Thu Feb 26 10:15:02 2015 UTC ()
Update bind910 package to 9.10.2.

Security Fixes

     * On servers configured to perform DNSSEC validation using managed
       trust anchors (i.e., keys configured explicitly via managed-keys,
       or implicitly via dnssec-validation auto; or dnssec-lookaside
       auto;), revoking a trust anchor and sending a new untrusted
       replacement could cause named to crash with an assertion failure.
       This could occur in the event of a botched key rollover, or
       potentially as a result of a deliberate attack if the attacker was
       in position to monitor the victim's DNS traffic.
       This flaw was discovered by Jan-Piet Mens, and is disclosed in
       CVE-2015-1349. [RT #38344]
     * A flaw in delegation handling could be exploited to put named into
       an infinite loop, in which each lookup of a name server triggered
       additional lookups of more name servers. This has been addressed by
       placing limits on the number of levels of recursion named will
       allow (default 7), and on the number of queries that it will send
       before terminating a recursive query (default 50).
       The recursion depth limit is configured via the max-recursion-depth
       option, and the query limit via the max-recursion-queries option.
       The flaw was discovered by Florian Maury of ANSSI, and is disclosed
       in CVE-2014-8500. [RT #37580]
     * Two separate problems were identified in BIND's GeoIP code that
       could lead to an assertion failure. One was triggered by use of
       both IPv4 and IPv6 address families, the other by referencing a
       GeoIP database in named.conf which was not installed. Both are
       covered by CVE-2014-8680. [RT #37672] [RT #37679]
       A less serious security flaw was also found in GeoIP: changes to
       the geoip-directory option in named.conf were ignored when running
       rndc reconfig. In theory, this could allow named to allow access to
       unintended clients.

New Features

     * None

Feature Changes

     * ACLs containing geoip asnum elements were not correctly matched
       unless the full organization name was specified in the ACL (as in
       geoip asnum "AS1234 Example, Inc.";). They can now match against
       the AS number alone (as in geoip asnum "AS1234";).
     * When using native PKCS#11 cryptography (i.e., configure
       --enable-native-pkcs11) HSM PINs of up to 256 characters can now be
       used.
     * NXDOMAIN responses to queries of type DS are now cached separately
       from those for other types. This helps when using "grafted" zones
       of type forward, for which the parent zone does not contain a
       delegation, such as local top-level domains. Previously a query of
       type DS for such a zone could cause the zone apex to be cached as
       NXDOMAIN, blocking all subsequent queries. (Note: This change is
       only helpful when DNSSEC validation is not enabled. "Grafted" zones
       without a delegation in the parent are not a recommended
       configuration.)
     * NOTIFY messages that are sent because a zone has been updated are
       now given priority above NOTIFY messages that were scheduled when
       the server started up. This should mitigate delays in zone
       propagation when servers are restarted frequently.
     * Errors reported when running rndc addzone (e.g., when a zone file
       cannot be loaded) have been clarified to make it easier to diagnose
       problems.
     * Added support for OPENPGPKEY type.
     * When encountering an authoritative name server whose name is an
       alias pointing to another name, the resolver treats this as an
       error and skips to the next server. Previously this happened
       silently; now the error will be logged to the newly-created "cname"
       log category.
     * If named is not configured to validate the answer then allow
       fallback to plain DNS on timeout even when we know the server
       supports EDNS. This will allow the server to potentially resolve
       signed queries when TCP is being blocked.

