From owner-freebsd-ports-bugs@FreeBSD.ORG Wed Sep 26 22:10:06 2012 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 22D581065679 for ; Wed, 26 Sep 2012 22:10:06 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id EFADE8FC18 for ; Wed, 26 Sep 2012 22:10:05 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.5/8.14.5) with ESMTP id q8QMA57E074218 for ; Wed, 26 Sep 2012 22:10:05 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.5/8.14.5/Submit) id q8QMA5rg074211; Wed, 26 Sep 2012 22:10:05 GMT (envelope-from gnats) Resent-Date: Wed, 26 Sep 2012 22:10:05 GMT Resent-Message-Id: <201209262210.q8QMA5rg074211@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Oliver Pinter Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 5D40A1065670 for ; Wed, 26 Sep 2012 22:09:32 +0000 (UTC) (envelope-from nobody@FreeBSD.org) Received: from red.freebsd.org (red.freebsd.org [IPv6:2001:4f8:fff6::22]) by mx1.freebsd.org (Postfix) with ESMTP id 2EE348FC19 for ; Wed, 26 Sep 2012 22:09:32 +0000 (UTC) Received: from red.freebsd.org (localhost [127.0.0.1]) by red.freebsd.org (8.14.5/8.14.5) with ESMTP id q8QM9WZt077918 for ; Wed, 26 Sep 2012 22:09:32 GMT (envelope-from nobody@red.freebsd.org) Received: (from nobody@localhost) by red.freebsd.org (8.14.5/8.14.5/Submit) id q8QM9VVO077917; Wed, 26 Sep 2012 22:09:31 GMT (envelope-from nobody) Message-Id: <201209262209.q8QM9VVO077917@red.freebsd.org> Date: Wed, 26 Sep 2012 22:09:31 GMT From: Oliver Pinter To: freebsd-gnats-submit@FreeBSD.org X-Send-Pr-Version: www-3.1 Cc: Subject: ports/172104: [PATCH] fix kdebase3 build with clang (crypto.cpp) X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Sep 2012 22:10:06 -0000 >Number: 172104 >Category: ports >Synopsis: [PATCH] fix kdebase3 build with clang (crypto.cpp) >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Sep 26 22:10:05 UTC 2012 >Closed-Date: >Last-Modified: >Originator: Oliver Pinter >Release: FreeBSD 10-CURRENT >Organization: >Environment: FreeBSD pandora-test 10.0-CURRENT FreeBSD 10.0-CURRENT #2 r+e17c996: Tue Sep 25 20:02:51 CEST 2012 root@pandora-test:/usr/obj/usr/src/sys/OP amd64 >Description: crypto.cpp:2329:8: error: assigning to 'SSL_METHOD *' (aka 'ssl_method_st *') from incompatible type 'const SSL_METHOD *' (aka 'const ssl_method_st *') meth = SSLv2_client_method(); ^ ~~~~~~~~~~~~~~~~~~~~~ crypto.cpp:2341:8: error: assigning to 'SSL_CIPHER *' (aka 'ssl_cipher_st *') from incompatible type 'const SSL_CIPHER *' (aka 'const ssl_cipher_st *') sc = (meth->get_cipher)(i); ^ ~~~~~~~~~~~~~~~~~~~~~ crypto.cpp:2358:8: error: assigning to 'SSL_METHOD *' (aka 'ssl_method_st *') from incompatible type 'const SSL_METHOD *' (aka 'const ssl_method_st *') meth = SSLv3_client_method(); ^ ~~~~~~~~~~~~~~~~~~~~~ crypto.cpp:2369:8: error: assigning to 'SSL_CIPHER *' (aka 'ssl_cipher_st *') from incompatible type 'const SSL_CIPHER *' (aka 'const ssl_cipher_st *') sc = (meth->get_cipher)(i); ^ ~~~~~~~~~~~~~~~~~~~~~ >How-To-Repeat: >Fix: Patch attached with submission follows: --- kdebase-3.5.10/kcontrol/crypto/crypto.cpp.orig 2006-10-01 19:31:49.000000000 +0200 +++ kdebase-3.5.10/kcontrol/crypto/crypto.cpp 2012-09-26 02:33:32.000000000 +0200 @@ -2326,7 +2326,7 @@ SSLv2Box->clear(); SSLv3Box->clear(); - meth = SSLv2_client_method(); + meth = (SSL_METHOD *)SSLv2_client_method(); SSLeay_add_ssl_algorithms(); ctx = SSL_CTX_new(meth); if (ctx == NULL) return false; @@ -2338,7 +2338,7 @@ for (i=0; ; i++) { int j, k; SSL_CIPHER *sc; - sc = (meth->get_cipher)(i); + sc = (SSL_CIPHER *)(meth->get_cipher)(i); if (!sc) break; // Leak of sc*? @@ -2355,7 +2355,7 @@ if (ssl) SSL_free(ssl); // We repeat for SSLv3 - meth = SSLv3_client_method(); + meth = (SSL_METHOD *)SSLv3_client_method(); SSLeay_add_ssl_algorithms(); ctx = SSL_CTX_new(meth); if (ctx == NULL) return false; @@ -2366,7 +2366,7 @@ for (i=0; ; i++) { int j, k; SSL_CIPHER *sc; - sc = (meth->get_cipher)(i); + sc = (SSL_CIPHER *)(meth->get_cipher)(i); if (!sc) break; // Leak of sc*? >Release-Note: >Audit-Trail: >Unformatted: