pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/security/sfs Update sfs to 0.7.2nb7
details: https://anonhg.NetBSD.org/pkgsrc/rev/e96a31688ff7
branches: trunk
changeset: 520429:e96a31688ff7
user: agc <agc%pkgsrc.org@localhost>
date: Sat Oct 21 11:53:13 2006 +0000
description:
Update sfs to 0.7.2nb7
+ add support for gcc4
diffstat:
security/sfs/Makefile | 6 +-
security/sfs/distinfo | 48 +++++++++++++-
security/sfs/patches/patch-aa | 53 ++++++++++++++
security/sfs/patches/patch-ab | 13 +++
security/sfs/patches/patch-ac | 13 +++
security/sfs/patches/patch-ad | 13 +++
security/sfs/patches/patch-ae | 35 +++++++++
security/sfs/patches/patch-af | 28 +++++++
security/sfs/patches/patch-ag | 14 +++
security/sfs/patches/patch-ah | 46 ++++++++++++
security/sfs/patches/patch-ai | 12 +++
security/sfs/patches/patch-aj | 13 +++
security/sfs/patches/patch-ak | 29 ++++++++
security/sfs/patches/patch-al | 63 +++++++++++++++++
security/sfs/patches/patch-am | 13 +++
security/sfs/patches/patch-an | 31 ++++++++
security/sfs/patches/patch-ao | 18 +++++
security/sfs/patches/patch-ap | 13 +++
security/sfs/patches/patch-aq | 31 ++++++++
security/sfs/patches/patch-ar | 76 +++++++++++++++++++++
security/sfs/patches/patch-as | 13 +++
security/sfs/patches/patch-at | 149 ++++++++++++++++++++++++++++++++++++++++++
security/sfs/patches/patch-au | 15 ++++
security/sfs/patches/patch-av | 12 +++
security/sfs/patches/patch-aw | 65 ++++++++++++++++++
security/sfs/patches/patch-ax | 17 ++++
security/sfs/patches/patch-ay | 52 ++++++++++++++
security/sfs/patches/patch-az | 42 +++++++++++
security/sfs/patches/patch-ba | 101 ++++++++++++++++++++++++++++
security/sfs/patches/patch-bb | 138 ++++++++++++++++++++++++++++++++++++++
security/sfs/patches/patch-bc | 39 ++++++++++
security/sfs/patches/patch-bd | 30 ++++++++
security/sfs/patches/patch-be | 40 +++++++++++
security/sfs/patches/patch-bf | 22 ++++++
security/sfs/patches/patch-bg | 130 ++++++++++++++++++++++++++++++++++++
security/sfs/patches/patch-bh | 22 ++++++
security/sfs/patches/patch-bi | 13 +++
security/sfs/patches/patch-bj | 31 ++++++++
security/sfs/patches/patch-bk | 13 +++
security/sfs/patches/patch-bl | 13 +++
security/sfs/patches/patch-bm | 27 +++++++
security/sfs/patches/patch-bn | 49 +++++++++++++
security/sfs/patches/patch-bo | 40 +++++++++++
security/sfs/patches/patch-bp | 58 ++++++++++++++++
security/sfs/patches/patch-bq | 31 ++++++++
security/sfs/patches/patch-br | 49 +++++++++++++
security/sfs/patches/patch-bs | 29 ++++++++
security/sfs/patches/patch-bt | 76 +++++++++++++++++++++
48 files changed, 1879 insertions(+), 5 deletions(-)
diffs (truncated from 2093 to 300 lines):
diff -r c11831af529f -r e96a31688ff7 security/sfs/Makefile
--- a/security/sfs/Makefile Sat Oct 21 11:52:57 2006 +0000
+++ b/security/sfs/Makefile Sat Oct 21 11:53:13 2006 +0000