Bug Fixes

     * dig, host and nslookup aborted when encountering a name which,
       after appending search list elements, exceeded 255 bytes. Such
       names are now skipped, but processing of other names will continue.
       [RT #36892]
     * The error message generated when named-checkzone or named-checkconf
       -z encounters a $TTL directive without a value has been clarified.
       [RT #37138]
     * Semicolon characters (;) included in TXT records were incorrectly
       escaped with a backslash when the record was displayed as text.
       This is actually only necessary when there are no quotation marks.
       [RT #37159]
     * When files opened for writing by named, such as zone journal files,
       were referenced more than once in named.conf, it could lead to file
       corruption as multiple threads wrote to the same file. This is now
       detected when loading named.conf and reported as an error. [RT
       #37172]
     * dnssec-keygen -S failed to generate successor keys for some
       algorithm types (including ECDSA and GOST) due to a difference in
       the content of private key files. This has been corrected. [RT
       #37183]
     * UPDATE messages that arrived too soon after an rndc thaw could be
       lost. [RT #37233]
     * Forwarding of UPDATE messages did not work when they were signed
       with SIG(0); they resulted in a BADSIG response code. [RT #37216]
     * When checking for updates to trust anchors listed in managed-keys,
       named now revalidates keys based on the current set of active trust
       anchors, without relying on any cached record of previous
       validation. [RT #37506]
     * Large-system tuning (configure --with-tuning=large) caused problems
       on some platforms by setting a socket receive buffer size that was
       too large. This is now detected and corrected at run time. [RT
       #37187]
     * When NXDOMAIN redirection is in use, queries for a name that is
       present in the redirection zone but a type that is not present will
       now return NOERROR instead of NXDOMAIN.
     * When a zone contained a delegation to an IPv6 name server but not
       an IPv4 name server, it was possible for a memory reference to be
       left un-freed. This caused an assertion failure on server shutdown,
       but was otherwise harmless. [RT #37796]
     * Due to an inadvertent removal of code in the previous release, when
       named encountered an authoritative name server which dropped all
       EDNS queries, it did not always try plain DNS. This has been
       corrected. [RT #37965]
     * A regression caused nsupdate to use the default recursive servers
       rather than the SOA MNAME server when sending the UPDATE.
     * Adjusted max-recursion-queries to accommodate the smaller initial
       packet sizes used in BIND 9.10 and higher when contacting
       authoritative servers for the first time.
     * Built-in "empty" zones did not correctly inherit the
       "allow-transfer" ACL from the options or view. [RT #38310]
     * Two leaks were fixed that could cause named processes to grow to
       very large sizes. [RT #38454]
     * Fixed some bugs in RFC 5011 trust anchor management, including a
       memory leak and a possible loss of state information.[RT #38458]


(taca)
diff -r1.5 -r1.6 pkgsrc/net/bind910/Makefile
diff -r1.3 -r1.4 pkgsrc/net/bind910/PLIST
diff -r1.4 -r1.5 pkgsrc/net/bind910/distinfo
diff -r1.1.1.1 -r1.2 pkgsrc/net/bind910/patches/patch-bin_dig_dighost.c
diff -r1.2 -r1.3 pkgsrc/net/bind910/patches/patch-configure

cvs diff -r1.5 -r1.6 pkgsrc/net/bind910/Attic/Makefile (expand / switch to unified diff)

--- pkgsrc/net/bind910/Attic/Makefile 2015/02/19 00:37:17 1.5
+++ pkgsrc/net/bind910/Attic/Makefile 2015/02/26 10:15:02 1.6
@@ -1,30 +1,30 @@ @@ -1,30 +1,30 @@
1# $NetBSD: Makefile,v 1.5 2015/02/19 00:37:17 taca Exp $ 1# $NetBSD: Makefile,v 1.6 2015/02/26 10:15:02 taca Exp $
2 2
3DISTNAME= bind-${BIND_VERSION} 3DISTNAME= bind-${BIND_VERSION}
4PKGNAME= ${DISTNAME:S/-P/pl/} 4PKGNAME= ${DISTNAME:S/-P/pl/}
5CATEGORIES= net 5CATEGORIES= net
6MASTER_SITES= ftp://ftp.isc.org/isc/bind9/${BIND_VERSION}/ \ 6MASTER_SITES= ftp://ftp.isc.org/isc/bind9/${BIND_VERSION}/ \
7 http://ftp.belnet.be/pub/mirror/ftp.isc.org/isc/bind9/${BIND_VERSION}/ 7 http://ftp.belnet.be/pub/mirror/ftp.isc.org/isc/bind9/${BIND_VERSION}/
8 8
9MAINTAINER= pkgsrc-users@NetBSD.org 9MAINTAINER= pkgsrc-users@NetBSD.org
10HOMEPAGE= http://www.isc.org/software/bind/ 10HOMEPAGE= http://www.isc.org/software/bind/
11COMMENT= Berkeley Internet Name Daemon implementation of DNS, version 9.10 11COMMENT= Berkeley Internet Name Daemon implementation of DNS, version 9.10
12 12
13CONFLICTS+= host-[0-9]* 13CONFLICTS+= host-[0-9]*
14 14
15MAKE_JOBS_SAFE= no 15MAKE_JOBS_SAFE= no
16 16
17BIND_VERSION= 9.10.1-P2 17BIND_VERSION= 9.10.2
18 18
19.include "../../mk/bsd.prefs.mk" 19.include "../../mk/bsd.prefs.mk"
20 20
21BUILD_DEFS+= BIND_DIR VARBASE 21BUILD_DEFS+= BIND_DIR VARBASE
22 22
23.include "options.mk" 23.include "options.mk"
24 24
25USE_TOOLS+= pax perl 25USE_TOOLS+= pax perl
26USE_LIBTOOL= yes 26USE_LIBTOOL= yes
27GNU_CONFIGURE= yes 27GNU_CONFIGURE= yes
28#CONFIG_SHELL= sh -x 28#CONFIG_SHELL= sh -x
29 29
30CONFIGURE_ARGS+= --with-libtool 30CONFIGURE_ARGS+= --with-libtool

cvs diff -r1.3 -r1.4 pkgsrc/net/bind910/Attic/PLIST (expand / switch to unified diff)

