Received: via dmail-2000(11) for martin; Fri, 7 Feb 2003 00:32:52 +0100 (CET)
Return-Path: <[EMAIL PROTECTED]>
Received: from lucy.verwaltung.uni-mainz.de (lucy.Verwaltung.Uni-Mainz.DE 
[134.93.144.162])
        by wintermute.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian -4) with ESMTP id 
h16NWj0C020188
        (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL)
        for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:45 +0100
Received: from mailgate3.zdv.Uni-Mainz.DE (mailgate3.zdv.Uni-Mainz.DE [134.93.130.78])
        by lucy.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian -4) with ESMTP id 
h16NWixj029654
        (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO)
        for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:44 +0100
Received: from exfront1.zdv.uni-mainz.de (exfront1.zdv.Uni-Mainz.DE [134.93.8.75])
        by mailgate3.zdv.Uni-Mainz.DE (8.12.6/8.12.6) with ESMTP id h16NWhS0000379
        for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:43 
+0100 (MET)
Received: from spamgate1.zdv.Uni-Mainz.DE ([134.93.8.231]) by 
exfront1.zdv.uni-mainz.de with Microsoft SMTPSVC(5.0.2195.5329);
         Fri, 7 Feb 2003 00:32:43 +0100
Received: from mailgate2.zdv.Uni-Mainz.DE (mailgate2.zdv.Uni-Mainz.DE [134.93.8.57])
        by spamgate1.zdv.Uni-Mainz.DE (8.12.6/8.12.2) with ESMTP id h16NWPdG027542
        for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:25 +0100 (MET)
Received: from master.debian.org ([EMAIL PROTECTED] [65.125.64.135])
        by mailgate2.zdv.Uni-Mainz.DE (8.12.6/8.12.6) with ESMTP id h16NWNKw013840
        for <[EMAIL PROTECTED]>; Fri, 7 Feb 2003 00:32:24 +0100 (MET)
Received: from debbugs by master.debian.org with local (Exim 3.12 1 (Debian))
        id 18gvHX-0004NM-00; Thu, 06 Feb 2003 17:18:11 -0600
X-Loop: [EMAIL PROTECTED]
Subject: Bug#180067: openssl: 0.9.7 causes gcc in sid to output warnings
Reply-To: Henrique de Moraes Holschuh <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Resent-From: Henrique de Moraes Holschuh <[EMAIL PROTECTED]>
Resent-To: [EMAIL PROTECTED]
Resent-CC: Christoph Martin <[EMAIL PROTECTED]>,
   [EMAIL PROTECTED]
Resent-Date: Thu, 06 Feb 2003 23:18:10 GMT
Resent-Message-ID: <[EMAIL PROTECTED]>
X-Debian-PR-Message: report 180067
X-Debian-PR-Package: openssl
X-Debian-PR-Keywords: upstream
Received: via spool by [EMAIL PROTECTED] id=B.104457332716468
          (code B ref -1); Thu, 06 Feb 2003 23:18:10 GMT
Date: Thu, 6 Feb 2003 21:15:25 -0200
From: Henrique de Moraes Holschuh <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Message-ID: <20030206231525.GA19802@khazad-dum>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 2.10
X-GPG-Fingerprint-1: 1024D/128D36EE 50AC 661A 7963 0BBA 8155  43D5 6EF7 F36B 128D 36EE
X-GPG-Fingerprint-2: 1024D/1CDB0FE3 5422 5C61 F6B7 06FB 7E04  3738 EE25 DE3F 1CDB 0FE3
User-Agent: Mutt/1.5.3i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Status: No, hits=-3.3 required=5 
tests=DEBIAN_BTS_BUG,FORGED_RCVD_FOUND,RESENT_TO,SIGNATURE_SHORT_DENSE,SPAM_PHRASE_00_01,USER_AGENT,USER_AGENT_MUTT,X_LOOP
 version=2.43
X-Spam-Status: No, hits=-7.2 required=5.0
        tests=SIGNATURE_SHORT_DENSE,SPAM_PHRASE_00_01,USER_AGENT,
              USER_AGENT_MUTT
        version=2.41
X-Spam-Level: 
Resent-Sender: Debian BTS <[EMAIL PROTECTED]>
X-Virus-Scanned: by amavisd-milter (http://amavis.org/)
X-Virus-Scanned: by amavisd-milter (http://amavis.org/)
X-Spam-Report: 
CARRIAGE_RETURNS,DEBIAN_BTS_BUG,FORGED_RCVD_FOUND,RESENT_TO,SPAM_PHRASE_00_01,USER_AGENT,USER_AGENT_MUTT,X_LOOP
X-OriginalArrivalTime: 06 Feb 2003 23:32:43.0875 (UTC) FILETIME=[0C3F2330:01C2CE38]
X-Scanned-By: MIMEDefang 2.21 (www . roaringpenguin . com / mimedefang)

Package: openssl
Version: 0.9.7-4
Severity: minor
Tags: upstream

This did not happen with 0.9.6, and as far as I can see from source both in
openssl and cyrus, it is being done as it should be:

(when compiling cyrus21-imapd source)
tls.c:612: warning: assignment from incompatible pointer type

Which reads:
    SSL_CTX_set_info_callback(ctx, apps_ssl_info_callback);

ctx is defined as:
static SSL_CTX *ctx = NULL;

and apps_ssl_info_callback is:
static void apps_ssl_info_callback(SSL * s, int where, int ret)
{
...
}

The culprit appears to be (in openssl source:)
include/openssl/ssl.h:
#define SSL_CTX_set_info_callback(ctx,cb) ((ctx)->info_callback=(cb))

(the above is also duplicated in ssl/ssl.h and other places).

This bug is rather annoying, as I like to keep any code I work with
warning-free, and now I can't even use -Wall to find any new warnings
to squash :-)

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux khazad-dum 2.4.18 #1 Sat May 11 19:16:08 BRT 2002 i686
Locale: LANG=pt_BR, LC_CTYPE=pt_BR

Versions of packages openssl depends on:
ii  libc6                         2.3.1-11   GNU C Library: Shared libraries an
ii  libssl0.9.7                   0.9.7-4    SSL shared libraries
ii  perl                          5.8.0-15   Larry Wall's Practical Extraction 

-- no debconf information


-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to