[ldns-users] First candidate for ldns-1.7.1 release

Jeffrey Walton noloader at gmail.com
Fri Jul 19 20:39:03 UTC 2019


On Thu, Jul 18, 2019 at 10:09 PM Willem Toorop <willem at nlnetlabs.nl> wrote:
>
> We have a new candidate for the upcoming 1.7.1 release of ldns.
> Besides many bugfixes, this release also has a few new features:
>
> * Support for DNSSEC algorithms ED25519 and ED448
>   when compiled with OpenSSL 1.1.1
>
> * An -I option to ldns-notify to specify a source IP address
>   to send to notify from.
>
> * Complete OpenSSL engine support with ldns-signzone
>   contributed by Vadim Penzin
>
> Please review this release candidate carefully and let us know if
> anything is wrong.  If all is well, the actual release will follow
> Friday the 26th of July 2019.

Working from Master on Fedora 30 with GCC 8.2:

./libtool --tag=CC --quiet --mode=compile gcc -I. -I.
-I/usr/local/include -DNDEBUG -DHAVE_CONFIG_H
-DLDNS_TRUST_ANCHOR_FILE="\"/usr/local/etc/unbound/root.key\""
-Wunused-function -Wstrict-prototypes -Wwrite-strings -W -Wall -g2 -O2
-march=native -fPIC -pthread -I/usr/local/include -c ./error.c -o
error.lo
./duration.c: In function ‘ldns_duration2string’:
./duration.c:287:15: warning: ‘strncat’ specified bound 1 equals
source length [-Wstringop-overflow=]
  287 |         str = strncat(str, "T", 1);
      |               ^~~~~~~~~~~~~~~~~~~~


./libtool --tag=CC --quiet --mode=compile gcc -I. -I.
-I/usr/local/include -DNDEBUG -DHAVE_CONFIG_H
-DLDNS_TRUST_ANCHOR_FILE="\"/usr/local/etc/unbound/root.key\""
-Wunused-function -Wstrict-prototypes -Wwrite-strings -W -Wall -g2 -O2
-march=native -fPIC -pthread -I/usr/local/include -c ./sha1.c -o
sha1.lo
./rr.c:215:4: warning: ‘strncpy’ specified bound depends on the length
of the source argument [-Wstringop-overflow=]
  215 |    strncpy(type, ttl, strlen(ttl) + 1);
      |    ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
./rr.c:215:23: note: length computed here
  215 |    strncpy(type, ttl, strlen(ttl) + 1);
      |                       ^~~~~~~~~~~
./rr.c:234:4: warning: ‘strncpy’ specified bound depends on the length
of the source argument [-Wstringop-overflow=]
  234 |    strncpy(type, clas, strlen(clas) + 1);
      |    ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
./rr.c:234:24: note: length computed here
  234 |    strncpy(type, clas, strlen(clas) + 1);
      |                        ^~~~~~~~~~~~
./rr.c:445:5: warning: ‘strncpy’ output truncated before terminating
nul copying as many bytes from a string as its length
[-Wstringop-truncation]
  445 |     strncpy(hex_data_str + cur_hex_data_size, rd,
      |     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  446 |       rd_strlen);
      |       ~~~~~~~~~~
./rr.c:436:18: note: length computed here
  436 |      rd_strlen = strlen(rd);
      |                  ^~~~~~~~~~



More information about the ldns-users mailing list