[openssl.org #491] [Fwd: Bug#180067: openssl: 0.9.7 causes gcc in sid to output warnings]

2003-02-10 Thread Bodo Moeller via RT

In OpenSSL, the 'info_callback' gets a 'const SSL *' argument;
the application in question used 'SSL *', which caused the compiler
warning for 0.9.7 (earlier OpenSSL versions did not declare the
'info_callback' argument list at all).

The problem has been solved by changing the application accordingly
(Debian Bug#180067).

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #491] [Fwd: Bug#180067: openssl: 0.9.7 causes gcc in sid to output warnings]

2003-02-07 Thread Christoph Martin via RT

Received: via dmail-2000(11) for martin; Fri, 7 Feb 2003 00:32:52 +0100 (CET)
Return-Path: [EMAIL PROTECTED]
Received: from lucy.verwaltung.uni-mainz.de (lucy.Verwaltung.Uni-Mainz.DE 
[134.93.144.162])
by wintermute.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian -4) with ESMTP id 
h16NWj0C020188
(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=FAIL)
for [EMAIL PROTECTED]; Fri, 7 Feb 2003 00:32:45 +0100
Received: from mailgate3.zdv.Uni-Mainz.DE (mailgate3.zdv.Uni-Mainz.DE [134.93.130.78])
by lucy.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian -4) with ESMTP id 
h16NWixj029654
(version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO)
for [EMAIL PROTECTED]; Fri, 7 Feb 2003 00:32:44 +0100
Received: from exfront1.zdv.uni-mainz.de (exfront1.zdv.Uni-Mainz.DE [134.93.8.75])
by mailgate3.zdv.Uni-Mainz.DE (8.12.6/8.12.6) with ESMTP id h16NWhS379
for [EMAIL PROTECTED]; Fri, 7 Feb 2003 00:32:43 
+0100 (MET)
Received: from spamgate1.zdv.Uni-Mainz.DE ([134.93.8.231]) by 
exfront1.zdv.uni-mainz.de with Microsoft SMTPSVC(5.0.2195.5329);
 Fri, 7 Feb 2003 00:32:43 +0100
Received: from mailgate2.zdv.Uni-Mainz.DE (mailgate2.zdv.Uni-Mainz.DE [134.93.8.57])
by spamgate1.zdv.Uni-Mainz.DE (8.12.6/8.12.2) with ESMTP id h16NWPdG027542
for [EMAIL PROTECTED]; Fri, 7 Feb 2003 00:32:25 +0100 (MET)
Received: from master.debian.org ([EMAIL PROTECTED] [65.125.64.135])
by mailgate2.zdv.Uni-Mainz.DE (8.12.6/8.12.6) with ESMTP id h16NWNKw013840
for [EMAIL PROTECTED]; Fri, 7 Feb 2003 00:32:24 +0100 (MET)
Received: from debbugs by master.debian.org with local (Exim 3.12 1 (Debian))
id 18gvHX-0004NM-00; Thu, 06 Feb 2003 17:18:11 -0600
X-Loop: [EMAIL PROTECTED]
Subject: Bug#180067: openssl: 0.9.7 causes gcc in sid to output warnings
Reply-To: Henrique de Moraes Holschuh [EMAIL PROTECTED], [EMAIL PROTECTED]
Resent-From: Henrique de Moraes Holschuh [EMAIL PROTECTED]
Resent-To: [EMAIL PROTECTED]
Resent-CC: Christoph Martin [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Resent-Date: Thu, 06 Feb 2003 23:18:10 GMT
Resent-Message-ID: [EMAIL PROTECTED]
X-Debian-PR-Message: report 180067
X-Debian-PR-Package: openssl
X-Debian-PR-Keywords: upstream
Received: via spool by [EMAIL PROTECTED] id=B.104457332716468
  (code B ref -1); Thu, 06 Feb 2003 23:18:10 GMT
Date: Thu, 6 Feb 2003 21:15:25 -0200
From: Henrique de Moraes Holschuh [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Message-ID: 20030206231525.GA19802@khazad-dum
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Reportbug-Version: 2.10
X-GPG-Fingerprint-1: 1024D/128D36EE 50AC 661A 7963 0BBA 8155  43D5 6EF7 F36B 128D 36EE
X-GPG-Fingerprint-2: 1024D/1CDB0FE3 5422 5C61 F6B7 06FB 7E04  3738 EE25 DE3F 1CDB 0FE3
User-Agent: Mutt/1.5.3i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Status: No, hits=-3.3 required=5 
tests=DEBIAN_BTS_BUG,FORGED_RCVD_FOUND,RESENT_TO,SIGNATURE_SHORT_DENSE,SPAM_PHRASE_00_01,USER_AGENT,USER_AGENT_MUTT,X_LOOP
 version=2.43
X-Spam-Status: No, hits=-7.2 required=5.0
tests=SIGNATURE_SHORT_DENSE,SPAM_PHRASE_00_01,USER_AGENT,
  USER_AGENT_MUTT
version=2.41
X-Spam-Level: 
Resent-Sender: Debian BTS [EMAIL PROTECTED]
X-Virus-Scanned: by amavisd-milter (http://amavis.org/)
X-Virus-Scanned: by amavisd-milter (http://amavis.org/)
X-Spam-Report: 
CARRIAGE_RETURNS,DEBIAN_BTS_BUG,FORGED_RCVD_FOUND,RESENT_TO,SPAM_PHRASE_00_01,USER_AGENT,USER_AGENT_MUTT,X_LOOP
X-OriginalArrivalTime: 06 Feb 2003 23:32:43.0875 (UTC) FILETIME=[0C3F2330:01C2CE38]
X-Scanned-By: MIMEDefang 2.21 (www . roaringpenguin . com / mimedefang)

Package: openssl
Version: 0.9.7-4
Severity: minor
Tags: upstream

This did not happen with 0.9.6, and as far as I can see from source both in
openssl and cyrus, it is being done as it should be:

(when compiling cyrus21-imapd source)
tls.c:612: warning: assignment from incompatible pointer type

Which reads:
SSL_CTX_set_info_callback(ctx, apps_ssl_info_callback);

ctx is defined as:
static SSL_CTX *ctx = NULL;

and apps_ssl_info_callback is:
static void apps_ssl_info_callback(SSL * s, int where, int ret)
{
...
}

The culprit appears to be (in openssl source:)
include/openssl/ssl.h:
#define SSL_CTX_set_info_callback(ctx,cb) ((ctx)-info_callback=(cb))

(the above is also duplicated in ssl/ssl.h and other places).

This bug is rather annoying, as I like to keep any code I work with
warning-free, and now I can't even use -Wall to find any new warnings
to squash :-)

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux khazad-dum 2.4.18 #1 Sat May 11 19:16:08 BRT 2002 i686
Locale: LANG=pt_BR, LC_CTYPE=pt_BR

Versions of packages openssl depends on:
ii  libc6 2.3.1-11   GNU C Library: Shared libraries an
ii  libssl0.9.7   0.9.7-4SSL shared libraries
ii  perl