--- pkgsrc/net/bind910/Attic/PLIST 2014/12/08 21:59:09 1.3
+++ pkgsrc/net/bind910/Attic/PLIST 2015/02/26 10:15:02 1.4
@@ -1,14 +1,14 @@ @@ -1,14 +1,14 @@
1@comment $NetBSD: PLIST,v 1.3 2014/12/08 21:59:09 taca Exp $ 1@comment $NetBSD: PLIST,v 1.4 2015/02/26 10:15:02 taca Exp $
2bin/bind9-config 2bin/bind9-config
3bin/delv 3bin/delv
4bin/dig 4bin/dig
5bin/host 5bin/host
6bin/isc-config.sh 6bin/isc-config.sh
7bin/nslookup 7bin/nslookup
8bin/nsupdate 8bin/nsupdate
9${PLIST.inet6}include/isc/ipv6.h 9${PLIST.inet6}include/isc/ipv6.h
10include/bind9/check.h 10include/bind9/check.h
11include/bind9/getaddresses.h 11include/bind9/getaddresses.h
12include/bind9/version.h 12include/bind9/version.h
13include/dns/acache.h 13include/dns/acache.h
14include/dns/acl.h 14include/dns/acl.h
@@ -401,26 +401,29 @@ sbin/tsig-keygen @@ -401,26 +401,29 @@ sbin/tsig-keygen
401share/doc/bind9/CHANGES 401share/doc/bind9/CHANGES
402share/doc/bind9/FAQ 402share/doc/bind9/FAQ
403share/doc/bind9/README 403share/doc/bind9/README
404share/doc/bind9/arm/Bv9ARM.ch01.html 404share/doc/bind9/arm/Bv9ARM.ch01.html
405share/doc/bind9/arm/Bv9ARM.ch02.html 405share/doc/bind9/arm/Bv9ARM.ch02.html
406share/doc/bind9/arm/Bv9ARM.ch03.html 406share/doc/bind9/arm/Bv9ARM.ch03.html
407share/doc/bind9/arm/Bv9ARM.ch04.html 407share/doc/bind9/arm/Bv9ARM.ch04.html
408share/doc/bind9/arm/Bv9ARM.ch05.html 408share/doc/bind9/arm/Bv9ARM.ch05.html
409share/doc/bind9/arm/Bv9ARM.ch06.html 409share/doc/bind9/arm/Bv9ARM.ch06.html
410share/doc/bind9/arm/Bv9ARM.ch07.html 410share/doc/bind9/arm/Bv9ARM.ch07.html
411share/doc/bind9/arm/Bv9ARM.ch08.html 411share/doc/bind9/arm/Bv9ARM.ch08.html
412share/doc/bind9/arm/Bv9ARM.ch09.html 412share/doc/bind9/arm/Bv9ARM.ch09.html
413share/doc/bind9/arm/Bv9ARM.ch10.html 413share/doc/bind9/arm/Bv9ARM.ch10.html
 414share/doc/bind9/arm/Bv9ARM.ch11.html
 415share/doc/bind9/arm/Bv9ARM.ch12.html
 416share/doc/bind9/arm/Bv9ARM.ch13.html
414share/doc/bind9/arm/Bv9ARM.html 417share/doc/bind9/arm/Bv9ARM.html
415share/doc/bind9/arm/man.arpaname.html 418share/doc/bind9/arm/man.arpaname.html
416share/doc/bind9/arm/man.ddns-confgen.html 419share/doc/bind9/arm/man.ddns-confgen.html
417share/doc/bind9/arm/man.delv.html 420share/doc/bind9/arm/man.delv.html
418share/doc/bind9/arm/man.dig.html 421share/doc/bind9/arm/man.dig.html
419share/doc/bind9/arm/man.dnssec-checkds.html 422share/doc/bind9/arm/man.dnssec-checkds.html
420share/doc/bind9/arm/man.dnssec-coverage.html 423share/doc/bind9/arm/man.dnssec-coverage.html
421share/doc/bind9/arm/man.dnssec-dsfromkey.html 424share/doc/bind9/arm/man.dnssec-dsfromkey.html
422share/doc/bind9/arm/man.dnssec-importkey.html 425share/doc/bind9/arm/man.dnssec-importkey.html
423share/doc/bind9/arm/man.dnssec-keyfromlabel.html 426share/doc/bind9/arm/man.dnssec-keyfromlabel.html
424share/doc/bind9/arm/man.dnssec-keygen.html 427share/doc/bind9/arm/man.dnssec-keygen.html
425share/doc/bind9/arm/man.dnssec-revoke.html 428share/doc/bind9/arm/man.dnssec-revoke.html
426share/doc/bind9/arm/man.dnssec-settime.html 429share/doc/bind9/arm/man.dnssec-settime.html
@@ -429,13 +432,14 @@ share/doc/bind9/arm/man.dnssec-verify.ht @@ -429,13 +432,14 @@ share/doc/bind9/arm/man.dnssec-verify.ht
429share/doc/bind9/arm/man.genrandom.html 432share/doc/bind9/arm/man.genrandom.html
430share/doc/bind9/arm/man.host.html 433share/doc/bind9/arm/man.host.html
431share/doc/bind9/arm/man.isc-hmac-fixup.html 434share/doc/bind9/arm/man.isc-hmac-fixup.html
432share/doc/bind9/arm/man.named-checkconf.html 435share/doc/bind9/arm/man.named-checkconf.html
433share/doc/bind9/arm/man.named-checkzone.html 436share/doc/bind9/arm/man.named-checkzone.html
434share/doc/bind9/arm/man.named-journalprint.html 437share/doc/bind9/arm/man.named-journalprint.html
435share/doc/bind9/arm/man.named-rrchecker.html 438share/doc/bind9/arm/man.named-rrchecker.html
436share/doc/bind9/arm/man.named.html 439share/doc/bind9/arm/man.named.html
437share/doc/bind9/arm/man.nsec3hash.html 440share/doc/bind9/arm/man.nsec3hash.html
438share/doc/bind9/arm/man.nsupdate.html 441share/doc/bind9/arm/man.nsupdate.html
439share/doc/bind9/arm/man.rndc-confgen.html 442share/doc/bind9/arm/man.rndc-confgen.html
440share/doc/bind9/arm/man.rndc.conf.html 443share/doc/bind9/arm/man.rndc.conf.html
441share/doc/bind9/arm/man.rndc.html 444share/doc/bind9/arm/man.rndc.html
 445share/doc/bind9/arm/notes.html

