pkgsrc/mbone/rtptools/distinfo
mef 6f6c5ea870 Update 1.18 to 1.20
1.20 (October 2013)
    Nick Birch (Nick.Birch@s-and-t.com): rtpsend -l (loop) flag does
    not work. Modified to rewind input file on feof if loop was
    set. Fails if length of line is greater than 2048
    characters. Increased to 4096 (sufficient for typical

    rtpdump: Put space after ext_data=<hex extension data> so that it
    can be parsed by rtpsend. parse_header doesn't comprehend the
    possible extension header. As a consequence any extension header
    data is also dumped twice. Once in the ext_data report and then a
    second time in the data report. Modify parse_header to return hlen
    that comprehends the extension header if present.

    The format for reporting contributing sources does not match the
    format accepted by rtpsend (i.e., reports "csrc[n] = xxxx" rather
    than "csrc[n]=0xxxxx"). Fixed. Note: the documentation is less
    than clear on the csrc syntax accepted by rtpsend.

1.19 (August 2010)
    Krzysztof Burghardt (krzysztof@burghardt.pl): "Wireshark
    implemented "rtpdump" file format in a bit different way, so
    cooperation beetwen those program is a bit problematic.
    Moreover rtptools compiled on i386 and amd64 have different size
    of file header (size of long in timeval is different)."
2014-12-10 05:28:27 +00:00

6 lines
301 B
Text

$NetBSD: distinfo,v 1.3 2014/12/10 05:28:27 mef Exp $
SHA1 (rtptools-1.20.tar.gz) = e3e7970634f8567097ae8dcd7143d2857594a5e1
RMD160 (rtptools-1.20.tar.gz) = c1299b874741a94ddefb5009f691790136630aa8
Size (rtptools-1.20.tar.gz) = 168950 bytes
SHA1 (patch-aa) = 152d118a104ba328789338db13fea3982efd441a