Subject: Re: bootstap on ubuntu
To: Gabor SUVEG <gsuveg@gmail.com>
From: Berndt Josef Wulf <wulf@ping.net.au>
List: tech-pkg
Date: 11/05/2005 08:45:16
--nextPart5072587.OlnMvY7egV
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

On Fri, 4 Nov 2005 18:39, Gabor SUVEG wrote:
> hi,
>
> im try compile bootstap in ubuntu:
>
> sha2hl.c:260: warning: passing argument 2 of 'SHA512_Update' from
> incompatible pointer type
> make: *** [sha2hl.o] Error 1
> =3D=3D=3D> exited with status 2
>
> it drop an error.
>
> www.suveg.hu/pkgsrc here is the long version.
>
> im updated pkgsrc with cvs today.
>
> have anybody idea ?
>
> --
> =DCdv=F6zlettel / best wishes / M.f.G:
>
> Gabor SUVEG <gsuveg at gmail dot com>
> skype: callto://gsuveg | icq: 122149709

In order to bootstrap FC4 I had to apply patch below. It required a few mor=
e=20
changes for the digest sha* files but I don't have the diffs at the moment,=
=20
but I'm sure you get the drift.

I managed to compile most packages that I attempted with some needing  some=
=20
serious hacking - eg. comms/kermit.

Hope this helps,

cheerio Berndt

=2D-- bootstrap/bmake/compat.c.orig	2005-11-03 13:28:57.000000000 +1030
+++ bootstrap/bmake/compat.c	2005-11-03 13:30:59.000000000 +1030
@@ -315,7 +315,7 @@
      */
     while (1) {
=20
=2D	while ((stat =3D wait(&reason)) !=3D cpid) {
+	while ((stat =3D waitpid(-1,&reason,0)) !=3D cpid) {
 	    if (stat =3D=3D -1 && errno !=3D EINTR) {
 		break;
 	    }
=2D-- pkgtools/digest/files/sha2.h.orig	2005-11-03 14:10:27.000000000 +1030
+++ pkgtools/digest/files/sha2.h	2005-11-03 14:19:34.000000000 +1030
@@ -99,21 +99,21 @@
 void SHA256_Update(SHA256_CTX*, const u_int8_t*, size_t);
 void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
 char* SHA256_End(SHA256_CTX*, u_char *);
=2Dchar* SHA256_Data(const u_int8_t*, size_t, u_char *);
+char* SHA256_Data(const u_char*, size_t, u_char *);
 char *SHA256_File(char *, char *);
=20
 void SHA384_Init(SHA384_CTX*);
 void SHA384_Update(SHA384_CTX*, const u_int8_t*, size_t);
 void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
 char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]);
=2Dchar* SHA384_Data(const u_int8_t*, size_t,=20
char[SHA384_DIGEST_STRING_LENGTH]);
+char* SHA384_Data(const u_char*, size_t, char[SHA384_DIGEST_STRING_LENGTH]=
);
 char *SHA384_File(char *, char *);
=20
 void SHA512_Init(SHA512_CTX*);
 void SHA512_Update(SHA512_CTX*, const u_int8_t*, size_t);
 void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
 char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]);
=2Dchar* SHA512_Data(const u_int8_t*, size_t,=20
char[SHA512_DIGEST_STRING_LENGTH]);
+char* SHA512_Data(const u_char*, size_t, char[SHA512_DIGEST_STRING_LENGTH]=
);
 char *SHA512_File(char *, char *);
=20
 #endif /* SHA2_USE_INTTYPES_H */
=2D-- pkgtools/pkg_install/files/create/perform.c.orig	2005-11-03=20
14:21:12.000000000 +1030
+++ pkgtools/pkg_install/files/create/perform.c	2005-11-03 14:21:27.0000000=
00=20
+1030
@@ -174,7 +174,7 @@
 	}
=20
 	fclose(totar);
=2D	wait(&ret);
+	waitpid(-1,&ret,0);
 	/* assume either signal or bad exit is enough for us */
 	if (ret) {
 		cleanup(0);

--nextPart5072587.OlnMvY7egV
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (NetBSD)

iD8DBQBDa915cUIHpeIRpjERAuURAJ4kXPc8yd/0qpDQliMoQq5QSqatmQCaAhgx
su41gzgiyD50YBZqTMrIt04=
=HZcM
-----END PGP SIGNATURE-----

--nextPart5072587.OlnMvY7egV--