@@ -1,8 +1,8 @@
-# $NetBSD: Makefile,v 1.27 2006/10/04 21:58:14 wiz Exp $
+# $NetBSD: Makefile,v 1.28 2006/10/21 11:53:13 agc Exp $
#
DISTNAME= sfs-0.7.2
-PKGREVISION= 6
+PKGREVISION= 7
CATEGORIES= net security
MASTER_SITES= http://www.fs.net/sfswww/dist/
@@ -21,8 +21,6 @@
USE_LANGUAGES= c c++
USE_TOOLS+= makeinfo perl:run
-GCC_REQD+= 2.95.3
-
INFO_FILES= # PLIST
PKG_SYSCONFSUBDIR= sfs
diff -r c11831af529f -r e96a31688ff7 security/sfs/distinfo
--- a/security/sfs/distinfo Sat Oct 21 11:52:57 2006 +0000
+++ b/security/sfs/distinfo Sat Oct 21 11:53:13 2006 +0000
@@ -1,5 +1,51 @@
-$NetBSD: distinfo,v 1.2 2005/02/24 13:10:13 agc Exp $
+$NetBSD: distinfo,v 1.3 2006/10/21 11:53:13 agc Exp $
SHA1 (sfs-0.7.2.tar.gz) = 3619afc9b785e4aa41f7cdf202c5b233a6b5fe08
RMD160 (sfs-0.7.2.tar.gz) = 30cd5e21c4f63292ef0f5671720f6036d08e5ff1
Size (sfs-0.7.2.tar.gz) = 1283652 bytes
+SHA1 (patch-aa) = 32bf5ca41bf588bdd4f2471c727822aac2906472
+SHA1 (patch-ab) = 7719eda254e57d7cc6cf3ae06db7b3beb30b9f94
+SHA1 (patch-ac) = 3afc535280b6f58090159fd9242edc63563e108d
+SHA1 (patch-ad) = f662ca56204ae71c64b2bdbb8a09384f868107c9
+SHA1 (patch-ae) = 80222c0384e5d746d1fce66231c0f35e32a572fd
+SHA1 (patch-af) = dd5c53e2971e7ad317578e136bac5f239ccdf00d
+SHA1 (patch-ag) = 963134e5b5746600dc184f4651bb70cdfaebf125
+SHA1 (patch-ah) = b411915bed2f6e008c2fa577aae4a96d2a45b2ab
+SHA1 (patch-ai) = c3c9cc83d07eb423c6732bbfe4191793c2f6dfd8
+SHA1 (patch-aj) = 46c78b2a5aa2f479eb8b71076883eace9070bfdc
+SHA1 (patch-ak) = 749ea20cb94f4cf58e753245824ac15617643beb
+SHA1 (patch-al) = 9ead095b5321ccf7ae969313253b143b37e1e201
+SHA1 (patch-am) = d17ab985f9959678d0d3b4b205f4fdd2d68d9eb1
+SHA1 (patch-an) = 85749b62a79924f67205f8d2113a6d42e60a6bdc
+SHA1 (patch-ao) = 598a061792b37b537bea29987645e8a72250bee2
+SHA1 (patch-ap) = 0edbc273d983bfa97df16d7e7ab6070b82d09726
+SHA1 (patch-aq) = c401278ff8c7499e006ff629f1583d6d02982388
+SHA1 (patch-ar) = 9b8e5fbc3d68883755378c6b010c22f387910c5d
+SHA1 (patch-as) = 6fdeac607eacb5f0a9364195f915b6addbc5e705
+SHA1 (patch-at) = c7ca70c5a5741cd55444d66de475788eda331ca0
+SHA1 (patch-au) = 80b0fb5b855860b0706e74ef113dd1f72366da62
+SHA1 (patch-av) = bc68e7066c0208933b5b1b006d884ffd7eb0c8bf
+SHA1 (patch-aw) = 17d79ef557b937acd726464791b07c459e667f45
+SHA1 (patch-ax) = 70fb501167632dbb9d748c49ac70d8836c1024bd
+SHA1 (patch-ay) = 96f5ed64cbf1d63916feed80548088afb74ada67
+SHA1 (patch-az) = e3037f63a5b9aac21a939904951c3524a8ee1dce
+SHA1 (patch-ba) = 09862e798fa38eff4333fbd810d439761b352d64
+SHA1 (patch-bb) = 0d055f44a9d98c06d6b86dbcfa8e0573b81370a4
+SHA1 (patch-bc) = 3f54e5fd0fc2d3b251c50759fa4b4f07155c012f
+SHA1 (patch-bd) = 238b103ece240f8a3d962400bf3858bf69d62f18
+SHA1 (patch-be) = c58facf1a383b8ca7599a425f6b4ec3ffe5e15cc
+SHA1 (patch-bf) = 9d2288f6307aeb661e444ceb33d1b67d9062fd33
+SHA1 (patch-bg) = 2c3d76bb6858e6edf800d6c362d0a079d6208cd5
