- Update from 3.4.0 to 3.5.1
- Update rootfile
- Changelog
Libarchive 3.5.1 Released: Dec 26, 2020
Important bugfixes
various compilation fixes
fixed undefined behavior in a function in warc reader
Windows binary uses xz 5.2.5
Libarchive 3.5.0 Released: Dec 1, 2020
New features
mtree digest reader support
completed support for UTF-8 encoding conversion
minor API enhancements
support for system extended attributes
support for decompression of symbolic links in zipx archives
Important bugfixes
fixed extraction of archives with hard links pointing to itself
fixed writing of cpio archives containing hardlinks without file type
fixed rdev field in cpio format for device nodes
fixed uninitialized size in rar5_read_data
fixed memory leaks in error case of archive_write_open() functions
Libarchive 3.4.3 Released: May 20, 2020
New features
support for pzstd compressed files
support for RHT.security.selinux tar extended attribute
Important bugfixes
various zstd fixes and improvements child process
handling fixes
Libarchive 3.4.2 Released: Feb 11, 2020
New features
Atomic file extraction support (bsdtar -x --safe-writes)
mbed TLS (PolarSSL) support
Important bugfixes
security fixes in RAR5 reader
compression buffer fix in XAR writer
fix for uname and gname longer than 32 characters in PAX writer
fix segfault when archiving hard links in ISO9660 and XAR writers
fix support for extracting 7z archive entries with Delta filter
Libarchive 3.4.1 Released: Dec 30, 2019
New features
Unicode filename support for reading lha/lzh archives
New pax write option "xattrhdr"
Important bugfixes
security fixes in wide string processing
security fixes in RAR5 reader
security fixes and optimizations to write filter logic
security fix related to use of readlink(2)
sparse file handling fixes
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- lua library update had a sobump and therefore linked packages require
to have that updated
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- lua library update had a sobump and therefore linked packages require
to have that updated
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- v2 patch version has required libraries not commented
- v2 patch version has lua.pc file commented out in the rootfile
pkgconfig file is only required for build or development and not
for normal running of IPFire
- v2 patch version has make linux changed to make all
INSTALL_TOP is required - default is /usr/local
INSTALL_DATA is required - default results in an empty rootfile
TO_LIB is required - default results in only lua.a in rootfile
- v2 patch version includes PAK_VER updates for dnsdist and haproxy due to
sobump. These packages showed up as dependencies to the old lua library
ncat was also linked but already had a PAK_VER change due to a package
upgrade and so no longer showed up in the find-dependencies scan
- Update from 5.3.5 to 5.4.3
- Autotoolize patch not update since 5.3 series
Based on input from Michael Tremer implemented build approach
from BLFS. This approach also used by Arch Linux. Updated lfs in
line with approach. Added pkgconfig file lua.pc as used in BLFS.
- Update of shared_library patch obtained from BLFS
- Update of rootfile
- Removal of old lua-5.3.5 patches
- Changelog
Main changes
new generational mode for garbage collection
to-be-closed variables
const variables
userdata can have multiple user values
new implementation for math.random
warning system
debug information about function arguments and returns
new semantics for the integer 'for' loop
optional 'init' argument to 'string.gmatch'
new functions 'lua_resetthread' and 'coroutine.close'
string-to-number coercions moved to the string library
allocation function allowed to fail when shrinking a memory block
new format '%p' in 'string.format'
utf8 library accepts codepoints up to 2^31
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 1.14.5 to 1.14.6
- Update of rootfile
- Changelog
2021-04-19 Marcelo Roberto Jimenez <mroberto(at)users.sourceforge.net>
Fix for a DNS Rebind exploit. A special thanks for the collaboration
of the following people:
- Alaric Senat
- Fabrice Fontaine
- Gabriel Corona
- Ian Whyman
- Jean-Francois Dockes
- Marvin Scholz
- Werner Mahr
2021-04-06 Marcelo Roberto Jimenez <mroberto(at)users.sourceforge.net>
Fix for Github #250:
When upnp uses ixml to parse SOAP messages which contains too many
node, services are unavailable.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 4.1.0 to 4.3.0
- Update of rootfile
- Changelog is too large to include here
Full details can be found in ChangeLog file in source tarball
49 bug fixes implemented between 4.1.0 and 4.3.0
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 2.0.4 to 2.1.0
- Update rootfile
- Changelog is too large to include here
Full details can be found in ChangeLog.md file in source tarball
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- In previous patch libid3tag.pc file was left uncommented in the rootfile
The pkg-config files are only required during the build or for
development not for the normal operation of IPFire
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 3.35.4 to 3.35.5
- Update of rootfile not required
- Changelog
Fix defects in the new ALTER TABLE DROP COLUMN feature that could
corrupt the database file.
