[ldns-users] First candidate for ldns-1.7.1 release

Willem Toorop willem at nlnetlabs.nl
Wed Jul 24 13:19:25 UTC 2019


On 19-07-19 16:39, Jeffrey Walton wrote:
> On Thu, Jul 18, 2019 at 10:09 PM Willem Toorop <willem at nlnetlabs.nl> wrote:
>>
>> We have a new candidate for the upcoming 1.7.1 release of ldns.
>> Besides many bugfixes, this release also has a few new features:
>>
>> * Support for DNSSEC algorithms ED25519 and ED448
>>   when compiled with OpenSSL 1.1.1
>>
>> * An -I option to ldns-notify to specify a source IP address
>>   to send to notify from.
>>
>> * Complete OpenSSL engine support with ldns-signzone
>>   contributed by Vadim Penzin
>>
>> Please review this release candidate carefully and let us know if
>> anything is wrong.  If all is well, the actual release will follow
>> Friday the 26th of July 2019.
> 
> Working from Master on Fedora 30 with GCC 8.2:

Thanks Jeffrey, but you should not compile from master.
The release candidate is on develop.

-- Willem

> 
> ./libtool --tag=CC --quiet --mode=compile gcc -I. -I.
> -I/usr/local/include -DNDEBUG -DHAVE_CONFIG_H
> -DLDNS_TRUST_ANCHOR_FILE="\"/usr/local/etc/unbound/root.key\""
> -Wunused-function -Wstrict-prototypes -Wwrite-strings -W -Wall -g2 -O2
> -march=native -fPIC -pthread -I/usr/local/include -c ./error.c -o
> error.lo
> ./duration.c: In function ‘ldns_duration2string’:
> ./duration.c:287:15: warning: ‘strncat’ specified bound 1 equals
> source length [-Wstringop-overflow=]
>   287 |         str = strncat(str, "T", 1);
>       |               ^~~~~~~~~~~~~~~~~~~~
> 
> 
> ./libtool --tag=CC --quiet --mode=compile gcc -I. -I.
> -I/usr/local/include -DNDEBUG -DHAVE_CONFIG_H
> -DLDNS_TRUST_ANCHOR_FILE="\"/usr/local/etc/unbound/root.key\""
> -Wunused-function -Wstrict-prototypes -Wwrite-strings -W -Wall -g2 -O2
> -march=native -fPIC -pthread -I/usr/local/include -c ./sha1.c -o
> sha1.lo
> ./rr.c:215:4: warning: ‘strncpy’ specified bound depends on the length
> of the source argument [-Wstringop-overflow=]
>   215 |    strncpy(type, ttl, strlen(ttl) + 1);
>       |    ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> ./rr.c:215:23: note: length computed here
>   215 |    strncpy(type, ttl, strlen(ttl) + 1);
>       |                       ^~~~~~~~~~~
> ./rr.c:234:4: warning: ‘strncpy’ specified bound depends on the length
> of the source argument [-Wstringop-overflow=]
>   234 |    strncpy(type, clas, strlen(clas) + 1);
>       |    ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> ./rr.c:234:24: note: length computed here
>   234 |    strncpy(type, clas, strlen(clas) + 1);
>       |                        ^~~~~~~~~~~~
> ./rr.c:445:5: warning: ‘strncpy’ output truncated before terminating
> nul copying as many bytes from a string as its length
> [-Wstringop-truncation]
>   445 |     strncpy(hex_data_str + cur_hex_data_size, rd,
>       |     ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>   446 |       rd_strlen);
>       |       ~~~~~~~~~~
> ./rr.c:436:18: note: length computed here
>   436 |      rd_strlen = strlen(rd);
>       |                  ^~~~~~~~~~
> 




More information about the ldns-users mailing list