cvs diff -r1.4 -r1.5 pkgsrc/net/bind910/Attic/distinfo (expand / switch to unified diff)

--- pkgsrc/net/bind910/Attic/distinfo 2015/02/19 00:37:17 1.4
+++ pkgsrc/net/bind910/Attic/distinfo 2015/02/26 10:15:02 1.5
@@ -1,13 +1,13 @@ @@ -1,13 +1,13 @@
1$NetBSD: distinfo,v 1.4 2015/02/19 00:37:17 taca Exp $ 1$NetBSD: distinfo,v 1.5 2015/02/26 10:15:02 taca Exp $
2 2
3SHA1 (bind-9.10.1-P2.tar.gz) = 4a7475b4f2c1d257001ad40653379af52f090666 3SHA1 (bind-9.10.2.tar.gz) = 4ddb2670976c06af7e86352616383958d82c51ce
4RMD160 (bind-9.10.1-P2.tar.gz) = 0148b0a2f7cdd3e144b0a52876a01ca8b6de075b 4RMD160 (bind-9.10.2.tar.gz) = 62ca38c60b792224e308815f2908b0c588b08c26
5Size (bind-9.10.1-P2.tar.gz) = 8356565 bytes 5Size (bind-9.10.2.tar.gz) = 8481111 bytes
6SHA1 (patch-bin_dig_dighost.c) = 72cb7676cdf9cd4b44bc62c72bcf29127d9fbffe 6SHA1 (patch-bin_dig_dighost.c) = 582fa4c7288e70bcc6ac906e8429cf38e0ad5152
7SHA1 (patch-bin_tests_system_Makefile.in) = 8bb6130981a6ff2ac736cf53a061115782bb65a2 7SHA1 (patch-bin_tests_system_Makefile.in) = 8bb6130981a6ff2ac736cf53a061115782bb65a2
8SHA1 (patch-config.threads.in) = 227b83efe9cb3e301aaac9b97cf42f1fb8ad06b2 8SHA1 (patch-config.threads.in) = 227b83efe9cb3e301aaac9b97cf42f1fb8ad06b2
9SHA1 (patch-configure) = 1de3bfa72fd9887a8fbb20ddd12bfe0469083ba0 9SHA1 (patch-configure) = 3ea12f60b26064679e086ef5e637420b95d165be
10SHA1 (patch-contrib_dlz_config.dlz.in) = f18bec63fbfce7cb2cd72929058ce3770fce458f 10SHA1 (patch-contrib_dlz_config.dlz.in) = f18bec63fbfce7cb2cd72929058ce3770fce458f
11SHA1 (patch-lib_dns_rbt.c) = 510dfc72bc7764e548a46e9c48b58b2543490d7a 11SHA1 (patch-lib_dns_rbt.c) = 510dfc72bc7764e548a46e9c48b58b2543490d7a
12SHA1 (patch-lib_lwres_getaddrinfo.c) = 69e9c8049fedcb93bd219c6053163f21ce3b2535 12SHA1 (patch-lib_lwres_getaddrinfo.c) = 69e9c8049fedcb93bd219c6053163f21ce3b2535
13SHA1 (patch-lib_lwres_getnameinfo.c) = 418ad349cf52925c9e8051b5c71d9d51ea8d2fb1 13SHA1 (patch-lib_lwres_getnameinfo.c) = 418ad349cf52925c9e8051b5c71d9d51ea8d2fb1

