Commit graph

14335 commits

Author SHA1 Message Date
jperkin
5e1ab46021 Fix the Solaris SMF method script. Bump PKGREVISION. 2016-01-27 13:48:01 +00:00
jklos
ea45a51224 distinfo was missing checksum for patch-zenmap_test_run__tests.py. 2016-01-26 10:31:39 +00:00
abs
2b6bc888cc Updated net/syncthing to 0.12.16
v0.12.16

    Don't require restart for usage reporting changes (#2704, @calmh)
    Restart on Debian package upgrade (@calmh)
    Avoid spurious scans with inotify package (#2151, @plouj)
2016-01-25 09:16:08 +00:00
adam
1ecffe5c7a Changes 2016.01.23:
[downloader/common] report_retry: Don't crash when retries is infinite
[cbsnews] Extract subtitles
[cbsnews] Simplify subtitles extraction and fix test
[arte:future] Fix extraction
[arte:future] Make duplicated test matching only
[arte:cinema] Add extractor
[nuevo] Generalize nuevo extractor and add support for trollvids
[nuevo] Simplify nuevo extractors
[ruleporn] Add new extractor
[nuevo] Improve thumbnail extraction
[ruleporn] Rework in terms of nuevo
[lovehomeporn] Add extractor
[SVTPlay] Add subtitle support
[svt] Improve subtitles extraction and add test
[options] Clarify language tags
[kanalplay] Use IETF language tag
[drtv] Use IETF language tag
2016-01-24 18:35:41 +00:00
tsutsui
d54e868572 Update mikutter to 3.3.4.
Also take maintainership.

Upstream changes:

* fill untranslated ja_KanSai locales
* avoid methods deprecated by Ruby 2.3
2016-01-24 16:29:23 +00:00
jperkin
ac56158090 Attempt to bring sanity to how ABI and MACHINE_ARCH are set.
Previously there were at least 5 different ways MACHINE_ARCH could be set,
some statically and some at run time, and in many cases these settings
differed, leading to issues at pkg_add time where there was conflict
between the setting encoded into the package and that used by pkg_install.

Instead, move to a single source of truth where the correct value based on
the host and the chosen (or default) ABI is determined in the bootstrap
script.  The value can still be overridden in mk.conf if necessary, e.g.
for cross-compiling.

ABI is now set by default and if unset a default is calculated based on
MACHINE_ARCH.  This fixes some OS, e.g. Linux, where the wrong default was
previously chosen.

As a result of the refactoring there is no need for LOWER_ARCH, with
references to it replaced by MACHINE_ARCH.  SPARC_TARGET_ARCH is also
removed.
2016-01-24 16:14:44 +00:00
richard
25d83bea3d update nmap options ndiff and zenmap and corresponding PLIST entries,
as well as getting the test facility to run.  okay'd pettai@
No PKGREVISION for now as default installation remains unchanged.
2016-01-24 13:46:49 +00:00
ryoon
cfb90f55c9 Use hardcoded py27 2016-01-24 04:03:23 +00:00
jperkin
950037d470 The previous update to the isc-dhcp packages replaced @PREFIX@ and
@PKG_SYSCONFDIR@ with hardcoded paths to /usr/pkg, possibly due to SUBST_STAGE
being set to post-patch.  Revert that change, move SUBST_STAGE to
pre-configure, and perform some minor cleanup while here.

Bump PKGREVISION of all packages, ignoring pkglint's error that this shouldn't
be done in Makefile.common.
2016-01-22 12:06:40 +00:00
leot
7401c27f05 Modify setup.py requirements in order to be less restrictive regarding version
dependencies.

Bump PKGREVISION.
2016-01-21 00:15:50 +00:00
roy
36f1041cb8 Adjust rc script to use correct pidfile. 2016-01-20 19:28:57 +00:00
roy
b6027050f8 Update to dhcpcd-6.10.1 with the following changes:
*  Add -P, --printpidfile to print the pidfile dhcpcd will use to
     stdout
  *  Fix a crash when a non active interface departs
  *  Add the -1, --oneshot option which causes dhcpcd to exit once an
     interface has been configured
  *  Fix delegation activating interfaces
2016-01-20 19:27:07 +00:00
taca
e4683ce323 Update bind99 to 9.9.8pl3 (BIND 9.9.8-P3).
Security Fixes

     * Specific APL data could trigger an INSIST. This flaw was discovered
       by Brian Mitchell and is disclosed in CVE-2015-8704. [RT #41396]
     * Named is potentially vulnerable to the OpenSSL vulnerabilty
       described in CVE-2015-3193.
     * Insufficient testing when parsing a message allowed records with an
       incorrect class to be be accepted, triggering a REQUIRE failure
       when those records were subsequently cached. This flaw is disclosed
       in CVE-2015-8000. [RT #40987]
     * Incorrect reference counting could result in an INSIST failure if a
       socket error occurred while performing a lookup. This flaw is
       disclosed in CVE-2015-8461. [RT#40945]

New Features

     * None

Feature Changes

     * Updated the compiled in addresses for H.ROOT-SERVERS.NET.

Bug Fixes

     * Authoritative servers that were marked as bogus (e.g. blackholed in
       configuration or with invalid addresses) were being queried anyway.
       [RT #41321]
2016-01-20 02:17:12 +00:00
taca
79bea7dcbe Update bind910 to 9.10.3pl3 (BIND 9.10.3-P3).
Security Fixes

     * Specific APL data could trigger an INSIST. This flaw was discovered
       by Brian Mitchell and is disclosed in CVE-2015-8704. [RT #41396]
     * Certain errors that could be encountered when printing out or
       logging an OPT record containing a CLIENT-SUBNET option could be
       mishandled, resulting in an assertion failure. This flaw was
       discovered by Brian Mitchell and is disclosed in CVE-2015-8705. [RT
       #41397]
     * Named is potentially vulnerable to the OpenSSL vulnerabilty
       described in CVE-2015-3193.
     * Insufficient testing when parsing a message allowed records with an
       incorrect class to be be accepted, triggering a REQUIRE failure
       when those records were subsequently cached. This flaw is disclosed
       in CVE-2015-8000. [RT #40987]
     * Incorrect reference counting could result in an INSIST failure if a
       socket error occurred while performing a lookup. This flaw is
       disclosed in CVE-2015-8461. [RT#40945]

New Features

     * None.

Feature Changes

     * Updated the compiled in addresses for H.ROOT-SERVERS.NET.

Bug Fixes

     * Authoritative servers that were marked as bogus (e.g. blackholed in
       configuration or with invalid addresses) were being queried anyway.
       [RT #41321]
2016-01-20 02:15:58 +00:00
wiz
e3a6d06c91 Update py-foolscap to 0.10.0:
* Release 0.10.0 (15-Jan-2015)

** Compatibility Fixes

This release is compatible with Twisted-15.3.0 through 15.5.0. A change in
15.3.0 triggered a bug in Foolscap which produced a somewhat-infinite series
of log messages when run under `twistd`. This release fixes that bug, and
slightly changes the semantics of calling `log.msg()` with additional
parameters. (#244)

Foolscap no longer claims compatibility with python-2.6.x . Twisted-15.5.0
was the last release to offer 2.6 support, and subsequent releases actively
throw errors when run against 2.6, so we've turned off Foolscap's automated
testing for 2.6. It may remain compatible by accident for a while. (#245)
2016-01-18 23:03:03 +00:00
fhajny
0c9abf09ee Revbump all Go packages after the go-1.5.3 security update (hint: static
linking).
2016-01-18 15:33:43 +00:00
abs
b216effbce Updated net/syncthing-gtk to 0.8.1
v0.8.1

Added localization support with translations for Czech, German and Slovak languages.

Fixes:

- Syncthing version of remote node not shown
- Missing definition causing UI problems and Appreport madness on Ubuntu (thanks @Newman101)

Other:

- Added --portable parameter to syncthing-gtk.exe on Windows.
- Updated syncthing-inotify version to 0.6.7
- Added support for download placeholders in Nautilus plugin


v0.8.0.0.1

Prelease for localization testing. May work. Probably.

Added localization support with translations for Czech, German and Slovak languages.

Fixes:

- Syncthing version of remote node not shown
- Missing definition causing UI problems and Appreport madness on Ubuntu (thanks @Newman101)


v0.8.0.1

Linux-only release. If you are on Windows, please, use v0.8

Fixes:

- Syncthing version of remote node not shown
- Missing definition causing UI problems, inotify bugs and Appreport madness on Ubuntu (thanks @Newman101)


v0.8

For Syncthing 0.12 and above

Additional fixes:

- No 'ignore' button on Unknown device message.
- Better support for non-ascii characters in user's home path on Windows


v0.7.6.2

Prerelease to test with Syncthing v0.12. Most likely working.


v0.7.6.1

Fixes:

- Typo in Windows installer description (thanks @DennisPS)
- Missing image definition causes crash with some GLib versions


v0.7.6

Fixes:

- window border disappearing (again) on Windows
- crash on too recent glib (#198)
- crash on too old glib (#201)
- inotify (filesystem watcher) not being aware of created directories
- Nautilus plugin ignoring some files until view is refreshed
2016-01-18 00:28:39 +00:00
abs
41229af56e Updated net/syncthing to 0.12.15
v0.12.15

- Handle race within the job queue (#1263, @AudriusButkevicius)
- Improve API/GUI shutdown handling (#2694, @calmh)
- Don't crash on folder remove while pulling (#2705, @calmh)

This release uses code signing on Mac OS X.


v0.12.14

This is a security update. The Windows builds are now done using Go 1.6beta2, otherwise this is identical to v0.12.13.


v0.12.13

This build is a security update.

- Add support for themes (#1925, @AudriusButkevicius)
- Don't leak sendIndexes on disconnect (#2589, @calmh)
- Always run relaying when enabled (#2665, @calmh)
- Update 'Edit' menu to 'Action' menu (#2662, @kluppy)


v0.12.12

- Update kardianos/osext (#2650, @calmh)
- Change default max conflicts to 10 (#2604, @calmh)
- Don't conflict copy conflict copies (#2605, @calmh)
- Don't allow in use CSRF tokens to expire (#1008, @calmh)
- Add relaying to main settings dialog (#2433, @calmh)
- Don't resolve destination address until we need to (#2671, @calmh)
- More fine grained locking in discovery cache (#2667, @calmh)
- Added STNODEFAULTFOLDER envvar to skip default folder creation on new install (#1515, @nrm21)


v0.12.11

- Remove windows specialisation from osutil.GetLans (#2192, @AudriusButkevicius)
- Ensure loaded config is free of duplicate devices (#2627, @calmh)
- Show device ID QR code from edit dialog (#1494, @ironmig)
- Don't warn about failed ignores if folder unhealthy (#2630, @AudriusButkevicius)
- Detect nonstandard hash algo and stop folder (#2314, @calmh)
- Also build linux-arm64, linux-ppc64, linux-ppc64le (@calmh)
- Disallow adding duplicate device ID in GUI (@ironmig)


v0.12.10

- Don't crash on stat error in ensureDir (#2608, @calmh)
- Correctly set default logfile location on Windows (#2608, @calmh)
- Consider tempfile when checking for free space (#2598, @andersonvom)
- Update kardianos/osext (#1272, @calmh)
- Remove fixed footer at first media break (#2454, @andersonvom)
- Update mtime of config file before upgrading (#2509, @andersonvom)
- Correct GUI asset dir handling (#2621, @calmh)


v0.12.9

- Example GUI override address (#2530, @calmh)
- Additional output on insufficient error (#2580, @Zillode)
- Add command line option to open GUI (#2210, @andersonvom)
- Always exit via error select, making sure reader routine is exits (#2547, @AudriusButkevicius)
- Don't verify free space for files when folder MinDiskFreePct==0 (#2600, @calmh)
- Edit device after accepting new connection (#1929, @andersonvom)


v0.12.8

- Correct type assertion in verbose logger, restart (#2561, @calmh)
- Remove Android hacks (#2505, @calmh)
- upnp: Use a separate error for the error unmarshalling (@wkennington)
2016-01-17 22:05:35 +00:00
joerg
2a1d5fa751 Add forgotten patch to remove one more INITARGS case. 2016-01-17 22:01:20 +00:00
joerg
10d25efae0 Avoid macro that no longer exists in modular Xorg. 2016-01-17 15:18:04 +00:00
adam
072a45d53a Changes 2016.01.15:
* fix signature and media url extraction
* Revert "[history] fix signature and media url extraction"
* extend _VALID_URL regex
* add support for episode pages
* Add support for fyi.tv, aetv.com and mylifetime.com
* Add shortcut
* Fix extraction
* Remove import
* Add extractor import
* Improve _VALID_URL
* Add new extractor
2016-01-17 10:10:33 +00:00
fhajny
2e26a430f8 Update net/erlang-p1_sip to 1.0.0
Change to use erlang/module.mk.
No upstream changes.
2016-01-16 18:46:30 +00:00
fhajny
295e866001 Update net/erlang-p1_stun to 0.9.0.
Change to use erlang/module.mk.
No upstream changes since last revision.
2016-01-16 18:42:25 +00:00
leot
5bdb3b5d13 Update net/scamper to 20141211d.
Patches provided by Matthew Luckie in PR pkg/50654.

ChangeLogs:
https://mailman.caida.org/pipermail/scamper-announce/2015-October/000004.html
https://mailman.caida.org/pipermail/scamper-announce/2015-December/000005.html
https://mailman.caida.org/pipermail/scamper-announce/2016-January/000006.html

tbit
* add support for initial congestion window (ICW) inferences
* add new tests to check response to packets that could have been
  sent by a blind attacker
* add a TCP fast-open implementation, with both experimental
  and official option values
* add support for testing HTTPS and BGP.  drop FTP, DNS, and SMTP
* add sc_tbitblind driver that was used for IMC 2015 paper

trace
* add tx timestamp to hop records
* add dl option, to replace dlts option removed from scamper.
* process UDP responses, if a UDP probe method is used.

ping:
* add tcp-syn ping method.
* fix memory leak when payloads are specified in ping.

sc_ipiddump
* report IPID values from traceroute measurements, where available
* report the source IP address used to probe the destination

sc_filterpolicy:
* add a new scamper driver to test systems for congruent filtering policy
  http://www.caida.org/tools/measurement/scamper/man/sc_filterpolicy.1.pdf

scamper:
* update scamper maximum PPS to 10,000 (from 1000).  Its not 2002 anymore.
* bind to requested source port with UDP sockets.
* set SO_SNDBUF once, when a probe socket is created.
* remove dlts option which was only used by traceroute.
* drop divert socket from privsep, which was not used in scamper anywhere.
* shift socket creation glue from scamper_privsep.c to
  scamper_udp4.c, scamper_icmp6.c, etc.
* fix memory leak when receiving TCP responses in tracelb.
* do not use the global address cache in tracelb: use a local one.
* in qsort with 3-way partition, do not compare items against
  themselves.
* improve performance of warts_addr_t code
* use calloc instead of malloc() -> memset(0) on systems where calloc
  is available.
* do not use the global address cache in ping: most responses are
  either from the destination, or from the same IP address, so
  optimize for that.
2016-01-16 16:13:15 +00:00
joerg
03bbf1a1be Output of rpcgen used without dependency. 2016-01-13 23:54:42 +00:00
taca
21b12112a5 Update isc-dhcp4 to 4.3.3-P1, security fix.
Changes since 4.3.3

! Update the bounds checking when receiving a packet.
  Thanks to Sebastian Poehn from Sophos for the bug report and a suggested
  patch.
  [ISC-Bugs #41267]
2016-01-13 04:43:00 +00:00
prlw1
b62f4d5515 Update Radicale to 1.1.1
1.1.1 - Second Law of Nature
============================

* Fix the owner_write rights rule


1.1 - Law of Nature
===================

One feature in this release is **not backward compatible**:

* Use the first matching section for rights (inspired from daald)

Now, the first section matching the path and current user in your custom rights
file is used. In the previous versions, the most permissive rights of all the
matching sections were applied. This new behaviour gives a simple way to make
specific rules at the top of the file independant from the generic ones.

Many **improvements in this release are related to security**, you should
upgrade Radicale as soon as possible:

* Improve the regex used for well-known URIs (by Unrud)
* Prevent regex injection in rights management (by Unrud)
* Prevent crafted HTTP request from calling arbitrary functions (by Unrud)
* Improve URI sanitation and conversion to filesystem path (by Unrud)
* Decouple the daemon from its parent environment (by Unrud)

Some bugs have been fixed and little enhancements have been added:

* Assign new items to corret key (by Unrud)
* Avoid race condition in PID file creation (by Unrud)
* Improve the docker version (by cdpb)
* Encode message and commiter for git commits
* Test with Python 3.5
2016-01-12 00:17:11 +00:00
taca
8986ae7b06 Update ruby-net-ldap to 0.13.0.
=== Net::LDAP 0.13.0

* Set a connect_timeout for the creation of a socket
  {#243}[https://github.com/ruby-ldap/ruby-net-ldap/pull/243]
* Update bundler before installing gems with bundler
  {#245}[https://github.com/ruby-ldap/ruby-net-ldap/pull/245]
* Net::LDAP#encryption accepts string
  {#239}[https://github.com/ruby-ldap/ruby-net-ldap/pull/239]
* Adds correct UTF-8 encoding to Net::BER::BerIdentifiedString
  {#242}[https://github.com/ruby-ldap/ruby-net-ldap/pull/242]
* Remove 2.3.0-preview since ruby-head already is included
  {#241}[https://github.com/ruby-ldap/ruby-net-ldap/pull/241]
* Drop support for ruby 1.9.3
  {#240}[https://github.com/ruby-ldap/ruby-net-ldap/pull/240]
* Fixed capitalization of StartTLSError
  {#234}[https://github.com/ruby-ldap/ruby-net-ldap/pull/234]
2016-01-11 16:08:51 +00:00
abs
be13c37050 +restclient-ui 2016-01-11 13:47:22 +00:00
abs
01d4847cc2 Added net/restclient-ui version 3.5
RESTClient is a Java application to test RESTful webservices. It
can be used to test variety of HTTP communications.
2016-01-11 13:47:01 +00:00
adam
f0fd3b7f39 Changes 1.9.20151212:
add commandline option to genconfig.sh to set UPnP (UDA) version
advertise correct service and device versions when IGDv2 is enabled
fix action arguments for DeviceProtection service
fix event subscription renewal (include SID in response)
2016-01-11 10:02:37 +00:00
adam
66e8b23ab6 Changes 2016.01.09:
* Automatically pickup full movie when rented
* Extract xHamster title fix
* Improve title extraction
* Fix upload date extraction
* Fix duration extraction
* Fix view count extraction
* Change title regex precedence
* Fix uploader extraction
* Update tests
2016-01-11 09:10:10 +00:00
ryoon
f5f00688ad Add py-google-cloud-sdk 2016-01-11 04:26:48 +00:00
ryoon
ed8e36271d Import py27-google-cloud-sdk-91.0.1 as net/py-google-cloud-sdk.
Google Cloud SDK contains tools and libraries that enable you to
easily create and manage resources on Google Cloud Platform,
including App Engine, Compute Engine, Cloud Storage, BigQuery,
Cloud SQL, and Cloud DNS.

This package contains bq, gcloud and gsutil commands.
2016-01-11 04:25:41 +00:00
markd
c182554838 Update kdenetwork-strigi-analyzers to 15.12.0
minor updates.
2016-01-10 19:21:48 +00:00
markd
ce9706f364 Update kget to 15.12.0
minor updates.
2016-01-10 19:20:48 +00:00
markd
42ddd80be3 Update kopete to 15.12.0
minor updates.
2016-01-10 19:20:07 +00:00
markd
67fea609dd Update kppp to 15.12.0
minor updates.
2016-01-10 19:19:30 +00:00
markd
a4e3498ab4 Update krdc to 15.12.0
minor updates.
2016-01-10 19:18:48 +00:00
markd
e48d4f9d49 library minor version update. Bump PKGREVISION. 2016-01-10 19:18:03 +00:00
szptvlfn
c6604daa03 Bump PKGREVISION for hs-text-1.2.2.0 || hs-hashable-1.2.3.3 2016-01-10 11:49:09 +00:00
richard
85cb541719 use of option noyywrap needs real flex not lex tool in openslp 2016-01-10 06:49:33 +00:00
tsutsui
6c3940c7ed Update mikutter to 3.3.3.
#mikutter 3.3.3

* update language po files
* fix of "crash on click of setting button" was missed

#mikutter 3.3.2

* Happy new year
* several crash issue
* crash on click of setting button on certain condition
* avoid use of lacacy methods deprecated by Ruby 2.3

#mikutter 3.3.1

* crash on UserStream process in some case
* crash on adding list

#mikutter 3.3.0

* use external libraries
 * Delayer-Deferred
 * Pluggaloid
* retweeted retweet
* liked retweet
* retweet with comments
* show icons for protected accounts
* add settings to show icons for verified accounts
* change method of counting a number of chars, to reflect URL conversion
* improvements of daemon mode
* notice function
* imrovements of support of some image services
2016-01-09 19:36:12 +00:00
tsutsui
470d15679f + ruby-pluggaloid 2016-01-09 19:02:24 +00:00
tsutsui
e1c2b4ae5f Import ruby-pluggaloid-1.0.2 as net/ruby-pluggaloid.
Pluggaloid is an extensible plugin system for mikutter
which allows registered plugins communicate each other via events.
2016-01-09 19:01:20 +00:00
tsutsui
6ed624062b + ruby-twitter-text 2016-01-09 18:56:19 +00:00
tsutsui
f0aac55f7f Import ruby-twitter-text-1.13.0 as net/ruby-twitter-text.
Twitter-text gem provides text processing routines for Twitter Tweets.
The major reason for this is to unify the various auto-linking and
extraction of usernames, lists, hashtags and URLs.
2016-01-09 18:55:29 +00:00
taca
6f2d9f4cd8 Update ntp4 to 4.2.8p5.
NTP 4.2.8p5

Focus: Security, Bug fixes, enhancements.

Severity: MEDIUM

In addition to bug fixes and enhancements, this release fixes the
following medium-severity vulnerability:

* Small-step/big-step.  Close the panic gate earlier.
    References: Sec 2956, CVE-2015-5300
    Affects: All ntp-4 releases up to, but not including 4.2.8p5, and
	4.3.0 up to, but not including 4.3.78
    CVSS3: (AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:L) Base Score: 4.0, MEDIUM
    Summary: If ntpd is always started with the -g option, which is
	common and against long-standing recommendation, and if at the
	moment ntpd is restarted an attacker can immediately respond to
	enough requests from enough sources trusted by the target, which
	is difficult and not common, there is a window of opportunity
	where the attacker can cause ntpd to set the time to an
	arbitrary value. Similarly, if an attacker is able to respond
	to enough requests from enough sources trusted by the target,
	the attacker can cause ntpd to abort and restart, at which
	point it can tell the target to set the time to an arbitrary
	value if and only if ntpd was re-started against long-standing
	recommendation with the -g flag, or if ntpd was not given the
	-g flag, the attacker can move the target system's time by at
	most 900 seconds' time per attack.
    Mitigation:
	Configure ntpd to get time from multiple sources.
	Upgrade to 4.2.8p5, or later, from the NTP Project Download
	    Page or the NTP Public Services Project Download Page
	As we've long documented, only use the -g option to ntpd in
	    cold-start situations.
	Monitor your ntpd instances.
    Credit: This weakness was discovered by Aanchal Malhotra,
	Isaac E. Cohen, and Sharon Goldberg at Boston University.

