Date: Fri, 5 Sep 2014 20:44:35 +0000 (UTC) From: Carlo Strub <cs@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r367388 - in head/security: . radamsa radamsa/files Message-ID: <201409052044.s85KiZG4027412@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: cs Date: Fri Sep 5 20:44:35 2014 New Revision: 367388 URL: http://svnweb.freebsd.org/changeset/ports/367388 QAT: https://qat.redports.org/buildarchive/r367388/ Log: Radamsa is a generic test case generator for robustness testing, aka a fuzzer. It can be used to test how well a program can stand malformed and potentially malicious inputs. It operates on given sample inputs and thus requires minimal effort to set up. WWW: https://www.ee.oulu.fi/research/ouspg/Radamsa PR: ports/187576 Submitted by: Jukka Ukkonen <jau@iki.fi> Added: head/security/radamsa/ head/security/radamsa/Makefile (contents, props changed) head/security/radamsa/distinfo (contents, props changed) head/security/radamsa/files/ head/security/radamsa/files/patch-Makefile (contents, props changed) head/security/radamsa/pkg-descr (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Fri Sep 5 20:43:09 2014 (r367387) +++ head/security/Makefile Fri Sep 5 20:44:35 2014 (r367388) @@ -826,6 +826,7 @@ SUBDIR += quantis SUBDIR += quantis-kmod SUBDIR += racoon2 + SUBDIR += radamsa SUBDIR += radiusniff SUBDIR += rainbowcrack SUBDIR += ranpwd Added: head/security/radamsa/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/radamsa/Makefile Fri Sep 5 20:44:35 2014 (r367388) @@ -0,0 +1,15 @@ +# Created by: Jukka Ukkonen <jau@iki.fi> +# $FreeBSD$ + +PORTNAME= radamsa +PORTVERSION= 0.3 +CATEGORIES= security +MASTER_SITES= https://ouspg.googlecode.com/files/ + +MAINTAINER= jau@iki.fi +COMMENT= General purpose fuzzer + +PLIST_FILES= bin/radamsa \ + man/man1/radamsa.1.gz + +.include <bsd.port.mk> Added: head/security/radamsa/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/radamsa/distinfo Fri Sep 5 20:44:35 2014 (r367388) @@ -0,0 +1,2 @@ +SHA256 (radamsa-0.3.tar.gz) = 17131a19fb28e5c97c28bf0b407a82744c251aa8aedfa507967a92438cd803be +SIZE (radamsa-0.3.tar.gz) = 116399 Added: head/security/radamsa/files/patch-Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/radamsa/files/patch-Makefile Fri Sep 5 20:44:35 2014 (r367388) @@ -0,0 +1,27 @@ +--- Makefile.orig 2014-03-14 15:53:14.654599833 +0200 ++++ Makefile 2014-03-14 15:56:03.358626694 +0200 +@@ -1,11 +1,11 @@ + DESTDIR= +-PREFIX=/usr ++PREFIX=/usr/local + BINDIR=/bin + CFLAGS=-Wall -O3 + OFLAGS=-O1 + W32GCC=i586-mingw32msvc-gcc # sudo apt-get install mingw32 @ debian squeeze + +-everything: bin/radamsa .seal-of-quality ++all everything: bin/radamsa .seal-of-quality + + bin/radamsa: radamsa.c + mkdir -p bin +@@ -21,8 +21,8 @@ + install: bin/radamsa + -mkdir -p $(DESTDIR)$(PREFIX)/bin + cp bin/radamsa $(DESTDIR)$(PREFIX)/bin +- -mkdir -p $(DESTDIR)$(PREFIX)/share/man/man1 +- cat doc/radamsa.1 | gzip -9 > $(DESTDIR)$(PREFIX)/share/man/man1/radamsa.1.gz ++ -mkdir -p $(DESTDIR)$(PREFIX)/man/man1 ++ cat doc/radamsa.1 | gzip -9 > $(DESTDIR)$(PREFIX)/man/man1/radamsa.1.gz + + clean: + -rm radamsa.c bin/* .seal-of-quality Added: head/security/radamsa/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/radamsa/pkg-descr Fri Sep 5 20:44:35 2014 (r367388) @@ -0,0 +1,6 @@ +Radamsa is a generic test case generator for robustness testing, aka a fuzzer. +It can be used to test how well a program can stand malformed and potentially +malicious inputs. It operates on given sample inputs and thus requires minimal +effort to set up. + +WWW: https://www.ee.oulu.fi/research/ouspg/Radamsa
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201409052044.s85KiZG4027412>