cvs diff -r1.1.1.1 -r1.2 pkgsrc/net/bind910/patches/Attic/patch-bin_dig_dighost.c (expand / switch to unified diff)

--- pkgsrc/net/bind910/patches/Attic/patch-bin_dig_dighost.c 2014/07/02 02:42:58 1.1.1.1
+++ pkgsrc/net/bind910/patches/Attic/patch-bin_dig_dighost.c 2015/02/26 10:15:02 1.2
@@ -1,128 +1,128 @@ @@ -1,128 +1,128 @@
1$NetBSD: patch-bin_dig_dighost.c,v 1.1.1.1 2014/07/02 02:42:58 jnemeth Exp $ 1$NetBSD: patch-bin_dig_dighost.c,v 1.2 2015/02/26 10:15:02 taca Exp $
2 2
3* Avoid to use true as variable name. 3* Avoid to use true as variable name.
4 4
5--- bin/dig/dighost.c.orig 2014-01-27 18:58:24.000000000 +0000 5--- bin/dig/dighost.c.orig 2015-02-18 01:55:55.000000000 +0000
6+++ bin/dig/dighost.c 6+++ bin/dig/dighost.c
7@@ -4397,7 +4397,7 @@ prepare_lookup(dns_name_t *name) 7@@ -4678,7 +4678,7 @@ prepare_lookup(dns_name_t *name)
8 isc_result_t result; 8 isc_result_t result;
9 isc_region_t r; 9 isc_region_t r;
10 dns_rdataset_t *rdataset = NULL; 10 dns_rdataset_t *rdataset = NULL;
11- isc_boolean_t true = ISC_TRUE; 11- isc_boolean_t true = ISC_TRUE;
12+ isc_boolean_t isc_true = ISC_TRUE; 12+ isc_boolean_t isc_true = ISC_TRUE;
13 #endif 13 #endif
14  14
15 memset(namestr, 0, DNS_NAME_FORMATSIZE); 15 memset(namestr, 0, DNS_NAME_FORMATSIZE);
16@@ -4411,7 +4411,7 @@ prepare_lookup(dns_name_t *name) 16@@ -4692,7 +4692,7 @@ prepare_lookup(dns_name_t *name)
17  17
18 result = advanced_rrsearch(&rdataset, &ns.name, 18 result = advanced_rrsearch(&rdataset, &ns.name,
19 dns_rdatatype_aaaa, 19 dns_rdatatype_aaaa,
20- dns_rdatatype_any, &true); 20- dns_rdatatype_any, &true);
21+ dns_rdatatype_any, &isc_true); 21+ dns_rdatatype_any, &isc_true);
22 if (result == ISC_R_SUCCESS) { 22 if (result == ISC_R_SUCCESS) {
23 for (result = dns_rdataset_first(rdataset); 23 for (result = dns_rdataset_first(rdataset);
24 result == ISC_R_SUCCESS; 24 result == ISC_R_SUCCESS;
25@@ -4440,7 +4440,7 @@ prepare_lookup(dns_name_t *name) 25@@ -4721,7 +4721,7 @@ prepare_lookup(dns_name_t *name)
26  26
27 rdataset = NULL; 27 rdataset = NULL;
28 result = advanced_rrsearch(&rdataset, &ns.name, dns_rdatatype_a, 28 result = advanced_rrsearch(&rdataset, &ns.name, dns_rdatatype_a,
29- dns_rdatatype_any, &true); 29- dns_rdatatype_any, &true);
30+ dns_rdatatype_any, &isc_true); 30+ dns_rdatatype_any, &isc_true);
31 if (result == ISC_R_SUCCESS) { 31 if (result == ISC_R_SUCCESS) {
32 for (result = dns_rdataset_first(rdataset); 32 for (result = dns_rdataset_first(rdataset);
33 result == ISC_R_SUCCESS; 33 result == ISC_R_SUCCESS;
34@@ -4559,11 +4559,11 @@ isc_result_t 34@@ -4840,11 +4840,11 @@ isc_result_t
35 initialization(dns_name_t *name) 35 initialization(dns_name_t *name)
36 { 36 {
37 isc_result_t result; 37 isc_result_t result;
38- isc_boolean_t true = ISC_TRUE; 38- isc_boolean_t true = ISC_TRUE;
39+ isc_boolean_t isc_true = ISC_TRUE; 39+ isc_boolean_t isc_true = ISC_TRUE;
40  40
41 chase_nsrdataset = NULL; 41 chase_nsrdataset = NULL;
