From patchwork Sun Aug 25 19:11:05 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 8052 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4WsNhG5XjXz3wwl for ; Sun, 25 Aug 2024 19:11:26 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "E5" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4WsNh84Rm0z4W4; Sun, 25 Aug 2024 19:11:20 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4WsNh82Cwcz345Q; Sun, 25 Aug 2024 19:11:20 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4WsNh51kPlz33Cv for ; Sun, 25 Aug 2024 19:11:17 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4WsNh45dkDz4Xp; Sun, 25 Aug 2024 19:11:16 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1724613076; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=nFsVNNwjWQ2rBo8NWarL5GzFJ2L6eZlAv/l5PlhGin8=; b=i6LBaCZy6Yz9f73U6NoB7lmR0OLHpP5Jcr7TgTGPG1z88F8mJsC7BURV81AsjVRkSQkyEp GCmTvApP9C0cprAw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1724613076; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=nFsVNNwjWQ2rBo8NWarL5GzFJ2L6eZlAv/l5PlhGin8=; b=SvlCh9m7BzeacipdZk2mhuOwne1zrDt8srtmMV5XukgHKzPVz6qqiWELf1qUOqF4vwQZJe 5GiytluSOJeNcr4lvYbFJzcVLIdQ2xDE56Bb5+engx4FnHknEpVp5adZzU9+ZkZv6cLHPZ pHFsgoIomMBi3RHTGZcvO2tkjapkk2AmZjTwGLo1wNhnK9dMzWrYC6VkZBvyfKem8ebiYk Jfm3H2J31lKeeTOLddmyCMCm7qoGD3G4Ogy5XCGIWPlrh2UfzCQgEhcKWWl1g2Q3QLKxuP I5dsanm9Jh2lF3GGupglGe+Hrw/gFYAhhBNaemqlUiqfRHEkL5E5suMY5Dv9Kg== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] gdbm: Update to version 1.24 Date: Sun, 25 Aug 2024 21:11:05 +0200 Message-ID: <20240825191109.1965960-3-adolf.belka@ipfire.org> In-Reply-To: <20240825191109.1965960-1-adolf.belka@ipfire.org> References: <20240825191109.1965960-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Message-ID-Hash: LVD7B753WGCWXRSXPYOOAFBR32CF3AOW X-Message-ID-Hash: LVD7B753WGCWXRSXPYOOAFBR32CF3AOW X-MailFrom: adolf.belka@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: - Update from version 1.23 to 1.24 - Update of rootfile not required - Changelog 1.24 * New gdbm_load option: --update The --update (-U) option instructs gdbm_load to update an existing database. * Fix semantics of gdbm_load -r The --replace (-r) is valid only when used together with --update. * Use getline in gdbmtool shell. * New function: gdbm_load_from_file_ext In contrast to gdbm_load and gdbm_load_from_file, which derive the value of the flag parameter for gdbm_open from the value of their "replace" argument, this function allows the caller to specify it explicitly. The prototype is: int gdbm_load_from_file_ext (GDBM_FILE *pdbf, FILE *fp, int flags, int replace, int meta_mask, unsigned long *line); * Bugfixes ** Fix binary dump format for key and/or data of zero size. (see https://puszcza.gnu.org.ua/bugs/?565) ** Fix location tracking and recover command in gdbtool. (see https://puszcza.gnu.org.ua/bugs/?566) ** Fix possible buffer underflow in gdbmload. ** Ensure any padding bytes in avail_elem structure are filled with 0. (fixes https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031276) ** Improve the documentation. Signed-off-by: Adolf Belka --- lfs/gdbm | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lfs/gdbm b/lfs/gdbm index caa0bdefe..c601718b1 100644 --- a/lfs/gdbm +++ b/lfs/gdbm @@ -1,7 +1,7 @@ ############################################################################### # # # IPFire.org - A linux based firewall # -# Copyright (C) 2007-2018 IPFire Team # +# Copyright (C) 2007-2024 IPFire Team # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # @@ -24,7 +24,7 @@ include Config -VER = 1.23 +VER = 1.24 THISAPP = gdbm-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = a47746577cf2f3c9b62faea496c4d6a50a8f1b0a5af448cb2215e90057c99b5b630ba3f5357c85dfb7fd98ba4e90969e30a779120c29106ed1e8736721f9bec1 +$(DL_FILE)_BLAKE2 = 79f49adbb455c2e1b91f3450037b71165fa8de82650d6402e0e22ee1f4d278fdb0bd78100659bf416e2409b432e1f8d32ecbae523980413f7148b80ee06c9f4b install : $(TARGET)