notbugIf you buy from Amazon USA, please support us by using this link.
Port details
radamsa General purpose fuzzer
0.5 security on this many watch lists=0 search for ports that depend on this port Find issues related to this port Report an issue related to this port
Maintainer: jau@iki.fi search for ports maintained by this maintainer
Port Added: 2014-09-05 20:44:47
Last Update: 2017-11-12 20:40:44
SVN Revision: 454079
License: MIT
Radamsa is a generic test case generator for robustness testing, aka a fuzzer.
It can be used to test how well a program can stand malformed and potentially
malicious inputs. It operates on given sample inputs and thus requires minimal
effort to set up.

WWW: https://www.ee.oulu.fi/research/ouspg/Radamsa
SVNWeb : Homepage
    Pseudo-pkg-plist information, but much better, from make generate-plist
    Expand this list (5 items)
  1. bin/radamsa
  2. man/man1/radamsa.1.gz
  3. /usr/local/share/licenses/radamsa-0.5/catalog.mk
  4. /usr/local/share/licenses/radamsa-0.5/LICENSE
  5. /usr/local/share/licenses/radamsa-0.5/MIT
  6. Collapse this list.
Dependency lines:
  • radamsa>0:security/radamsa

To install the port: cd /usr/ports/security/radamsa/ && make install clean
To add the package: pkg install radamsa

PKGNAME: radamsa

There is no flavor information for this port.

distinfo:

TIMESTAMP = 1510505781
SHA256 (aoh-radamsa-v0.5_GH0.tar.gz) = 75a9df441ffe3eb177d1a9420b61a32ec9225179036115aef4ec77a17dc783fe
SIZE (aoh-radamsa-v0.5_GH0.tar.gz) = 44857


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. ol : lang/owl-lisp
There are no ports dependent upon this port

Configuration Options
     No options to configure

Master Sites:
  1. https://codeload.github.com/aoh/radamsa/tar.gz/v0.5?dummy=/

Number of commits found: 5

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
12 Nov 2017 20:40:44
Original commit files touched by this commit  0.5
Revision:454079
rene search for other commits by this committer
security/radamsa: unbreak and update to version 0.5

- Add license information (MIT)
- Add dependency on lang/owl-lisp instead of letting the build
  phase fetch a copy from GitHub.

PR:		212825
Submitted by:	maintainer
MFH:		2017Q4 (+ r454076, r454078)
03 Mar 2017 16:00:20
Original commit files touched by this commit  0.3
Revision:435349
mat search for other commits by this committer
Mark the remaining ports depending on Google Code as DEPRECATED, with an
EXPIRATION_DATE at the end of April 2017.

In the past six months, about a third of the ports marked BROKEN because
they were hosted on Google Code have been fixed.  The remaining must not
be of use to anyone.

With hat:	portmgr
Sponsored by:	Absolight
14 Sep 2016 15:59:34
Original commit files touched by this commit  0.3
Revision:422140
mat search for other commits by this committer
GOOGLE_CODE has gone away.

- If a port has another upstream, remove GOOGLE_CODE
- If a port only has GOOGLE_CODE mark it BROKEN

Some ports have a local mirror configured but for security reasons, it
is not considered upstream.

Sponsored by:	Absolight
02 Aug 2016 18:29:25
Original commit files touched by this commit  0.3
Revision:419490
riggs search for other commits by this committer
Remove stochasting build-time tests

Detailed maintainer explanation:
Build time tests in the radamsa package are stochastic and
they experience sporadic failures. Simply remove them. They
are not necessary for radamsa to operate properly.

PR:		209792
Submitted by:	jau@iki.fi
Reviewed by:	riggs
05 Sep 2014 20:44:35
Original commit files touched by this commit  0.3
Revision:367388
cs search for other commits by this committer
Radamsa is a generic test case generator for robustness testing, aka a fuzzer.
It can be used to test how well a program can stand malformed and potentially
malicious inputs. It operates on given sample inputs and thus requires minimal
effort to set up.

WWW: https://www.ee.oulu.fi/research/ouspg/Radamsa

PR:		ports/187576
Submitted by:	Jukka Ukkonen <jau@iki.fi>

Number of commits found: 5

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
gnutlsApr 19
dovecotApr 18
libssh2Apr 18
giteaApr 17
mariadb101-serverApr 13
mariadb102-serverApr 13
mariadb103-serverApr 13
mariadb55-serverApr 13
mysql56-serverApr 13
mysql57-serverApr 13
mysql80-serverApr 13
percona55-serverApr 13
percona56-serverApr 13
percona57-serverApr 13
wgetApr 12

11 vulnerabilities affecting 132 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2019-04-19 15:43:25


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 36750
Broken 122
Deprecated 656
Ignore 343
Forbidden 3
Restricted 164
No CDROM 74
Vulnerable 36
Expired 512
Set to expire 631
Interactive 0
new 24 hours 26
new 48 hours27
new 7 days56
new fortnight76
new month145

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2019 Dan Langille. All rights reserved.