From owner-svn-ports-head@FreeBSD.ORG Sun Feb 22 14:09:14 2015 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 17247D14; Sun, 22 Feb 2015 14:09:14 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id DC83C74E; Sun, 22 Feb 2015 14:09:13 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t1ME9DiW057256; Sun, 22 Feb 2015 14:09:13 GMT (envelope-from marino@FreeBSD.org) Received: (from marino@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t1ME9DXk057254; Sun, 22 Feb 2015 14:09:13 GMT (envelope-from marino@FreeBSD.org) Message-Id: <201502221409.t1ME9DXk057254@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: marino set sender to marino@FreeBSD.org using -f From: John Marino Date: Sun, 22 Feb 2015 14:09:13 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r379605 - in head/security/p5-Crypt-OpenSSL-X509: . files X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 22 Feb 2015 14:09:14 -0000 Author: marino Date: Sun Feb 22 14:09:12 2015 New Revision: 379605 URL: https://svnweb.freebsd.org/changeset/ports/379605 QAT: https://qat.redports.org/buildarchive/r379605/ Log: security/p5-Crypt-OpenSSL-X509: Fix [-Werror=logical-not-parentheses] This bug was first discovered by Fedora 22 team building with gcc5 and they reported it upstream: https://github.com/dsully/perl-crypt-openssl-x509/issues/39 I believe this patch is equivalent but a bit nicer than the fix suggested there. The problem is "not (c < 0)" is desired but "(not c) < 0)" is what the condition evaluates to. The joy of C. Approved by: Just fix it Added: head/security/p5-Crypt-OpenSSL-X509/files/ head/security/p5-Crypt-OpenSSL-X509/files/patch-X509.xs (contents, props changed) Modified: head/security/p5-Crypt-OpenSSL-X509/Makefile Modified: head/security/p5-Crypt-OpenSSL-X509/Makefile ============================================================================== --- head/security/p5-Crypt-OpenSSL-X509/Makefile Sun Feb 22 13:54:34 2015 (r379604) +++ head/security/p5-Crypt-OpenSSL-X509/Makefile Sun Feb 22 14:09:12 2015 (r379605) @@ -3,7 +3,7 @@ PORTNAME= Crypt-OpenSSL-X509 PORTVERSION= 1.8.04 -PORTREVISION= 2 +PORTREVISION= 3 CATEGORIES= security perl5 MASTER_SITES= CPAN PKGNAMEPREFIX= p5- Added: head/security/p5-Crypt-OpenSSL-X509/files/patch-X509.xs ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/p5-Crypt-OpenSSL-X509/files/patch-X509.xs Sun Feb 22 14:09:12 2015 (r379605) @@ -0,0 +1,20 @@ +--- X509.xs.orig 2013-12-01 17:14:25 UTC ++++ X509.xs +@@ -181,7 +181,7 @@ static HV* hv_exts(X509* x509, int no_na + sv_2mortal((SV*)RETVAL); + c = X509_get_ext_count(x509); + +- if ( ! c > 0 ) { ++ if ( c <= 0 ) { + croak("No extensions found\n"); + } + +@@ -860,7 +860,7 @@ extension(x509, i) + + c = X509_get_ext_count(x509); + +- if (!c > 0) { ++ if (c <= 0) { + croak("No extensions found\n"); + } else if (i >= c || i < 0) { + croak("Requested extension index out of range\n");