From owner-freebsd-ports-bugs@FreeBSD.ORG Sun Mar 16 12:20:01 2014 Return-Path: Delivered-To: freebsd-ports-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 97ED4EAA for ; Sun, 16 Mar 2014 12:20:01 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 6A9BD9B for ; Sun, 16 Mar 2014 12:20:01 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.8/8.14.8) with ESMTP id s2GCK0JB009584 for ; Sun, 16 Mar 2014 12:20:00 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.8/8.14.8/Submit) id s2GCK0x9009583; Sun, 16 Mar 2014 12:20:00 GMT (envelope-from gnats) Date: Sun, 16 Mar 2014 12:20:00 GMT Message-Id: <201403161220.s2GCK0x9009583@freefall.freebsd.org> To: freebsd-ports-bugs@FreeBSD.org Cc: From: Jukka Ukkonen Subject: Re: ports/187576: [new port] security/radamsa, Yet another general purpose fuzzer for FreeBSD X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list Reply-To: Jukka Ukkonen List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 16 Mar 2014 12:20:01 -0000 The following reply was made to PR ports/187576; it has been noted by GNATS. From: Jukka Ukkonen To: bug-followup@FreeBSD.org, jau@iki.fi Cc: Subject: Re: ports/187576: [new port] security/radamsa, Yet another general purpose fuzzer for FreeBSD Date: Sun, 16 Mar 2014 14:02:51 +0200 This is a multi-part message in MIME format. --------------070602000508000201050606 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Oops...! The master site path went awry. I was reading through radamsa pages when creating the port kit and managed to get from there to zzuf pages. Find a fixed shar attached. --jau --------------070602000508000201050606 Content-Type: text/plain; charset=UTF-8; name="radamsa.shar" Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="radamsa.shar" # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # radamsa/Makefile # radamsa/distinfo # radamsa/files # radamsa/pkg-descr # echo x - radamsa/Makefile sed 's/^X//' >radamsa/Makefile << 'f20206d22787ea2ed2447b1fa0402ea8' X# Created by: Jukka Ukkonen X# $FreeBSD: head/security/radamsa/Makefile 347629 2014-03-09 14:42:14Z jau $ X XPORTNAME= radamsa XPORTVERSION= 0.3 XCATEGORIES= security XMASTER_SITES= https://ouspg.googlecode.com/files/ X XMAINTAINER= jau@iki.fi XCOMMENT= A general purpose fuzzer X XPLIST_FILES= bin/radamsa \ X man/man1/radamsa.1.gz X X.include f20206d22787ea2ed2447b1fa0402ea8 echo x - radamsa/distinfo sed 's/^X//' >radamsa/distinfo << '3daef87ee7ce64d22c45f297d49b1986' XSHA256 (radamsa-0.3.tar.gz) = 17131a19fb28e5c97c28bf0b407a82744c251aa8aedfa507967a92438cd803be XSIZE (radamsa-0.3.tar.gz) = 116399 3daef87ee7ce64d22c45f297d49b1986 echo c - radamsa/files mkdir -p radamsa/files > /dev/null 2>&1 echo x - radamsa/pkg-descr sed 's/^X//' >radamsa/pkg-descr << 'd7b727fc80203c26c42e717296048e16' XRadamsa is a generic test case generator for robustness testing, aka a fuzzer. XIt can be used to test how well a program can stand malformed and potentially Xmalicious inputs. It operates on given sample inputs and thus requires minimal Xeffort to set up. d7b727fc80203c26c42e717296048e16 exit --------------070602000508000201050606--