[ldns-users] First candidate for ldns-1.7.1 release
Willem Toorop
willem at nlnetlabs.nl
Wed Jul 24 13:19:25 UTC 2019
On 19-07-19 16:39, Jeffrey Walton wrote:
> On Thu, Jul 18, 2019 at 10:09 PM Willem Toorop <willem at nlnetlabs.nl> wrote:
>>
>> We have a new candidate for the upcoming 1.7.1 release of ldns.
>> Besides many bugfixes, this release also has a few new features:
>>
>> * Support for DNSSEC algorithms ED25519 and ED448
>> when compiled with OpenSSL 1.1.1
>>
>> * An -I option to ldns-notify to specify a source IP address
>> to send to notify from.
>>
>> * Complete OpenSSL engine support with ldns-signzone
>> contributed by Vadim Penzin
>>
>> Please review this release candidate carefully and let us know if
>> anything is wrong. If all is well, the actual release will follow
>> Friday the 26th of July 2019.
>
> Working from Master on Fedora 30 with GCC 8.2:
Thanks Jeffrey, but you should not compile from master.
The release candidate is on develop.
-- Willem
>
> ./libtool --tag=CC --quiet --mode=compile gcc -I. -I.
> -I/usr/local/include -DNDEBUG -DHAVE_CONFIG_H
> -DLDNS_TRUST_ANCHOR_FILE="\"/usr/local/etc/unbound/root.key\""
> -Wunused-function -Wstrict-prototypes -Wwrite-strings -W -Wall -g2 -O2
> -march=native -fPIC -pthread -I/usr/local/include -c ./error.c -o
> error.lo
> ./duration.c: In function ‘ldns_duration2string’:
> ./duration.c:287:15: warning: ‘strncat’ specified bound 1 equals
> source length [-Wstringop-overflow=]
> 287 | str = strncat(str, "T", 1);
> | ^~~~~~~~~~~~~~~~~~~~
>
>
> ./libtool --tag=CC --quiet --mode=compile gcc -I. -I.
> -I/usr/local/include -DNDEBUG -DHAVE_CONFIG_H
> -DLDNS_TRUST_ANCHOR_FILE="\"/usr/local/etc/unbound/root.key\""
> -Wunused-function -Wstrict-prototypes -Wwrite-strings -W -Wall -g2 -O2
> -march=native -fPIC -pthread -I/usr/local/include -c ./sha1.c -o
> sha1.lo
> ./rr.c:215:4: warning: ‘strncpy’ specified bound depends on the length
> of the source argument [-Wstringop-overflow=]
> 215 | strncpy(type, ttl, strlen(ttl) + 1);
> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> ./rr.c:215:23: note: length computed here
> 215 | strncpy(type, ttl, strlen(ttl) + 1);
> | ^~~~~~~~~~~
> ./rr.c:234:4: warning: ‘strncpy’ specified bound depends on the length
> of the source argument [-Wstringop-overflow=]
> 234 | strncpy(type, clas, strlen(clas) + 1);
> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> ./rr.c:234:24: note: length computed here
> 234 | strncpy(type, clas, strlen(clas) + 1);
> | ^~~~~~~~~~~~
> ./rr.c:445:5: warning: ‘strncpy’ output truncated before terminating
> nul copying as many bytes from a string as its length
> [-Wstringop-truncation]
> 445 | strncpy(hex_data_str + cur_hex_data_size, rd,
> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> 446 | rd_strlen);
> | ~~~~~~~~~~
> ./rr.c:436:18: note: length computed here
> 436 | rd_strlen = strlen(rd);
> | ^~~~~~~~~~
>
More information about the ldns-users
mailing list