 2015 (r397695) @@ -69,21 +69,6 @@ + ; int proto = 0; int verify = 0, require = 0, request = 1; -@@ -1029,9 +1029,9 @@ - State *statePtr; - int proto; -- char *key; -- char *cert; -- char *CAdir; -- char *CAfile; -- char *ciphers; -+ const char *key; -+ const char *cert; -+ const char *CAdir; -+ const char *CAfile; -+ const char *ciphers; - { - Tcl_Interp *interp = statePtr->interp; @@ -1050,5 +1050,5 @@ #if defined(NO_SSL2) if (ENABLED(proto, TLS_PROTO_SSL2)) { Modified: head/devel/tcltls/files/patch-warnings ============================================================================== --- head/devel/tcltls/files/patch-warnings Thu Sep 24 15:57:52 2015 (r397694) +++ head/devel/tcltls/files/patch-warnings Thu Sep 24 15:59:19 2015 (r397695) @@ -52,8 +52,8 @@ + (void *)bio, cmd, num, ptr); switch (cmd) { ---- tlsIO.c Mon Feb 4 17:46:31 2002 -+++ tlsIO.c Mon Jun 20 10:18:45 2005 +--- tlsIO.c 2015-06-06 09:07:08 UTC ++++ tlsIO.c 2015-09-22 20:41:37 UTC @@ -287,5 +287,5 @@ State *statePtr = (State *) instanceData; @@ -61,14 +61,21 @@ + dprintf(stderr,"\nTlsCloseProc(%p)", instanceData); if (channelTypeVersion == TLS_CHANNEL_VERSION_1) { -@@ -413,5 +413,5 @@ +@@ -424,5 +424,5 @@ *errorCodePtr = 0; - dprintf(stderr,"\nBIO_write(0x%x, %d)", (unsigned int) statePtr, toWrite); + dprintf(stderr,"\nBIO_write(%p, %d)", instanceData, toWrite); - if (!SSL_is_init_finished(statePtr->ssl)) { -@@ -443,6 +443,6 @@ + if (statePtr->flags & TLS_TCL_CALLBACK) { +@@ -444,5 +444,5 @@ + if (toWrite == 0) { + dprintf(stderr, "zero-write\n"); +- BIO_flush(statePtr->bio); ++ (void)BIO_flush(statePtr->bio); + written = 0; + goto output; +@@ -461,6 +461,6 @@ ERR_clear_error(); written = BIO_write(statePtr->bio, buf, toWrite); - dprintf(stderr,"\nBIO_write(0x%x, %d) -> [%d]", @@ -77,38 +84,138 @@ + instanceData, toWrite, written); } if (written <= 0) { -@@ -851,5 +851,5 @@ +@@ -543,5 +543,5 @@ + return (*getOptionProc)(Tcl_GetChannelInstanceData(downChan), + interp, optionName, dsPtr); +- } else if (optionName == (char*) NULL) { ++ } else if (optionName == NULL) { + /* + * Request is query for all options, this is ok. +@@ -554,10 +554,10 @@ + return TCL_ERROR; + } else { ++#if 0 + size_t len = 0; + +- if (optionName != (char *) NULL) { ++ if (optionName != NULL) { + len = strlen(optionName); + } +-#if 0 + if ((len == 0) || ((len > 1) && (optionName[1] == 'c') && + (strncmp(optionName, "-cipher", len) == 0))) { +@@ -888,5 +888,5 @@ int err; - dprintf(stderr,"\nWaitForConnect(0x%x)", (unsigned int) statePtr); + dprintf(stderr,"\nWaitForConnect(%p)", (void *)statePtr); - for (;;) { + if (statePtr->flags & TLS_TCL_HANDSHAKE_FAILED) { +@@ -913,5 +913,5 @@ + /*SSL_write(statePtr->ssl, (char*)&err, 0); HACK!!! */ + if (err > 0) { +- BIO_flush(statePtr->bio); ++ (void)BIO_flush(statePtr->bio); + } + +--- tls.c 2015-07-07 17:16:02 UTC ++++ tls.c 2015-09-22 20:18:04 UTC +@@ -64,7 +64,7 @@ + Tcl_Interp *interp, int objc, Tcl_Obj *CONST objv[])); + +-static SSL_CTX *CTX_Init _ANSI_ARGS_((State *statePtr, int proto, char *key, +- char *cert, char *CAdir, char *CAfile, char *ciphers, +- char *DHparams)); ++static SSL_CTX *CTX_Init _ANSI_ARGS_((State *statePtr, int proto, const char *key, ++ const char *cert, const char *CAdir, const char *CAfile, ++ const char *ciphers, const