42 result = advanced_rrsearch(&chase_nsrdataset, name, dns_rdatatype_ns, 42 result = advanced_rrsearch(&chase_nsrdataset, name, dns_rdatatype_ns,
43- dns_rdatatype_any, &true); 43- dns_rdatatype_any, &true);
44+ dns_rdatatype_any, &isc_true); 44+ dns_rdatatype_any, &isc_true);
45 if (result != ISC_R_SUCCESS) { 45 if (result != ISC_R_SUCCESS) {
46 printf("\n;; NS RRset is missing to continue validation:" 46 printf("\n;; NS RRset is missing to continue validation:"
47 " FAILED\n\n"); 47 " FAILED\n\n");
48@@ -4911,7 +4911,7 @@ sigchase_td(dns_message_t *msg) 48@@ -5202,7 +5202,7 @@ sigchase_td(dns_message_t *msg)
49 isc_result_t result; 49 isc_result_t result;
50 dns_name_t *name = NULL; 50 dns_name_t *name = NULL;
51 isc_boolean_t have_answer = ISC_FALSE; 51 isc_boolean_t have_answer = ISC_FALSE;
52- isc_boolean_t true = ISC_TRUE; 52- isc_boolean_t true = ISC_TRUE;
53+ isc_boolean_t isc_true = ISC_TRUE; 53+ isc_boolean_t isc_true = ISC_TRUE;
54  54
55 if ((result = dns_message_firstname(msg, DNS_SECTION_ANSWER)) 55 if (msg->rcode != dns_rcode_noerror &&
56 == ISC_R_SUCCESS) { 56 msg->rcode != dns_rcode_nxdomain) {
57@@ -4920,7 +4920,7 @@ sigchase_td(dns_message_t *msg) 57@@ -5225,7 +5225,7 @@ sigchase_td(dns_message_t *msg)
58 initialization(name); 58 initialization(name);
59 return; 59 return;
60 } 60 }
61- have_answer = true; 61- have_answer = true;
62+ have_answer = isc_true; 62+ have_answer = isc_true;
63 } else { 63 } else {
64 if (!current_lookup->trace_root_sigchase) { 64 if (!current_lookup->trace_root_sigchase) {
65 result = dns_message_firstname(msg, 65 result = dns_message_firstname(msg,
66@@ -5038,7 +5038,7 @@ sigchase_td(dns_message_t *msg) 66@@ -5346,7 +5346,7 @@ sigchase_td(dns_message_t *msg)
67 dns_rdatatype_rrsig, 67 dns_rdatatype_rrsig,
68 current_lookup 68 current_lookup
69 ->rdtype_sigchase, 69 ->rdtype_sigchase,
70- &true); 70- &true);
71+ &isc_true); 71+ &isc_true);
72 if (result == ISC_R_FAILURE) { 72 if (result == ISC_R_FAILURE) {
73 printf("\n;; RRset is missing to continue" 73 printf("\n;; RRset is missing to continue"
74 " validation SHOULD NOT APPEND:" 74 " validation SHOULD NOT APPEND:"
75@@ -5051,7 +5051,7 @@ sigchase_td(dns_message_t *msg) 75@@ -5359,7 +5359,7 @@ sigchase_td(dns_message_t *msg)
76 &chase_authority_name, 76 &chase_authority_name,
77 dns_rdatatype_rrsig, 77 dns_rdatatype_rrsig,
78 dns_rdatatype_any, 78 dns_rdatatype_any,
79- &true); 79- &true);
80+ &isc_true); 80+ &isc_true);
81 if (result == ISC_R_FAILURE) { 81 if (result == ISC_R_FAILURE) {
82 printf("\n;; RRSIG is missing to continue" 82 printf("\n;; RRSIG is missing to continue"
83 " validation SHOULD NOT APPEND:" 83 " validation SHOULD NOT APPEND:"
84@@ -5127,7 +5127,7 @@ sigchase_td(dns_message_t *msg) 84@@ -5435,7 +5435,7 @@ sigchase_td(dns_message_t *msg)
85 &chase_authority_name, 85 &chase_authority_name,
86 dns_rdatatype_rrsig, 86 dns_rdatatype_rrsig,
87 dns_rdatatype_ds, 87 dns_rdatatype_ds,
88- &true); 88- &true);