Fix an obscure query optimizer problem that might cause an incorrect
query result.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 4.13.7 to 4.14.3
Change to Samba 4.14 release series
4.13 is now in maintenance mode
4.14 is now the current stable release series
- Update of x86_64 rootfile
- Checked library changes with find-dependencies
No linked programs found
- Changelog
o Trever L. Adams <trever.adams@gmail.com>
* BUG 14671: s3:modules:vfs_virusfilter: Recent New_VFS changes break
vfs_virusfilter_openat.
o Andrew Bartlett <abartlet@samba.org>
* BUG 14586: build: Notice if flex is missing at configure time.
o Ralph Boehme <slow@samba.org>
* BUG 14672: Fix smbd panic when two clients open same file.
* BUG 14675: Fix memory leak in the RPC server.
* BUG 14679: s3: smbd: fix deferred renames.
o Samuel Cabrero <scabrero@samba.org>
* BUG 14675: s3-iremotewinspool: Set the per-request memory context.
o Volker Lendecke <vl@samba.org>
* BUG 14675: Fix memory leak in the RPC server.
o Stefan Metzmacher <metze@samba.org>
* BUG 11899: third_party: Update socket_wrapper to version 1.3.2.
* BUG 14640: third_party: Update socket_wrapper to version 1.3.3.
o David Mulder <dmulder@suse.com>
* BUG 14665: samba-gpupdate: Test that sysvol paths download in
case-insensitive way.
o Sachin Prabhu <sprabhu@redhat.com>
* BUG 14662: smbd: Ensure errno is preserved across fsp destructor.
o Christof Schmitt <cs@samba.org>
* BUG 14663: idmap_rfc2307 and idmap_nss return wrong mapping for uid/gid
conflict.
o Martin Schwenke <martin@meltin.net>
* BUG 14288: build: Only add -Wl,--as-needed when supported.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 3.9.10 (2007) to 4.0.27 (2021)
- Update of rootfile
- Changelog is too large to put here
Full details can be found in the changelog file in the debian
subdirectory of the source tarball
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 1.9.2 to 1.9.3
- Update of rootfile
- Changelog is too long to put here.
Full details can be found in the ChangeLog file in the source tarball
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 563 to 581
- Update of rootfile not required
- Changelog
Change ESC-u command to toggle, not disable, highlighting per man page.
Add ESC-U command.
Add ctrl-W search modifier for wrapping search.
F command can be interrupted by ^X.
Support OSC 8 hyperlinks when -R is in effect.
g command with no number will ignore -j and put first line at top of screen.
Multiple + or -p command line options are handled better.
Add the --incsearch option.
Add the --line-num-width option.
Add the --status-col-width option.
Add the --use-color and --color options.
Display -w highlight even if highlighted line is empty.
If search result is in a long line, scroll to ensure it is visible.
Editing the same file under different names now creates only one entry in the file list.
Make visual bell more visible on some terminals.
Ring end-of-file bell no more than once per second.
Build can use either Python or Perl for Makefile.aut operations.
Fix crash when using the @ search modifier.
Fix crash in the 's' command due to duplicate free.
