Received: via dmail-2000(11) for martin; Fri, 7 Feb 2003 00:32:52 +0100 (CET) Return-Path: <[EMAIL PROTECTED]> Received: from lucy.verwaltung.uni-mainz.de (lucy.Verwaltung.Uni-Mainz.DE [134.93.144.162]) by wintermute.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian -4) with ESMTP id h16NWj0C020188 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL) for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:45 +0100 Received: from mailgate3.zdv.Uni-Mainz.DE (mailgate3.zdv.Uni-Mainz.DE [134.93.130.78]) by lucy.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian -4) with ESMTP id h16NWixj029654 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO) for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:44 +0100 Received: from exfront1.zdv.uni-mainz.de (exfront1.zdv.Uni-Mainz.DE [134.93.8.75]) by mailgate3.zdv.Uni-Mainz.DE (8.12.6/8.12.6) with ESMTP id h16NWhS0000379 for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:43 +0100 (MET) Received: from spamgate1.zdv.Uni-Mainz.DE ([134.93.8.231]) by exfront1.zdv.uni-mainz.de with Microsoft SMTPSVC(5.0.2195.5329); Fri, 7 Feb 2003 00:32:43 +0100 Received: from mailgate2.zdv.Uni-Mainz.DE (mailgate2.zdv.Uni-Mainz.DE [134.93.8.57]) by spamgate1.zdv.Uni-Mainz.DE (8.12.6/8.12.2) with ESMTP id h16NWPdG027542 for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:25 +0100 (MET) Received: from master.debian.org ([EMAIL PROTECTED] [65.125.64.135]) by mailgate2.zdv.Uni-Mainz.DE (8.12.6/8.12.6) with ESMTP id h16NWNKw013840 for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:24 +0100 (MET) Received: from debbugs by master.debian.org with local (Exim 3.12 1 (Debian)) id 18gvHX-0004NM-00; Thu, 06 Feb 2003 17:18:11 -0600 X-Loop: [EMAIL PROTECTED] Subject: Bug#180067: openssl: 0.9.7 causes gcc in sid to output warnings Reply-To: Henrique de Moraes Holschuh <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Resent-From: Henrique de Moraes Holschuh <[EMAIL PROTECTED]> Resent-To: [EMAIL PROTECTED] Resent-CC: Christoph Martin <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Resent-Date: Thu, 06 Feb 2003 23:18:10 GMT Resent-Message-ID: <[EMAIL PROTECTED]> X-Debian-PR-Message: report 180067 X-Debian-PR-Package: openssl X-Debian-PR-Keywords: upstream Received: via spool by [EMAIL PROTECTED] id=B.104457332716468 (code B ref -1); Thu, 06 Feb 2003 23:18:10 GMT Date: Thu, 6 Feb 2003 21:15:25 -0200 From: Henrique de Moraes Holschuh <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Message-ID: <20030206231525.GA19802@khazad-dum> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Reportbug-Version: 2.10 X-GPG-Fingerprint-1: 1024D/128D36EE 50AC 661A 7963 0BBA 8155 43D5 6EF7 F36B 128D 36EE X-GPG-Fingerprint-2: 1024D/1CDB0FE3 5422 5C61 F6B7 06FB 7E04 3738 EE25 DE3F 1CDB 0FE3 User-Agent: Mutt/1.5.3i Delivered-To: [EMAIL PROTECTED] X-Spam-Status: No, hits=-3.3 required=5 tests=DEBIAN_BTS_BUG,FORGED_RCVD_FOUND,RESENT_TO,SIGNATURE_SHORT_DENSE,SPAM_PHRASE_00_01,USER_AGENT,USER_AGENT_MUTT,X_LOOP version=2.43 X-Spam-Status: No, hits=-7.2 required=5.0 tests=SIGNATURE_SHORT_DENSE,SPAM_PHRASE_00_01,USER_AGENT, USER_AGENT_MUTT version=2.41 X-Spam-Level: Resent-Sender: Debian BTS <[EMAIL PROTECTED]> X-Virus-Scanned: by amavisd-milter (http://amavis.org/) X-Virus-Scanned: by amavisd-milter (http://amavis.org/) X-Spam-Report: CARRIAGE_RETURNS,DEBIAN_BTS_BUG,FORGED_RCVD_FOUND,RESENT_TO,SPAM_PHRASE_00_01,USER_AGENT,USER_AGENT_MUTT,X_LOOP X-OriginalArrivalTime: 06 Feb 2003 23:32:43.0875 (UTC) FILETIME=[0C3F2330:01C2CE38] X-Scanned-By: MIMEDefang 2.21 (www . roaringpenguin . com / mimedefang)
Package: openssl Version: 0.9.7-4 Severity: minor Tags: upstream This did not happen with 0.9.6, and as far as I can see from source both in openssl and cyrus, it is being done as it should be: (when compiling cyrus21-imapd source) tls.c:612: warning: assignment from incompatible pointer type Which reads: SSL_CTX_set_info_callback(ctx, apps_ssl_info_callback); ctx is defined as: static SSL_CTX *ctx = NULL; and apps_ssl_info_callback is: static void apps_ssl_info_callback(SSL * s, int where, int ret) { ... } The culprit appears to be (in openssl source:) include/openssl/ssl.h: #define SSL_CTX_set_info_callback(ctx,cb) ((ctx)->info_callback=(cb)) (the above is also duplicated in ssl/ssl.h and other places). This bug is rather annoying, as I like to keep any code I work with warning-free, and now I can't even use -Wall to find any new warnings to squash :-) -- System Information: Debian Release: testing/unstable Architecture: i386 Kernel: Linux khazad-dum 2.4.18 #1 Sat May 11 19:16:08 BRT 2002 i686 Locale: LANG=pt_BR, LC_CTYPE=pt_BR Versions of packages openssl depends on: ii libc6 2.3.1-11 GNU C Library: Shared libraries an ii libssl0.9.7 0.9.7-4 SSL shared libraries ii perl 5.8.0-15 Larry Wall's Practical Extraction -- no debconf information -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]