89+ &isc_true); 89+ &isc_true);
90 if (result != ISC_R_SUCCESS) { 90 if (result != ISC_R_SUCCESS) {
91 printf("\n;; DSset is missing to continue validation:" 91 printf("\n;; DSset is missing to continue validation:"
92 " FAILED\n\n"); 92 " FAILED\n\n");
93@@ -5215,7 +5215,7 @@ sigchase_td(dns_message_t *msg) 93@@ -5523,7 +5523,7 @@ sigchase_td(dns_message_t *msg)
94 result = advanced_rrsearch(&chase_rdataset, &chase_name, 94 result = advanced_rrsearch(&chase_rdataset, &chase_name,
95 current_lookup->rdtype_sigchase, 95 current_lookup->rdtype_sigchase,
96 dns_rdatatype_any , 96 dns_rdatatype_any ,
97- &true); 97- &true);
98+ &isc_true); 98+ &isc_true);
99 if (result == ISC_R_FAILURE) { 99 if (result == ISC_R_FAILURE) {
100 printf("\n;; RRsig of RRset is missing to continue validation" 100 printf("\n;; RRsig of RRset is missing to continue validation"
101 " SHOULD NOT APPEND: FAILED\n\n"); 101 " SHOULD NOT APPEND: FAILED\n\n");
102@@ -5258,7 +5258,7 @@ getneededrr(dns_message_t *msg) 102@@ -5566,7 +5566,7 @@ getneededrr(dns_message_t *msg)
103 dns_name_t *name = NULL; 103 dns_name_t *name = NULL;
104 dns_rdata_t sigrdata = DNS_RDATA_INIT; 104 dns_rdata_t sigrdata = DNS_RDATA_INIT;
105 dns_rdata_sig_t siginfo; 105 dns_rdata_sig_t siginfo;
106- isc_boolean_t true = ISC_TRUE; 106- isc_boolean_t true = ISC_TRUE;
107+ isc_boolean_t isc_true = ISC_TRUE; 107+ isc_boolean_t isc_true = ISC_TRUE;
108  108
109 if ((result = dns_message_firstname(msg, DNS_SECTION_ANSWER)) 109 if ((result = dns_message_firstname(msg, DNS_SECTION_ANSWER))
110 != ISC_R_SUCCESS) { 110 != ISC_R_SUCCESS) {
111@@ -5274,7 +5274,7 @@ getneededrr(dns_message_t *msg) 111@@ -5582,7 +5582,7 @@ getneededrr(dns_message_t *msg)
112 if (chase_rdataset == NULL) { 112 if (chase_rdataset == NULL) {
113 result = advanced_rrsearch(&chase_rdataset, name, 113 result = advanced_rrsearch(&chase_rdataset, name,
114 dns_rdatatype_any, 114 dns_rdatatype_any,
115- dns_rdatatype_any, &true); 115- dns_rdatatype_any, &true);
116+ dns_rdatatype_any, &isc_true); 116+ dns_rdatatype_any, &isc_true);
117 if (result != ISC_R_SUCCESS) { 117 if (result != ISC_R_SUCCESS) {
118 printf("\n;; No Answers: Validation FAILED\n\n"); 118 printf("\n;; No Answers: Validation FAILED\n\n");
119 return (ISC_R_NOTFOUND); 119 return (ISC_R_NOTFOUND);
120@@ -5394,7 +5394,7 @@ getneededrr(dns_message_t *msg) 120@@ -5701,7 +5701,7 @@ getneededrr(dns_message_t *msg)
121 result = advanced_rrsearch(&chase_sigdsrdataset, 121 result = advanced_rrsearch(&chase_sigdsrdataset,
122 &chase_signame, 122 &chase_signame,
123 dns_rdatatype_rrsig, 123 dns_rdatatype_rrsig,
124- dns_rdatatype_ds, &true); 124- dns_rdatatype_ds, &true);
125+ dns_rdatatype_ds, &isc_true); 125+ dns_rdatatype_ds, &isc_true);
126 if (result == ISC_R_FAILURE) { 126 if (result == ISC_R_FAILURE) {
127 printf(";; WARNING : NO RRSIG DS : RRSIG DS" 127 printf(";; WARNING : NO RRSIG DS : RRSIG DS"
128 " should come with DS\n"); 128 " should come with DS\n");

