From nobody Thu May 25 09:11:06 2023 X-Original-To: dev-commits-ports-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QRj2z09lrz4TF7d; Thu, 25 May 2023 09:11:07 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QRj2y4vVMz3PqN; Thu, 25 May 2023 09:11:06 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1685005866; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=gVeidZXjUDbTxYEsP3z2B8MydtIDHAMjswaSTYzA1pc=; b=X+GLzVsnefs6Y5yr5kegDjKf3AcgZGyzwJFxRcwgJVPDuYJYrzsldaLXkcJzRdVSHmpvDc SdFkw/+crRlZvgLBLriaJDYSUUZeNTkyVy+BZkqhBuPjn9OgwP8g6H4eXL8JMzrNpidVV+ 57G8+TT4geZ5AM7ib0OT255ZT6ffDBFniPWZaEjT71o/YxYOiS/+Fmi1JayFwRCRiV/j9P of8AlQLixnpGHBBnjlYVi96ZUVb+ilN78NOewvCUEfwzwINiRRgpwvpUTwMk9AFgS9szNb ug2O2C9ks9X+1RDr0yM3gCn9SBOXeV3g/yJom7DZuz0TFn5e5OgPRkQnHPUAjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1685005866; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=gVeidZXjUDbTxYEsP3z2B8MydtIDHAMjswaSTYzA1pc=; b=n/31LspJVyrULjC765m2AXF6rlVk98ZZEhJ6WRiEWwisbQMYHWdQh7uO86pF69FUx5WIlX FWo4Y+PYkqw7XBTzXLq72FJ/RSHQmgmFp7X+ragz5hnSFhxr2CX1m5UFIX+m4VOwJeQ/2S xWLnd4FpuMnu5U6MR1raF20twD5l6ha66ELOj21kJ+QYAqDCcSzabMrfKHamtWVJ2Hr5p5 V4uXJQcCync2dgkLOY3GFYQdR41l4bvtD3ia3qEfOe5po/xLUaF8yXzf/TAfupVwzYCLc9 TaC91ow9E9YJPOE5gkHh+ISG7p/DIQlOuEXDtkGuOPwNcREfOS85kL/jLrQcpQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1685005866; a=rsa-sha256; cv=none; b=nS7O5cY7Ahff7scthJNzLhPVWj+ZdrP+k7JU4bBEhVdY7P/XxPhHL9liw10eeS65EqI3G+ /cqOKL2DELsz5wWGqC4MEBC2Zi/sSu03ssrFri+EXTLRqVb629FdYC9Jeq/ZNhlalmj1h8 8g66XNJVvN0ctSQ52L45+4Hy6lyL78DKshlhfFgg1aE2o9CFdMjKYhcs2pUQ86fv6aaMm2 NQmlWUwPUsO0GoEb14mS8IvI/cE1mXOU+4lyY+Rzvg4aQ9e7NiGBo2SHdax66DLSH3IX+J CiZpiH3/ncHhkFw5a30J2OtZXTkLHapxuwWZ/8ff1o9SBnvZvLi4NYYHzqTm9Q== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4QRj2y32NBzJsG; Thu, 25 May 2023 09:11:06 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 34P9B6UP045455; Thu, 25 May 2023 09:11:06 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 34P9B6PY045454; Thu, 25 May 2023 09:11:06 GMT (envelope-from git) Date: Thu, 25 May 2023 09:11:06 GMT Message-Id: <202305250911.34P9B6PY045454@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Cy Schubert Subject: git: 18bba8441a4d - main - net/cryptcat: Fix numerous LLVM15 build errors List-Id: Commit messages for all branches of the ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-all@freebsd.org X-BeenThere: dev-commits-ports-all@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: cy X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 18bba8441a4ddd827edf80284c23dddf41979069 Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by cy: URL: https://cgit.FreeBSD.org/ports/commit/?id=18bba8441a4ddd827edf80284c23dddf41979069 commit 18bba8441a4ddd827edf80284c23dddf41979069 Author: Cy Schubert AuthorDate: 2023-05-25 09:09:03 +0000 Commit: Cy Schubert CommitDate: 2023-05-25 09:09:03 +0000 net/cryptcat: Fix numerous LLVM15 build errors Fix numerous instances of, netcat.c:241:22: error: incompatible integer to pointer conversion passing 'unsigned int' to parameter of type 'char *' [-Wint-conversion] bail (wrote_txt, wrote_net, wrote_out); ^~~~~~~~~ While at it assume care and feeding of this port. MFH: 2023Q2 --- net/cryptcat/Makefile | 2 +- net/cryptcat/files/patch-netcat.c | 151 +++++++++++++++++++++++++++++++++++++- 2 files changed, 150 insertions(+), 3 deletions(-) diff --git a/net/cryptcat/Makefile b/net/cryptcat/Makefile index 32e350c65a55..f29b21f9093f 100644 --- a/net/cryptcat/Makefile +++ b/net/cryptcat/Makefile @@ -5,7 +5,7 @@ CATEGORIES= net MASTER_SITES= SF/${PORTNAME}/${PORTNAME}-unix-1.2/${PORTNAME}-unix-${PORTVERSION} DISTNAME= ${PORTNAME}-unix-${PORTVERSION} -MAINTAINER= ports@FreeBSD.org +MAINTAINER= cy@FreeBSD.org COMMENT= Standard netcat enhanced with twofish encryption WWW= https://sourceforge.net/projects/cryptcat/ diff --git a/net/cryptcat/files/patch-netcat.c b/net/cryptcat/files/patch-netcat.c index e4efd99385fa..a2c2b48a832f 100644 --- a/net/cryptcat/files/patch-netcat.c +++ b/net/cryptcat/files/patch-netcat.c @@ -1,5 +1,5 @@ ---- netcat.c.orig 2005-10-18 17:42:05 UTC -+++ netcat.c +--- netcat.c.orig 2005-10-18 10:42:05.000000000 -0700 ++++ netcat.c 2023-05-25 02:08:35.476614000 -0700 @@ -48,9 +48,6 @@ #else #include @@ -23,3 +23,150 @@ #ifdef HAVE_RANDOM /* aficionados of ?rand48() should realize */ #define SRAND srandom /* that this doesn't need *strong* random */ +@@ -235,7 +238,7 @@ + { + errno = 0; + if (o_verbose > 1) /* normally we don't care */ +- bail (wrote_txt, wrote_net, wrote_out); ++ bail (wrote_txt, (char*) wrote_net, (char *) wrote_out); + bail (" punt!"); + } + +@@ -277,7 +280,7 @@ + if (p != NULL) + memset (p, 0, s); + else +- bail ("Hmalloc %d failed", s); ++ bail ("Hmalloc %d failed", (char *) s); + return (p); + } /* Hmalloc */ + +@@ -465,7 +468,7 @@ + if (servent) { + y = ntohs (servent->s_port); + if (x != y) /* "never happen" */ +- holler ("Warning: port-bynum mismatch, %d != %d", x, y); ++ holler ("Warning: port-bynum mismatch, %d != %d", (char *) x, (char *) y); + strncpy (portpoop->name, servent->s_name, sizeof (portpoop->name)); + } /* if servent */ + goto gp_finish; +@@ -565,7 +568,7 @@ + if (! block) + bail ("loadports: no block?!"); + if ((! lo) || (! hi)) +- bail ("loadports: bogus values %d, %d", lo, hi); ++ bail ("loadports: bogus values %d, %d", (char *) lo, (char *) hi); + x = hi; + while (lo <= x) { + block[x] = 1; +@@ -671,7 +674,7 @@ + if (errno != EADDRINUSE) + break; + else { +- holler ("retrying local %s:%d", inet_ntoa (lclend->sin_addr), lp); ++ holler ("retrying local %s:%d", inet_ntoa (lclend->sin_addr), (char *) lp); + sleep (2); + errno = 0; /* clear from sleep */ + } /* if EADDRINUSE */ +@@ -679,7 +682,7 @@ + } /* if lad or lp */ + if (rr) + bail ("Can't grab %s:%d with bind", +- inet_ntoa(lclend->sin_addr), lp); ++ inet_ntoa(lclend->sin_addr), (char *) lp); + + if (o_listen) + return (nnetfd); /* thanks, that's all for today */ +@@ -824,7 +827,7 @@ + strcat (bigbuf_net, "any"); + strcat (bigbuf_net, "] %d ..."); + z = ntohs (lclend->sin_port); +- holler (bigbuf_net, z); ++ holler (bigbuf_net, (char *) z); + } /* verbose -- whew!! */ + + /* UDP is a speeeeecial case -- we have to do I/O *and* get the calling +@@ -936,9 +939,9 @@ + x = 1; + if (x) /* guilty! */ + bail ("invalid connection to [%s] from %s [%s] %d", +- cp, whozis->name, whozis->addrs[0], z); ++ cp, whozis->name, whozis->addrs[0], (char *) z); + holler ("connect to [%s] from %s [%s] %d", /* oh, you're okay.. */ +- cp, whozis->name, whozis->addrs[0], z); ++ cp, whozis->name, whozis->addrs[0], (char *) z); + return (nnetfd); /* open! */ + + dol_tmo: +@@ -966,7 +969,7 @@ + + rr = write (fd, bigbuf_in, 1); + if (rr != 1) +- holler ("udptest first write failed?! errno %d", errno); ++ holler ("udptest first write failed?! errno %d", (char *) errno); + if (o_wait) + sleep (o_wait); + else { +@@ -1143,7 +1146,7 @@ + /* if you don't have all this FD_* macro hair in sys/types.h, you'll have to + either find it or do your own bit-bashing: *ding1 |= (1 << fd), etc... */ + if (fd > FD_SETSIZE) { +- holler ("Preposterous fd value %d", fd); ++ holler ("Preposterous fd value %d", (char *) fd); + return (1); + } + FD_SET (fd, ding1); /* global: the net is open */ +@@ -1251,7 +1254,7 @@ + + /* sanity check. Works because they're both unsigned... */ + if ((rzleft > 8200) || (rnleft > 8200)) { +- holler ("Bogus buffers: %d, %d", rzleft, rnleft); ++ holler ("Bogus buffers: %d, %d", (char *) rzleft, (char *) rnleft); + rzleft = rnleft = 0; + } + /* net write retries sometimes happen on UDP connections */ +@@ -1435,7 +1438,7 @@ + if ((x) && (x == (x & 0x1c))) /* mask off bits of fukt values */ + gatesptr = x; + else +- bail ("invalid hop pointer %d, must be multiple of 4 <= 28", x); ++ bail ("invalid hop pointer %d, must be multiple of 4 <= 28", (char *) x); + break; + case 'g': /* srcroute hop[s] */ + if (gatesidx > 8) +@@ -1565,7 +1568,7 @@ + #endif /* GAPING_SECURITY_HOLE */ + x = readwrite (netfd); /* it even works with UDP! */ + if (o_verbose > 1) /* normally we don't care */ +- holler (wrote_txt, wrote_net, wrote_out); ++ holler (wrote_txt, (char *) wrote_net, (char *) wrote_out); + exit (x); /* "pack out yer trash" */ + } else /* if no netfd */ + bail ("no connection"); +@@ -1624,7 +1627,7 @@ + if (netfd > 0) { /* Yow, are we OPEN YET?! */ + x = 0; /* pre-exit status */ + holler ("%s [%s] %d (%s) open", +- whereto->name, whereto->addrs[0], curport, portpoop->name); ++ whereto->name, whereto->addrs[0], (char *) curport, portpoop->name); + #ifdef GAPING_SECURITY_HOLE + if (pr00gie) /* exec is valid for outbound, too */ + doexec (netfd); +@@ -1637,7 +1640,7 @@ + Give it another -v if you want to see everything. */ + if ((Single || (o_verbose > 1)) || (errno != ECONNREFUSED)) + holler ("%s [%s] %d (%s)", +- whereto->name, whereto->addrs[0], curport, portpoop->name); ++ whereto->name, whereto->addrs[0], (char *) curport, portpoop->name); + } /* if netfd */ + close (netfd); /* just in case we didn't already */ + if (o_interval) +@@ -1652,7 +1655,7 @@ + + errno = 0; + if (o_verbose > 1) /* normally we don't care */ +- holler (wrote_txt, wrote_net, wrote_out); ++ holler (wrote_txt, (char *) wrote_net, (char *) wrote_out); + if (Single) + exit (x); /* give us status on one connection */ + exit (0); /* otherwise, we're just done */