+SHA1 (patch-bh) = 1f85d5ce9f3e36685b3a18b638fa7c75a577eaaf
+SHA1 (patch-bi) = 1354d1cc7da39e91515dbb53e31e8c19976341f8
+SHA1 (patch-bj) = 8fe2fe0a1e1bcd339cc2f791c18a392c401cc630
+SHA1 (patch-bk) = d7ae5c0b7dc0092e605695b7ca0feb8274fac575
+SHA1 (patch-bl) = 73eb190aa378c8d1d01fd93cc7c17f657d887d6e
+SHA1 (patch-bm) = 21a453088da17fc0ec67501168eef8493238a8cf
+SHA1 (patch-bn) = fa92872cd5d9e10a1ef45ccef11aa7b3e507b3ca
+SHA1 (patch-bo) = 1d812c99e3b75c1296dc17120f82411714f7d8fd
+SHA1 (patch-bp) = 4c550d82a7b85900cca30003c0faaba967c99108
+SHA1 (patch-bq) = df81507b2e2fd5d40a6759bf063229ef3e0fa301
+SHA1 (patch-br) = 411b894e043d105402ab7d0622fc843703457639
+SHA1 (patch-bs) = a426787d1b2a74a92a091046c1c9fdf7696a87f4
+SHA1 (patch-bt) = 41b1359d716493aadd861818c9a377247191ecec
diff -r c11831af529f -r e96a31688ff7 security/sfs/patches/patch-aa
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/sfs/patches/patch-aa Sat Oct 21 11:53:13 2006 +0000
@@ -0,0 +1,53 @@
+$NetBSD: patch-aa,v 1.1 2006/10/21 11:53:13 agc Exp $
+
+--- ./async/aiod.C.orig 2002-09-09 19:58:48.000000000 +0100
++++ ./async/aiod.C
+@@ -277,7 +277,7 @@ void
+ aiosrv::pathop (aiomsg_t msg)
+ {
+ static int fd = -1;
+- aiod_pathop *rq = buf->template getptr<aiod_pathop> (msg);
++ aiod_pathop *rq = buf->getptr<aiod_pathop> (msg);
+ errno = 0;
+ switch (rq->op) {
+ case AIOD_UNLINK:
+@@ -324,8 +324,8 @@ aiosrv::pathop (aiomsg_t msg)
+ void
+ aiosrv::fhop (aiomsg_t msg)
+ {
+- aiod_fhop *rq = buf->template getptr<aiod_fhop> (msg);
+- aiod_file *af = buf->template getptr<aiod_file> (rq->fh);
++ aiod_fhop *rq = buf->getptr<aiod_fhop> (msg);
++ aiod_file *af = buf->getptr<aiod_file> (rq->fh);
+
+ if (rq->op == AIOD_OPEN) {
+ fht.create (af, rq->mode, &rq->err);
+@@ -387,8 +387,8 @@ aiosrv::fhop (aiomsg_t msg)
+ void
+ aiosrv::fstat (aiomsg_t msg)
+ {
+- aiod_fstat *rq = buf->template getptr<aiod_fstat> (msg);
+- aiod_file *af = buf->template getptr<aiod_file> (rq->fh);
++ aiod_fstat *rq = buf->getptr<aiod_fstat> (msg);
++ aiod_file *af = buf->getptr<aiod_file> (rq->fh);
+
+ if (rq->op != AIOD_FSTAT)
+ panic ("aiosrv::fstat: bad op %d\n", rq->op);
+@@ -407,7 +407,7 @@ void
+ aiosrv::nop (aiomsg_t msg)
+ {
+ /* If the shmfile is sparse, a nop forces allocation. */
+- aiod_nop *rq = buf->template getptr<aiod_nop> (msg);
++ aiod_nop *rq = buf->getptr<aiod_nop> (msg);
+ size_t sz = 0;
+ bool touchable = rq->nopsize;
+ if (lseek (buf->fd, msg, SEEK_SET) != -1) {
+@@ -466,7 +466,7 @@ aiosrv::getmsg (aiomsg_t msg)
+ fatal ("bad opcode %d from client\n", op);
+
+ if (aiodtrace)
+- aiod_dump (buf->template getptr<void> (msg));
++ aiod_dump (buf->getptr<void> (msg));
+ if (write (fd, &msg, sizeof (msg)) != sizeof (msg)) {
+ if (errno != EPIPE)
+ fatal ("aiosrv::write: %m\n");
