From nobody Mon May 29 15:03:02 2023 X-Original-To: dev-commits-ports-branches@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QVJgB61l2z4Xv9R; Mon, 29 May 2023 15:03:02 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QVJgB5Yhsz3kr9; Mon, 29 May 2023 15:03:02 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1685372582; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=R3gKSJtfMKw1mIB+hZq0eFwzw01B2at94Ka5CfAm5Co=; b=Ca+u0ekvxzBuRImISnqbFplwvuGHVFHC074wINfljF8IlOUVw4zdR6SSss18Jwb1yL590l AoIo7mAXOjhHcXuctoszForfdZ96s9uB2JTL+rLqhKHftx/HZWJlVbA/xCcsGR8BrDvsai wi/Bqq5nBwGuMXivUmJNLx7td8TPQoR/Cq55V5gdUwup0DgJpYf0Fene8aB50jEu9GCp4k aGoOpl6aWj0QZZDsmkdCDcA2L/+LmgJdsPavjsCR7ltvBMQ2e5ttVvggEvFWWq4E/nSGtb OnpklpZKv07NJgb9qMYJbrvT6gytdBZElMhfXB9vHJ1vTIe1JxzXTdv0yPlfhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1685372582; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=R3gKSJtfMKw1mIB+hZq0eFwzw01B2at94Ka5CfAm5Co=; b=GYbvPn67kz6lvxlcjCw/oI63wo0oW4Vsb3xjOkSHKJS+BAZOBPg+AQ5V9IPOUT9JnaiRJF 7rvx/3akQgbhXFd79wsHlY+2fW7y7iGJDMx7ER4boR2fO4ubAkEz6IW+fb46MElK6oMmEE vQkhWbbfTovnyr4wKnb9VdxQvWa1EuJWckr5/HDNihH3qYL+a/9Z4qYpRZUoRwrAnq8VV/ dkZkkKBc61Bs1UW2Lt9OlTQEtKmQP7ZhxyKh/0j0ZAn4+fACmY7c8F9LgSyX8rk2EkuNJZ 0pYQ2rXrV9Jz4ZArTBTZgfQ9F943ckGGXWtRdTE8MBXHwIXAacWpvrz/Rem+Fw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1685372582; a=rsa-sha256; cv=none; b=bGotPyiEtWBtJ8Sm5N3fI9vjRxmY88UdyReN5EUe6vbERcKtND6jjiNNonBbrpN1d6SDTU ZJVyKEiWDBJdW+7XAJIMYas7Pf4I2JgJO6rwJvCt/xWCcMq3Z7TD1NxnkmOCfTNC2OJHFe gvWhYjATXFzi/N0V27CfaTMP5e+6YjKIrS8xNORyq6l34u4+eiTfp+pgQ6aYcBzFf7PUiX Ly2qmPX6W/5ggQQt+Db5D8P6Q6XC75sBVioYYmsrc9A6A14Oy450Hk2Miodb3HLG3GPivK le9IwcgfxpR6XSdcVvIiu+4cBJrWhRdRFUJhSVmRpSoap3QqxMhRtsLLBBLOMA== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4QVJgB4dFXzG0r; Mon, 29 May 2023 15:03:02 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 34TF32XK038854; Mon, 29 May 2023 15:03:02 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 34TF32tn038853; Mon, 29 May 2023 15:03:02 GMT (envelope-from git) Date: Mon, 29 May 2023 15:03:02 GMT Message-Id: <202305291503.34TF32tn038853@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-branches@FreeBSD.org From: Cy Schubert Subject: git: 05b6b28bb7b7 - 2023Q2 - net/cryptcat: Fix numerous LLVM15 build errors List-Id: Commits to the quarterly branches of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-branches List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-branches@freebsd.org X-BeenThere: dev-commits-ports-branches@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: cy X-Git-Repository: ports X-Git-Refname: refs/heads/2023Q2 X-Git-Reftype: branch X-Git-Commit: 05b6b28bb7b7890b6b10cc530576d01b8a71166f Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch 2023Q2 has been updated by cy: URL: https://cgit.FreeBSD.org/ports/commit/?id=05b6b28bb7b7890b6b10cc530576d01b8a71166f commit 05b6b28bb7b7890b6b10cc530576d01b8a71166f Author: Cy Schubert AuthorDate: 2023-05-25 09:09:03 +0000 Commit: Cy Schubert CommitDate: 2023-05-29 15:02:53 +0000 net/cryptcat: Fix numerous LLVM15 build errors Fix numerous instances of, netcat.c:241:22: error: incompatible integer to pointer conversion