Port details |
- dump1090 Simple Mode S decoder for RTLSDR devices
- 20200718 comms
=0 20200718Version of this port present on the latest quarterly branch.- Maintainer: skreuzer@FreeBSD.org
 - Port Added: 2015-03-05 02:32:25
- Last Update: 2020-07-27 22:38:53
- SVN Revision: 543550
- License: BSD3CLAUSE
- Description:
- Dump 1090 is a Mode S decoder specifically designed for RTLSDR devices.
The main features are:
* Robust decoding of weak messages.
* Network support: TCP30003 stream (MSG5...), Raw packets, HTTP.
* Embedded HTTP server that displays the currently detected aircrafts on
Google Map.
* Single bit errors correction using the 24 bit CRC.
* Ability to decode DF11, DF17 messages.
* Ability to decode DF formats like DF0, DF4, DF5, DF16, DF20 and DF21 where the
checksum is xored with the ICAO address by brute forcing the checksum field
using recently seen ICAO addresses.
* Decode raw IQ samples from file (using --ifile command line switch).
* Interactive command-line-interfae mode where aircrafts currently detected are
shown as a list refreshing as more data arrives.
* CPR coordinates decoding and track calculation from velocity.
* TCP server streaming and receiving raw data to/from connected clients.
WWW: https://github.com/antirez/dump1090
- SVNWeb : Homepage
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- dump1090>0:comms/dump1090
- To install the port:
cd /usr/ports/comms/dump1090/ && make install clean - To add the package:
pkg install dump1090 - PKGNAME: dump1090
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1595885702
SHA256 (antirez-dump1090-20200718-de61bd5_GH0.tar.gz) = 30fb3174d49464aaf7f3b559af39ee4094074329a7902dc8ff6a6d4b80c11a85
SIZE (antirez-dump1090-20200718-de61bd5_GH0.tar.gz) = 485418
Packages: (move your mouse over the cells for more information)
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- gmake>=4.3 : devel/gmake
- Library dependencies:
-
- librtlsdr.so : comms/rtl-sdr
- There are no ports dependent upon this port
- Configuration Options
- No options to configure
- USES:
- gmake
- Master Sites:
-
|
Number of commits found: 5
Commit History - (may be incomplete: see SVNWeb link above for full details) |
Date | By | Description |
27 Jul 2020 21:38:53
20200718

|
skreuzer  |
Update to version 20200718
PR: 248060
Submitted by: Daniel Tihanyi <daniel.tihanyi@tetragir.com> |
24 Feb 2019 19:12:54
20150225_1

|
martymac  |
comms/rtl-sdr: Switch to upstream versioning scheme and update to 0.6.0
Also:
- Switch to Github mirror
- Bump dependent ports' PORTREVISIONs |
01 Apr 2016 13:29:17
20150225

|
mat  |
Remove ${PORTSDIR}/ from dependencies, Mk and categories a, b, and c.
With hat: portmgr
Sponsored by: Absolight |
06 May 2015 15:16:54
20150225

|
mat  |
Update ports in the [bcd]* categories to not use GH_COMMIT.
With minor cleanups to make things simpler.
With hat: portmgr
Sponsored by: Absolight |
05 Mar 2015 02:32:09
20150225

|
skreuzer  |
Dump 1090 is a Mode S decoder specifically designed for RTLSDR devices.
The main features are:
* Robust decoding of weak messages.
* Network support: TCP30003 stream (MSG5...), Raw packets, HTTP.
* Embedded HTTP server that displays the currently detected aircrafts on
Google Map.
* Single bit errors correction using the 24 bit CRC.
* Ability to decode DF11, DF17 messages.
* Ability to decode DF formats like DF0, DF4, DF5, DF16, DF20 and DF21 where the
checksum is xored with the ICAO address by brute forcing the checksum field
using recently seen ICAO addresses.
* Decode raw IQ samples from file (using --ifile command line switch).
* Interactive command-line-interfae mode where aircrafts currently detected are
shown as a list refreshing as more data arrives.
* CPR coordinates decoding and track calculation from velocity.
* TCP server streaming and receiving raw data to/from connected clients.
WWW: https://github.com/antirez/dump1090 |
Number of commits found: 5
|
Latest Vulnerabilities |
13 vulnerabilities affecting 98 ports have been reported in the past 14 days
|
* - modified, not new All vulnerabilities
Last updated: 2021-02-27 01:52:12
|
|