TODOs for libical-0.16 --------------------- libical treats properties with multiple values incorrecty -- it always seperates multiple values into multiple properties. This is not acceptable for CATEGORIES and RESOURCES. Some TEXT valued properties, like METHOD, have a limited set of valid values. The code should check that the values of these properites are valid. ( Although METHOD now uses enums, and is not really TEXT valued ) Finish implementing values ATTACH/BINARY content_type language Check for buffer overflow on external input. Error Handling Dates and times: the parser will accept many illegal date time values RECUR values ignore integers in BYDAY clauses, ie 'FREQ=MONTHLY;BYDAY=-1SU' Restrictions code does not catch lack of DTEND or DURATION For some value types, if there illegal characters in the value ( like 4.56 in an integer value), the parser will output the characters to stdout. Check all uses of strcpy and sprinf for buffer overflows Make the mime parsing code in sspm grow the list of parts as needed, rather than having a hard limit. t/cgit.cgi/'>index : freebsd-ports-gnome
FreeBSD GNOME current development ports (https://github.com/freebsd/freebsd-ports-gnome)
aboutsummaryrefslogtreecommitdiffstats
path: root/dns/bind95
Commit message (Expand)AuthorAgeFilesLines
* Fix pkg-plist by including a new file.dougb2007-12-052-0/+2
* ISC recently announced that BIND 8 has been End-of-Life'd:dougb2007-12-031-1/+1
* Update to BIND 9.4.2. Many bugs are fixed, please see the CHANGESdougb2007-12-024-17/+14
* Update to 9.4.1-P1, which has fixes for the following:dougb2007-07-252-8/+8
* - Set --mandir and --infodir in CONFIGURE_ARGS if the configure scriptrafan2007-07-231-2/+1
* Update to version 9.4.1, a security update from ISC:dougb2007-05-012-8/+8
* Update to the release version of 9.4.0.dougb2007-02-262-8/+8
* Complete the update for bind94 after the repocopy, and hook it up.dougb2007-01-294-32/+49
* Upgrade to version 9.3.4, the latest from ISC, which addresses thedougb2007-01-252-8/+8
* Apply the markup fixes from the base to the nsupdate.8 anddougb2006-12-211-0/+8
* Upgrade to version 9.3.3, the latest from ISC. This isdougb2006-12-102-8/+8
* Update to version 9.3.2-P2, which addresses the vulnerabilitydougb2006-11-032-8/+8
* Upgrade to version 9.3.2-P1, which addresses the following securitydougb2006-09-072-8/+8
* Add OPTIONS to the rest of my ports that need them.dougb2006-08-281-16/+10
* Replace ugly "@unexec rmdir %D... 2>/dev/null || true" with @dirrmtryedwin2006-01-22