Fix realpath crash on Darwin.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 8.5p1 to 8.6p1
- Update of rootfile not needed
- Changelog
Future deprecation notice
It is now possible[1] to perform chosen-prefix attacks against the
SHA-1 algorithm for less than USD$50K.
In the SSH protocol, the "ssh-rsa" signature scheme uses the SHA-1
hash algorithm in conjunction with the RSA public key algorithm.
OpenSSH will disable this signature scheme by default in the near
future.
Note that the deactivation of "ssh-rsa" signatures does not necessarily
require cessation of use for RSA keys. In the SSH protocol, keys may be
capable of signing using multiple algorithms. In particular, "ssh-rsa"
keys are capable of signing using "rsa-sha2-256" (RSA/SHA256),
"rsa-sha2-512" (RSA/SHA512) and "ssh-rsa" (RSA/SHA1). Only the last of
these is being turned off by default.
This algorithm is unfortunately still used widely despite the
existence of better alternatives, being the only remaining public key
signature algorithm specified by the original SSH RFCs that is still
enabled by default.
The better alternatives include:
* The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These
algorithms have the advantage of using the same key type as
"ssh-rsa" but use the safe SHA-2 hash algorithms. These have been
supported since OpenSSH 7.2 and are already used by default if the
client and server support them.
* The RFC8709 ssh-ed25519 signature algorithm. It has been supported
in OpenSSH since release 6.5.
* The RFC5656 ECDSA algorithms: ecdsa-sha2-nistp256/384/521. These
have been supported by OpenSSH since release 5.7.
To check whether a server is using the weak ssh-rsa public key
algorithm, for host authentication, try to connect to it after
removing the ssh-rsa algorithm from ssh(1)'s allowed list:
ssh -oHostKeyAlgorithms=-ssh-rsa user@host
If the host key verification fails and no other supported host key
types are available, the server software on that host should be
upgraded.
OpenSSH recently enabled the UpdateHostKeys option by default to assist
the client by automatically migrating to better algorithms.
[1] "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and
Application to the PGP Web of Trust" Leurent, G and Peyrin, T
(2020) https://eprint.iacr.org/2020/014.pdf
Security
* sshd(8): OpenSSH 8.5 introduced the LogVerbose keyword. When this
option was enabled with a set of patterns that activated logging
in code that runs in the low-privilege sandboxed sshd process, the
log messages were constructed in such a way that printf(3) format
strings could effectively be specified the low-privilege code.
An attacker who had sucessfully exploited the low-privilege
process could use this to escape OpenSSH's sandboxing and attack
the high-privilege process. Exploitation of this weakness is
highly unlikely in practice as the LogVerbose option is not
enabled by default and is typically only used for debugging. No
vulnerabilities in the low-privilege process are currently known
to exist.
Thanks to Ilja Van Sprundel for reporting this bug.
Changes since OpenSSH 8.5
This release contains mostly bug fixes.
New features
* sftp-server(8): add a new limits@openssh.com protocol extension
that allows a client to discover various server limits, including
maximum packet size and maximum read/write length.
* sftp(1): use the new limits@openssh.com extension (when available)
to select better transfer lengths in the client.
* sshd(8): Add ModuliFile keyword to sshd_config to specify the
location of the "moduli" file containing the groups for DH-GEX.
* unit tests: Add a TEST_SSH_ELAPSED_TIMES environment variable to
enable printing of the elapsed time in seconds of each test.
Bugfixes
* ssh_config(5), sshd_config(5): sync CASignatureAlgorithms lists in
manual pages with the current default. GHPR174
* ssh(1): ensure that pkcs11_del_provider() is called before exit.
GHPR234
* ssh(1), sshd(8): fix problems in string->argv conversion. Multiple
backslashes were not being dequoted correctly and quoted space in
the middle of a string was being incorrectly split. GHPR223
* ssh(1): return non-zero exit status when killed by signal; bz#3281
* sftp-server(8): increase maximum SSH2_FXP_READ to match the maximum
packet size. Also handle zero-length reads that are not explicitly
banned by the spec.