diff -r c11831af529f -r e96a31688ff7 security/sfs/patches/patch-ab
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/sfs/patches/patch-ab Sat Oct 21 11:53:13 2006 +0000
@@ -0,0 +1,13 @@
+$NetBSD: patch-ab,v 1.1 2006/10/21 11:53:13 agc Exp $
+
+--- ./async/dnsparse.C.orig 2002-06-26 07:36:31.000000000 +0100
++++ ./async/dnsparse.C
+@@ -323,7 +323,7 @@ dnsparse::tomxlist ()
+ n_chars += strlen (name) + 1;
+
+ ref <mxlist> mxl = refcounted<mxlist, vsize>::alloc
+- (offsetof (mxlist, m_mxes[nmx]) + n_chars);
++ (((unsigned int)&(((mxlist *)0)->m_mxes[nmx])) + n_chars);
+ mxrec *mxrecs = mxl->m_mxes;
+ char *np = (char *) &mxrecs[nmx];
+
diff -r c11831af529f -r e96a31688ff7 security/sfs/patches/patch-ac
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/sfs/patches/patch-ac Sat Oct 21 11:53:13 2006 +0000
@@ -0,0 +1,13 @@
+$NetBSD: patch-ac,v 1.1 2006/10/21 11:53:13 agc Exp $
+
+--- ./async/ihash.h.orig 2002-05-28 11:29:16.000000000 +0100
++++ ./async/ihash.h
+@@ -213,7 +213,7 @@ class ihash
+ const H hash;
+
+ public:
+- ihash () {}
++ ihash () : eq (E ()), hash (H ()) {}
+ ihash (const E &e, const H &h) : eq (e), hash (h) {}
+
+ void insert (V *elm) { insert_val (elm, hash (elm->*key)); }
diff -r c11831af529f -r e96a31688ff7 security/sfs/patches/patch-ad
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/sfs/patches/patch-ad Sat Oct 21 11:53:13 2006 +0000
@@ -0,0 +1,13 @@
+$NetBSD: patch-ad,v 1.1 2006/10/21 11:53:13 agc Exp $
+
+--- ./async/qhash.h.orig 2002-05-28 11:50:37.000000000 +0100
++++ ./async/qhash.h
+@@ -166,7 +166,7 @@ class bhash // <K, void, H, E, kludge>
+
+ public:
+ bhash () {}
+- void clear () { deleteall (); }
++ void clear () { this->deleteall (); }
+ ~bhash () { clear (); }
+
+ bool insert (const K &k) {
diff -r c11831af529f -r e96a31688ff7 security/sfs/patches/patch-ae
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/sfs/patches/patch-ae Sat Oct 21 11:53:13 2006 +0000
@@ -0,0 +1,35 @@
+$NetBSD: patch-ae,v 1.1 2006/10/21 11:53:13 agc Exp $
+
+--- ./async/refcnt.h.orig 2002-09-21 00:05:21.000000000 +0100
++++ ./async/refcnt.h
+@@ -408,6 +408,8 @@ template<class T>
+ class ref : public refpriv, public refops<T> {
+ friend class refpriv;
+
++ refops<T>::p;
++
+ friend ref<T> mkref<T> (T *);
+ ref (T *pp, refcount *cc) : refpriv (cc) { p = pp; inc (); }
+
+@@ -455,6 +457,8 @@ template<class T>
+ class ptr : public refpriv, public refops <T> {
+ friend class refpriv;
+
++ refops<T>::p;
++
+ void inc () const { if (c) (rinc (c)); }
+ void dec () const { if (c) (rdec (c)); }
+
+@@ -509,10 +513,11 @@ public:
+
+ template<class T>
+ struct bssptr : ptr<T> {
++
+ // Don't initialize (assume we were 0 initialized in the BSS)
+ bssptr () : ptr<T> (__bss_init ()) {}
+ // Override the effects of destruction
+- ~bssptr () { assert (globaldestruction); if (*this != NULL) Xleak (); }