passing 'unsigned int' to parameter of type 'char *' [-Wint-conversion] bail (wrote_txt, wrote_net, wrote_out); ^~~~~~~~~ While at it assume care and feeding of this port. (cherry picked from commit 18bba8441a4ddd827edf80284c23dddf41979069) --- net/cryptcat/Makefile | 2 +- net/cryptcat/files/patch-netcat.c | 151 +++++++++++++++++++++++++++++++++++++- 2 files changed, 150 insertions(+), 3 deletions(-) diff --git a/net/cryptcat/Makefile b/net/cryptcat/Makefile index 32e350c65a55..f29b21f9093f 100644 --- a/net/cryptcat/Makefile +++ b/net/cryptcat/Makefile @@ -5,7 +5,7 @@ CATEGORIES= net MASTER_SITES= SF/${PORTNAME}/${PORTNAME}-unix-1.2/${PORTNAME}-unix-${PORTVERSION} DISTNAME= ${PORTNAME}-unix-${PORTVERSION} -MAINTAINER= ports@FreeBSD.org +MAINTAINER= cy@FreeBSD.org COMMENT= Standard netcat enhanced with twofish encryption WWW= https://sourceforge.net/projects/cryptcat/ diff --git a/net/cryptcat/files/patch-netcat.c b/net/cryptcat/files/patch-netcat.c index e4efd99385fa..a2c2b48a832f 100644 --- a/net/cryptcat/files/patch-netcat.c +++ b/net/cryptcat/files/patch-netcat.c @@ -1,5 +1,5 @@ ---- netcat.c.orig 2005-10-18 17:42:05 UTC -+++ netcat.c +--- netcat.c.orig 2005-10-18 10:42:05.000000000 -0700 ++++ netcat.c 2023-05-25 02:08:35.476614000 -0700 @@ -48,9 +48,6 @@ #else #include @@ -23,3 +23,150 @@ #ifdef HAVE_RANDOM /* aficionados of ?rand48() should realize */ #define SRAND srandom /* that this doesn't need *strong* random */ +@@ -235,7 +238,7 @@ + { + errno = 0; + if (o_verbose > 1) /* normally we don't care */ +- bail (wrote_txt, wrote_net, wrote_out); ++ bail (wrote_txt, (char*) wrote_net, (char *) wrote_out); + bail (" punt!"); + } + +@@ -277,7 +280,7 @@ + if (p != NULL) + memset (p, 0, s); + else +- bail ("Hmalloc %d failed", s); ++ bail ("Hmalloc %d failed", (char *) s); + return (p); + } /* Hmalloc */ + +@@ -465,7 +468,7 @@ + if (servent) { + y = ntohs (servent->s_port); + if (x != y) /* "never happen" */ +- holler ("Warning: port-bynum mismatch, %d != %d", x, y); ++ holler ("Warning: port-bynum mismatch, %d != %d", (char *) x, (char *) y); + strncpy (portpoop->name, servent->s_name, sizeof (portpoop->name)); + } /* if servent */ + goto gp_finish; +@@ -565,7 +568,7 @@ + if (! block) + bail ("loadports: no block?!"); + if ((! lo) || (! hi)) +- bail ("loadports: bogus values %d, %d", lo, hi); ++ bail ("loadports: bogus values %d, %d", (char *) lo, (char *) hi); + x = hi; + while (lo <= x) { + block[x] = 1; +@@ -671,7 +674,7 @@ + if (errno != EADDRINUSE) + break; + else { +- holler ("retrying local %s:%d", inet_ntoa (lclend->sin_addr), lp); ++ holler ("retrying local %s:%d", inet_ntoa (lclend->sin_addr), (char *) lp); + sleep (2); + errno = 0; /* clear from sleep */ + } /* if EADDRINUSE */ +@@ -679,7 +682,7 @@ + } /* if lad or lp */ + if (rr) + bail ("Can't grab %s:%d with bind", +- inet_ntoa(lclend->sin_addr), lp); ++ inet_ntoa(lclend->sin_addr), (char *) lp); + + if (o_listen) + return (nnetfd); /* thanks, that's all for today */ +@@ -824,7 +827,7 @@ + strcat (bigbuf_net, "any"); + strcat (bigbuf_net, "] %d ..."); + z = ntohs (lclend->sin_port); +- holler (bigbuf_net, z); ++ holler (bigbuf_net, (char *) z); + } /* verbose -- whew!! */ + + /* UDP is a speeeeecial case -- we have to do I/O *and* get the calling +@@ -936,9 +939,9 @@ + x = 1; + if (x) /* guilty! */ + bail ("invalid connection to [%s] from %s [%s] %d", +- cp, whozis->name, whozis->addrs[0], z); ++ cp, whozis->name, whozis->addrs[0], (char *) z); + holler ("connect to [%s] from %s [%s] %d", /* oh, you're okay.. */ +- cp, whozis->name, whozis->addrs[0], z); ++ cp, whozis->name, whozis->addrs[0], (char *) z); + return (nnetfd); /* open! */ + + dol_tmo: +@@ -966,7 +969,7 @@ + + rr = write (fd, bigbuf_in, 1); + if (rr != 1) +- holler ("udptest first write failed?! errno %d", errno); ++ holler ("udptest first write failed?! errno %d", (char *) errno); + if (o_wait) + sleep (o_wait); + else { +@@ -1143,7 +1146,7 @@ + /* if you don't have all this FD_* macro hair in sys/types.h, you'll have to + either find it or do your own bit-bashing: *ding1 |= (1 << fd), etc... */ + if (fd > FD_SETSIZE) { +- holler ("Preposterous fd value %d", fd); ++ holler ("Preposterous fd value %d", (char *) fd); + return (1); + } + FD_SET (fd, ding1); /* global: the net is open */ +@@ -1251,7 +1254,7 @@ + + /* sanity check. Works because they're both unsigned... */ + if ((rzleft > 8200) || (rnleft > 8200)) { +- holler ("Bogus buffers: %d, %d", rzleft, rnleft); ++ holler ("Bogus buffers: %d, %d", (char *) rzleft, (char *) rnleft); + rzleft = rnleft = 0; + } + /* net write retries sometimes happen on UDP connections */ +@@ -1435,7 +1438,7 @@ + if ((x) && (x == (x & 0x1c))) /* mask off bits of fukt values */ + gatesptr = x; + else +- bail ("invalid hop pointer %d, must be multiple of 4 <= 28", x); ++ bail ("invalid hop pointer %d, must be multiple of 4 <= 28", (char *) x); + break; + case 'g': /* srcroute hop[s] */ + if (gatesidx > 8) +@@ -1565,7 +1568,7 @@ + #endif /* GAPING_SECURITY_HOLE */ + x = readwrite (netfd); /* it even works with UDP! */ + if (o_verbose > 1) /* normally we don't care */ +- holler (wrote_txt, wrote_net, wrote_out); ++ holler (wrote_txt, (char *) wrote_net, (char *) wrote_out); + exit (x); /* "pack out yer trash" */ + } else /* if no netfd */ + bail ("no connection"); +@@ -1624,7 +1627,7 @@ + if (netfd > 0) { /* Yow, are we OPEN YET?! */ + x = 0; /* pre-exit status */ + holler ("%s [%s] %d (%s) open", +- whereto->name, whereto->addrs[0], curport, portpoop->name); ++ whereto->name, whereto->addrs[0], (char *) curport, portpoop->name); + #ifdef GAPING_SECURITY_HOLE + if (pr00gie) /* exec is valid for outbound, too */ + doexec (netfd); +@@ -1637,7 +1640,7 @@ + Give it another -v if you want to see everything. */ + if ((Single || (o_verbose > 1)) || (errno != ECONNREFUSED)) + holler ("%s [%s] %d (%s)", +- whereto->name, whereto->addrs[0], curport, portpoop->name); ++ whereto->name, whereto->addrs[0], (char *) curport, portpoop->name); + } /* if netfd */ + close (netfd); /* just in case we didn't already */ + if (o_interval) +@@ -1652,7 +1655,7 @@ + + errno = 0; + if (o_verbose > 1) /* normally we don't care */ +- holler (wrote_txt, wrote_net, wrote_out); ++ holler (wrote_txt, (char *) wrote_net, (char *) wrote_out); + if (Single) + exit (x); /* give us status on one connection */ + exit (0); /* otherwise, we're just done */