Portability
* sshd(8): don't mistakenly exit on transient read errors on the
network socket (e.g. EINTR, EAGAIN); bz3297
* Create a dedicated contrib/gnome-ssk-askpass3.c source instead of
building it from the same file as used for GNOME2. Use the GNOME3
gdk_seat_grab() to manage keyboard/mouse/server grabs for better
compatibility with Wayland.
* Fix portability build errors bz3293 bz3292 bz3291 bz3278
* sshd(8): soft-disallow the fstatat64 syscall in the Linux
seccomp-bpf sandbox. bz3276
* unit tests: enable autoopt and misc unit tests that were
previously skipped
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 7.80 to 7.91
- Update of rootfile
- Changelog is too long to include here
Full details can be found in the CHANGELOG file in the source tarball
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 7.80 to 7.91
- Update of rootfile
- Changelog is too long to include here
Full details can be found in the CHANGELOG file in the source tarball
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 3.10.1 to 3.10.3
- Update of rootfile
- Changelog
libfuse 3.10.3 (2021-04-12)
* Fix returning d_ino and d_type from readdir(3) in non-plus mode
libfuse 3.10.2 (2021-02-05)
* Allow "nonempty" as a mount option, for backwards compatibility with fusermount 2. The
option has no effect since mounting over non-empty directories is allowed by default.
* Fix returning inode numbers from readdir() in offset==0 mode.
* FUSE filesystems can now be mounted underneath EXFAT mountpoints.
* Various minor bugfixes.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 1.08 to 1.19
- Update of rootfile
- Changelog
1.19 Tue 2020-10-13
- Merge blead change: Remove . from @INC when loading optional modules.
1.18 Tue 2020-10-13
- Correct documentation for add_bits
- Explain $args,... in constructor prototypes
- Add base64_padded_digest method
- Add support for the SHA3 digests
- Update .gitignore and get make manifest working
- Github CI
- Move Digest to a more modern directory tree layout
- Enable strict/warnings for code and tests
- Drop use vars
- Provide a consistent tidy to the code base
- Get rid of the use of bareword file handles
- Modernize the changelog
- Use File::Temp for temporary test files
1.17 Sun 2011-10-02
- Less noisy 'git status' output - Gisle Aas
- Merge pull request #1 from schwern/bug/require_eval - Gisle Aas
- Don't clobber $@ in Digest->new [RT#50663] - Gisle Aas
- More meta info added to Makefile.PL - Gisle Aas
- Fix typo in RIPEMD160 [RT#50629] - Gisle Aas
- Add schwern's test files - Gisle Aas
- Turn on strict. - Michael G. Schwern
- Convert tests to use Test::More - Michael G. Schwern
- Untabify - Michael G. Schwern
- Turn Digest::Dummy into a real file which exercises the Digest->new() require logic. - Michael G. Schwern
- Close the eval "require $module" security hole in Digest->new($algorithm) - Michael G. Schwern
1.16 Tue 2009-06-09
- For SHA-1 try Digest::SHA before tryign Digest::SHA1 as suggested by Adam Trickett - Gisle Aas
- Support Digest->new("RIPEMD-160") as suggested by Zefram - Gisle Aas
- Use 3-arg open for fewer surprises - Gisle Aas
- Sync up with EBCDIC changes from core perl - Jarkko Hietaniemi
1.15 Mon 2006-03-20
- Improved documentation.
1.14 Sat 2005-11-26
- Documentation tweaks.
1.13 Tue 2005-10-18
- Fixed documentation typo.
1.12 Thu 2005-09-29
- Fix documentation typo. Patch by <steve@fisharerojo.org>.
1.11 Sun 2005-09-11
- Make Digest->new("SHA-224") work. Patch by Mark Shelor <shelor@cpan.org>.
1.10 Mon 2004-11-08
- Added Digest::file module which provide convenience functions that calculate digests of files.
