Bug#804617: xchat-gnome: FTBFS: error: implicit declaration of function 'SSLv3_server_method'
Chris West (Faux)
solo-debianbugs at goeswhere.com
Mon Nov 9 21:24:49 UTC 2015
Source: xchat-gnome
Version: 1:0.30.0~git20131003.d20b8d-3
Severity: serious
Justification: fails to build from source
Tags: sid stretch
User: reproducible-builds at lists.alioth.debian.org
Usertags: ftbfs
X-Debbugs-CC: reproducible-builds at lists.alioth.debian.org
Dear Maintainer,
The package fails to build:
ssl.c: In function '_SSL_context_init':
ssl.c:73:30: error: implicit declaration of function 'SSLv3_server_method' [-Werror=implicit-function-declaration]
ctx = SSL_CTX_new (server ? SSLv3_server_method() : SSLv3_client_method ());
^
ssl.c:73:2: warning: nested extern declaration of 'SSLv3_server_method' [-Wnested-externs]
ctx = SSL_CTX_new (server ? SSLv3_server_method() : SSLv3_client_method ());
^
ssl.c:73:54: error: implicit declaration of function 'SSLv3_client_method' [-Werror=implicit-function-declaration]
ctx = SSL_CTX_new (server ? SSLv3_server_method() : SSLv3_client_method ());
^
ssl.c:73:2: warning: nested extern declaration of 'SSLv3_client_method' [-Wnested-externs]
ctx = SSL_CTX_new (server ? SSLv3_server_method() : SSLv3_client_method ());
^
ssl.c:73:21: warning: passing argument 1 of 'SSL_CTX_new' makes pointer from integer without a cast [-Wint-conversion]
ctx = SSL_CTX_new (server ? SSLv3_server_method() : SSLv3_client_method ());
^
In file included from ssl.c:20:0:
/usr/include/openssl/ssl.h:2131:10: note: expected 'const SSL_METHOD * {aka const struct ssl_method_st *}' but argument is of type 'int'
SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth);
^
ssl.c: In function '_SSL_get_cipher_info':
ssl.c:205:4: warning: assignment discards 'const' qualifier from pointer target type [-Wdiscarded-qualifiers]
c = SSL_get_current_cipher (ssl);
^
ssl.c: In function '_SSL_socket':
ssl.c:284:18: warning: comparison between pointer and integer
Full build log:
https://reproducible.debian.net/rb-pkg/unstable/amd64/xchat-gnome.html
-- System Information:
Debian Release: stretch/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
More information about the pkg-gnome-maintainers
mailing list