From owner-freebsd-ports-bugs@FreeBSD.ORG Tue Apr 29 10:10:01 2014 Return-Path: Delivered-To: freebsd-ports-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 39EDA4F3 for ; Tue, 29 Apr 2014 10:10:01 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 11220FBF for ; Tue, 29 Apr 2014 10:10:01 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.8/8.14.8) with ESMTP id s3TAA0BI000561 for ; Tue, 29 Apr 2014 10:10:00 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.8/8.14.8/Submit) id s3TAA02W000560; Tue, 29 Apr 2014 10:10:00 GMT (envelope-from gnats) Resent-Date: Tue, 29 Apr 2014 10:10:00 GMT Resent-Message-Id: <201404291010.s3TAA02W000560@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, freebsd@nagilum.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9B36E3FE for ; Tue, 29 Apr 2014 10:01:31 +0000 (UTC) Received: from mo6-p05-ob.smtp.rzone.de (mo6-p05-ob.smtp.rzone.de [IPv6:2a01:238:20a:202:5305::10]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.smtp.rzone.de", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 26F64F76 for ; Tue, 29 Apr 2014 10:01:30 +0000 (UTC) Received: from cakebox.homeunix.net (188-015-186-093.fttx.vsenet.de [93.186.15.188]) by smtp.strato.de (RZmta 32.39 AUTH) with ESMTPSA id h03cebq3TA0u886 (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "cakebox.mooo.com", Issuer "CA Cert Signing Authority" (verification FAILED - unable to verify the first certificate)) (Client hostname not verified); Tue, 29 Apr 2014 12:00:56 +0200 (CEST) Received: from cakebox.homeunix.net (localhost [127.0.0.1]) by cakebox.homeunix.net (Postfix) with ESMTP id 880602D52A5; Tue, 29 Apr 2014 12:00:23 +0200 (CEST) Received: by cakebox.homeunix.net (Postfix, from userid 1000) id 9FB6B2D52A4; Tue, 29 Apr 2014 12:00:13 +0200 (CEST) Message-Id: <20140429100013.9FB6B2D52A4@cakebox.homeunix.net> Date: Tue, 29 Apr 2014 12:00:13 +0200 (CEST) From: freebsd@nagilum.org To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.114 Subject: ports/189105: textproc/raptor2-2.0.13 build fails Cc: kde@FreeBSD.org X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Apr 2014 10:10:01 -0000 >Number: 189105 >Category: ports >Synopsis: textproc/raptor2-2.0.13 build fails >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Apr 29 10:10:00 UTC 2014 >Closed-Date: >Last-Modified: >Originator: Nagilum >Release: FreeBSD 9.2-STABLE i386 >Organization: >Environment: System: FreeBSD cakebox.tis 9.2-STABLE FreeBSD 9.2-STABLE #0 r264294M: Fri Apr 11 10:19:25 CEST 2014 root@cakebox.tis:/usr/obj/export/src/sys/net5501 i386 >Description: The build will fail with this: /bin/sh ../libtool --tag=CC --mode=link gcc48 -lcrypto -Os -O3 -pipe -march=native -mtune=native -fno-strict-aliasing -L/usr/local/lib -o rapper rapper.o ../src/libraptor2.la libtool: link: gcc48 -Os -O3 -pipe -march=native -mtune=native -fno-strict-aliasing -o .libs/rapper rapper.o -lcrypto -L/usr/local/lib ../src/.libs/libraptor2.so -pthread -Wl,-rpath -Wl,/usr/local/lib //usr/lib/libhx509.so.10: undefined reference to `MD2_Final' //usr/lib/libhx509.so.10: undefined reference to `MD2_Update' //usr/lib/libhx509.so.10: undefined reference to `MD2_Init' collect2: error: ld returned 1 exit status gmake: *** [rapper] Error 1 >How-To-Repeat: Try building the port. >Fix: Apply attached patch to /usr/src/crypto/heimdal/lib/hx509/crypto.c then cd /usr/src/kerberos5/lib/libhx509 && make install The patch removes all stale references to md2 from libhx509. --- crypto.c.patch begins here --- --- crypto.c 2014-04-29 11:52:59.000000000 +0200 +++ crypto.c.bak 2014-04-29 11:48:28.000000000 +0200 @@ -841,6 +841,7 @@ return 0; } +#if 0 static int md2_verify_signature(hx509_context context, const struct signature_alg *sig_alg, @@ -870,6 +871,7 @@ return 0; } +#endif static const struct signature_alg heim_rsa_pkcs1_x509 = { "rsa-pkcs1-x509", @@ -926,6 +928,7 @@ rsa_create_signature }; +#if 0 static const struct signature_alg rsa_with_md2_alg = { "rsa-with-md2", oid_id_pkcs1_md2WithRSAEncryption, @@ -936,6 +939,7 @@ rsa_verify_signature, rsa_create_signature }; +#endif static const struct signature_alg dsa_sha1_alg = { "dsa-with-sha1", @@ -980,6 +984,7 @@ md5_verify_signature }; +#if 0 static const struct signature_alg md2_alg = { "rsa-md2", oid_id_rsa_digest_md2, @@ -989,6 +994,7 @@ SIG_DIGEST, md2_verify_signature }; +#endif /* * Order matter in this structure, "best" first for each "key @@ -1000,13 +1006,17 @@ &rsa_with_sha1_alg, &pkcs1_rsa_sha1_alg, &rsa_with_md5_alg, +#if 0 &rsa_with_md2_alg, +#endif &heim_rsa_pkcs1_x509, &dsa_sha1_alg, &sha256_alg, &sha1_alg, &md5_alg, +#if 0 &md2_alg, +#endif NULL }; @@ -1432,10 +1442,12 @@ { 6, rk_UNCONST(md5_oid_tree) }, rk_UNCONST(&null_entry_oid) }; +#if 0 static const unsigned md2_oid_tree[] = { 1, 2, 840, 113549, 2, 2 }; const AlgorithmIdentifier _hx509_signature_md2_data = { { 6, rk_UNCONST(md2_oid_tree) }, rk_UNCONST(&null_entry_oid) }; +#endif static const unsigned rsa_with_sha512_oid[] ={ 1, 2, 840, 113549, 1, 1, 13 }; const AlgorithmIdentifier _hx509_signature_rsa_with_sha512_data = { @@ -1462,10 +1474,12 @@ { 7, rk_UNCONST(rsa_with_md5_oid) }, NULL }; +#if 0 static const unsigned rsa_with_md2_oid[] ={ 1, 2, 840, 113549, 1, 1, 2 }; const AlgorithmIdentifier _hx509_signature_rsa_with_md2_data = { { 7, rk_UNCONST(rsa_with_md2_oid) }, NULL }; +#endif static const unsigned rsa_oid[] ={ 1, 2, 840, 113549, 1, 1, 1 }; const AlgorithmIdentifier _hx509_signature_rsa_data = { @@ -1512,9 +1526,11 @@ hx509_signature_md5(void) { return &_hx509_signature_md5_data; } +#if 0 const AlgorithmIdentifier * hx509_signature_md2(void) { return &_hx509_signature_md2_data; } +#endif const AlgorithmIdentifier * hx509_signature_rsa_with_sha512(void) @@ -1536,9 +1552,11 @@ hx509_signature_rsa_with_md5(void) { return &_hx509_signature_rsa_with_md5_data; } +#if 0 const AlgorithmIdentifier * hx509_signature_rsa_with_md2(void) { return &_hx509_signature_rsa_with_md2_data; } +#endif const AlgorithmIdentifier * hx509_signature_rsa(void) --- crypto.c.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted: