Local pkgsrc changes are minimal: date change and checksum updates.
Upstream changes are ... many, please refer to
http://pcc.ludd.ltu.se/
for pointers to the buck tracker and list of resolves issues.
A small C program to modify PCAP files to forge them and use
them for test and so on. It allows you to change IP address,
Mac address, time of the capture, Mbit/second, Packets/second.
This collection of programs and modules, written in C, is
intended to support research and education concerning Low
Density Parity Check (LDPC) codes. (Note, however, that the
copyright notice no longer restricts use to these purposes).
These codes were invented by Robert Gallager in the early
1960's, and re-invented and shown to have very good
performance by David MacKay and myself in the mid-1990's. The
decoding algorithm for LDPC codes is related to that used for
Turbo codes, and to probabilistic inference methods used in
other fields. Variations on LDPC and Turbo codes are
currently the best practical codes known, in terms of their
ability to transmit data at rates approaching channel capacity
with very low error probability.
* Gtk+ 3.x fixes.
Changes 0.25:
* Optionally build with Gtk+ 3.x in addition to Gtk+ 2.x.
Changes 0.24:
* GTK code is now fine with GSEAL. Minor fixes in the PulseAudio backend,
other fixes.
Changes 0.23:
* various minor fixes in the pulse and gstreamer backends as well in the Vala
API. Support for the recently standardized Vorbis 6.1/7.1 multichannel modes.
- Postfix no longer automatically appends the system default CA
(certificate authority) certificates, when it reads the CA
certificates specified with {smtp, lmtp, smtpd}_tls_CAfile or
with {smtp, lmtp, smtpd}_tls_CApath. This prevents third-party
certificates from getting mail relay permission with the
permit_tls_all_clientcerts feature. Unfortunately, this change
may cause compatibility problems with configurations that rely
on certificate verification for other purposes. To get the old
behavior, specify "tls_append_default_CA = yes".
- A prior fix for compatibility with Postfix < 2.3 was incomplete.
When pipe-to-command delivery fails with a signal, mail is now
correctly deferred, instead of being returned to sender.
- Poor smtpd_proxy_filter TCP performance over loopback (127.0.0.1)
connections was fixed by adapting the output buffer size to the MTU.
- The SMTP server no longer applies the reject_rhsbl_helo feature
to non-domain forms such as network addresses. This would cause
false positives with dbl.spamhaus.org.
- The Postfix SMTP server failed to deliver a "421" response and
hang up the connection after Milter error. Instead, the server
delivered a "503 Access denied" response and left the connection
open, due to some Postfix 1.1 workaround for RFC 2821.
- The milter_header_checks parser failed to enable any of the actions
that have no effect on message delivery (warn, replace, prepend,
ignore, dunno, and ok).
natively (that is, only to byte-code).
This consists of two parts:
a) a patch to ocamldoc/Makefile to make it create the man pages using
the interpreted ocamldoc - this exists for both types of architectures,
so is safe. (This will be sent up-stream).
b) move a common shared library file to the common PLIST, and a lot of
files (natively compiled versions of the ML modules and natively compiled
versions of a few binaries) to PLIST.opt.
This has been build-tested on i386 (cross-compiled from amd64) and on
arm. unison builds and works.
"make test" shows the same amount of passed and failed tests (mostly
non-found libraries) as before; but this needs more investigation.
An additional issue to solve (with upstream) is that there's no easy way
to run the part of the test suite that would work on byte-code-only
architectures.
* Allow the empty domain "." in dhcp domain-search (119) options.
* Fix corruption of the domain when a name from /etc/hosts
overrides one supplied by a DHCP client.
* Fix regression which caused configuration like
--address=/.domain.com/1.2.3.4 to be rejected.
* Many new options added and improved.
* syntax in 50-ypbind hook has been fixed
* man page corrections
* Compile correctly on Debian kFreeBSD
* invoke-rc.d now detected by configure correctly
* report hwaddr used by dhcpcd when debug is enabled
* Fix detecting inet address for INFORM support
* document reason RELEASE in dhcpcd-run-hooks
* Support RTM_CHGADDR in the upcoming NetBSD-6
This is used to work out if the hwaddr has changed as the interface
does not go down/up unlike other OSes
* ntp hook no longer attempts to restart ntpd if 1st attempt failed
private mail.
MediaTomb 0.12.1 is a minor bugfix release which fixes:
- YouTube support
- a problem in the soap response http header
- automatic id3lib detection when taglib is not available
The following patches are no longer needed as they have been integrated
upstream:
patches/patch-aa
patches/patch-ab
patches/patch-ac
patches/patch-ad
patches/patch-ae
patches/patch-ah
patches/patch-ai
patches/patch-aj
LibTomCrypt is a fairly comprehensive, modular and portable
cryptographic toolkit that provides developers with a vast array of
well known published block ciphers, one-way hash functions, chaining
modes, pseudo-random number generators, public key cryptography and a
plethora of other routines. LibTomCrypt has been designed from the
ground up to be very simple to use. It has a modular and standard API
that allows new ciphers, hashes and PRNGs to be added or removed
without change to the overall end application. It features easy to
use functions and a complete user manual which has many source snippet
examples.
* Block Ciphers
* Blowfish
* XTEA
* RC5
* RC6
* SAFER+
* Rijndael (aka AES)
* Twofish
* SAFER (K64, SK64, K128, SK128)
* RC2
* DES, 3DES
* CAST5
* Noekeon
* Skipjack
* Anubis (with optional tweak as proposed by the developers)
* Khazad
* KASUMI
* SEED
* Chaining Modes
* ECB
* CBC
* OFB
* CFB
* CTR
* IEEE LRW mode
* F8 Chaining Mode
* One-Way Hash Functions
* MD2
* MD4
* MD5
* SHA-1
* SHA-224/256/384/512
* TIGER-192
* RIPE-MD 128/160/256/320
* WHIRLPOOL
* Message Authentication
* FIPS-198 HMAC (supports all hashes)
* CMAC, also known as OMAC1 (supports all ciphers)
* PMAC Authentication
* F9-MAC
* Pelican MAC
* Message Encrypt+Authenticate Modes
* EAX Mode
* OCB Mode
* CCM Mode (NIST spec)
* GCM Mode (IEEE spec)
* Pseudo-Random Number Generators
* Yarrow (based algorithm)
* RC4
* Support for /dev/random, /dev/urandom and the Win32 CSP RNG
* Fortuna
* SOBER-128
* Public Key Algorithms
* RSA (using PKCS #1 v1.5 and v2.1)
* ECC (EC-DSA X9.62 signatures, X9.63 EC-DH)
o With fast Fixed Point ECC support as well
o X9.63 import/export of public keys
* DSA (Users make their own groups)
* The math routines are pluggable which means you can use your own
math provider if you want.
* Other standards
* PKCS #1 (v1.5 and v2.1 padding)
* PKCS #5
* ASN.1 DER