++ ~bssptr () { assert (globaldestruction); if (*this != NULL) this->Xleak (); }
+ ptr<T> &operator= (refpriv::privtype *p) { return ptr<T>::operator= (p); }
+ template<class U> ptr<T> &operator= (const ptr<U> &r)
+ { return ptr<T>::operator= (r); }
diff -r c11831af529f -r e96a31688ff7 security/sfs/patches/patch-af
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/sfs/patches/patch-af Sat Oct 21 11:53:13 2006 +0000
@@ -0,0 +1,28 @@
+$NetBSD: patch-af,v 1.1 2006/10/21 11:53:13 agc Exp $
+
+--- ./async/vec.h.orig 2002-05-28 11:29:16.000000000 +0100
++++ ./async/vec.h
+@@ -72,7 +72,14 @@ public:
+ };
+
+ template<class T, size_t N = 0> class vec : public vec_base<T, N> {
++
+ typedef typename vec_base<T, N>::elm_t elm_t;
++
++ vec_base<T, N>::basep;
++ vec_base<T, N>::firstp;
++ vec_base<T, N>::lastp;
++ vec_base<T, N>::limp;
++
+ void move (elm_t *dst) {
+ if (dst == firstp)
+ return;
+@@ -92,7 +99,7 @@ template<class T, size_t N = 0> class ve
+ { return *new (implicit_cast<void *> (&e)) elm_t (v); }
+ static void destroy (elm_t &e) { e.~elm_t (); }
+
+- void init () { lastp = firstp = basep = def_basep (); limp = def_limp (); }
++ void init () { lastp = firstp = basep = this->def_basep (); limp = this->def_limp (); }
+ void del () { while (firstp < lastp) firstp++->~elm_t (); bfree (basep); }
+
+ #define append(v) \
diff -r c11831af529f -r e96a31688ff7 security/sfs/patches/patch-ag
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/sfs/patches/patch-ag Sat Oct 21 11:53:13 2006 +0000
@@ -0,0 +1,14 @@
+$NetBSD: patch-ag,v 1.1 2006/10/21 11:53:13 agc Exp $
+
+--- ./async/aiod.h.orig 2002-10-29 06:29:02.000000000 +0000
++++ ./async/aiod.h
+@@ -32,6 +32,9 @@
+
+ struct aiod_req;
+
++class aiod;
++class aiofh;
++
+ class aiobuf {
+ friend class aiod;
+ friend class aiofh;
diff -r c11831af529f -r e96a31688ff7 security/sfs/patches/patch-ah
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/security/sfs/patches/patch-ah Sat Oct 21 11:53:13 2006 +0000
@@ -0,0 +1,46 @@
+$NetBSD: patch-ah,v 1.1 2006/10/21 11:53:13 agc Exp $
+
+--- ./arpc/rpctypes.h.orig 2002-05-28 11:29:15.000000000 +0100
++++ ./arpc/rpctypes.h
+@@ -173,7 +173,7 @@ public:
+ template<size_t m> rpc_vec &set (const array<T, m> &v)
+ { switch (0) case 0: case m <= max:; assign (v); return *this; }
+ #endif
+- rpc_vec &set (elm_t *base, size_t len, freemode_t m = NOFREE)
++ rpc_vec &set (elm_t *base, size_t len, freemode_t m = freemode::NOFREE)
+ { mcheck (len); del (); mode = m; nelm = len; vec = base; return *this; }
+ template<size_t m> rpc_vec &set (const ::vec<T, m> &v)
+ { set (v.base (), v.size ()); }
+@@ -266,6 +266,8 @@ swap (rpc_vec<T, max> &a, rpc_vec<T, max
+ a.swap (b);
+ }
+
++extern const str rpc_emptystr;
++
+ template<size_t max = RPC_INFINITY> struct rpc_str : str
Home |
Main Index |
Thread Index |
Old Index