head 1.1; access; symbols pkgsrc-2026Q1:1.1.0.74 pkgsrc-2026Q1-base:1.1 pkgsrc-2025Q4:1.1.0.72 pkgsrc-2025Q4-base:1.1 pkgsrc-2025Q3:1.1.0.70 pkgsrc-2025Q3-base:1.1 pkgsrc-2025Q2:1.1.0.68 pkgsrc-2025Q2-base:1.1 pkgsrc-2025Q1:1.1.0.66 pkgsrc-2025Q1-base:1.1 pkgsrc-2024Q4:1.1.0.64 pkgsrc-2024Q4-base:1.1 pkgsrc-2024Q3:1.1.0.62 pkgsrc-2024Q3-base:1.1 pkgsrc-2024Q2:1.1.0.60 pkgsrc-2024Q2-base:1.1 pkgsrc-2024Q1:1.1.0.58 pkgsrc-2024Q1-base:1.1 pkgsrc-2023Q4:1.1.0.56 pkgsrc-2023Q4-base:1.1 pkgsrc-2023Q3:1.1.0.54 pkgsrc-2023Q3-base:1.1 pkgsrc-2023Q2:1.1.0.52 pkgsrc-2023Q2-base:1.1 pkgsrc-2023Q1:1.1.0.50 pkgsrc-2023Q1-base:1.1 pkgsrc-2022Q4:1.1.0.48 pkgsrc-2022Q4-base:1.1 pkgsrc-2022Q3:1.1.0.46 pkgsrc-2022Q3-base:1.1 pkgsrc-2022Q2:1.1.0.44 pkgsrc-2022Q2-base:1.1 pkgsrc-2022Q1:1.1.0.42 pkgsrc-2022Q1-base:1.1 pkgsrc-2021Q4:1.1.0.40 pkgsrc-2021Q4-base:1.1 pkgsrc-2021Q3:1.1.0.38 pkgsrc-2021Q3-base:1.1 pkgsrc-2021Q2:1.1.0.36 pkgsrc-2021Q2-base:1.1 pkgsrc-2021Q1:1.1.0.34 pkgsrc-2021Q1-base:1.1 pkgsrc-2020Q4:1.1.0.32 pkgsrc-2020Q4-base:1.1 pkgsrc-2020Q3:1.1.0.30 pkgsrc-2020Q3-base:1.1 pkgsrc-2020Q2:1.1.0.26 pkgsrc-2020Q2-base:1.1 pkgsrc-2020Q1:1.1.0.6 pkgsrc-2020Q1-base:1.1 pkgsrc-2019Q4:1.1.0.28 pkgsrc-2019Q4-base:1.1 pkgsrc-2019Q3:1.1.0.24 pkgsrc-2019Q3-base:1.1 pkgsrc-2019Q2:1.1.0.22 pkgsrc-2019Q2-base:1.1 pkgsrc-2019Q1:1.1.0.20 pkgsrc-2019Q1-base:1.1 pkgsrc-2018Q4:1.1.0.18 pkgsrc-2018Q4-base:1.1 pkgsrc-2018Q3:1.1.0.16 pkgsrc-2018Q3-base:1.1 pkgsrc-2018Q2:1.1.0.14 pkgsrc-2018Q2-base:1.1 pkgsrc-2018Q1:1.1.0.12 pkgsrc-2018Q1-base:1.1 pkgsrc-2017Q4:1.1.0.10 pkgsrc-2017Q4-base:1.1 pkgsrc-2017Q3:1.1.0.8 pkgsrc-2017Q3-base:1.1 pkgsrc-2017Q2:1.1.0.4 pkgsrc-2017Q2-base:1.1 pkgsrc-2017Q1:1.1.0.2 pkgsrc-2017Q1-base:1.1; locks; strict; comment @# @; 1.1 date 2017.02.11.02.08.16; author kamil; state Exp; branches; next ; commitid zurMFmArGHlbAtFz; desc @@ 1.1 log @Import radamsa-0.5 as devel/radamsa. Radamsa is a test case generator for robustness testing, a.k.a. a fuzzer. It is typically used to test how well a program can withstand malformed and potentially malicious inputs. It works by reading sample files of valid data and generating interestringly different outputs from them. The main selling points of radamsa are that it has already found a slew of bugs in programs that actually matter, it is easily scriptable and easy to get up and running. @ text @$NetBSD$ Install manpages into appropriate directory. --- Makefile.orig 2016-07-20 19:02:29.000000000 +0000 +++ Makefile @@@@ -39,8 +39,8 @@@@ radamsa.c: rad/*.scm install: bin/radamsa -mkdir -p $(DESTDIR)$(PREFIX)/bin cp bin/radamsa $(DESTDIR)$(PREFIX)/bin - -mkdir -p $(DESTDIR)$(PREFIX)/share/man/man1 - cat doc/radamsa.1 | gzip -9 > $(DESTDIR)$(PREFIX)/share/man/man1/radamsa.1.gz + -mkdir -p $(DESTDIR)$(PREFIX)/@@PKGMANDIR@@/man1 + cat doc/radamsa.1 | gzip -9 > $(DESTDIR)$(PREFIX)/@@PKGMANDIR@@/man1/radamsa.1.gz clean: -rm radamsa.c bin/radamsa .seal-of-quality @@@@ -78,6 +78,6 @@@@ benchmark: bin/radamsa uninstall: rm $(DESTDIR)$(PREFIX)/bin/radamsa || echo "no radamsa" - rm $(DESTDIR)$(PREFIX)/share/man/man1/radamsa.1.gz || echo "no manpage" + rm $(DESTDIR)$(PREFIX)/@@PKGMANDIR@@/man1/radamsa.1.gz || echo "no manpage" .PHONY: todo you install clean test bytecode uninstall get-owl standalone @