pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/opendnssec There's one more useless ntohl(), ...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/5bd39450fa9c
branches:  trunk
changeset: 641332:5bd39450fa9c
user:      he <he%pkgsrc.org@localhost>
date:      Tue Nov 04 09:41:02 2014 +0000

description:
There's one more useless ntohl(), get rid of that as well.

Bump PKGREVISION.

diffstat:

 security/opendnssec/Makefile                             |   4 ++--
 security/opendnssec/distinfo                             |   4 ++--
 security/opendnssec/patches/patch-signer_src_wire_xfrd.c |  13 +++++++++++--
 3 files changed, 15 insertions(+), 6 deletions(-)

diffs (54 lines):

diff -r 0a8b9b2c48fc -r 5bd39450fa9c security/opendnssec/Makefile
--- a/security/opendnssec/Makefile      Tue Nov 04 08:36:17 2014 +0000
+++ b/security/opendnssec/Makefile      Tue Nov 04 09:41:02 2014 +0000
@@ -1,8 +1,8 @@
-# $NetBSD: Makefile,v 1.47 2014/10/31 16:32:39 he Exp $
+# $NetBSD: Makefile,v 1.48 2014/11/04 09:41:02 he Exp $
 #
 
 DISTNAME=      opendnssec-1.4.6
-PKGREVISION=   3
+PKGREVISION=   4
 CATEGORIES=    security net
 MASTER_SITES=  http://www.opendnssec.org/files/source/
 
diff -r 0a8b9b2c48fc -r 5bd39450fa9c security/opendnssec/distinfo
--- a/security/opendnssec/distinfo      Tue Nov 04 08:36:17 2014 +0000
+++ b/security/opendnssec/distinfo      Tue Nov 04 09:41:02 2014 +0000
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.27 2014/10/31 16:32:39 he Exp $
+$NetBSD: distinfo,v 1.28 2014/11/04 09:41:02 he Exp $
 
 SHA1 (opendnssec-1.4.6.tar.gz) = 2318b31546d0d4118cd03b9591ba76d259e1b0b0
 RMD160 (opendnssec-1.4.6.tar.gz) = a7c3bbfa42edd64fffbb0680db6f9c372ded2c85
@@ -6,4 +6,4 @@
 SHA1 (patch-aa) = 104e077af6c368cbb5fc3034d58b2f2249fcf991
 SHA1 (patch-enforcer_utils_Makefile.am) = bee7cb4f3cfe5aae96c5726a115eb8b6587288dd
 SHA1 (patch-enforcer_utils_Makefile.in) = da9fce97e631bb81607851f9758b206ea975b052
-SHA1 (patch-signer_src_wire_xfrd.c) = 2158991c46ac415d187c45b654d548a459547693
+SHA1 (patch-signer_src_wire_xfrd.c) = ebf381c7c8e3bb7d48a647e9941b936f59fc88db
diff -r 0a8b9b2c48fc -r 5bd39450fa9c security/opendnssec/patches/patch-signer_src_wire_xfrd.c
--- a/security/opendnssec/patches/patch-signer_src_wire_xfrd.c  Tue Nov 04 08:36:17 2014 +0000
+++ b/security/opendnssec/patches/patch-signer_src_wire_xfrd.c  Tue Nov 04 09:41:02 2014 +0000
@@ -1,6 +1,6 @@
-$NetBSD: patch-signer_src_wire_xfrd.c,v 1.1 2014/10/31 16:32:39 he Exp $
+$NetBSD: patch-signer_src_wire_xfrd.c,v 1.2 2014/11/04 09:41:02 he Exp $
 
-There's no need for htonl() on values restored from a local file.
+Hm, there's no need for htonl() on values restored from a file.
 This causes IXFRs to fail, because the wrong SOA version number
 is being stuffed into the IXFR requests(!)
 
@@ -25,3 +25,12 @@
                  xfrd->soa.mname[0] = xfrd_recover_dname(xfrd->soa.mname+1,
                      soa_mname);
                  xfrd->soa.rname[0] = xfrd_recover_dname(xfrd->soa.rname+1,
+@@ -2097,7 +2097,7 @@ xfrd_backup(xfrd_type* xfrd)
+                 fprintf(fd, "%s\n", ODS_SE_FILE_MAGIC_V3);
+                 fprintf(fd, ";;Zone: name %s ttl %u mname ",
+                     zone->name,
+-                    (unsigned) ntohl(xfrd->soa.ttl));
++                    (unsigned) xfrd->soa.ttl);
+                 xfrd_backup_dname(fd, xfrd->soa.mname),
+                 fprintf(fd, " rname ");
+                 xfrd_backup_dname(fd, xfrd->soa.rname),



Home | Main Index | Thread Index | Old Index