1.09 Fri 2004-11-05
- Fix trivial documentation typo.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 7.75.0 to 7.76.1
- Update of rootfile
- Changelog is too large to include here.
Full details can be found in the CHANGES file in the source tarball
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 1.3 to 1.41
- Update of rootfile not needed
- Changelog
1.41 2021-02-01T15:56:00
- Adopt new repo structure. See
http://savage.net.au/Ron/html/My.Workflow.for.Building.Distros.html.
- Reformat Makefile.PL.
- Add t/00.*.
- Update POD to change RT to github.
1.40 2013-09-30T15:32:00
- No code changes.
- Maintenance by Ron Savage <rsavage@cpan.org>.
- Fabricate some version #s for this file.
- Made Passwd.pm utf-8 so we can use Luis' proper name.
- Clean up code formatting.
- Clean up Makefile.PL.
- Use fake (ASCII) ñ in Makefile.PL to keep Solaris happy. See RT#68478.
- Clean up README.
- Add Build.PL.
- Add Changes and Changelog.ini.
- Add META.*.
- Adopt Test::More in t/basic.t.
- Adopt 'use strict' and 'use warnings' to PasswdMD5.pm and t/basic.t.
- Accept patch for new function random_md5_salt(), and tests, from kbrint@rufus.net.
With thanx. See RT#37036.
- Add xt/author/pod.t.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Install Canary-Stability-2013
Required to build Convert-UUlib since version 1.5 (2015)
- Create rootfile
- Canary::Stability - canary to check perl compatibility for schmorp's
modules
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 1.06 to 1.8
- Update of rootfiles
- Changelog
1.8 Thu Dec 17 02:23:53 CET 2020
- no bugfixes in this release due to lack of known bugs, but the major changes
in this release might have introduced new bugs, so watch out.
- update large decoder example to disable OPT_AUTOCHK and use Smerge -1.
- some micro-optimisations.
- avoid costly string comparisons by comparing hashes when isnerting items,
which speeds up insertion by a constant factor.
- improve uulist (and other) structure layout and size.
- reverse the order of file list items, which heuristically improves
match speed with large usenet file lists.
- use getc instead of fgetc, which makes no difference on gnu/linux.
- clean up _FP symbol names toi not start with an underscore.
- use feof_unlocked and ferror_unlocked.
- implement a faster ascii-only strnicmp.
- misc very minor code improvements.
- remove quite a bit of pre-posix/dos/etc. cruft.
- use flockfile, if available, for a potential but small
speed gain.
- speed up inner yenc decoder loop.
- kentnl said that this module should no longer claim to be a simple
interface to uulib, as the bunndled copy is now better maintained
than the original upstream library.
1.71 Tue Mar 17 00:54:06 CET 2020
- backport to c89 (patch by Paul Howarth).
1.7 Sat Feb 29 22:07:54 CET 2020
- new function: GetFileList.
- experimental perlmulticore support (see manpage).
- Initialize is now a NOP and CleanUp automatically initializes again.
- updated example decoder and documentation a bit.
- include ecb.h to deal with compiler builtins and endianness.
- some further µ-optimisations in hot code, especially for yEnc.
- replace crc32 function by slice-by-16 version by Stephan Brumme,
which should speed up yEnc en-/decoding.
- yEnc: do not calculate two crcs per part, instead, combine
the part crcs together to form the file crc.
- yEnc: allow pcrc= in addition to pcrc32= for yenc trailers, as
some draft mentions both and it is actually in active use.
- yEnc: ignore crc32= on multiparts, except on the last part,
which avoids spurious corruption warnings.
- be more precise in documenting code licenses in COPYING.
- convert constant creation to the method I normally use.
- use common::sense.
1.62 Mon Feb 17 23:19:42 CET 2020
- major performance improvement by simplifying code in _FP_gets
to not use fscanf. This might slow things down on platforms
with very slow fgetc.
1.61 Sun Feb 9 18:38:29 CET 2020
- lint uulib: fix some format string type mismatches
and some other minor issues.