    NOTE WELL: The -g flag disables the limit check on the panic_gate
	in ntpd, which is 900 seconds by default. The bug identified by
	the researchers at Boston University is that the panic_gate
	check was only re-enabled after the first change to the system
	clock that was greater than 128 milliseconds, by default. The
	correct behavior is that the panic_gate check should be
	re-enabled after any initial time correction.

	If an attacker is able to inject consistent but erroneous time
	responses to your systems via the network or "over the air",
	perhaps by spoofing radio, cellphone, or navigation satellite
	transmissions, they are in a great position to affect your
	system's clock. There comes a point where your very best
	defenses include:

	    Configure ntpd to get time from multiple sources.
	    Monitor your ntpd instances.

Other fixes:

* Coverity submission process updated from Coverity 5 to Coverity 7.
  The NTP codebase has been undergoing regular Coverity scans on an
  ongoing basis since 2006.  As part of our recent upgrade from
  Coverity 5 to Coverity 7, Coverity identified 16 nits in some of
  the newly-written Unity test programs.  These were fixed.
* [Bug 2829] Clean up pipe_fds in ntpd.c  perlinger@ntp.org
* [Bug 2887] stratum -1 config results as showing value 99
  - fudge stratum should only accept values [0..16]. perlinger@ntp.org
* [Bug 2932] Update leapsecond file info in miscopt.html.  CWoodbury, HStenn.
* [Bug 2934] tests/ntpd/t-ntp_scanner.c has a magic constant wired in.  HMurray
* [Bug 2944] errno is not preserved properly in ntpdate after sendto call.
  - applied patch by Christos Zoulas.  perlinger@ntp.org
* [Bug 2952] Peer associations broken by fix for Bug 2901/CVE-2015-7704.
* [Bug 2954] Version 4.2.8p4 crashes on startup on some OSes.
  - fixed data race conditions in threaded DNS worker. perlinger@ntp.org
  - limit threading warm-up to linux; FreeBSD bombs on it. perlinger@ntp.org
* [Bug 2957] 'unsigned int' vs 'size_t' format clash. perlinger@ntp.org
  - accept key file only if there are no parsing errors
  - fixed size_t/u_int format clash
  - fixed wrong use of 'strlcpy'
* [Bug 2958] ntpq: fatal error messages need a final newline. Craig Leres.
* [Bug 2962] truncation of size_t/ptrdiff_t on 64bit targets. perlinger@ntp.org
  - fixed several other warnings (cast-alignment, missing const, missing prototypes)
  - promote use of 'size_t' for values that express a size
  - use ptr-to-const for read-only arguments
  - make sure SOCKET values are not truncated (win32-specific)
  - format string fixes
* [Bug 2965] Local clock didn't work since 4.2.8p4.  Martin Burnicki.
* [Bug 2967] ntpdate command suffers an assertion failure
  - fixed ntp_rfc2553.c to return proper address length. perlinger@ntp.org
* [Bug 2969]  Seg fault from ntpq/mrulist when looking at server with
              lots of clients. perlinger@ntp.org
* [Bug 2971] ntpq bails on ^C: select fails: Interrupted system call
  - changed stacked/nested handling of CTRL-C. perlinger@ntp.org
* Unity cleanup for FreeBSD-6.4.  Harlan Stenn.
* Unity test cleanup.  Harlan Stenn.
* Libevent autoconf pthread fixes for FreeBSD-10.  Harlan Stenn.
* Header cleanup in tests/sandbox/uglydate.c.  Harlan Stenn.
* Header cleanup in tests/libntp/sfptostr.c.  Harlan Stenn.
* Quiet a warning from clang.  Harlan Stenn.
2016-01-09 15:49:26 +00:00
fhajny
cadecc117b Add build dependency on net/rsync to fix installation on platforms
that do not have rsync.
2016-01-08 15:14:33 +00:00
roy
792163596d Regen distinfo for SHA512 2016-01-07 22:28:47 +00:00