char *DHparams)); ---- tls.c 2014-12-08 14:10:28.000000000 -0500 -+++ tls.c 2015-03-25 18:22:52.000000000 -0400 -@@ -514,5 +514,5 @@ + static int TlsLibInit _ANSI_ARGS_ (()) ; +@@ -309,5 +309,5 @@ + { + Tcl_Obj *cmdPtr, *result; +- char *errStr, *string; ++ const char *errStr; + int length; + SSL *ssl = (SSL*)X509_STORE_CTX_get_app_data(ctx); +@@ -320,7 +320,7 @@ + + if (!ok) { +- errStr = (char*)X509_verify_cert_error_string(err); ++ errStr = X509_verify_cert_error_string(err); + } else { +- errStr = (char *)0; ++ errStr = NULL; + } + +@@ -350,5 +350,5 @@ + + Tcl_ListObjAppendElement( statePtr->interp, cmdPtr, +- Tcl_NewStringObj( errStr ? errStr : "", -1) ); ++ Tcl_NewStringObj( errStr != NULL ? errStr : "", -1) ); + + Tcl_Preserve( (ClientData) statePtr->interp); +@@ -364,5 +364,5 @@ + } else { + result = Tcl_GetObjResult(statePtr->interp); +- string = Tcl_GetStringFromObj(result, &length); ++ Tcl_GetStringFromObj(result, &length); /* We only need the length */ + /* An empty result leaves verification unchanged. */ + if (length > 0) { +@@ -532,5 +532,5 @@ }; enum protocol { - TLS_SSL2, TLS_SSL3, TLS_TLS1, TLS_TLS1_1, TLS_TLS1_2, TLS_NONE + TLS_SSL2, TLS_SSL3, TLS_TLS1, TLS_TLS1_1, TLS_TLS1_2 }; Tcl_Obj *objPtr; -@@ -1040,5 +1040,5 @@ - Tcl_DString ds1; - int off = 0; -- const SSL_METHOD *method; -+ SSL_METHOD *method; - - if (!proto) { -@@ -1361,5 +1361,5 @@ +@@ -745,13 +745,13 @@ + int flags = TLS_TCL_INIT; + int server = 0; /* is connection incoming or outgoing? */ +- char *key = NULL; +- char *cert = NULL; +- char *ciphers = NULL; +- char *CAfile = NULL; +- char *CAdir = NULL; +- char *DHparams = NULL; +- char *model = NULL; ++ const char *key = NULL; ++ const char *cert = NULL; ++ const char *ciphers = NULL; ++ const char *CAfile = NULL; ++ const char *CAdir = NULL; ++ const char *DHparams = NULL; ++ const char *model = NULL; + #ifndef OPENSSL_NO_TLSEXT +- char *servername = NULL; /* hostname for Server Name Indication */ ++ const char *servername = NULL; /* hostname for Server Name Indication */ + #endif + #if defined(NO_SSL2) +@@ -1050,10 +1062,10 @@ + State *statePtr; + int proto; +- char *key; +- char *cert; +- char *CAdir; +- char *CAfile; +- char *ciphers; +- char *DHparams; ++ const char *key; ++ const char *cert; ++ const char *CAdir; ++ const char *CAfile; ++ const char *ciphers; ++ const char *DHparams; + { + Tcl_Interp *interp = statePtr->interp; +@@ -1422,5 +1434,5 @@ { static CONST84 char *commands [] = { "req", NULL }; - enum command { C_REQ, C_DUMMY }; + enum command { C_REQ }; int cmd; -@@ -1465,11 +1465,11 @@ +@@ -1526,11 +1538,11 @@ name=X509_get_subject_name(cert); - X509_NAME_add_entry_by_txt(name,"C", MBSTRING_ASC, k_C, -1, -1, 0); @@ -136,3 +243,26 @@ +#ifndef _TLSINT_H #define _TLSINT_H +--- tlsX509.c 2004-06-29 10:58:08 UTC ++++ tlsX509.c 2015-09-22 20:49:42 UTC +@@ -119,5 +119,5 @@ + n = max(n, 0); + subject[n] = 0; +- BIO_flush(bio); ++ (void)BIO_flush(bio); + + X509_NAME_print_ex(bio, X509_get_issuer_name(cert), 0, flags); +@@ -125,5 +125,5 @@ + n = max(n, 0); + issuer[n] = 0; +- BIO_flush(bio); ++ (void)BIO_flush(bio); + + i2a_ASN1_INTEGER(bio, X509_get_serialNumber(cert)); +@@ -131,5 +131,5 @@ + n = max(n, 0); + serial[n] = 0; +- BIO_flush(bio); ++ (void)BIO_flush(bio); + + BIO_free(bio);