cvs diff -r1.2 -r1.3 pkgsrc/net/bind910/patches/Attic/patch-configure (expand / switch to unified diff)

--- pkgsrc/net/bind910/patches/Attic/patch-configure 2014/10/14 16:23:19 1.2
+++ pkgsrc/net/bind910/patches/Attic/patch-configure 2015/02/26 10:15:02 1.3
@@ -1,44 +1,44 @@ @@ -1,44 +1,44 @@
1$NetBSD: patch-configure,v 1.2 2014/10/14 16:23:19 taca Exp $ 1$NetBSD: patch-configure,v 1.3 2015/02/26 10:15:02 taca Exp $
2 2
3* Add DragonFly support. 3* Add DragonFly support.
4* Link proper postgresql library. 4* Link proper postgresql library.
5* Avoid using "==" for argument of test(1). 5* Avoid using "==" for argument of test(1).
6 6
7--- configure.orig 2014-09-16 19:27:15.000000000 +0000 7--- configure.orig 2015-02-18 01:55:55.000000000 +0000
8+++ configure 8+++ configure
9@@ -11827,7 +11827,7 @@ fi 9@@ -11840,7 +11840,7 @@ fi
10 test -n "$PYTHON" && break 10 test -n "$PYTHON" && break
11 done 11 done
12  12
13- if test "X$PYTHON" == "X"; then 13- if test "X$PYTHON" == "X"; then
14+ if test "X$PYTHON" = "X"; then 14+ if test "X$PYTHON" = "X"; then
15 continue; 15 continue;
16 fi 16 fi
17 { $as_echo "$as_me:${as_lineno-$LINENO}: checking python module 'argparse'" >&5 17 { $as_echo "$as_me:${as_lineno-$LINENO}: checking python module 'argparse'" >&5
18@@ -11842,7 +11842,7 @@ $as_echo "not found" >&6; } 18@@ -11855,7 +11855,7 @@ $as_echo "not found" >&6; }
19 unset ac_cv_path_PYTHON 19 unset ac_cv_path_PYTHON
20 unset PYTHON 20 unset PYTHON
21 done 21 done
22- if test "X$PYTHON" == "X" 22- if test "X$PYTHON" == "X"
23+ if test "X$PYTHON" = "X" 23+ if test "X$PYTHON" = "X"
24 then 24 then
25 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for python support" >&5 25 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for python support" >&5
26 $as_echo_n "checking for python support... " >&6; } 26 $as_echo_n "checking for python support... " >&6; }
27@@ -14352,6 +14352,8 @@ case $host in 27@@ -14379,6 +14379,8 @@ case $host in
28 use_threads=false ;; 28 use_threads=false ;;
29 *-freebsd*) 29 *-freebsd*)
30 use_threads=true ;; 30 use_threads=true ;;
31+*-dragonfly*) 31+*-dragonfly*)
32+ use_threads=false ;; 32+ use_threads=false ;;
33 *-bsdi[234]*) 33 *-bsdi[234]*)
34 # Thread signals do not work reliably on some versions of BSD/OS. 34 # Thread signals do not work reliably on some versions of BSD/OS.
35 use_threads=false ;; 35 use_threads=false ;;
36@@ -20865,7 +20867,7 @@ $as_echo "no" >&6; } 36@@ -21029,7 +21031,7 @@ $as_echo "no" >&6; }
37 fi 37 fi
38 if test -n "-L$use_dlz_postgres_lib -lpq" 38 if test -n "-L$use_dlz_postgres_lib -lpq"
39 then 39 then
40- DLZ_DRIVER_LIBS="$DLZ_DRIVER_LIBS -L$use_dlz_postgres_lib -lpq" 40- DLZ_DRIVER_LIBS="$DLZ_DRIVER_LIBS -L$use_dlz_postgres_lib -lpq"
41+ DLZ_DRIVER_LIBS="$DLZ_DRIVER_LIBS -L${PREFIX}/lib -lpq" 41+ DLZ_DRIVER_LIBS="$DLZ_DRIVER_LIBS -L${PREFIX}/lib -lpq"
42 fi 42 fi
43  43
44  44