Tue Jul 7 08:48:25 2020 UTC ()
Add patch to avoid declaring variables in a for statement which reduces
compiler compatibility for no benefit
(sborrill)
diff -r1.14 -r1.15 pkgsrc/net/arping/distinfo
diff -r0 -r1.1 pkgsrc/net/arping/patches/patch-arping.c
--- pkgsrc/net/arping/distinfo 2020/04/10 21:25:03 1.14
+++ pkgsrc/net/arping/distinfo 2020/07/07 08:48:25 1.15
| @@ -1,6 +1,7 @@ | | | @@ -1,6 +1,7 @@ |
1 | $NetBSD: distinfo,v 1.14 2020/04/10 21:25:03 schwarz Exp $ | | 1 | $NetBSD: distinfo,v 1.15 2020/07/07 08:48:25 sborrill Exp $ |
2 | | | 2 | |
3 | SHA1 (arping-2.21.tar.gz) = 2e3477883110f3c0456af78d13fab3c029f93974 | | 3 | SHA1 (arping-2.21.tar.gz) = 2e3477883110f3c0456af78d13fab3c029f93974 |
4 | RMD160 (arping-2.21.tar.gz) = 13e645ccb52add237458862fb59ee4ccd581a57a | | 4 | RMD160 (arping-2.21.tar.gz) = 13e645ccb52add237458862fb59ee4ccd581a57a |
5 | SHA512 (arping-2.21.tar.gz) = 0413e87aa9f0664c3e9485c1d8c2fbd2adb322bfc871f9bddf84f458433d7c8c7587ac4b24cff36caff7b966cd9b71a7d8a54ac951723b322a475ac68cf45d47 | | 5 | SHA512 (arping-2.21.tar.gz) = 0413e87aa9f0664c3e9485c1d8c2fbd2adb322bfc871f9bddf84f458433d7c8c7587ac4b24cff36caff7b966cd9b71a7d8a54ac951723b322a475ac68cf45d47 |
6 | Size (arping-2.21.tar.gz) = 181039 bytes | | 6 | Size (arping-2.21.tar.gz) = 181039 bytes |
| | | 7 | SHA1 (patch-arping.c) = 66de32d83a15c704ef4bc273cfc849fdb10bf0f6 |
$NetBSD: patch-arping.c,v 1.1 2020/07/07 08:48:25 sborrill Exp $
Don't declare variables in a for statement.
--- src/arping.c.orig 2020-07-07 09:38:15.158734218 +0100
+++ src/arping.c 2020-07-07 09:38:49.341138903 +0100
@@ -222,11 +222,12 @@
static ssize_t
xgetrandom(void *buf, const size_t buflen, const unsigned int flags)
{
+ int n;
#ifdef HAVE_GETRANDOM
return getrandom(buf, buflen, flags);
#else
char* p = buf;
- for (int n = 0; n < buflen; n++) {
+ for (n = 0; n < buflen; n++) {
p[n] = random() & 0xff;
}
return buflen;
@@ -236,7 +237,8 @@
static long int
xrandom() {
const int maxtry = 10;
- for (int c = 0; c < maxtry; c++) {
+ int c;
+ for (c = 0; c < maxtry; c++) {
long int ret;
const ssize_t rc = xgetrandom(&ret, sizeof(ret), 0);
if (rc == -1) {