Subject: Re: bootstap on ubuntu
To: Gabor SUVEG <gsuveg@gmail.com>
From: Berndt Josef Wulf <wulf@ping.net.au>
List: tech-pkg
Date: 11/05/2005 08:45:16
--nextPart5072587.OlnMvY7egV
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
On Fri, 4 Nov 2005 18:39, Gabor SUVEG wrote:
> hi,
>
> im try compile bootstap in ubuntu:
>
> sha2hl.c:260: warning: passing argument 2 of 'SHA512_Update' from
> incompatible pointer type
> make: *** [sha2hl.o] Error 1
> =3D=3D=3D> exited with status 2
>
> it drop an error.
>
> www.suveg.hu/pkgsrc here is the long version.
>
> im updated pkgsrc with cvs today.
>
> have anybody idea ?
>
> --
> =DCdv=F6zlettel / best wishes / M.f.G:
>
> Gabor SUVEG <gsuveg at gmail dot com>
> skype: callto://gsuveg | icq: 122149709
In order to bootstrap FC4 I had to apply patch below. It required a few mor=
e=20
changes for the digest sha* files but I don't have the diffs at the moment,=
=20
but I'm sure you get the drift.
I managed to compile most packages that I attempted with some needing some=
=20
serious hacking - eg. comms/kermit.
Hope this helps,
cheerio Berndt
=2D-- bootstrap/bmake/compat.c.orig 2005-11-03 13:28:57.000000000 +1030
+++ bootstrap/bmake/compat.c 2005-11-03 13:30:59.000000000 +1030
@@ -315,7 +315,7 @@
*/
while (1) {
=20
=2D while ((stat =3D wait(&reason)) !=3D cpid) {
+ while ((stat =3D waitpid(-1,&reason,0)) !=3D cpid) {
if (stat =3D=3D -1 && errno !=3D EINTR) {
break;
}
=2D-- pkgtools/digest/files/sha2.h.orig 2005-11-03 14:10:27.000000000 +1030
+++ pkgtools/digest/files/sha2.h 2005-11-03 14:19:34.000000000 +1030
@@ -99,21 +99,21 @@
void SHA256_Update(SHA256_CTX*, const u_int8_t*, size_t);
void SHA256_Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*);
char* SHA256_End(SHA256_CTX*, u_char *);
=2Dchar* SHA256_Data(const u_int8_t*, size_t, u_char *);
+char* SHA256_Data(const u_char*, size_t, u_char *);
char *SHA256_File(char *, char *);
=20
void SHA384_Init(SHA384_CTX*);
void SHA384_Update(SHA384_CTX*, const u_int8_t*, size_t);
void SHA384_Final(u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*);
char* SHA384_End(SHA384_CTX*, char[SHA384_DIGEST_STRING_LENGTH]);
=2Dchar* SHA384_Data(const u_int8_t*, size_t,=20
char[SHA384_DIGEST_STRING_LENGTH]);
+char* SHA384_Data(const u_char*, size_t, char[SHA384_DIGEST_STRING_LENGTH]=
);
char *SHA384_File(char *, char *);
=20
void SHA512_Init(SHA512_CTX*);
void SHA512_Update(SHA512_CTX*, const u_int8_t*, size_t);
void SHA512_Final(u_int8_t[SHA512_DIGEST_LENGTH], SHA512_CTX*);
char* SHA512_End(SHA512_CTX*, char[SHA512_DIGEST_STRING_LENGTH]);
=2Dchar* SHA512_Data(const u_int8_t*, size_t,=20
char[SHA512_DIGEST_STRING_LENGTH]);
+char* SHA512_Data(const u_char*, size_t, char[SHA512_DIGEST_STRING_LENGTH]=
);
char *SHA512_File(char *, char *);
=20
#endif /* SHA2_USE_INTTYPES_H */
=2D-- pkgtools/pkg_install/files/create/perform.c.orig 2005-11-03=20
14:21:12.000000000 +1030
+++ pkgtools/pkg_install/files/create/perform.c 2005-11-03 14:21:27.0000000=
00=20
+1030
@@ -174,7 +174,7 @@
}
=20
fclose(totar);
=2D wait(&ret);
+ waitpid(-1,&ret,0);
/* assume either signal or bad exit is enough for us */
if (ret) {
cleanup(0);
--nextPart5072587.OlnMvY7egV
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (NetBSD)
iD8DBQBDa915cUIHpeIRpjERAuURAJ4kXPc8yd/0qpDQliMoQq5QSqatmQCaAhgx
su41gzgiyD50YBZqTMrIt04=
=HZcM
-----END PGP SIGNATURE-----
--nextPart5072587.OlnMvY7egV--