1.6 Thu Oct 24 17:11:54 CEST 2019
- fix heap overflow (testcase by Noel Duffy, reported
by Robert Scheck). The defense-in-depth mechanism based
on mmap should make this unexploitable for other than denial
of service, on systems supporting mmap/mprotect.
1.5 Sat Jul 11 03:56:06 CEST 2015
- fix a heap overflow (testcase by Krzysztof Wojtaś).
- on systems that support it (posix + mmap + map_anonymous),
allocate all dynamic areas via mmap and put four guard
pages around them, to catch similar heap overflows
safely in the future.
- find a safer way to pass in CC/CFLAGS to uulib.
- added stability canary support.
1.4 Sun May 29 17:17:01 CEST 2011
- avoid a classical buffer overflow in case a progress
message is too long.
- this release adds dependencies for snprintf/vsnprintf.
- some uuencode encoders do not generate a final "space" line
before the "end" marker, so do not rely on the line to be there.
1.34 Tue Dec 14 22:20:00 CET 2010
- fix a one-byte-past-end-write buffer overflow in UURepairData
(reported, analysed and testcase provided by Marco Walther).
- quoted-printable decoding was completely broken, try a fix.
1.33 Wed Oct 28 09:04:38 CET 2009
- handle yEnc files with part end=0 and total= more gracefully.
I wish yEnc had been created by somebody who knows;
what he does;
but I doubt he even knows;
what he did.
1.32 Wed Sep 16 20:07:13 CEST 2009
- Due to a glitch with CVS, configure lacked executable bits.
(Quickly reported by Anton Berezin).
1.31 Wed Sep 16 09:04:30 CEST 2009
- do not use system-replacements for case-insensitive string
functions when found, as they are broken on too many systems
(mostly bsds, as usual, but at least some versions of GNU/Linux
disagree with themselves apparently). Analyzed by Anton Berezin.
1.3 Sat Aug 29 01:24:35 CEST 2009
- major changes, new bugs and changes in decoding behaviour are
expected (but not intended).
- major scanning and decoding speed-up (by a factor of 4),
by replacing ultra-slow _FP_gets and improving IsKnownHeader
(but fgets is *still* responsible for >50% if the time).
- new option OPT_AUTOCHECK to disable O(n) UUCheckGlobalList
call after every loadfile, majorly speeds up large decodes
(easily by a factor of 10..100).
- allow "Smerge -1" to call UUCheckGlobalList.
- majorly speed up part insertion (still O(n), but much faster).
- allow for 1023 octet headers instead of the standard
255 octet ones.
- support strcasestr, strcasecmp, strncasecmp for added speed.
1.12 Mon Oct 13 14:11:01 CEST 2008
- use the yencode filesize as additional matching criterium
to avoid false matches.
- made the example decoder more verbose w.r.t. error handling.
- removed potentially confusing decode_temp calls from
example decoder.
1.11 Fri Jun 13 15:32:30 CEST 2008
- don't ask.
1.10 Fri Jun 13 14:22:42 CEST 2008
- fix an infinite-looping problem when scanning in freestyle
mode (testcase provided by Pieter Geens and Reinhard Pfau).
1.09 Fri May 25 19:38:11 CEST 2007
- create something sensible, trust a windows program to fuck
it up: work around literal "(null)" filenames in yenc-encoded
files.
- some minor cleanups.
1.08 Sat Dec 16 23:27:13 CET 2006
- URGENT update, the last release did not
decode files correctly, usually not at all.
- my last patch was, of course, completely bogus.
(sorry. looked simple...).
1.07 Sun Dec 10 17:41:46 CET 2006
- fixed an uninitialised variable based on analysis
and patch by Mark Martinec.
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- Update from 0.17 to 0.18
- Update of rootfile not needed
- Changelog
- Add IO::Wrap dependency to Makefile.PL (RT78412).
- Change longname() to detect names in newer versions of Outlook.
(RT78484)
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>