http://www.microsoft.com/typography/fontpack/. The port is constructed
so that the actual fonts are downloaded from Sourceforge's site at
build time so this port does not 'redistribute' the fonts, it just
makes it easy to install them on an OpenBSD system.
ok pvalchev@
from MAINTAINER
- improved error handling
- use of Shell-Quote module for improved filename handling
- new feature for combined plot of line and file statistics
naddy@ OK
submitted by Jim Geovedi <jim@corebsd.or.id>
This module contains some functions which are useful for quoting strings
which are going to pass through the shell or a shell-like object.
naddy@ OK
submitted by Gerardo Santana Gomez Garrido <santana@openbsd.org.mx>
This module replaces the standard localtime and gmtime functions with
implementations that return objects. It does so in a backwards compatible
manner, so that using localtime/gmtime in the way documented in perlfunc
will still return what you expect.
naddy@ OK
Kill NEED_VERSION
Bump version number. This was patched to fix a bug dealing with -pthread
quite a while ago. The version should have been updated then but wasn't.
submitted by Claudio Jeker <cjeker@diehard.n-r-g.com>
This is Crypt::Rijndael, an XS-based implementation of the newly-selected
Advanced Encryption Standard algorithm Rijndael, designed by Joan Daemen
and Vincent Rijmen.
naddy@ OK
Submitted by Jim Geovedi <jim@corebsd.or.id>.
getxml is an XML internationalization tool; it is comprised of
getxml-extract (makes the header for the gettext tool) and
getxml-merge (merges XML and po files).
It provides an queued asynchronous callback-based mechanism for sending
and servicing SOAP requests, and a WSDL (Web Service Definition Language)
to C compiler which generates client stubs and server skeletons for easily
calling and implementing SOAP methods.
ok todd@
Embrace glib2 support, namely produce a subpackage that glib2 applications
can use to get mcop support.
(disabled with pseudo flavor no_glib if you're in a hurry)
--
This version fixes an URL CRLF Injection Vulnerability:
A CRLF injection vulnerability has been reported for Links that
may allow an attacker to include extra HTTP headers when viewing
web pages.
If Links is called from the command line, carriage return and line
feed (CRLF) characters may be included in the specified URL.
These characters are not escaped when the input is used to construct
a HTTP request.
URL: http://online.securityfocus.com/bid/5499/discussion/
espie@ brad@ ok